WorldWideScience

Sample records for schemes protect secrets

  1. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  2. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  3. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  4. A novel secret image sharing scheme based on chaotic system

    Science.gov (United States)

    Li, Li; Abd El-Latif, Ahmed A.; Wang, Chuanjun; Li, Qiong; Niu, Xiamu

    2012-04-01

    In this paper, we propose a new secret image sharing scheme based on chaotic system and Shamir's method. The new scheme protects the shadow images with confidentiality and loss-tolerance simultaneously. In the new scheme, we generate the key sequence based on chaotic system and then encrypt the original image during the sharing phase. Experimental results and analysis of the proposed scheme demonstrate a better performance than other schemes and confirm a high probability to resist brute force attack.

  5. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  6. Efficient multiparty quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-01-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information

  7. Secret Sharing Schemes and Advanced Encryption Standard

    Science.gov (United States)

    2015-09-01

    25 4.7 Computational Example . . . . . . . . . . . . . . . . . . . . . 26 5 Side-Channel Effect on Advanced Encryption Standard ( AES ) 31...improvements, and to build upon them to discuss the side-channel effects on the Advanced Encryption Standard ( AES ). The following questions are asked...secret sharing scheme? • Can the improvements to the current secret sharing scheme prove to be beneficial in strengthening/weakening AES encryption

  8. Nonlinear Secret Image Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Sang-Ho Shin

    2014-01-01

    efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB and 1.74tlog2⁡m bit-per-pixel (bpp, respectively.

  9. Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images

    Science.gov (United States)

    Chen, Chien-Chang; Liu, Chong-An

    2013-01-01

    A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users' secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.

  10. Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.

    Science.gov (United States)

    Yuan, Lifeng; Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi

    2016-01-01

    After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t', n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.

  11. A linear construction of perfect secret sharing schemes

    NARCIS (Netherlands)

    Dijk, van M.; Santis, De A.

    1995-01-01

    In this paper, we generalize the vector space construction due to Brickell [5]. This generalization, introduced by Bertilsson [1], leads to perfect secret sharing schemes with rational information rates in which the secret can be computed efficiently by each qualified group. A one to one

  12. Verifiable Secret Redistribution for Threshold Sharing Schemes

    National Research Council Canada - National Science Library

    Wong, Theodore M; Wang, Chenxi; Wing, Jeannette M

    2002-01-01

    .... Our protocol guards against dynamic adversaries. We observe that existing protocols either cannot be readily extended to allow redistribution between different threshold schemes, or have vulnerabilities that allow faulty old shareholders...

  13. Threshold secret sharing scheme based on phase-shifting interferometry.

    Science.gov (United States)

    Deng, Xiaopeng; Shi, Zhengang; Wen, Wei

    2016-11-01

    We propose a new method for secret image sharing with the (3,N) threshold scheme based on phase-shifting interferometry. The secret image, which is multiplied with an encryption key in advance, is first encrypted by using Fourier transformation. Then, the encoded image is shared into N shadow images based on the recording principle of phase-shifting interferometry. Based on the reconstruction principle of phase-shifting interferometry, any three or more shadow images can retrieve the secret image, while any two or fewer shadow images cannot obtain any information of the secret image. Thus, a (3,N) threshold secret sharing scheme can be implemented. Compared with our previously reported method, the algorithm of this paper is suited for not only a binary image but also a gray-scale image. Moreover, the proposed algorithm can obtain a larger threshold value t. Simulation results are presented to demonstrate the feasibility of the proposed method.

  14. Security of Linear Secret-Sharing Schemes Against Mass Surveillance

    DEFF Research Database (Denmark)

    Giacomelli, Irene; Olimid, Ruxandra; Ranellucci, Samuel

    2015-01-01

    by a proprietary code that the provider (“big brother”) could manipulate to covertly violate the privacy of the users (by implementing Algorithm-Substitution Attacks or ASAs). First, we formalize the security notion that expresses the goal of big brother and prove that for any linear secret-sharing scheme...... there exists an undetectable subversion of it that efficiently allows surveillance. Second, we formalize the security notion that assures that a sharing scheme is secure against ASAs and construct the first sharing scheme that meets this notion....

  15. Privacy protection schemes for fingerprint recognition systems

    Science.gov (United States)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  16. Protection of industrial and business secrets in environmental protection law

    International Nuclear Information System (INIS)

    Breuer, R.

    1986-01-01

    The author investigates the relation between environmental protection and data protection, especially concerning the protection of industrial and business secrets. For this kind of conflict there are only general administrative and procedural provisions with little systematic order. Special provisions of data protection covering all aspects of industrial and business secrets, as for example in social or tax law, do not exist in German law until now. (WG) [de

  17. Meaningful Share Generation for Increased Number of Secrets in Visual Secret-Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Mustafa Ulutas

    2010-01-01

    Full Text Available This paper presents a new scheme for hiding two halftone secret images into two meaningful shares created from halftone cover images. Meaningful shares are more desirable than noise-like (meaningless shares in Visual Secret Sharing because they look natural and do not attract eavesdroppers' attention. Previous works in the field focus on either increasing number of secrets or creating meaningful shares for one secret image. The method outlined in this paper both increases the number of secrets and creates meaningful shares at the same time. While the contrast ratio of shares is equal to that of Extended Visual Cryptography, two secrets are encoded into two shares as opposed to one secret in the Extended Visual Cryptography. Any two natural-looking images can be used as cover unlike the Halftone Visual Cryptography method where one cover should be the negative of the other cover image and can only encode one secret. Effectiveness of the proposed method is verified by an experiment.

  18. Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow.

    Science.gov (United States)

    Pang, Liaojun; Miao, Deyu; Li, Huixian; Wang, Qiong

    2015-01-01

    Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.

  19. Standpoints and protection of business secrets

    Directory of Open Access Journals (Sweden)

    Brane Bertoncelj

    2001-06-01

    Full Text Available The human impact on an information system where data bases, containing business secretes, are stored is one of the most unreliable and unforeseeable factors. For this reason, it must not be underestimated. The results of this study indicate a correlation between behavioural intention and protection of business secretes. There is a statistically significant correlation between behavioural intention and behavioural supervision. This means that an increased level of perceived supervision over one's own behaviour is related to behavioural intention. A great majority of participants would not divulge a business secret due to internal moral factors, i.e., they possess the appropriate capabilities to determine the advantages of social moral values over personal values.

  20. Trade secrets protection mode of nuclear power plant

    International Nuclear Information System (INIS)

    Zeng Bin

    2015-01-01

    The paper analyzes the legal environment in which nuclear power enterprises are stayed, and mainly discusses the business secret protection modes of China's nuclear power enterprises. It is expected to provide a revelation and help for these enterprises to protect their business secrets. Firstly, the paper briefly expounds the legal basis of business secret protection and China's legalization status in this regard. Then it mainly puts forward the business secret management framework and postulations for nuclear power enterprises, and key points in application and protection of nuclear power business secret. (author)

  1. Cancelable remote quantum fingerprint templates protection scheme

    International Nuclear Information System (INIS)

    Liao Qin; Guo Ying; Huang Duan

    2017-01-01

    With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)

  2. System Protection Schemes in Eastern Denmark

    DEFF Research Database (Denmark)

    Rasmussen, Joana

    outages in the southern part of the 132-kV system introduce further stress in the power system, eventually leading to a voltage collapse. The local System Protection Scheme against voltage collapse is designed as a response-based scheme, which is dependent on local indication of reactive and active power...... effective measures, because they are associated with large reactive power losses in the transmission system. Ordered reduction of wind generation is considered an effective measure to maintain voltage stability in the system. Reactive power in the system is released due to tripping of a significant amount...... system. In that way, the power system capability could be extended beyond normal limits....

  3. Cryptanalysis of a semi-quantum secret sharing scheme based on Bell states

    Science.gov (United States)

    Gao, Gan; Wang, Yue; Wang, Dong

    2018-03-01

    In the paper [Mod. Phys. Lett. B 31 (2017) 1750150], Yin et al. proposed a semi-quantum secret sharing scheme by using Bell states. We find that the proposed scheme cannot finish the quantum secret sharing task. In addition, we also find that the proposed scheme has a security loophole, that is, it will not be detected that the dishonest participant, Charlie attacks on the quantum channel.

  4. Novel Quantum Secret Sharing and Controlled Communication Schemes Based on Einstein–Podolsky–Rosen Correlations

    International Nuclear Information System (INIS)

    Yuan, Li; Gui-Hua, Zeng

    2009-01-01

    Employing quantum registers, we first proposed a novel (2, 3) quantum threshold scheme based on Einstein–Podolsky–Rosen (EPR) correlations in this letter. Motivated by the present threshold scheme, we also propose a controlled communication scheme to transmit the secret message with a controller. In the communication protocol, the encoded quantum message carried by particles sequence, is transmitted by legitimate communicators

  5. SECRET SHARING SCHEMES WITH STRONG MULTIPLICATION AND A LARGE NUMBER OF PLAYERS FROM TORIC VARIETIES

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    2017-01-01

    This article consider Massey's construction for constructing linear secret sharing schemes from toric varieties over a finite field $\\Fq$ with $q$ elements. The number of players can be as large as $(q-1)^r-1$ for $r\\geq 1$. The schemes have strong multiplication, such schemes can be utilized in ...

  6. Radiation Protection Officer certification scheme. Malaysian experience

    International Nuclear Information System (INIS)

    Pungut, Noraishah; Razali, Noraini; Mod Ali, Noriah

    2011-01-01

    In Malaysia, the need for maintaining competency in radiation protection is emerging, focusing on the qualification of Radiation Protection Officers (RPO). Regulation 23 of Malaysian Radiation Protection (Basic Safety Standards) Regulations 1988, requires the applicant to employ an RPO, with the necessary knowledge, skill and training, enabling effective protection of individuals and minimizing danger to life, property and the environment for all activities sought to be licensed. An RPO must demonstrate the knowledge required, by attending RPO courses organised by an accredited agency and pass the RPO certification examination. Maintaining a high level of competency is crucial for future development of safe applications of ionising radiation. The major goal of training is to provide essential knowledge and skills and to foster correct attitudes on radiation protection and safe use of radiation sources. Assessment of the competency is through theoretical and practical examination. A standard criterion on the performance of the individuals evaluated has been established and only those who meet this criterion can be accepted as certified RPO. The National Committee for the Certification of Radiation Protection Officer (NCCRPO), comprising experts in various fields, is responsible to review and update requirements on competency of a certified RPO. With increasing number of candidates (i.e. 701 in 2008) and the international requirement for radioactive source security, it is incumbent upon the NCCRPO to improve the syllabus of the certification scheme. The introduction of a Radiation Protection Advisor (RPA) to provide service and advice to the radiation industry in Malaysia is also seriously considered. (author)

  7. Secret Sharing Schemes with a large number of players from Toric Varieties

    DEFF Research Database (Denmark)

    Hansen, Johan P.

    A general theory for constructing linear secret sharing schemes over a finite field $\\Fq$ from toric varieties is introduced. The number of players can be as large as $(q-1)^r-1$ for $r\\geq 1$. We present general methods for obtaining the reconstruction and privacy thresholds as well as conditions...... for multiplication on the associated secret sharing schemes. In particular we apply the method on certain toric surfaces. The main results are ideal linear secret sharing schemes where the number of players can be as large as $(q-1)^2-1$. We determine bounds for the reconstruction and privacy thresholds...

  8. Secret-key and identification rates for biometric identification systems with protected templates

    NARCIS (Netherlands)

    Ignatenko, T.; Willems, F.M.J.

    2010-01-01

    In this paper we consider secret generation in biometric identification systems with protected templates. This problem is closely related to the study of the bio metric identification capacity [Willems et al., 2003] and [O’Sullivan and Sclmmid, 2002] and the common randomness generation scheme

  9. 32 CFR 9.9 - Protection of State secrets.

    Science.gov (United States)

    2010-07-01

    ... FOR TRIALS BY MILITARY COMMISSIONS OF CERTAIN NON-UNITED STATES CITIZENS IN THE WAR AGAINST TERRORISM § 9.9 Protection of State secrets. Nothing in this part shall be construed to authorize disclosure of... 32 National Defense 1 2010-07-01 2010-07-01 false Protection of State secrets. 9.9 Section 9.9...

  10. Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding.

    Science.gov (United States)

    Lai, Hong; Zhang, Jun; Luo, Ming-Xing; Pan, Lei; Pieprzyk, Josef; Xiao, Fuyuan; Orgun, Mehmet A

    2016-08-12

    With prevalent attacks in communication, sharing a secret between communicating parties is an ongoing challenge. Moreover, it is important to integrate quantum solutions with classical secret sharing schemes with low computational cost for the real world use. This paper proposes a novel hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding. To be exact, we employ entangled states prepared by m-bonacci sequences to detect eavesdropping. Meanwhile, we encode m-bonacci sequences in Lagrange interpolation polynomials to generate the shares of a secret with reverse Huffman-Fibonacci-tree coding. The advantages of the proposed scheme is that it can detect eavesdropping without joint quantum operations, and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth. Also, in comparison with existing quantum secret sharing schemes, it still works when there are dynamic changes, such as the unavailability of some quantum channel, the arrival of new participants and the departure of participants. Finally, we provide security analysis of the new hybrid quantum secret sharing scheme and discuss its useful features for modern applications.

  11. A new (k,n verifiable secret image sharing scheme (VSISS

    Directory of Open Access Journals (Sweden)

    Amitava Nag

    2014-11-01

    Full Text Available In this paper, a new (k,n verifiable secret image sharing scheme (VSISS is proposed in which third order LFSR (linear-feedback shift register-based public key cryptosystem is applied for the cheating prevention and preview before decryption. In the proposed scheme the secret image is first partitioned into several non-overlapping blocks of k pixels. Every k pixel is then used to form m=⌈k/4⌉+1 pixels of one encrypted share. The original secret image can be reconstructed by gathering any k or more encrypted shared images. The experimental results show that the proposed VSISS is an efficient and safe method.

  12. Machine protection schemes for the SLC

    International Nuclear Information System (INIS)

    Ross, M.C.

    1991-01-01

    The beamline components of a linear collider must be protected from high power beams in a way that is both reliable and has a minimum impact on integrated luminosity. When an upstream accelerator component fault occurs, the machine protection system suppresses the appropriate beam pulses and restores them when the fault clears or is compensated for. If an unacceptable localized beam loss is detected, without an accompanying component fault that is a likely cause of the loss, the system must provide identical, lower rate (lower average power), beam pulses to be used for diagnosis. This must not be done at the expense of any upstream beam stabilization system since fault diagnosis and recovery may take some time. Since the SLC beam pulse sequence is a regenerative one, i.e. correct function on a given pulse requires that several preceding pulses have been successfully completed, beam pulse repetition rate limiting is not trivial. Smooth, rapid, recovery from this type of fault is very important and can have a significant impact on luminosity. This paper provides an overview of the beam suppression and repetition rate limiting schemes used at the SLC

  13. Secret data embedding scheme modifying the frequency of ...

    Indian Academy of Sciences (India)

    The main purpose of this presented work is to develop a data embedding method based on a new digital image histogram modification approach. The proposed scheme fundamentally is concerned about the frequency of occurrence of the image brightness values of the cover image for the data embedding procedures.

  14. Secret data embedding scheme modifying the frequency of ...

    Indian Academy of Sciences (India)

    such as banking, e-commerce, e-signature, distance learning, e-government ... received a growing attention in conjunction with the new tools and methods ... Essential points of the image processing and data embedding are clarified in the next section. ..... The proposed scheme's numerical performance is shown in table 6.

  15. Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks

    KAUST Repository

    Shafie, Ahmed El

    2017-06-12

    This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been previously shared between Alice and Bob during the perfectly secured time slots (i.e., when the channel secrecy rate is positive). The secret-key bits exchanged between Alice and Bob are stored in a finite-length buffer and are used to secure data transmission whenever needed. We model the secret-key buffer as a queueing system and analyze its Markov chain. Our numerical results show the gains of our proposed scheme relative to benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure throughput.

  16. Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks

    KAUST Repository

    Shafie, Ahmed El; Salem, Ahmed Sultan; Mabrouk, Asma; Tourki, Kamel; Al-Dhahir, Naofal

    2017-01-01

    This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been previously shared between Alice and Bob during the perfectly secured time slots (i.e., when the channel secrecy rate is positive). The secret-key bits exchanged between Alice and Bob are stored in a finite-length buffer and are used to secure data transmission whenever needed. We model the secret-key buffer as a queueing system and analyze its Markov chain. Our numerical results show the gains of our proposed scheme relative to benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure throughput.

  17. Optical threshold secret sharing scheme based on basic vector operations and coherence superposition

    Science.gov (United States)

    Deng, Xiaopeng; Wen, Wei; Mi, Xianwu; Long, Xuewen

    2015-04-01

    We propose, to our knowledge for the first time, a simple optical algorithm for secret image sharing with the (2,n) threshold scheme based on basic vector operations and coherence superposition. The secret image to be shared is firstly divided into n shadow images by use of basic vector operations. In the reconstruction stage, the secret image can be retrieved by recording the intensity of the coherence superposition of any two shadow images. Compared with the published encryption techniques which focus narrowly on information encryption, the proposed method can realize information encryption as well as secret sharing, which further ensures the safety and integrality of the secret information and prevents power from being kept centralized and abused. The feasibility and effectiveness of the proposed method are demonstrated by numerical results.

  18. Nigeria's first national social protection scheme | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-06-14

    Jun 14, 2017 ... Women and children at an IDP Camp in DRC ... The cash transfer was provided through the Nigerian Ekiti State Social Security Scheme, ... national policy conference to discuss the findings with media and policy stakeholders.

  19. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    Science.gov (United States)

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  20. A disclosure scheme for protecting the victims of domestic violence.

    Science.gov (United States)

    Griffith, Richard

    2017-06-08

    Richard Griffith, Senior Lecturer in Health Law at Swansea University, explains how the Domestic Violence Disclosure Scheme aims to protect potential victims by allowing disclosure of a partner's previous crimes.

  1. Quantum-Secret-Sharing Scheme Based on Local Distinguishability of Orthogonal Seven-Qudit Entangled States

    Science.gov (United States)

    Liu, Cheng-Ji; Li, Zhi-Hui; Bai, Chen-Ming; Si, Meng-Meng

    2018-02-01

    The concept of judgment space was proposed by Wang et al. (Phys. Rev. A 95, 022320, 2017), which was used to study some important properties of quantum entangled states based on local distinguishability. In this study, we construct 15 kinds of seven-qudit quantum entangled states in the sense of permutation, calculate their judgment space and propose a distinguishability rule to make the judgment space more clearly. Based on this rule, we study the local distinguishability of the 15 kinds of seven-qudit quantum entangled states and then propose a ( k, n) threshold quantum secret sharing scheme. Finally, we analyze the security of the scheme.

  2. Design of an adaptive overcurrent protection scheme for microgrids ...

    African Journals Online (AJOL)

    Microgrid is a new phenomenon regarded to Distributed Generation (DG) penetration in the existing distribution systems. In this paper adaptive over current (OC) protection technique for a distribution system with DG penetration is proposed. This scheme takes into account general protection requirements, impacts of DG on ...

  3. A novel lost packets recovery scheme based on visual secret sharing

    Science.gov (United States)

    Lu, Kun; Shan, Hong; Li, Zhi; Niu, Zhao

    2017-08-01

    In this paper, a novel lost packets recovery scheme which encrypts the effective parts of an original packet into two shadow packets based on (2, 2)-threshold XOR-based visual Secret Sharing (VSS) is proposed. The two shadow packets used as watermarks would be embedded into two normal data packets with digital watermarking embedding technology and then sent from one sensor node to another. Each shadow packet would reveal no information of the original packet, which can improve the security of original packet delivery greatly. The two shadow packets which can be extracted from the received two normal data packets delivered from a sensor node can recover the original packet lossless based on XOR-based VSS. The Performance analysis present that the proposed scheme provides essential services as long as possible in the presence of selective forwarding attack. The proposed scheme would not increase the amount of additional traffic, namely, lower energy consumption, which is suitable for Wireless Sensor Network (WSN).

  4. Lightning protection scheme for the CPRF/ZTH system complex

    International Nuclear Information System (INIS)

    Konkel, H.

    1987-01-01

    This paper describes some of the background in the design and the lightning protection and grounding scheme recommended for the CPRF/ZTH system at the Los Alamos Laboratory. Standard power industry practices were applied to minimize the effect on both the system and personnel of a high magnitude, direct lightning discharge in the CPRF/ZTH area. The recommended scheme is in compliance with existing local and national electric and safety codes. 7 refs., 3 figs

  5. Shamir secret sharing scheme with dynamic access structure (SSSDAS). Case study on nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Thiyagarajan, P.; Thandra, Prasanth Kumar; Rajan, J.; Satyamurthy, S.A.V. [Indira Gandhi Centre for Atomic Research (IGCAR), Kalpakkam (India). Computer Div.; Aghila, G. [National Institute of Technology, Karaikal (India). Dept. of Computer Science and Engineering

    2015-05-15

    In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.

  6. Shamir secret sharing scheme with dynamic access structure (SSSDAS). Case study on nuclear power plant

    International Nuclear Information System (INIS)

    Thiyagarajan, P.; Thandra, Prasanth Kumar; Rajan, J.; Satyamurthy, S.A.V.; Aghila, G.

    2015-01-01

    In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.

  7. Efficient quantum secret sharing scheme with two-particle entangled states

    International Nuclear Information System (INIS)

    Zhu Zhen-Chao; Fu An-Min; Zhang Yu-Qing

    2011-01-01

    This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time. (general)

  8. A secure data outsourcing scheme based on Asmuth-Bloom secret sharing

    Science.gov (United States)

    Idris Muhammad, Yusuf; Kaiiali, Mustafa; Habbal, Adib; Wazan, A. S.; Sani Ilyasu, Auwal

    2016-11-01

    Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users' queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients' data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth-Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing.

  9. Community Based Health Insurance Schemes and Protection of the ...

    African Journals Online (AJOL)

    The objectives of this study are two folds: firstly to explore the magnitude of catastrophic expenditure, and secondly to determine its contributing factor,s including the protective impact of the voluntary community based health insurance schemes in Tanzania. The study covered 274 respondents. Study findings have shown ...

  10. Novel Directional Protection Scheme for the FREEDM Smart Grid System

    Science.gov (United States)

    Sharma, Nitish

    This research primarily deals with the design and validation of the protection system for a large scale meshed distribution system. The large scale system simulation (LSSS) is a system level PSCAD model which is used to validate component models for different time-scale platforms, to provide a virtual testing platform for the Future Renewable Electric Energy Delivery and Management (FREEDM) system. It is also used to validate the cases of power system protection, renewable energy integration and storage, and load profiles. The protection of the FREEDM system against any abnormal condition is one of the important tasks. The addition of distributed generation and power electronic based solid state transformer adds to the complexity of the protection. The FREEDM loop system has a fault current limiter and in addition, the Solid State Transformer (SST) limits the fault current at 2.0 per unit. Former students at ASU have developed the protection scheme using fiber-optic cable. However, during the NSF-FREEDM site visit, the National Science Foundation (NSF) team regarded the system incompatible for the long distances. Hence, a new protection scheme with a wireless scheme is presented in this thesis. The use of wireless communication is extended to protect the large scale meshed distributed generation from any fault. The trip signal generated by the pilot protection system is used to trigger the FID (fault isolation device) which is an electronic circuit breaker operation (switched off/opening the FIDs). The trip signal must be received and accepted by the SST, and it must block the SST operation immediately. A comprehensive protection system for the large scale meshed distribution system has been developed in PSCAD with the ability to quickly detect the faults. The validation of the protection system is performed by building a hardware model using commercial relays at the ASU power laboratory.

  11. A Novel Multiparty Quantum Secret Sharing Scheme of Secure Direct Communication Based on Bell States and Bell Measurements

    International Nuclear Information System (INIS)

    Shi Run-Hua; Huang Liu-Sheng; Yang Wei; Zhong Hong

    2011-01-01

    We present a novel quantum secret sharing scheme of secure direct communication and analyze its security. This scheme takes Einstein—Podolsky—Rosen (EPR) pairs in Bell states as quantum resources. In order to obtain the direct communication message, all agents only need to perform Bell measurements, not to perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is unnecessary except for the eavesdropping checks. (general)

  12. Social Protection Schemes in Pakistan: assessment of existing programs

    Directory of Open Access Journals (Sweden)

    Yu ShuHong

    2017-07-01

    Full Text Available Social protection is regarded as a basic human right guaranteed in several International Covenants and Treaties. The Constitution of Pakistan exclusively stipulates the provision of social security for all citizens of the country. The aim of the study is to explore and evaluate the social protection schemes with regards to its coverage, scope and outreach. The country has number of social security schemes that are being carried out by provincial and federal governments for the welfare of workers like old age benefits, disablement, health and medical facilities. However, these schemes have failed to extend their benefits to home based, part-time, temporary or contract and agricultural workers. This paper attempts to highlight the shortcomings of existing social protection programs that are obstructing their benefit distribution and limiting their outreach. It underlines the challenges faced by the implementing agencies. This paper also suggests some improvements in the structural design of social security mechanism with special focus on the scope, coverage, outreach and effective delivery mechanism. Since, the proper allocation of resources and effective implementation of these schemes can ensure the assistance and welfare of the targeted population.

  13. Fast rerouting schemes for protected mobile IP over MPLS networks

    Science.gov (United States)

    Wen, Chih-Chao; Chang, Sheng-Yi; Chen, Huan; Chen, Kim-Joan

    2005-10-01

    Fast rerouting is a critical traffic engineering operation in the MPLS networks. To implement the Mobile IP service over the MPLS network, one can collaborate with the fast rerouting operation to enhance the availability and survivability. MPLS can protect critical LSP tunnel between Home Agent (HA) and Foreign Agent (FA) using the fast rerouting scheme. In this paper, we propose a simple but efficient algorithm to address the triangle routing problem for the Mobile IP over the MPLS networks. We consider this routing issue as a link weighting and capacity assignment (LW-CA) problem. The derived solution is used to plan the fast restoration mechanism to protect the link or node failure. In this paper, we first model the LW-CA problem as a mixed integer optimization problem. Our goal is to minimize the call blocking probability on the most congested working truck for the mobile IP connections. Many existing network topologies are used to evaluate the performance of our scheme. Results show that our proposed scheme can obtain the best performance in terms of the smallest blocking probability compared to other schemes.

  14. Superconducting synchrotron power supply and quench protection scheme

    International Nuclear Information System (INIS)

    Stiening, R.; Flora, R.; Lauckner, R.; Tool, G.

    1978-01-01

    The power supply and quench protection scheme for the proposed Fermilab 6 km circumference superconducting synchrotron is described. Specifically, the following points are discussed: (1) the 46 MW thyristor power supply; (2) the 3 x 10 8 J emergency energy dump; (3) the distributed microprocessing system for the detection of quenches; (4) the thyristor network for shunting current around quenched magnets; and (5) the heaters internal to the magnets which cause rapid propagation of quenches. Test results on prototype systems are given

  15. An adaptive secret key-directed cryptographic scheme for secure transmission in wireless sensor networks

    International Nuclear Information System (INIS)

    Muhammad, K.; Jan, Z.; Khan, Z

    2015-01-01

    Wireless Sensor Networks (WSNs) are memory and bandwidth limited networks whose main goals are to maximize the network lifetime and minimize the energy consumption and transmission cost. To achieve these goals, different techniques of compression and clustering have been used. However, security is an open and major issue in WSNs for which different approaches are used, both in centralized and distributed WSNs' environments. This paper presents an adaptive cryptographic scheme for secure transmission of various sensitive parameters, sensed by wireless sensors to the fusion center for further processing in WSNs such as military networks. The proposed method encrypts the sensitive captured data of sensor nodes using various encryption procedures (bitxor operation, bits shuffling, and secret key based encryption) and then sends it to the fusion center. At the fusion center, the received encrypted data is decrypted for taking further necessary actions. The experimental results with complexity analysis, validate the effectiveness and feasibility of the proposed method in terms of security in WSNs. (author)

  16. Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop

    Directory of Open Access Journals (Sweden)

    Su-Hyun Kim

    2014-07-01

    Full Text Available In a cloud computing environment, user data is encrypted and stored using a large number of distributed servers. Global Internet service companies such as Google and Yahoo have recognized the importance of Internet service platforms and conducted their own research and development to utilize large cluster-based cloud computing platform technologies based on low-cost commercial off-the-shelf nodes. Accordingly, as various data services are now allowed over a distributed computing environment, distributed management of big data has become a major issue. On the other hand, security vulnerability and privacy infringement due to malicious attackers or internal users can occur by means of various usage types of big data. In particular, various security vulnerabilities can occur in the block access token, which is used for the permission control of data blocks in Hadoop. To solve this problem, we have proposed a weight-applied XOR-based efficient distribution storage and recovery scheme in this paper. In particular, various security vulnerabilities can occur in the block access token, which is used for the permission control of data blocks in Hadoop. In this paper, a secret sharing-based block access token management scheme is proposed to overcome such security vulnerabilities.

  17. On-Line Generation and Arming of System Protection Schemes

    DEFF Research Database (Denmark)

    Pedersen, Andreas Søndergaard; Blanke, Mogens; Møller, Jakob Glarbo

    2016-01-01

    This paper presents a new method to automatically generate system protection schemes in real-time, where contingencies are filtered using a method providing N– 1 system snapshots. With future power systems consisting largely of renewable distributed generation with time-varying production, highly....... The method is based on a recently proposed method of calculating post-contingency Thevenin equivalents, which are used to assess the security of the post-contingency condition. The contingencies that violate the emergency limits are contained by pre-determining event-based remedial actions. The instability...

  18. Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate

    International Nuclear Information System (INIS)

    Chau, H.F.

    2002-01-01

    A secret key shared through quantum key distribution between two cooperative players is secure against any eavesdropping attack allowed by the laws of physics. Yet, such a key can be established only when the quantum channel error rate due to eavesdropping or imperfect apparatus is low. Here, a practical quantum key distribution scheme by making use of an adaptive privacy amplification procedure with two-way classical communication is reported. Then, it is proven that the scheme generates a secret key whenever the bit error rate of the quantum channel is less than 0.5-0.1√(5)≅27.6%, thereby making it the most error resistant scheme known to date

  19. Saturation Detection-Based Blocking Scheme for Transformer Differential Protection

    Directory of Open Access Journals (Sweden)

    Byung Eun Lee

    2014-07-01

    Full Text Available This paper describes a current differential relay for transformer protection that operates in conjunction with a core saturation detection-based blocking algorithm. The differential current for the magnetic inrush or over-excitation has a point of inflection at the start and end of each saturation period of the transformer core. At these instants, discontinuities arise in the first-difference function of the differential current. The second- and third-difference functions convert the points of inflection into pulses, the magnitudes of which are large enough to detect core saturation. The blocking signal is activated if the third-difference of the differential current is larger than the threshold and is maintained for one cycle. In addition, a method to discriminate between transformer saturation and current transformer (CT saturation is included. The performance of the proposed blocking scheme was compared with that of a conventional harmonic blocking method. The test results indicate that the proposed scheme successfully discriminates internal faults even with CT saturation from the magnetic inrush, over-excitation, and external faults with CT saturation, and can significantly reduce the operating time delay of the relay.

  20. Overview and Example Test Results of Modern Pilot Schemes for Coordination of Line Distance Protection Relays

    OpenAIRE

    Emil Bartosiewicz; Ryszard Kowalik; Marcin Januszewski

    2014-01-01

    The paper presents a short review of pilot schemes which are available in modern line distance protection relays, and example results of common pilot scheme tests with the testing methods description. Some differences in implementations of selected pilot schemes have been shown for comparison reasons. Distance protection coordination functions have been tested for GE Multilin UR series devices. Every type of available pilot scheme has been checked in synthetic tests and during the real ...

  1. The constitutional protection of trade secrets and patents under the Biologics Price Competition and Innovation Act of 2009.

    Science.gov (United States)

    Epstein, Richard A

    2011-01-01

    The Biologics Price Competition and Innovation Act of 2009 ("Biosimilars Act") is for the field of pharmaceutical products the single most important legislative development since passage of the Drug Price Competition and Patent Term Restoration Act of 1984 ("Hatch-Waxman Act"), on which portions of the Biosimilars Act are clearly patterned. Congress revised section 351 of the Public Health Service Act (PHSA) to create a pathway for FDA approval of "biosimilar" biological products. Each biosimilar applicant is required to cite in its application a "reference product" that was approved on the basis of a full application containing testing data and manufacturing information, which is owned and was submitted by another company and much of which constitutes trade secret information subject to constitutional protection. Because the Biosimilars Act authorizes biosimilar applicants to cite these previously approved applications, the implementation of the new legislative scheme raises critical issues under the Fifth Amendment of the Constitution, pursuant to which private property--trade secrets included--may not be taken for public use, without "just compensation." FDA must confront those issues as it implements the scheme set out in the Biosimilars Act. This article will discuss these issues, after providing a brief overview of the Biosimilars Act and a more detailed examination of the law of trade secrets.

  2. Protection of business and industrial secrets under the Atomic Energy Act and the relevant ordinances governing licensing and supervisory procedures

    International Nuclear Information System (INIS)

    Steinberg, R.

    1988-01-01

    The article deals with problems concerning the protection of secret information in licensing and supervisory procedures under the Atomic Energy Act and the relevant ordinances. The extent of the secret protection of business and industrial secrets is regulated differently for both procedures. These legal provisions have to be interpreted with due consideration for third party interests in information. (WG) [de

  3. A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards

    Science.gov (United States)

    Son, Kyungho; Han, Dong-Guk; Won, Dongho

    In this work we propose a novel smart card based privacy-protecting authentication scheme for roaming services. Our proposal achieves so-called Class 2 privacy protection, i.e., no information identifying a roaming user and also linking the user's behaviors is not revealed in a visited network. It can be used to overcome the inherent structural flaws of smart card based anonymous authentication schemes issued recently. As shown in our analysis, our scheme is computationally efficient for a mobile user.

  4. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    Science.gov (United States)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  5. Molecular mechanisms of lipoapoptosis and metformin protection in GLP-1 secreting cells

    DEFF Research Database (Denmark)

    Kappe, Camilla; Holst, Jens Juul; Zhang, Qimin

    2012-01-01

    Evidence is emerging that elevated serum free fatty acids (hyperlipidemia) contribute to the pathogenesis of type-2-diabetes, and lipotoxicity is observed in many cell types. We recently published data indicating lipotoxic effects of simulated hyperlipidemia also in GLP-1-secreting cells, where...... the antidiabetic drug metformin conferred protection from lipoapoptosis. The aim of the present study was to identify mechanisms involved in mediating lipotoxicity and metformin lipoprotection in GLP-1 secreting cells. These signaling events triggered by simulated hyperlipidemia may underlie reduced GLP-1...... secretion in diabetic subjects, and metformin lipoprotection by metformin could explain elevated plasma GLP-1 levels in diabetic patients on chronic metformin therapy. The present study may thus identify potential molecular targets for increasing endogenous GLP-1 secretion through enhanced viability of GLP...

  6. Protection Scheme for Modular Multilevel Converters under Diode Open-Circuit Faults

    DEFF Research Database (Denmark)

    Deng, Fujin; Zhu, Rongwu; Liu, Dong

    2018-01-01

    devices. The diode open-circuit fault in the submodule (SM) is an important issue for the MMC, which would affect the performance of the MMC and disrupt the operation of the MMC. This paper analyzes the impact of diode open-circuit failures in the SMs on the performance of the MMC and proposes...... a protection scheme for the MMC under diode open-circuit faults. The proposed protection scheme not only can effectively eliminate the possible caused high voltage due to the diode open-circuit fault but also can quickly detect the faulty SMs, which effectively avoids the destruction and protects the MMC....... The proposed protection scheme is verified with a downscale MMC prototype in the laboratory. The results confirm the effectiveness of the proposed protection scheme for the MMC under diode open-circuit faults....

  7. The trade secrets protection in U.S. and in Europe: a comparative study

    Directory of Open Access Journals (Sweden)

    Chiara Gaido

    2017-12-01

    Full Text Available Only by deeply understanding the new laws that govern trade secrets protection in the United States and Europe, companies will be able to effectively protect their own trade secrets. The purpose of this paper is to highlight the similarities and differences between both regulations to give useful guidelines to international companies who deal in both geographical areas. Therefore, the paper will focus first on the economic value of trade secrets and the costs related to cybercrime and cyberespionage. Then, it will analyze the US and EU historical legal backgrounds that brought to the adoption of both laws. Finally, this article will make a comparative analysis of the provisions in each law. Hence, the paper makes potential suggestions for companies that deal in both regimes.

  8. Overview and Example Test Results of Modern Pilot Schemes for Coordination of Line Distance Protection Relays

    Directory of Open Access Journals (Sweden)

    Emil Bartosiewicz

    2014-03-01

    Full Text Available The paper presents a short review of pilot schemes which are available in modern line distance protection relays, and example results of common pilot scheme tests with the testing methods description. Some differences in implementations of selected pilot schemes have been shown for comparison reasons. Distance protection coordination functions have been tested for GE Multilin UR series devices. Every type of available pilot scheme has been checked in synthetic tests and during the real coordination between D60 and D90Plus devices. For the POTT scheme, coordination between two L90 protections has been carried out by a sort of available different data communication link types, for comparison reasons too.

  9. Adaptive protection coordination scheme for distribution network with distributed generation using ABC

    Directory of Open Access Journals (Sweden)

    A.M. Ibrahim

    2016-09-01

    Full Text Available This paper presents an adaptive protection coordination scheme for optimal coordination of DOCRs in interconnected power networks with the impact of DG, the used coordination technique is the Artificial Bee Colony (ABC. The scheme adapts to system changes; new relays settings are obtained as generation-level or system-topology changes. The developed adaptive scheme is applied on the IEEE 30-bus test system for both single- and multi-DG existence where results are shown and discussed.

  10. Unequal Error Protected JPEG 2000 Broadcast Scheme with Progressive Fountain Codes

    OpenAIRE

    Chen, Zhao; Xu, Mai; Yin, Luiguo; Lu, Jianhua

    2012-01-01

    This paper proposes a novel scheme, based on progressive fountain codes, for broadcasting JPEG 2000 multimedia. In such a broadcast scheme, progressive resolution levels of images/video have been unequally protected when transmitted using the proposed progressive fountain codes. With progressive fountain codes applied in the broadcast scheme, the resolutions of images (JPEG 2000) or videos (MJPEG 2000) received by different users can be automatically adaptive to their channel qualities, i.e. ...

  11. Genetic secrets: Protecting privacy and confidentiality in the genetic era

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-07-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  12. A concatenated coding scheme for biometric template protection

    NARCIS (Netherlands)

    Shao, X.; Xu, H.; Veldhuis, Raymond N.J.; Slump, Cornelis H.

    2012-01-01

    Cryptography may mitigate the privacy problem in biometric recognition systems. However, cryptography technologies lack error-tolerance and biometric samples cannot be reproduced exactly, rising the robustness problem. The biometric template protection system needs a good feature extraction

  13. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0083] Privacy Act of 1974; Department of Homeland Security/United States Secret Service--004 Protection Information System... Security (DHS)/United States Secret Service (USSS)-004 System name: DHS/USSS-004 Protection Information...

  14. Wavelet Based Protection Scheme for Multi Terminal Transmission System with PV and Wind Generation

    Science.gov (United States)

    Manju Sree, Y.; Goli, Ravi kumar; Ramaiah, V.

    2017-08-01

    A hybrid generation is a part of large power system in which number of sources usually attached to a power electronic converter and loads are clustered can operate independent of the main power system. The protection scheme is crucial against faults based on traditional over current protection since there are adequate problems due to fault currents in the mode of operation. This paper adopts a new approach for detection, discrimination of the faults for multi terminal transmission line protection in presence of hybrid generation. Transient current based protection scheme is developed with discrete wavelet transform. Fault indices of all phase currents at all terminals are obtained by analyzing the detail coefficients of current signals using bior 1.5 mother wavelet. This scheme is tested for different types of faults and is found effective for detection and discrimination of fault with various fault inception angle and fault impedance.

  15. A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection

    Science.gov (United States)

    Ahmed, Fawad; Sattar, Farook; Siyal, Mohammed Yakoob; Yu, Dan

    2006-12-01

    We propose a secure watermarking scheme that integrates watermarking with cryptography for addressing some important issues in copyright protection. We address three copyright protection issues—buyer-seller identification, copyright infringement, and ownership verification. By buyer-seller identification, we mean that a successful watermark extraction at the buyer's end will reveal the identities of the buyer and seller of the watermarked image. For copyright infringement, our proposed scheme enables the seller to identify the specific buyer from whom an illegal copy of the watermarked image has originated, and further prove this fact to a third party. For multiple ownership claims, our scheme enables a legal seller to claim his/her ownership in the court of law. We will show that the combination of cryptography with watermarking not only increases the security of the overall scheme, but it also enables to associate identities of buyer/seller with their respective watermarked images.

  16. Adaptive Protection Scheme for a Distribution System Considering Grid-Connected and Islanded Modes of Operation

    Directory of Open Access Journals (Sweden)

    Yavuz Ates

    2016-05-01

    Full Text Available The renewable energy-based distributed generation (DG implementation in power systems has been an active research area during the last few decades due to several environmental, economic and political factors. Although the integration of DG offers many advantages, several concerns, including protection schemes in systems with the possibility of bi-directional power flow, are raised. Thus, new protection schemes are strongly required in power systems with a significant presence of DG. In this study, an adaptive protection strategy for a distribution system with DG integration is proposed. The proposed strategy considers both grid-connected and islanded operating modes, while the adaptive operation of the protection is dynamically realized considering the availability of DG power production (related to faults or meteorological conditions in each time step. Besides, the modular structure and fast response of the proposed strategy is validated via simulations conducted on the IEEE 13-node test system.

  17. Effects of Distributed Generation on Overcurrent Relay Coordination and an Adaptive Protection Scheme

    Science.gov (United States)

    Ilik, Semih C.; Arsoy, Aysen B.

    2017-07-01

    Integration of distributed generation (DG) such as renewable energy sources to electrical network becomes more prevalent in recent years. Grid connection of DG has effects on load flow directions, voltage profile, short circuit power and especially protection selectivity. Applying traditional overcurrent protection scheme is inconvenient when system reliability and sustainability are considered. If a fault happens in DG connected network, short circuit contribution of DG, creates additional branch element feeding the fault current; compels to consider directional overcurrent (OC) protection scheme. Protection coordination might get lost for changing working conditions when DG sources are connected. Directional overcurrent relay parameters are determined for downstream and upstream relays when different combinations of DG connected singular or plural, on radial test system. With the help of proposed flow chart, relay parameters are updated and coordination between relays kept sustained for different working conditions in DigSILENT PowerFactory program.

  18. A Novel Dedicated Route Protection Scheme for Survivability of Link Failure in Elastic Optical Networks

    Directory of Open Access Journals (Sweden)

    Sridhar Iyer

    2017-11-01

    Full Text Available The spectrally efficient transportation of the high bit rate(s data is achievable by the Elastic optical networks (EONs. However, in the EONs, owing to the failure occurrence even in an individual simple element, different service(s maybe interrupted. Hence, it is imperative that the schemes for survivability be developed so that the issues due to the possible failure(s can be overcome. In the current work, in view of survivability of the link failure(s in the EONs, we propose the Spectrum Continuity and Contiguity Established DRP (SCC-E-DRP algorithm which is a novel dedicated route protection (DRP scheme that attempts to avoid the problem of trap topology during its exploration for a pair of link disjoint path. Further, to evaluate the link disjoint paths, we resort to the use of the SCC Established Shortest Route (SCC-E-SR algorithm which is a modified Dijkstra’s algorithm based scheme that selects the path(s pair(s based on the end-toend SCC. We conduct extensive simulations considering realistic network topologies, and compare the performance of the SCCE-DRP scheme with the existing techniques. The obtained results show that, compared to the existing schemes, the SCC-E-DRP scheme achieves better results in terms of blocking probability.

  19. An efficient hybrid protection scheme with shared/dedicated backup paths on elastic optical networks

    Directory of Open Access Journals (Sweden)

    Nogbou G. Anoh

    2017-02-01

    Full Text Available Fast recovery and minimum utilization of resources are the two main criteria for determining the protection scheme quality. We address the problem of providing a hybrid protection approach on elastic optical networks under contiguity and continuity of available spectrum constraints. Two main hypotheses are used in this paper for backup paths computation. In the first case, it is assumed that backup paths resources are dedicated. In the second case, the assumption is that backup paths resources are available shared resources. The objective of the study is to minimize spectrum utilization to reduce blocking probability on a network. For this purpose, an efficient survivable Hybrid Protection Lightpath (HybPL algorithm is proposed for providing shared or dedicated backup path protection based on the efficient energy calculation and resource availability. Traditional First-Fit and Best-Fit schemes are employed to search and assign the available spectrum resources. The simulation results show that HybPL presents better performance in terms of blocking probability, compared with the Minimum Resources Utilization Dedicated Protection (MRU-DP algorithm which offers better performance than the Dedicated Protection (DP algorithm.

  20. BossPro: a biometrics-based obfuscation scheme for software protection

    Science.gov (United States)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    This paper proposes to integrate biometric-based key generation into an obfuscated interpretation algorithm to protect authentication application software from illegitimate use or reverse-engineering. This is especially necessary for mCommerce because application programmes on mobile devices, such as Smartphones and Tablet-PCs are typically open for misuse by hackers. Therefore, the scheme proposed in this paper ensures that a correct interpretation / execution of the obfuscated program code of the authentication application requires a valid biometric generated key of the actual person to be authenticated, in real-time. Without this key, the real semantics of the program cannot be understood by an attacker even if he/she gains access to this application code. Furthermore, the security provided by this scheme can be a vital aspect in protecting any application running on mobile devices that are increasingly used to perform business/financial or other security related applications, but are easily lost or stolen. The scheme starts by creating a personalised copy of any application based on the biometric key generated during an enrolment process with the authenticator as well as a nuance created at the time of communication between the client and the authenticator. The obfuscated code is then shipped to the client's mobile devise and integrated with real-time biometric extracted data of the client to form the unlocking key during execution. The novelty of this scheme is achieved by the close binding of this application program to the biometric key of the client, thus making this application unusable for others. Trials and experimental results on biometric key generation, based on client's faces, and an implemented scheme prototype, based on the Android emulator, prove the concept and novelty of this proposed scheme.

  1. Voltage protection scheme for MG sets used to drive inductive energy storage systems

    International Nuclear Information System (INIS)

    Campen, G.L.; Easter, R.B.

    1977-01-01

    A recent tokamak proposal at ORNL called for MG (motor-generator) sets to drive the ohmic heating (OH] coil, which was to be subjected to 20 kV immediately after coil charge-up to initiate the experiment. Since most rotating machinery is inherently low voltage, including the machines available at ORNL, a mechanism was necessary to isolate the generators from the high voltage portions of the circuit before the appearance of this voltage. It is not the expected 20 kV at the coil that causes difficulty, because the main interrupting switch handles this. The voltage induced in the armature due to di/dt and the possibility of faults are the greatest causes for concern and are responsible for the complexity of the voltage protection scheme, which must accommodate any possible combination of fault time and location. Such a protection scheme is presented in this paper

  2. Filaggrin-dependent secretion of sphingomyelinase protects against staphylococcal α-toxin-induced keratinocyte death.

    Science.gov (United States)

    Brauweiler, Anne M; Bin, Lianghua; Kim, Byung Eui; Oyoshi, Michiko K; Geha, Raif S; Goleva, Elena; Leung, Donald Y M

    2013-02-01

    The skin of patients with atopic dermatitis (AD) has defects in keratinocyte differentiation, particularly in expression of the epidermal barrier protein filaggrin. AD skin lesions are often exacerbated by Staphylococcus aureus-mediated secretion of the virulence factor α-toxin. It is unknown whether lack of keratinocyte differentiation predisposes to enhanced lethality from staphylococcal toxins. We investigated whether keratinocyte differentiation and filaggrin expression protect against cell death induced by staphylococcal α-toxin. Filaggrin-deficient primary keratinocytes were generated through small interfering RNA gene knockdown. RNA expression was determined by using real-time PCR. Cell death was determined by using the lactate dehydrogenase assay. Keratinocyte cell survival in filaggrin-deficient (ft/ft) mouse skin biopsies was determined based on Keratin 5 staining. α-Toxin heptamer formation and acid sphingomyelinase expression were determined by means of immunoblotting. We found that filaggrin expression, occurring as the result of keratinocyte differentiation, significantly inhibits staphylococcal α-toxin-mediated pathogenicity. Furthermore, filaggrin plays a crucial role in protecting cells by mediating the secretion of sphingomyelinase, an enzyme that reduces the number of α-toxin binding sites on the keratinocyte surface. Finally, we determined that sphingomyelinase enzymatic activity directly prevents α-toxin binding and protects keratinocytes against α-toxin-induced cytotoxicity. The current study introduces the novel concept that S aureus α-toxin preferentially targets and destroys filaggrin-deficient keratinocytes. It also provides a mechanism to explain the increased propensity for S aureus-mediated exacerbation of AD skin disease. Copyright © 2012 American Academy of Allergy, Asthma & Immunology. Published by Mosby, Inc. All rights reserved.

  3. Considerations of coil protection and electrical connection schemes in large superconducting toroidal magnet system

    International Nuclear Information System (INIS)

    Yeh, H.T.

    1976-03-01

    A preliminary comparison of several different coil protection and electrical connection schemes for large superconducting toroidal magnet systems (STMS) is carried out. The tentative recommendation is to rely on external dump resistors for coil protection and to connect the coils in the toroidal magnet in several parallel loops (e.g., every fourth coil is connected into a single series loop). For the fault condition when a single coil quenches, the quenched coil should be isolated from its loop by switching devices. The magnet, as a whole, should probably be discharged if more than a few coils have quenched

  4. Anthocyanin increases adiponectin secretion and protects against diabetes-related endothelial dysfunction.

    Science.gov (United States)

    Liu, Yan; Li, Dan; Zhang, Yuhua; Sun, Ruifang; Xia, Min

    2014-04-15

    Adiponectin is an adipose tissue-secreted adipokine with beneficial effects on the cardiovascular system. In this study, we evaluated a potential role for adiponectin in the protective effects of anthocyanin on diabetes-related endothelial dysfunction. We treated db/db mice on a normal diet with anthocyanin cyanidin-3-O-β-glucoside (C3G; 2 g/kg diet) for 8 wk. Endothelium-dependent and -independent relaxations of the aorta were then evaluated. Adiponectin expression and secretion were also measured. C3G treatment restores endothelium-dependent relaxation of the aorta in db/db mice, whereas diabetic mice treated with an anti-adiponectin antibody do not respond. C3G treatment induces adiponectin expression and secretion in cultured 3T3 adipocytes through transcription factor forkhead box O1 (Foxo1). Silencing Foxo1 expression prevented C3G-stimulated induction of adiponectin expression. In contrast, overexpression of Foxo1-ADA promoted adiponectin expression in adipocytes. C3G activates Foxo1 by increasing its deacetylation via silent mating type information regulation 2 homolog 1 (Sirt1). Furthermore, purified anthocyanin supplementation significantly improved flow-mediated dilation (FMD) and increased serum adiponectin concentrations in patients with type 2 diabetes. Changes in adiponectin concentrations positively correlated with FMD in the anthocyanin group. Mechanistically, adiponectin activates cAMP-PKA-eNOS signaling pathways in human aortic endothelial cells, increasing endothelial nitric oxide bioavailability. These results demonstrate that adipocyte-derived adiponectin is required for anthocyanin C3G-mediated improvement of endothelial function in diabetes.

  5. Cervicovaginal secretions protect from human papillomavirus infection: effects of vaginal douching.

    Science.gov (United States)

    Chu, Tang-Yuan; Chang, Ying-Cheng; Ding, Dah-Ching

    2013-06-01

    Cervicovaginal secretions (CVSs) are reported to protect against human papillomavirus (HPV) infection. Although vaginal douching is known to clear both viral inoculants and CVSs, its effect on CVSs in women with HPV infection is unknown. The in vitro HPV pseudovirus infection system was used to test the protective activity of CVSs against HPV infection in samples collected before and after vaginal douching. To simulate different time points of vaginal douching in relation to viral exposure, the cell CVS reconstitute was washed after different viral exposure durations. In the CVSs of premenopausal and postmenopausal women who did not perform douching, the CVSs inhibited HPV infection by 56.7 ± 1.8% and 53.6 ± 2.5%, respectively; in women who had performed douching, the CVSs inhibited HPV infection by only 31.2 ± 7.1%, which was significantly lower (p infection existed for up to 8 hours after HPV exposure, and cell washing increased the clearance to up to 82-93% of the infectious load. This study confirms the protective activity of CVSs against HPV infection regardless of age. In this in vitro study, the net effect of douching was found to be beneficial. Copyright © 2013. Published by Elsevier B.V.

  6. Indian community health insurance schemes provide partial protection against catastrophic health expenditure

    Directory of Open Access Journals (Sweden)

    Ranson Kent

    2007-03-01

    Full Text Available Abstract Background More than 72% of health expenditure in India is financed by individual households at the time of illness through out-of-pocket payments. This is a highly regressive way of financing health care and sometimes leads to impoverishment. Health insurance is recommended as a measure to protect households from such catastrophic health expenditure (CHE. We studied two Indian community health insurance (CHI schemes, ACCORD and SEWA, to determine whether insured households are protected from CHE. Methods ACCORD provides health insurance cover for the indigenous population, living in Gudalur, Tamil Nadu. SEWA provides insurance cover for self employed women in the state of Gujarat. Both cover hospitalisation expenses, but only upto a maximum limit of US$23 and US$45, respectively. We reviewed the insurance claims registers in both schemes and identified patients who were hospitalised during the period 01/04/2003 to 31/03/2004. Details of their diagnoses, places and costs of treatment and self-reported annual incomes were obtained. There is no single definition of CHE and none of these have been validated. For this research, we used the following definition; "annual hospital expenditure greater than 10% of annual income," to identify those who experienced CHE. Results There were a total of 683 and 3152 hospital admissions at ACCORD and SEWA, respectively. In the absence of the CHI scheme, all of the patients at ACCORD and SEWA would have had to pay OOP for their hospitalisation. With the CHI scheme, 67% and 34% of patients did not have to make any out-of-pocket (OOP payment for their hospital expenses at ACCORD and SEWA, respectively. Both CHI schemes halved the number of households that would have experienced CHE by covering hospital costs. However, despite this, 4% and 23% of households with admissions still experienced CHE at ACCORD and SEWA, respectively. This was related to the following conditions: low annual income, benefit

  7. A Cryptographic SoC for Robust Protection of Secret Keys in IPTV DRM Systems

    Science.gov (United States)

    Lee, Sanghan; Yang, Hae-Yong; Yeom, Yongjin; Park, Jongsik

    The security level of an internet protocol television (IPTV) digital right management (DRM) system ultimately relies on protection of secret keys. Well known devices for the key protection include smartcards and battery backup SRAMs (BB-SRAMs); however, these devices could be vulnerable to various physical attacks. In this paper, we propose a secure and cost-effective design of a cryptographic system on chip (SoC) that integrates the BB-SRAM with a cell-based design technique. The proposed SoC provides robust safeguard against the physical attacks, and satisfies high-speed and low-price requirements of IPTV set-top boxes. Our implementation results show that the maximum encryption rate of the SoC is 633Mb/s. In order to verify the data retention capabilities, we made a prototype chip using 0.18µm standard cell technology. The experimental results show that the integrated BB-SRAM can reliably retain data with a 1.4µA leakage current.

  8. An Asset Protection Scheme for Banks Exposed to Troubled Loan Portfolios

    DEFF Research Database (Denmark)

    Grosen, Anders; Jessen, Pernille; Kokholm, Thomas Sander

    contract with an appropriate structure of incentives. Within the structural credit risk modeling framework, we apply two alternative multivariate default risk models; the classical Gaussian Merton model and a model based on Normal Inverse Gaussian (NIG) processes. Exchanging the normal factors......We examine a specific portfolio credit derivative, an Asset Protection Scheme (APS), and its applicability as a tool to restore financial stability and reduce asymmetric information. As opposed to most governmental bailout packages implemented across the world recently, the APS can be a fair valued...

  9. An Asset Protection Scheme for Banks Exposed to Troubled Loan Portfolios

    DEFF Research Database (Denmark)

    Kokholm, Thomas

    contract with an appropriate structure of incentives. Within the structural credit risk modeling framework, we apply two alternative multivariate default risk models: the classical Gaussian Merton model and a model based on Normal Inverse Gaussian (NIG) processes. Exchanging the normal factors......We examine a specific portfolio credit derivative, an Asset Protection Scheme (APS), and its applicability as a tool to restore financial stability and reduce asymmetric information. As opposed to most governmental bailout packages implemented across the world recently, the APS can be a fair valued...

  10. Multiagent System-Based Wide-Area Protection and Control Scheme against Cascading Events

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Sun, Haishun

    2015-01-01

    In this paper, a multi agent system (MAS) based wide area protection and control scheme is proposed to deal with the long term voltage instability induced cascading trips. Based on sensitivity analysis between the relay operation margin and power system state variables, an optimal emergency control...... strategy is defined to adjust the emergency states timely and prevent the unexpected relay trips. In order to supervise the control process and further minimize the load loss, an agent based process control is adopted to monitor the states of distributed controllers and adjust the emergency control...... strategy. A hybrid simulation platform based on LabVIEW and real time digital simulator (RTDS) is set up to simulate a blackout case in the power system of Eastern Denmark and to demonstrate the effectiveness of the proposed MAS based protection strategy....

  11. Fuzzy-Wavelet Based Double Line Transmission System Protection Scheme in the Presence of SVC

    Science.gov (United States)

    Goli, Ravikumar; Shaik, Abdul Gafoor; Tulasi Ram, Sankara S.

    2015-06-01

    Increasing the power transfer capability and efficient utilization of available transmission lines, improving the power system controllability and stability, power oscillation damping and voltage compensation have made strides and created Flexible AC Transmission (FACTS) devices in recent decades. Shunt FACTS devices can have adverse effects on distance protection both in steady state and transient periods. Severe under reaching is the most important problem of relay which is caused by current injection at the point of connection to the system. Current absorption of compensator leads to overreach of relay. This work presents an efficient method based on wavelet transforms, fault detection, classification and location using Fuzzy logic technique which is almost independent of fault impedance, fault distance and fault inception angle. The proposed protection scheme is found to be fast, reliable and accurate for various types of faults on transmission lines with and without Static Var compensator at different locations and with various incidence angles.

  12. Zero leakage quantization scheme for biometric verification

    NARCIS (Netherlands)

    Groot, de J.A.; Linnartz, J.P.M.G.

    2011-01-01

    Biometrics gain increasing interest as a solution for many security issues, but privacy risks exist in case we do not protect the stored templates well. This paper presents a new verification scheme, which protects the secrets of the enrolled users. We will show that zero leakage is achieved if

  13. On distributed key distribution centers and unconditionally secure proactive verifiable secret sharing schemes based on general access structure

    NARCIS (Netherlands)

    Nikov, V.S.; Nikova, S.I.; Preneel, B.; Vandewalle, J.; Menezes, A.; Sarkar, P.

    2002-01-01

    A Key Distribution Center of a network is a server enabling private communications within groups of users. A Distributed Key Distribution Center is a set of servers that jointly realizes a Key Distribution Center. In this paper we build a robust Distributed Key Distribution Center Scheme secure

  14. National Health Insurance Scheme: How Protected Are Households in Oyo State, Nigeria from Catastrophic Health Expenditure?

    Directory of Open Access Journals (Sweden)

    Olayinka Stephen Ilesanmi

    2014-05-01

    Full Text Available Background The major objective of the National Health Insurance Scheme (NHIS in Nigeria is to protect families from the financial hardship of large medical bills. Catastrophic Health Expenditure (CHE is rampart in Nigeria despite the take-off of the NHIS. This study aimed to determine if households enrolled in the NHIS were protected from having CHE. Methods The study took place among 714 households in urban communities of Oyo State. CHE was measured using a threshold of 40% of monthly non-food expenditure. Descriptive statistics were done, Principal Component Analysis was used to divide households into wealth quintiles. Chi-square test and binary logistic regression were done. Results The mean age of household respondent was 33.5 years. The median household income was 43,500 naira (290 US dollars and the range was 7,000–680,000 naira (46.7–4,533 US dollars in 2012. The overall median household healthcare cost was 890 naira (5.9 US dollars and the range was 10-17,700 naira (0.1–118 US dollars in 2012. In all, 67 (9.4% households were enrolled in NHIS scheme. Healthcare services was utilized by 637 (82.9% and CHE occurred in 42 (6.6% households. CHE occurred in 14 (10.9% of the households in the lowest quintile compared to 3 (2.5% in the highest wealth quintile (P= 0.004. The odds of CHE among households in lowest wealth quintile is about 5 times. They had Crude OR (CI: 4.7 (1.3–16.8, P= 0.022. Non enrolled households were two times likely to have CHE, though not significant Conclusion Households in the lowest wealth quintiles were at higher risk of CHE. Universal coverage of health insurance in Nigeria should be fast-tracked to give the expected financial risk protection and decreased incidence of CHE.

  15. Probabilistic Infinite Secret Sharing

    OpenAIRE

    Csirmaz, László

    2013-01-01

    The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes. It highlights important properties, explains why certain definitions work better than others, connects this topic to other branches of mathematics, and might yield new design paradigms. A probabilistic secret sharing scheme is a joint probability distribution of the shares and the secret together with a colle...

  16. Design of Provider-Provisioned Website Protection Scheme against Malware Distribution

    Science.gov (United States)

    Yagi, Takeshi; Tanimoto, Naoto; Hariu, Takeo; Itoh, Mitsutaka

    Vulnerabilities in web applications expose computer networks to security threats, and many websites are used by attackers as hopping sites to attack other websites and user terminals. These incidents prevent service providers from constructing secure networking environments. To protect websites from attacks exploiting vulnerabilities in web applications, service providers use web application firewalls (WAFs). WAFs filter accesses from attackers by using signatures, which are generated based on the exploit codes of previous attacks. However, WAFs cannot filter unknown attacks because the signatures cannot reflect new types of attacks. In service provider environments, the number of exploit codes has recently increased rapidly because of the spread of vulnerable web applications that have been developed through cloud computing. Thus, generating signatures for all exploit codes is difficult. To solve these problems, our proposed scheme detects and filters malware downloads that are sent from websites which have already received exploit codes. In addition, to collect information for detecting malware downloads, web honeypots, which automatically extract the communication records of exploit codes, are used. According to the results of experiments using a prototype, our scheme can filter attacks automatically so that service providers can provide secure and cost-effective network environments.

  17. Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing

    Directory of Open Access Journals (Sweden)

    Daisuke Mashima

    2018-03-01

    Full Text Available Thanks to the roll-out of smart meters, availability of fine-grained electricity usage data has rapidly grown. Such data has enabled utility companies to perform robust and efficient grid operations. However, at the same time, privacy concerns associated with sharing and disclosure of such data have been raised. In this paper, we first demonstrate the feasibility of estimating privacy-sensitive household attributes based solely on the energy usage data of residential customers. We then discuss a framework to measure privacy gain and evaluate the effectiveness of customer-centric privacy-protection schemes, namely redaction of data irrelevant to services and addition of bounded artificial noise. Keywords: Privacy, Smart meter data, Quantitative evaluation

  18. An Asset Protection Scheme for Banks Exposed to Troubled Loan Portfolios

    DEFF Research Database (Denmark)

    Grosen, Anders; Jessen, Pernille; Kokholm, Thomas

    2014-01-01

    We examine a specific portfolio credit derivative, an Asset Protection Scheme (APS), and its applicability as a discretionary regulatory tool to reduce asymmetric information and help restore the capital base of troubled banks. The APS can be a fair-valued contract with an appropriate structure...... of incentives. We apply two alternative multivariate structural default risk models: the classical Gaussian Merton model and a model based on Normal Inverse Gaussian processes. Using a data set on annual farm level data from 1996 to 2009, we use the Danish agricultural sector as a case study and price an APS...... on an agricultural loan portfolio. We compute the economic capital for this loan portfolio with and without an APS. Moreover, we illustrate how model risk in the form of parameter uncertainty is reduced when an APS is attached to the loan portfolio....

  19. Does the National Health Insurance Scheme provide financial protection to households in Ghana?

    Science.gov (United States)

    Kusi, Anthony; Hansen, Kristian Schultz; Asante, Felix A; Enemark, Ulrika

    2015-08-15

    Excessive healthcare payments can impede access to health services and also disrupt the welfare of households with no financial protection. Health insurance is expected to offer financial protection against health shocks. Ghana began the implementation of its National Health Insurance Scheme (NHIS) in 2004. The NHIS is aimed at removing the financial barrier to healthcare by limiting direct out-of-pocket health expenditures (OOPHE). The study examines the effect of the NHIS on OOPHE and how it protects households against catastrophic health expenditures. Data was obtained from a cross-sectional representative household survey involving 2,430 households from three districts across Ghana. All OOPHE associated with treatment seeking for reported illness in the household in the last 4 weeks preceding the survey were analysed and compared between insured and uninsured persons. The incidence and intensity of catastrophic health expenditures (CHE) among households were measured by the catastrophic health payment method. The relative effect of NHIS on the incidence of CHE in the household was estimated by multiple logistic regression analysis. About 36% of households reported at least one illness during the 4 weeks period. Insured patients had significantly lower direct OOPHE for out-patient and in-patient care compared to the uninsured. On financial protection, the incidence of CHE was lower among insured households (2.9%) compared to the partially insured (3.7%) and the uninsured (4.0%) at the 40% threshold. The incidence of CHE was however significantly lower among fully insured households (6.0%) which sought healthcare from NHIS accredited health facilities compared to the partially insured (10.1%) and the uninsured households (23.2%). The likelihood of a household incurring CHE was 4.2 times less likely for fully insured and 2.9 times less likely for partially insured households relative to being uninsured. The NHIS has however not completely eliminated OOPHE for the

  20. Who uses outpatient healthcare services under Ghana's health protection scheme and why?

    Science.gov (United States)

    Fenny, Ama P; Asante, Felix A; Arhinful, Daniel K; Kusi, Anthony; Parmar, Divya; Williams, Gemma

    2016-05-10

    The National Health Insurance Scheme (NHIS) was launched in Ghana in 2003 with the main objective of increasing utilisation to healthcare by making healthcare more affordable. Previous studies on the NHIS have repeatedly highlighted that cost of premiums is one of the major barriers for enrollment. However, despite introducing premium exemptions for pregnant women, older people, children and indigents, many Ghanaians are still not active members of the NHIS. In this paper we investigate why there is limited success of the NHIS in improving access to healthcare in Ghana and whether social exclusion could be one of the limiting barriers. The study explores this by looking at the Social, Political, Economic and Cultural (SPEC) dimensions of social exclusion. Using logistic regression, the study investigates the determinants of health service utilisation using SPEC variables including other variables. Data was collected from 4050 representative households in five districts in Ghana covering the 3 ecological zones (coastal, forest and savannah) in Ghana. Among 16,200 individuals who responded to the survey, 54 % were insured. Out of the 1349 who sought health care, 64 % were insured and 65 % of them had basic education and 60 % were women. The results from the logistic regressions show health insurance status, education and gender to be the three main determinants of health care utilisation. Overall, a large proportion of the insured who reported ill, sought care from formal health care providers compared to those who had never insured in the scheme. The paper demonstrates that the NHIS presents a workable policy tool for increasing access to healthcare through an emphasis on social health protection. However, affordability is not the only barrier for access to health services. Geographical, social, cultural, informational, political, and other barriers also come into play.

  1. Adipose Tissue-Derived Stem Cell Secreted IGF-1 Protects Myoblasts from the Negative Effect of Myostatin

    Directory of Open Access Journals (Sweden)

    Sebastian Gehmert

    2014-01-01

    Full Text Available Myostatin, a TGF-β family member, is associated with inhibition of muscle growth and differentiation and might interact with the IGF-1 signaling pathway. Since IGF-1 is secreted at a bioactive level by adipose tissue-derived mesenchymal stem cells (ASCs, these cells (ASCs provide a therapeutic option for Duchenne Muscular Dystrophy (DMD. But the protective effect of stem cell secreted IGF-1 on myoblast under high level of myostatin remains unclear. In the present study murine myoblasts were exposed to myostatin under presence of ASCs conditioned medium and investigated for proliferation and apoptosis. The protective effect of IGF-1 was further examined by using IGF-1 neutralizing and receptor antibodies as well as gene silencing RNAi technology. MyoD expression was detected to identify impact of IGF-1 on myoblasts differentiation when exposed to myostatin. IGF-1 was accountable for 43.6% of the antiapoptotic impact and 48.8% for the proliferative effect of ASCs conditioned medium. Furthermore, IGF-1 restored mRNA and protein MyoD expression of myoblasts under risk. Beside fusion and transdifferentiation the beneficial effect of ASCs is mediated by paracrine secreted cytokines, particularly IGF-1. The present study underlines the potential of ASCs as a therapeutic option for Duchenne muscular dystrophy and other dystrophic muscle diseases.

  2. PaCATB, a secreted catalase protecting Podospora anserina against exogenous oxidative stress

    DEFF Research Database (Denmark)

    Zintel, Sandra; Bernhardt, Dominik; Rogowska-Wrzesinska, Adelina

    2011-01-01

    A differential mass spectrometry analysis of secreted proteins from juvenile and senescentPodospora anserina cultures revealed age-related differences in protein profiles. Among other proteins with decreased abundance in the secretome of senescent cultures a catalase, termed PaCATB, was identified...

  3. A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptography.

    Science.gov (United States)

    Devi, B Pushpa; Singh, Kh Manglem; Roy, Sudipta

    2016-01-01

    This paper proposes a new watermarking algorithm based on the shuffled singular value decomposition and the visual cryptography for copyright protection of digital images. It generates the ownership and identification shares of the image based on visual cryptography. It decomposes the image into low and high frequency sub-bands. The low frequency sub-band is further divided into blocks of same size after shuffling it and then the singular value decomposition is applied to each randomly selected block. Shares are generated by comparing one of the elements in the first column of the left orthogonal matrix with its corresponding element in the right orthogonal matrix of the singular value decomposition of the block of the low frequency sub-band. The experimental results show that the proposed scheme clearly verifies the copyright of the digital images, and is robust to withstand several image processing attacks. Comparison with the other related visual cryptography-based algorithms reveals that the proposed method gives better performance. The proposed method is especially resilient against the rotation attack.

  4. Schemes for protecting electric power systems; Esquemas de protecao de sistemas de energia eletrica

    Energy Technology Data Exchange (ETDEWEB)

    Almeida, Paulo Cesar de

    2002-07-01

    The objective of this dissertation is to accomplish an introduction to the studies and the applications of the System Protection Schemes (SPS) used to maintain the electric power systems safety. A small group of definitions and concepts from the 'protection, reliability and power systems performance analysis' areas is presented with the objective of distinguishing SPS from the conventional system component protections. It also helps in understanding the functions of the SPS with more clarity. The SPS are used to maintain the integrity of the system when it is submitted to phenomena that provoke instability or cascade circuit outages. The classification and the description of these phenomena, as well as the SPS application are shown in this dissertation. The general structure of the SPS, the ways of classifying them and the different actions used by SPS to control the disturbances are the objectives of the analysis of this work. In order to exemplify, a vision is given of how the SPS are located in the Brazilian interconnected system (BIS) and also in the rest of the world. Some SPS used in Brazil deserved special attention. The analyses of the main blackouts that occurred in Brazil and in North America are presented, in a summarized term, in appendix I. Considerable knowledge is obtained from these analyses, leading to implementation measures that minimize the risk of interruptions in the energy supply. A comparison is also made of the degree of severity of the great blackouts that happened in Brazil and, for the two largest, an estimate of their respective interruption costs is made. In appendix II, an attempt was also made to establish the basic requirements for the SPS implementation using micro processing technology. Based on the experience lived during the studies developed by the group that analyzed the safety of the Bis after the blackout on March 11/1999, criteria and procedures to analyze the safety of the system and to accomplish studies of SPS

  5. Multi-Agent System Based Special Protection and Emergency Control Scheme against Cascading Events in Power System

    DEFF Research Database (Denmark)

    Liu, Zhou

    relay operations due to low voltage or overload state in the post stage of N-1 (or N-k) contingency. If such state could be sensed and adjusted appropriately before those relay actions, the system stability might be sustained. So it is of great significance to develop a suitable protection scheme...... the proposed protection strategy in this thesis, a real time simulation platform based on Real Time Digital Simulator (RTDS) and LabVIEW is built. In this platform, the cases of cascaded blackouts are simulated on the test system simplified from the East Denmark power system. For the MAS based control system......, the distributed power system agents are set up in RTDS, while the agents in higher level are designed by LabVIEW toolkits. The case studies and simulation results demonstrate the effectiveness of real time application of the proposed MAS based special protection and emergency control scheme against the cascaded...

  6. A Multiagent System-Based Protection and Control Scheme for Distribution System With Distributed-Generation Integration

    DEFF Research Database (Denmark)

    Liu, Z.; Su, Chi; Hoidalen, Hans

    2017-01-01

    In this paper, a multi agent system (MAS) based protection and control scheme is proposed to deal with diverse operation conditions in distribution system due to distributed generation (DG) integration. Based on cooperation between DG controller and relays, an adaptive protection and control...... algorithm is designed on converter based wind turbine DG to limit the influence of infeed fault current. With the consideration of DG control modes, an adaptive relay setting strategy is developed to help protective relays adapt suitable settings to different operation conditions caused by the variations...

  7. Impact of Publicly Financed Health Insurance Schemes on Healthcare Utilization and Financial Risk Protection in India: A Systematic Review.

    Science.gov (United States)

    Prinja, Shankar; Chauhan, Akashdeep Singh; Karan, Anup; Kaur, Gunjeet; Kumar, Rajesh

    2017-01-01

    Several publicly financed health insurance schemes have been launched in India with the aim of providing universalizing health coverage (UHC). In this paper, we report the impact of publicly financed health insurance schemes on health service utilization, out-of-pocket (OOP) expenditure, financial risk protection and health status. Empirical research studies focussing on the impact or evaluation of publicly financed health insurance schemes in India were searched on PubMed, Google scholar, Ovid, Scopus, Embase and relevant websites. The studies were selected based on two stage screening PRISMA guidelines in which two researchers independently assessed the suitability and quality of the studies. The studies included in the review were divided into two groups i.e., with and without a comparison group. To assess the impact on utilization, OOP expenditure and health indicators, only the studies with a comparison group were reviewed. Out of 1265 articles screened after initial search, 43 studies were found eligible and reviewed in full text, finally yielding 14 studies which had a comparator group in their evaluation design. All the studies (n-7) focussing on utilization showed a positive effect in terms of increase in the consumption of health services with introduction of health insurance. About 70% studies (n-5) studies with a strong design and assessing financial risk protection showed no impact in reduction of OOP expenditures, while remaining 30% of evaluations (n-2), which particularly evaluated state sponsored health insurance schemes, reported a decline in OOP expenditure among the enrolled households. One study which evaluated impact on health outcome showed reduction in mortality among enrolled as compared to non-enrolled households, from conditions covered by the insurance scheme. While utilization of healthcare did improve among those enrolled in the scheme, there is no clear evidence yet to suggest that these have resulted in reduced OOP expenditures or

  8. Dynamic quantum secret sharing

    International Nuclear Information System (INIS)

    Jia, Heng-Yue; Wen, Qiao-Yan; Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo

    2012-01-01

    In this Letter we consider quantum secret sharing (QSS) between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications. -- Highlights: ► We consider quantum secret sharing between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). ► In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. ► Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. ► Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. ► Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications.

  9. Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding Theory

    OpenAIRE

    Matsumoto, Ryutaroh

    2018-01-01

    We consider secret sharing schemes with a classical secret and quantum shares. One example of such schemes was recently reported whose access structure cannot be realized by any secret sharing schemes with classical shares. In this paper, we report further quantum secret sharing schemes whose access structures cannot be realized by any classical secret sharing schemes.

  10. Authentication Without Secrets

    Energy Technology Data Exchange (ETDEWEB)

    Pierson, Lyndon G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Robertson, Perry J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  11. Recombinant Forms of Leishmania amazonensis Excreted/Secreted Promastigote Surface Antigen (PSA Induce Protective Immune Responses in Dogs.

    Directory of Open Access Journals (Sweden)

    Elodie Petitdidier

    2016-05-01

    Full Text Available Preventive vaccination is a highly promising strategy for interrupting leishmaniasis transmission that can, additionally, contribute to elimination. A vaccine formulation based on naturally excreted secreted (ES antigens was prepared from L. infantum promastigote culture supernatant. This vaccine achieved successful results in Phase III trials and was licensed and marketed as CaniLeish. We recently showed that newly identified ES promastigote surface antigen (PSA, from both viable promastigotes and axenically-grown amastigotes, represented the major constituent and the highly immunogenic antigen of L. infantum and L. amazonensis ES products. We report here that three immunizations with either the recombinant ES LaPSA-38S (rPSA or its carboxy terminal part LaPSA-12S (Cter-rPSA, combined with QA-21 as adjuvant, confer high levels of protection in naive L. infantum-infected Beagle dogs, as checked by bone marrow parasite absence in respectively 78.8% and 80% of vaccinated dogs at 6 months post-challenge. The parasite burden in infected vaccinated dogs was significantly reduced compared to placebo group, as measured by q-PCR. Moreover, our results reveal humoral and cellular immune response clear-cut differences between vaccinated and control dogs. An early increase in specific IgG2 antibodies was observed in rPSA/QA-21- and Cter-rPSA/QA-21-immunized dogs only. They were found functionally active in vitro and were highly correlated with vaccine protection. In vaccinated protected dogs, IFN-γ and NO productions, as well as anti-leishmanial macrophage activity, were increased. These data strongly suggest that ES PSA or its carboxy-terminal part, in recombinant forms, induce protection in a canine model of zoonotic visceral leishmaniasis by inducing a Th1-dominant immune response and an appropriate specific antibody response. These data suggest that they could be considered as important active components in vaccine candidates.

  12. On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xuran Li

    2016-11-01

    Full Text Available Wireless sensor networks (WSNs play an important role in Cyber Physical Social Sensing (CPSS systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious attacks. In this paper, we propose a novel anti-eavesdropping mechanism by introducing friendly jammers to wireless sensor networks (WSNs. In particular, we establish a theoretical framework to evaluate the eavesdropping risk of WSNs with friendly jammers and that of WSNs without jammers. Our theoretical model takes into account various channel conditions such as the path loss and Rayleigh fading, the placement schemes of jammers and the power controlling schemes of jammers. Extensive results show that using jammers in WSNs can effectively reduce the eavesdropping risk. Besides, our results also show that the appropriate placement of jammers and the proper assignment of emitting power of jammers can not only mitigate the eavesdropping risk but also may have no significant impairment to the legitimate communications.

  13. Authenticated Diffie-Hellman Key Agreement Scheme that Protects Client Anonymity and Achieves Half-Forward Secrecy

    Directory of Open Access Journals (Sweden)

    Hung-Yu Chien

    2015-01-01

    Full Text Available Authenticated Diffie-Hellman key agreement (D-H key is the de facto building block for establishing secure session keys in many security systems. Regarding the computations of authenticated D-H key agreement, the operation of modular exponentiation is the most expensive computation, which incurs a heavy loading on those clients where either their computational capacities or their batteries are limited and precious. As client’s privacy is a big concern in several e-commerce applications, it is desirable to extend authenticated D-H key agreement to protect client’s identity privacy. This paper proposes a new problem: the modified elliptic curves computational Diffie-Hellman problem (MECDHP and proves that the MECDHP is as hard as the conventional elliptic curves computational Diffie-Hellman problem (ECDHP. Based on the MECDHP, we propose an authenticated D-H key agreement scheme which greatly improves client computational efficiency and protects client’s anonymity from outsiders. This new scheme is attractive to those applications where the clients need identity protection and lightweight computation.

  14. Immunoglobins in mammary secretions

    DEFF Research Database (Denmark)

    Hurley, W L; Theil, Peter Kappel

    2013-01-01

    Immunoglobulins secreted in colostrum and milk by the lactating mammal are major factors providing immune protection to the newborn. Immunoglobulins in mammary secretions represent the cumulative immune response of the lactating animal to exposure to antigenic stimulation that occurs through...... the immunoglobulins found in mammary secretions in the context of their diversity of structure, origin, mechanisms of transfer, and function....

  15. Schemes of radioactive decay, its interpretations in the scope of the radiological protection

    International Nuclear Information System (INIS)

    Mohamad, N.; Caro, R.A.; Bergoc, R.M.

    1998-01-01

    Full text: In our teaching experience we have verified that the interpretation of the symbols of radioactive decay schemes is one of the most difficult subject in the study of radioisotope methodologies for almost all professionals, and specially for those who have no solid background in mathematics or physics. The correct interpretation of decay schemes has fundamental importance for the proper election of measurement conditions and for performing the dosimetric and shielding calculations. Nuclides employed in Nuclear Medicine and Biomedicine are beta, gamma or beta/gamma emitters. Interpretation of decay schemes of beta emitters, by β + , β - or electronic capture are not difficult. In gamma emitting nuclides it is frequent that a particular level of energy is de-excited through more than one gamma transition of a given percentage and energy. On the other hand, it is also frequent that conversion electrons are emitted together with gamma photons, the proportion of which is usually given as the conversion factor, e/γ. The fraction of emitted photons is calculated as: 1 / [1+ (e/γ)], whereas the fraction of emitted conversion electrons is equal to: (e/γ) / [1+ (e/γ)]. Special attention should be given to the post-accommodation mechanism after disintegration in which orbital vacancies are produced: electron conversion or electron capture, in which the emission of X-rays and Auger electrons occur. All this information should be taken into account for the correct choice of measurement conditions, as well as internal and external dose calculations. In the present work we describe the analysis and interpretation of disintegration schemes in general and that of the most employed nuclides in Nuclear Medicine and Biomedicine. (author) [es

  16. Video Waterscrambling: Towards a Video Protection Scheme Based on the Disturbance of Motion Vectors

    Science.gov (United States)

    Bodo, Yann; Laurent, Nathalie; Laurent, Christophe; Dugelay, Jean-Luc

    2004-12-01

    With the popularity of high-bandwidth modems and peer-to-peer networks, the contents of videos must be highly protected from piracy. Traditionally, the models utilized to protect this kind of content are scrambling and watermarking. While the former protects the content against eavesdropping (a priori protection), the latter aims at providing a protection against illegal mass distribution (a posteriori protection). Today, researchers agree that both models must be used conjointly to reach a sufficient level of security. However, scrambling works generally by encryption resulting in an unintelligible content for the end-user. At the moment, some applications (such as e-commerce) may require a slight degradation of content so that the user has an idea of the content before buying it. In this paper, we propose a new video protection model, called waterscrambling, whose aim is to give such a quality degradation-based security model. This model works in the compressed domain and disturbs the motion vectors, degrading the video quality. It also allows embedding of a classical invisible watermark enabling protection against mass distribution. In fact, our model can be seen as an intermediary solution to scrambling and watermarking.

  17. Video Waterscrambling: Towards a Video Protection Scheme Based on the Disturbance of Motion Vectors

    Directory of Open Access Journals (Sweden)

    Yann Bodo

    2004-10-01

    Full Text Available With the popularity of high-bandwidth modems and peer-to-peer networks, the contents of videos must be highly protected from piracy. Traditionally, the models utilized to protect this kind of content are scrambling and watermarking. While the former protects the content against eavesdropping (a priori protection, the latter aims at providing a protection against illegal mass distribution (a posteriori protection. Today, researchers agree that both models must be used conjointly to reach a sufficient level of security. However, scrambling works generally by encryption resulting in an unintelligible content for the end-user. At the moment, some applications (such as e-commerce may require a slight degradation of content so that the user has an idea of the content before buying it. In this paper, we propose a new video protection model, called waterscrambling, whose aim is to give such a quality degradation-based security model. This model works in the compressed domain and disturbs the motion vectors, degrading the video quality. It also allows embedding of a classical invisible watermark enabling protection against mass distribution. In fact, our model can be seen as an intermediary solution to scrambling and watermarking.

  18. Mutual influences of rated currents, short circuit levels, fault durations and integrated protective schemes for industrial distribution MV switchgears

    Energy Technology Data Exchange (ETDEWEB)

    Gaidano, G. (FIAT Engineering, Torino, Italy); Lionetto, P.F.; Pelizza, C.; Tommazzolli, F.

    1979-01-01

    This paper deals with the problem of integrated and coordinated design of distribution systems, as regards the definition of system structure and parameters together with protection criteria and schemes. Advantages in system operation, dynamic response, heavier loads with reduced machinery rating margins and overall cost reduction, can be achieved. It must be noted that MV switchgears installed in industrial main distribution substations are the vital nodes of the distribution system. Very large amounts of power (up to 100 MW and more) are conveyed through MV busbars, coming from Utility and from in-plant generators and outgoing to subdistribution substations, to step-down transformers and to main concentrated loads (big drivers, furnaces etc.). Criteria and methods already studied and applied to public distribution are examined to assess service continuity and economics by means of the reduction of thermal stresses, minimization of disturbances and improvement of system stability. The life of network components depends on sizing, on fault energy levels and on probability of fault occurrence. Constructional measures and protection schemes, which reduce probability and duration of faults, are the most important tools to improve overall reliability. The introduction of advanced techniques, mainly based on computer application, not only allows drastic reduction of fault duration, but also permits the system to operate, under any possible contingency, in the optimal conditions, as the computer provides adaptive control. This mode of system management makes it possible to size network components with reference to the true magnitude of system quantities, avoiding expensive oversizing connected to the unflexibility of conventional protection and control schemes.

  19. Vaccination with the Secreted Glycoprotein G of Herpes Simplex Virus 2 Induces Protective Immunity after Genital Infection.

    Science.gov (United States)

    Önnheim, Karin; Ekblad, Maria; Görander, Staffan; Bergström, Tomas; Liljeqvist, Jan-Åke

    2016-04-22

    Herpes simplex virus 2 (HSV-2) infects the genital mucosa and establishes a life-long infection in sensory ganglia. After primary infection HSV-2 may reactivate causing recurrent genital ulcerations. HSV-2 infection is prevalent, and globally more than 400 million individuals are infected. As clinical trials have failed to show protection against HSV-2 infection, new vaccine candidates are warranted. The secreted glycoprotein G (sgG-2) of HSV-2 was evaluated as a prophylactic vaccine in mice using two different immunization and adjuvant protocols. The protocol with three intramuscular immunizations combining sgG-2 with cytosine-phosphate-guanine dinucleotide (CpG) motifs and alum induced almost complete protection from genital and systemic disease after intra-vaginal challenge with HSV-2. Robust immunoglobulin G (IgG) antibody titers were detected with no neutralization activity. Purified splenic CD4+ T cells proliferated and produced interferon-γ (IFN-γ) when re-stimulated with the antigen in vitro. sgG-2 + adjuvant intra-muscularly immunized mice showed a significant reduction of infectious HSV-2 and increased IFN-γ levels in vaginal washes. The HSV-2 DNA copy numbers were significantly reduced in dorsal root ganglia, spinal cord, and in serum at day six or day 21 post challenge. We show that a sgG-2 based vaccine is highly effective and can be considered as a novel candidate in the development of a prophylactic vaccine against HSV-2 infection.

  20. Genetic secrets: Protecting privacy and confidentiality in the genetic era. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Rothstein, M.A. [ed.

    1998-09-01

    Few developments are likely to affect human beings more profoundly in the long run than the discoveries resulting from advances in modern genetics. Although the developments in genetic technology promise to provide many additional benefits, their application to genetic screening poses ethical, social, and legal questions, many of which are rooted in issues of privacy and confidentiality. The ethical, practical, and legal ramifications of these and related questions are explored in depth. The broad range of topics includes: the privacy and confidentiality of genetic information; the challenges to privacy and confidentiality that may be projected to result from the emerging genetic technologies; the role of informed consent in protecting the confidentiality of genetic information in the clinical setting; the potential uses of genetic information by third parties; the implications of changes in the health care delivery system for privacy and confidentiality; relevant national and international developments in public policies, professional standards, and laws; recommendations; and the identification of research needs.

  1. Falling short of protection: Peru’s new migration scheme for Venezuelans

    Directory of Open Access Journals (Sweden)

    Nicolas Parent

    2017-10-01

    Full Text Available Peru’s introduction of a new work and study permit for Venezuelans fleeing violence in their country is to be applauded – but it provides only a limited, temporary form of protection.

  2. Development and Testing of Protection Scheme for Renewable-Rich Distribution System

    Energy Technology Data Exchange (ETDEWEB)

    Brahma, Sukumar [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ranade, Satish [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Elkhatib, Mohamed E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ellis, Abraham [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Reno, Matthew J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-09-01

    As the penetration of renewables increases in the distribution systems, and microgrids are conceived with high penetration of such generation that connects through inverters, fault location and protection of microgrids needs consideration. This report proposes averaged models that help simulate fault scenarios in renewable-rich microgrids, models for locating faults in such microgrids, and comments on the protection models that may be considered for microgrids. Simulation studies are reported to justify the models.

  3. Arrangement of the Krsko NPP protection scheme for the power system malfunction cases

    International Nuclear Information System (INIS)

    Omahen, P.; Pavsek, J.; Dirnbek, V.

    1996-01-01

    The Krsko NPP has been designed with the capability to reject 100% of its rated power and runback to the station electrical load. However, an adequate detection system of the outside network degradation is needed for the activation of the existing load drop anticipated (LDA) function. The Krsko NPP electrical, turbine and generator protection systems were carefully evaluated in order to redesign some of its functions. These additional functions should be able to protect and disconnect the plant from the system whenever some serious trouble of the outside electric power system is detected. On the other side, preventive measures should be introduced to avoid unnecessary plant disconnection or unnecessary power system collapse due to such disconnection. At the end, the paper presents a precise design of additional function possibilities for the Krsko NPP electrical protection system. A critical evaluation of these functions is given and the best option is proposed. (author)

  4. Line Differential Protection Scheme Modelling for Underground 420 kV Cable Systems

    DEFF Research Database (Denmark)

    Sztykiel, Michal; Bak, Claus Leth; Dollerup, Sebastian

    2011-01-01

    Based on the analysis of a specific relay model and an HVAC (High Voltage Alternating Current) cable system, a detailed approach to EMTDC/PSCAD modelling of protective relays is presented. Such approach allows to create complex and accurate relay models derived from the original algorithms. Relay...... models can be applied with various systems, allowing to obtain the most optimal configuration of the protective relaying. The present paper describes modelling methodology on the basis of Siemens SIPROTEC 4 7SD522/610. Relay model was verified experimentally with its real equivalent by both EMTP......-simulated and real world generated current signals connected to the relay....

  5. Line Differential Protection Scheme Modelling for Underground 420 kV Cable Systems

    DEFF Research Database (Denmark)

    Sztykiel, Michal; Bak, Claus Leth; Wiechowski, Wojciech

    2010-01-01

    Based on the analysis of a specific relay model and an HVAC (High Voltage Alternating Current) cable system, a new approach to EMTDC/PSCAD modelling of protective relays is presented. Such approach allows to create complex and accurate relay models derived from the original algorithms. Relay models...... can be applied with various systems, allowing to obtain the most optimal configuration of the protective relaying. The present paper describes modelling methodology on the basis of Siemens SIPROTEC 4 7SD522/610. Relay model was verified experimentally with its real equivalent by both EMTP......-simulated and real world generated current signals connected to the relay....

  6. Evaluation of the schemes of protections of Sistema Nacional Interconectado of year 2014 by analyzing the transient stability

    International Nuclear Information System (INIS)

    Rojas Rojas, Luis Felipe

    2012-01-01

    The elaboration of a study of transient stability is seen as part of the planning process associated with the Plan de Expansion de la Transmision. Studies have historically contemplated the calculation of critics times of release of failures without allowing to obtain conclusive information about the performance of protection systems. An evaluation of the protection schemes of substations is determined make of the Sistema Nacional Interconectado of year 2014. Analysis of transient stability was used to verify compliance with the ''Criterios de Seguridad para la Planificacion, Diseno y Operacion del Sistema Electrico Nacional'' and ''Criterios de Calidad, Seguridad y Desempeno'' of the Reglamento del Mercado Electrico Regional in order to determine the necessary improvements. A methodology is proposed for simulating the behavior of protection systems using the software PSS/E, which has replaced the methodology based on the calculation of critical times. The presence of 42 substations were determined in which the release of failures for remote backup has caused unstable conditions of the system. 174 improvements have identified as necessary among which are: the implementation of distance relays in autotransformers, differential protections in reactors, differentials of lines and overcurrents of definite time in lines, duplication of differentials in bars, the replacement of pole breakers for monopolar and duplication of breakers of link bars. The current criteria have been recommended to supplement with probabilistic criteria to avoid incurring unnecessary investments. (author) [es

  7. Wide Area Protection Scheme Preventing Cascading Events Caused by Load Flow Transferring

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Sun, Haishun

    2013-01-01

    Load flow transferring after an initial contingency is regarded as one of the main reasons of causing unexpected cascading trips. A multi agent system (MAS) based wide area protection strategy is proposed in this paper to predict the load flow transferring from the point of view of impedance relays...

  8. Wide Area Protection Scheme Preventing Cascading Events based on Improved Impedance relay

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Sun, Haishun

    2013-01-01

    Load flow transferring after an initial contingency is regarded as one of the main reasons of causing unexpected cascading trips. A multi agent system (MAS) based wide area protection strategy is proposed in this paper to predict the load flow transferring from the point of view of impedance relays...

  9. Cyber attacks, countermeasures, and protection schemes — A state of the art survey

    OpenAIRE

    Shabut, Antesar M.; Lwin, K.T.; Hossain, M.A.

    2017-01-01

    Thousands of cyber-attacks (fraudulent online activities to acquire users’ sensitive information via email, during online transactions, live video streaming, online gaming and browsing) are launched every day against Internet users across the world. To prevent these attacks, researchers have responded with a number of protection systems. Currently, the methods which cyber-attackers use to conduct attacks is associated with exploiting humans. Such attacks are recorded more frequently than befo...

  10. The financial protection effect of Ghana National Health Insurance Scheme: evidence from a study in two rural districts

    Directory of Open Access Journals (Sweden)

    Wang Hong

    2011-01-01

    Full Text Available Abstract Background One of the key functions of health insurance is to provide financial protection against high costs of health care, yet evidence of such protection from developing countries has been inconsistent. The current study uses the case of Ghana to contribute to the evidence pool about insurance's financial protection effects. It evaluates the impact of the country's National Health Insurance Scheme on households' out-of-pocket spending and catastrophic health expenditure. Methods We use data from a household survey conducted in two rural districts, Nkoranza and Offinso, in 2007, two years after the initiation of the Ghana National Health Insurance Scheme. To address the skewness of health expenditure data, the absolute amount of out-of-pocket spending is estimated using a two-part model. We also conduct a probit estimate of the likelihood of catastrophic health expenditures, defined at different thresholds relative to household income and non-food consumption expenditure. The analysis controls for chronic and self-assessed health conditions, which typically drive adverse selection in insurance. Results At the time of the survey, insurance coverage was 35 percent. Although the benefit package of insurance is generous, insured people still incurred out-of-pocket payment for care from informal sources and for uncovered drugs and tests at health facilities. Nevertheless, they paid significantly less than the uninsured. Insurance has been shown to have a protective effect against the financial burden of health care, reducing significantly the likelihood of incurring catastrophic payment. The effect is particularly remarkable among the poorest quintile of the sample. Conclusions Findings from this study confirm the positive financial protection effect of health insurance in Ghana. The effect is stronger among the poor group than among general population. The results are encouraging for many low income countries who are considering a

  11. The limitations of contractual clauses to determine the legal nature of information and to protect trade secrets

    Directory of Open Access Journals (Sweden)

    Nelson Remolina Angarita

    2017-12-01

    Full Text Available This text analyses the legal requirements for information to be considered a trade secret based on Colombian regulations and rulings issued by the Superintendencia de Industria y Comercio. A contractual clause, by itself, does not have the power to define the information that can be considered a trade secret because freedom of choice cannot disregard the legal nature of the information.

  12. Using an Ecosystem Approach to complement protection schemes based on organism-level endpoints

    International Nuclear Information System (INIS)

    Bradshaw, Clare; Kapustka, Lawrence; Barnthouse, Lawrence; Brown, Justin; Ciffroy, Philippe; Forbes, Valery; Geras'kin, Stanislav; Kautsky, Ulrik; Bréchignac, François

    2014-01-01

    Radiation protection goals for ecological resources are focussed on ecological structures and functions at population-, community-, and ecosystem-levels. The current approach to radiation safety for non-human biota relies on organism-level endpoints, and as such is not aligned with the stated overarching protection goals of international agencies. Exposure to stressors can trigger non-linear changes in ecosystem structure and function that cannot be predicted from effects on individual organisms. From the ecological sciences, we know that important interactive dynamics related to such emergent properties determine the flows of goods and services in ecological systems that human societies rely upon. A previous Task Group of the IUR (International Union of Radioecology) has presented the rationale for adding an Ecosystem Approach to the suite of tools available to manage radiation safety. In this paper, we summarize the arguments for an Ecosystem Approach and identify next steps and challenges ahead pertaining to developing and implementing a practical Ecosystem Approach to complement organism-level endpoints currently used in radiation safety. - Highlights: • An Ecosystem Approach to radiation safety complements the organism-level approach. • Emergent properties in ecosystems are not captured by organism-level endpoints. • The proposed Ecosystem Approach better aligns with management goals. • Practical guidance with respect to system-level endpoints is needed. • Guidance on computational model selection would benefit an Ecosystem Approach

  13. An Asset Protection Scheme for Banks Exposed to Troubled Loan Portfolios: Application to the Danish Agricultural Sector

    DEFF Research Database (Denmark)

    Grosen, Anders; Jessen, Pernille; Kokholm, Thomas

    while retaining an appropriate structure of incentives. Within the structural credit risk modeling framework we apply two alternative structural multivariate default risk models, the classical Gaussian Black-Scholes-Merton model and a model based on Normal Inverse Gaussian (NIG) processes, e.g. Barndorf...... as the underlying in the valuation of the corresponding APS in order to demonstrate the applicability of the APS as a regulatory tool. The contribution to the financial literature on credit risk is the empirical analysis of agricultural loans using our unique data set. The contribution to the banking literature......An Asset Protection Scheme (APS) is a portfolio insurance contract; a credit derivative used as a tool to restore financial stability and reestablish economic confidence. Opposed to most governmental bailout packages implemented all over the world recently, the APS can be a fair market contract...

  14. Quantum strongly secure ramp secret sharing

    DEFF Research Database (Denmark)

    Zhang, Paul; Matsumoto, Rytaro Yamashita

    2015-01-01

    Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares and distributing them among several participants. If a sufficient number of shares are put together, then the secret can be fully reconstructed. If an insufficient number of shares are put together...... however, no information about the secret can be revealed. In quantum ramp secret sharing, partial information about the secret is allowed to leak to a set of participants, called an unqualified set, that cannot fully reconstruct the secret. By allowing this, the size of a share can be drastically reduced....... This paper introduces a quantum analog of classical strong security in ramp secret sharing schemes. While the ramp secret sharing scheme still leaks partial information about the secret to unqualified sets of participants, the strong security condition ensures that qudits with critical information can...

  15. Protection against RAGE-mediated neuronal cell death by sRAGE-secreting human mesenchymal stem cells in 5xFAD transgenic mouse model.

    Science.gov (United States)

    Son, Myeongjoo; Oh, Seyeon; Park, Hyunjin; Ahn, Hyosang; Choi, Junwon; Kim, Hyungho; Lee, Hye Sun; Lee, Sojung; Park, Hye-Jeong; Kim, Seung U; Lee, Bonghee; Byun, Kyunghee

    2017-11-01

    Alzheimer's disease (AD), which is the most commonly encountered neurodegenerative disease, causes synaptic dysfunction and neuronal loss due to various pathological processes that include tau abnormality and amyloid beta (Aβ) accumulation. Aβ stimulates the secretion and the synthesis of Receptor for Advanced Glycation End products (RAGE) ligand by activating microglial cells, and has been reported to cause neuronal cell death in Aβ 1-42 treated rats and in mice with neurotoxin-induced Parkinson's disease. The soluble form of RAGE (sRAGE) is known to reduce inflammation, and to decrease microglial cell activation and Aβ deposition, and thus, it protects from neuronal cell death in AD. However, sRAGE protein has too a short half-life for therapeutic purposes. We developed sRAGE-secreting umbilical cord derived mesenchymal stem cells (sRAGE-MSCs) to enhance the inhibitory effects of sRAGE on Aβ deposition and to reduce the secretion and synthesis of RAGE ligands in 5xFAD mice. In addition, these cells improved the viability of injected MSCs, and enhanced the protective effects of sRAGE by inhibiting the binding of RAGE and RAGE ligands in 5xFAD mice. These findings suggest sRAGE protein from sRAGE-MSCs has better protection against neuronal cell death than sRAGE protein or single MSC treatment by inhibiting the RAGE cell death cascade and RAGE-induce inflammation. Copyright © 2017 Elsevier Inc. All rights reserved.

  16. Construction of Lactococcus lactis expressing secreted and anchored Eimeria tenella 3-1E protein and comparison of protective immunity against homologous challenge.

    Science.gov (United States)

    Ma, Chunli; Zhang, Lili; Gao, Mingyang; Ma, Dexing

    2017-07-01

    Two novel plasmids pTX8048-SP-Δ3-1E and pTX8048-SP-NAΔ3-1E-CWA were constructed. The plasmids were respectively electrotransformed into L. lactis NZ9000 to generate strain of L. lactis/pTX8048-SP-Δ3-1E in which 3-1E protein was expressed in secretion, and L. lactis/pTX8048-SP-NAΔ3-1E-CWA on which 3-1E protein was covalently anchored to the surface of bacteria cells. The expression of target proteins were examined by Western blot. The live lactococci expressing secreted 3-1E protein, anchored 3-1E protein, and cytoplasmic 3-1E protein was administered orally to chickens respectively, and the protective immunity and efficacy were compared by animal experiment. The results showed oral immunization to chickens with recombinant lactococci expressing anchored 3-1E protein elicited high 3-1E-specific serum IgG, increased high proportion of CD4 + and CD8α + cells in spleen, alleviated average lesion score in cecum, decreased the oocyst output per chicken compared to lactococci expressing cytoplasmic or secreted 3-1E protein. Taken together, these findings indicated the surface anchored Eimeria protein displayed by L. lacits can induce protective immunity and partial protection against homologous infection. Copyright © 2017 Elsevier Inc. All rights reserved.

  17. Oral delivery of the Sj23LHD-GST antigen by Salmonella typhimurium type III secretion system protects against Schistosoma japonicum infection in mice.

    Directory of Open Access Journals (Sweden)

    Guo Chen

    2011-09-01

    Full Text Available BACKGROUND: Schistosomiasis japonica is a zoonotic parasitic disease and oral vaccine delivery system would be benefit for prevention of this disease. Although attenuated salmonella has been used as an antigen expression vector for oral vaccine development, the membrane-bound vacuoles in which bacteria reside hinders the presentation of expressed heterologous antigens to the major histocompatibility complex (MHC molecules. The present work used an attenuated Salmonella typhimurium strain VNP20009 to secretory expression of Sj23LHDGST bivalent antigen from Schistosoma japonicum and tested the protective efficacy against S. japonicum infection in orally immunized mice. METHODOLOGY/PRINCIPAL FINDINGS: Promoters (nirB or pagC were used to express the antigen (Sj23LHDGST and the Salmonella type III or α-hemolysin secretion system was employed to secrete it. The immunoblotting analysis and fluorescent microscopy revealed that the antigen was effectively expressed and delivered to the cytosol of macrophages in vitro. Among recombinant vaccine strains, an engineered VNP20009 which expressed the antigen by nirB promoter and secreted it through type III secretion system (nirB-sopE(1-104-Sj23LHD-GST efficiently protected against S. japonicum infection in a mouse model. This strain elicited a predominantly IgG(2a antibody response and a markedly increase in the production of IL-12 and IFN-γ. The flow cytometric analysis demonstrated that this strain caused T cell activation as evidenced by significantly increased expression of CD44 and CD69. CONCLUSION/SIGNIFICANCE: Oral delivery of antigen by nirB-driven Salmonella typhimurium type III secretion system is a novel, safe, inexpensive, efficient and convenient approach for schistosome vaccine development.

  18. Financial protection effects of modification of China's New Cooperative Medical Scheme on rural households with chronic diseases.

    Science.gov (United States)

    Wang, Jing; Chen, Lina; Ye, Ting; Zhang, Zhiguo; Ma, Jingdong

    2014-07-15

    Several years have passed since the rural New Cooperative Medical Scheme (NCMS) in China was established and policies kept continuous improvement. Its policies on chronic diseases vary by county but have certain shared characteristics. Following this modification of medical insurance policy, this study reassesses the provision of insurance against expenditure on chronic diseases in rural areas, and analyzes its effect on impoverishment. We conducted an empirical study using multi-stage stratified random sampling. We surveyed 1,661 rural households in three provinces and analyzed the responses from 1,525 households that participated in NCMS, using descriptive and logistic regression analysis. The NCMS has reduced the prevalence of poverty and catastrophic health expenditure (CHE), as measured by out-of-pocket (OOP) payments exceeding 40% of total household expenditure, by decreasing medical expenditure. It provides obvious protection to households which include someone with chronic diseases. However, these households continue to face a higher financial risk than those without anyone suffering from chronic diseases. Variables about health service utilization and OOP payment differed significantly between households with or without people suffering from chronic disease. And CHE risk is commonly associated with household income, the number of family members with chronic diseases, OOP payment of outpatient and inpatient service in all three provinces. To reduce CHE risk for these households, it is critical to decrease OOP payments for health services by enhancing the effective reimbursement level of NCMS and strictly regulating the providers' behaviors. We recommend that a combinatory changes should be made to the rural health insurance scheme in China to improve its effect. These include improving the NCMS benefit package by broadening the catalogue of drugs and treatments covered, decreasing or abolishing deductible and increasing the reimbursement ratio of outpatient

  19. Sequential testing scheme for the assessment of the side-effects of plant protection products on the predatory bug Orius laevigatus

    NARCIS (Netherlands)

    Veire, Van de M.; Sterk, G.; Staaij, van der M.; Ramakers, P.M.J.; Tirry, L.

    2002-01-01

    This paper describes a number of test methods, to beused in a sequential scheme, for testing the side-effects ofplant protection products on anthocorid bugs. Orius laevigatuswas used as test species. A `worst case' laboratory method wasdeveloped for evaluating the effect on mortality of the

  20. Can health insurance protect against out-of-pocket and catastrophic expenditures and also support poverty reduction? Evidence from Ghana's National Health Insurance Scheme

    NARCIS (Netherlands)

    Aryeetey, G.C.; Westeneng, J.; Spaan, E.J.; Jehu-Appiah, C.; Agyepong, I.A.; Baltussen, R.M.

    2016-01-01

    BACKGROUND: Ghana since 2004, begun implementation of a National Health Insurance Scheme (NHIS) to minimize financial barriers to health care at point of use of service. Usually health insurance is expected to offer financial protection to households. This study aims to analyze the effect health

  1. Wide-area measurement system-based supervision of protection schemes with minimum number of phasor measurement units.

    Science.gov (United States)

    Gajare, Swaroop; Rao, J Ganeswara; Naidu, O D; Pradhan, Ashok Kumar

    2017-08-13

    Cascade tripping of power lines triggered by maloperation of zone-3 relays during stressed system conditions, such as load encroachment, power swing and voltage instability, has led to many catastrophic power failures worldwide, including Indian blackouts in 2012. With the introduction of wide-area measurement systems (WAMS) into the grids, real-time monitoring of transmission network condition is possible. A phasor measurement unit (PMU) sends time-synchronized data to a phasor data concentrator, which can provide a control signal to substation devices. The latency associated with the communication system makes WAMS suitable for a slower form of protection. In this work, a method to identify the faulted line using synchronized data from strategic PMU locations is proposed. Subsequently, a supervisory signal is generated for specific relays in the system for any disturbance or stressed condition. For a given system, an approach to decide the strategic locations for PMU placement is developed, which can be used for determining the minimum number of PMUs required for application of the method. The accuracy of the scheme is tested for faults during normal and stressed conditions in a New England 39-bus system simulated using EMTDC/PSCAD software. With such a strategy, maloperation of relays can be averted in many situations and thereby blackouts/large-scale disturbances can be prevented.This article is part of the themed issue 'Energy management: flexibility, risk and optimization'. © 2017 The Author(s).

  2. Evaluation of immunogenicity and protective efficacy of orally delivered Shigella type III secretion system proteins IpaB and IpaD.

    Science.gov (United States)

    Heine, Shannon J; Diaz-McNair, Jovita; Martinez-Becerra, Francisco J; Choudhari, Shyamal P; Clements, John D; Picking, Wendy L; Pasetti, Marcela F

    2013-06-19

    Shigella spp. are food- and water-borne pathogens that cause shigellosis, a severe diarrheal and dysenteric disease that is associated with a high morbidity and mortality in resource-poor countries. No licensed vaccine is available to prevent shigellosis. We have recently demonstrated that Shigella invasion plasmid antigens (Ipas), IpaB and IpaD, which are components of the bacterial type III secretion system (TTSS), can prevent infection in a mouse model of intranasal immunization and lethal pulmonary challenge. Because they are conserved across Shigella spp. and highly immunogenic, these proteins are excellent candidates for a cross-protective vaccine. Ideally, such a vaccine could be administered to humans orally to induce mucosal and systemic immunity. In this study, we investigated the immunogenicity and protective efficacy of Shigella IpaB and IpaD administered orally with a double mutant of the Escherichia coli heat labile toxin (dmLT) as a mucosal adjuvant. We characterized the immune responses induced by oral vs. intranasal immunization and the protective efficacy using a mouse pulmonary infection model. Serum IgG and fecal IgA against IpaB were induced after oral immunization. These responses, however, were lower than those obtained after intranasal immunization despite a 100-fold dosage increase. The level of protection induced by oral immunization with IpaB and IpaD was 40%, while intranasal immunization resulted in 90% protective efficacy. IpaB- and IpaD-specific IgA antibody-secreting cells in the lungs and spleen and T-cell-derived IL-2, IL-5, IL-17 and IL-10 were associated with protection. These results demonstrate the immunogenicity of orally administered IpaB and IpaD and support further studies in humans. Copyright © 2013 Elsevier Ltd. All rights reserved.

  3. Utilization of symmetrical components in a communication-assisted protection scheme for radial MV feeders with variable or reduced short-circuit currents

    DEFF Research Database (Denmark)

    Ciontea, Catalin-Iosif; Bak, Claus Leth; Blaabjerg, Frede

    2017-01-01

    because the fault current is significantly lower in the islanded mode compared to the grid-connected mode and consequently a single set of settings for the OC relays is not sufficient. This paper propose a communication-assisted protection scheme that is able to operate correctly in a radial Medium...... over positive-sequence current, while the relays placed downstream the fault detect a zero magnitude for their corresponding ratios. Protection relays calculate the magnitude of the proposed ratio and then exchange the obtained value with the adjacent upstream relays using communication. Therefore......, each relay would have access to its own ratio and to the ratio provided by the adjacent relay. Finally, the relay with the highest calculated magnitude of the ratio of zero-sequence to positive-sequence current will trip, thus clearing the fault. The new protection scheme is implemented in a test...

  4. Open Secrets

    OpenAIRE

    Madison, Michael

    2017-01-01

    The law of trade secrets is often conceptualized in bilateral terms, as creating and enforcing rights between trade secret owners, on the one hand, and misappropriators on the other hand. This paper, a chapter in a forthcoming collection on the law of trade secrets, argues that trade secrets and the law that guards them can serve structural and insitutional roles as well. Somewhat surprisingly, given the law’s focus on secrecy, among the institutional products of trade secrets law are commons...

  5. RSA-Based Secret Handshakes

    OpenAIRE

    Vergnaud , Damien

    2006-01-01

    A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, Smetters, Staddon and Wong and, so far, all the schemes proposed are based on discrete log systems. This paper proposes three new secret handshake protocols secure against active impersonator and detector adversaries. Inspired by two RSA-based key agreement protocols introduced by Okamoto and Tanaka in 1989 and Gira...

  6. Chronic inhibition of glycogen synthase kinase-3 protects against rotenone-induced cell death in human neuron-like cells by increasing BDNF secretion.

    Science.gov (United States)

    Giménez-Cassina, Alfredo; Lim, Filip; Díaz-Nido, Javier

    2012-12-07

    Mitochondrial dysfunction is a common feature of many neurodegenerative disorders. Likewise, activation of glycogen synthase kinase-3 (GSK-3) has been proposed to play an important role in neurodegeneration. This multifunctional protein kinase is involved in a number of cellular functions and we previously showed that chronic inhibition of GSK-3 protects neuronal cells against mitochondrial dysfunction-elicited cell death, through a mechanism involving increased glucose metabolism and the translocation of hexokinase II (HKII) to mitochondria. Here, we sought to gain deeper insight into the molecular basis of this neuroprotection. We found that chronic inhibition of GSK-3, either genetically or pharmacologically, elicited a marked increase in brain-derived neurotrophic factor (BDNF) secretion, which in turn conferred resistance to mitochondrial dysfunction through subcellular re-distribution of HKII. These results define a molecular pathway through which chronic inhibition of GSK-3 may protect neuronal cells from death. Moreover, they highlight the potential benefits of enhanced neurotrophic factor secretion as a therapeutic approach to treat neurodegenerative diseases. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  7. Can health insurance protect against out-of-pocket and catastrophic expenditures and also support poverty reduction? Evidence from Ghana's National Health Insurance Scheme.

    Science.gov (United States)

    Aryeetey, Genevieve Cecilia; Westeneng, Judith; Spaan, Ernst; Jehu-Appiah, Caroline; Agyepong, Irene Akua; Baltussen, Rob

    2016-07-22

    Ghana since 2004, begun implementation of a National Health Insurance Scheme (NHIS) to minimize financial barriers to health care at point of use of service. Usually health insurance is expected to offer financial protection to households. This study aims to analyze the effect health insurance on household out-of-pocket expenditure (OOPE), catastrophic expenditure (CE) and poverty. We conducted two repeated household surveys in two regions of Ghana in 2009 and 2011. We first analyzed the effect of OOPE on poverty by estimating poverty headcount before and after OOPE were incurred. We also employed probit models and use of instrumental variables to analyze the effect of health insurance on OOPE, CE and poverty. Our findings showed that between 7-18 % of insured households incurred CE as a result of OOPE whereas this was between 29-36 % for uninsured households. In addition, between 3-5 % of both insured and uninsured households fell into poverty due to OOPE. Our regression analyses revealed that health insurance enrolment reduced OOPE by 86 % and protected households against CE and poverty by 3.0 % and 7.5 % respectively. This study provides evidence that high OOPE leads to CE and poverty in Ghana but enrolment into the NHIS reduces OOPE, provides financial protection against CE and reduces poverty. These findings support the pro-poor policy objective of Ghana's National Health Insurance Scheme and holds relevance to other low and middle income countries implementing or aiming to implement insurance schemes.

  8. Olive Component Oleuropein Promotes β-Cell Insulin Secretion and Protects β-Cells from Amylin Amyloid-Induced Cytotoxicity.

    Science.gov (United States)

    Wu, Ling; Velander, Paul; Liu, Dongmin; Xu, Bin

    2017-09-26

    Oleuropein, a natural product derived from olive leaves, has reported anti-diabetic functions. However, detailed molecular mechanisms for how it affects β-cell functions remain poorly understood. Here, we present evidence that oleuropein promotes glucose-stimulated insulin secretion (GSIS) in β-cells. The effect is dose-dependent and stimulates the ERK/MAPK signaling pathway. We further demonstrated that oleuropein inhibits the cytotoxicity induced by amylin amyloids, a hallmark feature of type 2 diabetes. We demonstrated that these dual functions are structure-specific: we identified the 3-hydroxytyrosol moiety of oleuropein as the main functional entity responsible for amyloid inhibition, but the novel GSIS function requires the entire structure scaffold of the molecule.

  9. A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth

    Directory of Open Access Journals (Sweden)

    Yuwen Chen

    2017-01-01

    Full Text Available In a wearable sensor-based deployment, sensors are placed over the patient to monitor their body health parameters. Continuous physiological information monitored by wearable sensors helps doctors have a better diagnostic and a suitable treatment. When doctors want to access the patient’s sensor data remotely via network, the patient will authenticate the identity of the doctor first, and then they will negotiate a key for further communication. Many lightweight schemes have been proposed to enable a mutual authentication and key establishment between the two parties with the help of a gateway node, but most of these schemes cannot enable identity confidentiality. Besides, the shared key is also known by the gateway, which means the patient’s sensor data could be leaked to the gateway. In PriAuth, identities are encrypted to guarantee confidentiality. Additionally, Elliptic Curve Diffie–Hellman (ECDH key exchange protocol has been adopted to ensure the secrecy of the key, avoiding the gateway access to it. Besides, only hash and XOR computations are adopted because of the computability and power constraints of the wearable sensors. The proposed scheme has been validated by BAN logic and AVISPA, and the results show the scheme has been proven as secure.

  10. Measures of the EU Agri-Environmental Protection Scheme (GAEPS) and their impacts on the visual acceptability of Finnish agricultural landscapes.

    Science.gov (United States)

    Tahvanainen, Liisa; Ihalainen, Marjut; Hietala-Koivu, Reija; Kolehmainen, Osmo; Tyrväinen, Liisa; Nousiainen, Ismo; Helenius, Juha

    2002-11-01

    As a member of the European Union, Finland has committed itself to creating an environmental policy for agriculture. The aims of this study were to evaluate visual impacts of the General Agri-Environmental Protection Scheme (GAEPS) and Supplementary Protection Scheme (SPS) and general attitudes towards some activities in those policies and furthermore to examine the suitability of the method of Alho et al. (2001) for the scenic beauty assessment. The study areas consisted of three original, untreated, and 15 modified rural landscapes representing a variety of different activities. The scenic beauty of the landscapes was evaluated through pairwise comparisons of the responses of 68 people. Furthermore, attitudes towards environmental values, water protection, buffer strips and subsidies to agriculture were obtained. The respondents found the maintained buffer strips more pleasing than unmaintained strips and considered that the quality of watercourses was increased by buffer strips along them. A suitable width for the buffer strip along main ditches, brooks and waterways was regarded, on average, to be wider than the current recommendations. Although the opinions of farmers were basically in line with the existing recommendations, farmers' opininons on the second and third most important effects of buffer strips, an increase in weeds and a decrease in cultivated land, clearly differed from those of the other respondents. Afforestation, lack of building maintenance and abandoned fields were considered to be the most important factors impacting rural landscapes. This study indicates that the Finnish Agri-Environmental Protection Schemes have had positive impacts on the visual quality of landscapes. Attitudes towards other impacts are contradictory. This study also showed the improvement of the Alho et al. (2001) method in these kinds of studies relative to other methods of pairwise comparisons.

  11. [Individual prevention of occupational contact dermatitis: protective gloves and skin protection recommendations as part of the patient management scheme by the public statutory employers' liability insurance].

    Science.gov (United States)

    Wilke, A; Skudlik, C; Sonsmann, F K

    2018-05-02

    The dermatologist's procedure is a pivotal tool for early recognition of occupational contact dermatitis (OCD), for reporting OCD cases to the statutory accident insurance and for treating the diseases. The employer is in charge of implementing skin protection measures at the workplace. However, in terms of an individual prevention approach it may be necessary to propose targeted skin protection recommendations in specific patient cases. The patient's own skin protection behavior significantly contributes to regenerating and maintaining healthy skin. This behavior includes the use of occupational skin products, and in particular the correct use of appropriately selected protective gloves. Protective gloves are the most important personal protective measure in the prevention of OCD. Prevention services, occupational health and safety specialists, occupational physicians and centers specialized in occupational dermatology can support the identification of suitable protective measures. Nowadays, suitable protective gloves exist for (almost) every occupational activity and exposure. However, improper use in practice can become a risk factor by itself for the skin (e. g., incorrectly used gloves). Therefore, it is of utmost importance to identify application errors, to educate patients in terms of skin protection and to motivate them to perform an appropriate skin protection behavior. With particular focus on protective gloves, this article gives an overview of various types, materials and potentially glove-related allergens, presents strategies for reducing occlusion effects and discusses some typical application errors and solutions.

  12. Authenticated quantum secret sharing with quantum dialogue based on Bell states

    International Nuclear Information System (INIS)

    Abulkasim, Hussein; Hamad, Safwat; El Bahnasy, Khalid; Rida, Saad Z

    2016-01-01

    This work proposes a scheme that combines the advantages of a quantum secret sharing procedure and quantum dialogue. The proposed scheme enables the participants to simultaneously make mutual identity authentications, in a simulated scenario where the boss, Alice, shares a secret with her two agents Bob and Charlie. The secret is protected by checking photons to keep untrustworthy agents and outer attacks from getting useful information. Before the two agents cooperate to recover Alice’s secret, they must authenticate their identity using parts of a pre-shared key. In addition, the whole pre-shared key is reused as part of recovering the secret data to avoid any leaks of information. In comparison with previous schemes, the proposed method can efficiently detect eavesdropping and it is free from information leaks. Furthermore, the proposed scheme proved to be secure against man-in-the-middle attacks, impersonation attacks, entangled-and-measure attacks, participant attacks, modification attacks and Trojan-horse attacks. (paper)

  13. IL-22 is mainly produced by IFNγ-secreting cells but is dispensable for host protection against Mycobacterium tuberculosis infection.

    Directory of Open Access Journals (Sweden)

    Jochen Behrends

    Full Text Available Anti-inflammatory treatment of autoimmune diseases is associated with an increased risk of reactivation tuberculosis (TB. Besides interleukin (IL-17A, IL-22 represents a classical T helper (TH17 cytokine and shares similar pathological effects in inflammatory diseases such as psoriasis or arthritis. Whereas IL-17A supports protective immune responses during mycobacterial infections, the role of IL-22 after infection with Mycobacterium tuberculosis (Mtb is yet poorly characterized. Therefore, we here characterize the cell types producing IL-22 and the protective function of this cytokine during experimental TB in mice. Like IL-17A, IL-22 is expressed early after infection with Mtb in an IL-23-dependent manner. Surprisingly, the majority of IL-22-producing cells are not positive for IL-17A but have rather functional characteristics of interferon-gamma-producing TH1 cells. Although we found minor differences in the number of naive and central memory T cells as well as in the frequency of TH1 and polyfunctional T cells in mice deficient for IL-22, the absence of IL-22 does not affect the outcome of Mtb infection. Our study revealed that although produced by TH1 cells, IL-22 is dispensable for protective immune responses during TB. Therefore, targeting of IL-22 in inflammatory disease may represent a therapeutic approach that does not incur the danger of reactivation TB.

  14. Oral administration of Lactobacillus plantarum strain AYA enhances IgA secretion and provides survival protection against influenza virus infection in mice.

    Directory of Open Access Journals (Sweden)

    Yosuke Kikuchi

    Full Text Available The mucosal immune system provides the first line of defense against inhaled and ingested pathogenic microbacteria and viruses. This defense system, to a large extent, is mediated by the actions of secretory IgA. In this study, we screened 140 strains of lactic acid bacteria for induction of IgA production by murine Peyer's patch cells. We selected one strain and named it Lactobacillus plantarum AYA. We found that L. plantarum AYA-induced production of IL-6 in Peyer's patch dendritic cells, with this production promoting IgA(+ B cells to differentiate into IgA-secreting plasma cells. We also observed that oral administration of L. plantarum AYA in mice caused an increase in IgA production in the small intestine and lung. This production of IgA correlated strongly with protective ability, with the treated mice surviving longer than the control mice after lethal influenza virus infection. Our data therefore reveals a novel immunoregulatory role of the L. plantarum AYA strain which enhances mucosal IgA production and provides protection against respiratory influenza virus infection.

  15. Is it worth protecting groundwater from diffuse pollution with agri-environmental schemes? A hydro-economic modeling approach.

    Science.gov (United States)

    Hérivaux, Cécile; Orban, Philippe; Brouyère, Serge

    2013-10-15

    In Europe, 30% of groundwater bodies are considered to be at risk of not achieving the Water Framework Directive (WFD) 'good status' objective by 2015, and 45% are in doubt of doing so. Diffuse agricultural pollution is one of the main pressures affecting groundwater bodies. To tackle this problem, the WFD requires Member States to design and implement cost-effective programs of measures to achieve the 'good status' objective by 2027 at the latest. Hitherto, action plans have mainly consisted of promoting the adoption of Agri-Environmental Schemes (AES). This raises a number of questions concerning the effectiveness of such schemes for improving groundwater status, and the economic implications of their implementation. We propose a hydro-economic model that combines a hydrogeological model to simulate groundwater quality evolution with agronomic and economic components to assess the expected costs, effectiveness, and benefits of AES implementation. This hydro-economic model can be used to identify cost-effective AES combinations at groundwater-body scale and to show the benefits to be expected from the resulting improvement in groundwater quality. The model is applied here to a rural area encompassing the Hesbaye aquifer, a large chalk aquifer which supplies about 230,000 inhabitants in the city of Liege (Belgium) and is severely contaminated by agricultural nitrates. We show that the time frame within which improvements in the Hesbaye groundwater quality can be expected may be much longer than that required by the WFD. Current WFD programs based on AES may be inappropriate for achieving the 'good status' objective in the most productive agricultural areas, in particular because these schemes are insufficiently attractive. Achieving 'good status' by 2027 would demand a substantial change in the design of AES, involving costs that may not be offset by benefits in the case of chalk aquifers with long renewal times. Copyright © 2013 Elsevier Ltd. All rights reserved.

  16. The ethyl acetate fraction of corn silk exhibits dual antioxidant and anti-glycation activities and protects insulin-secreting cells from glucotoxicity.

    Science.gov (United States)

    Chang, Chia-Chuan; Yuan, Wei; Roan, Hsiao-Yuh; Chang, Jia-Ling; Huang, Hsiu-Chen; Lee, Yu-Ching; Tsay, Huey Jen; Liu, Hui-Kang

    2016-11-03

    In this study, we aimed to develop a Stigmata Maydis (corn silk) fraction with dual bio-activities against oxidative stress and protein glycation to protect β-cells from diabetes-induced failure. Corn silk fractions were prepared by partition and chemically characterised by thin-layer chromatography. Free radical scavenging assay, glycation assay, and cell-based viability test (neutral red) were employed to decide the best fraction. Cell death analysis was executed by annexin V/ Propidium iodide staining. Cell proliferation was measured by WST-1. Finally, β-cell function was evaluated by β-cell marker gene expression (RT-PCR) and acute insulin secretion test. Four corn silk fractions were prepared from an ethanolic crude extract of corn silk. In vitro assays indicate ethyl acetate fraction (YMS-EA) was the most potent fraction. YMS-EA also attenuated the hydrogen peroxide- or methylglyoxal-induced induction of reactive oxygen species, reduction of cell viability, and inhibition of cell proliferation. However, YMS-EA was unable to prevent hydrogen peroxide-induced apoptosis or advanced glycation end-products-induced toxicity. Under hyperglycemic conditions, YMS-EA effectively reduced ROS levels, improved mRNA expression of insulin, glucokinase, and PDX-1, and enhanced glucose-stimulated insulin secretion. The similarity of bioactivities among apigenin, luteolin, and YMS-EA indicated that dual activities of YMS-EA might be derived from those compounds. We concluded that YMS-EA fraction could be developed as a preventive food agent against the glucotoxicity to β-cells in Type 2 diabetes.

  17. River crossings: decision making scheme for the execution of protection work; Cruces de rios: esquema de toma de decisiones para la ejecucion de obras de proteccion

    Energy Technology Data Exchange (ETDEWEB)

    Silva, Fernando C.; Carnicero, Martin [TGN - Transportadora de Gas del Norte S.A. (Argentina)

    2003-07-01

    TGN operates a natural gas transportation network of 7.700 kilometers of length that comprises most of Argentina and part of Chile, intercepting a considerable amount of rivers that travel in different geographic environments. In order to protect the integrity at river crossings, the Company implemented a program that includes monitoring, maintenance, assessment, characterization, design and construction of erosion control works in rivers. This document is focused in the method of assessment and characterization of problems related to river crossings and in its technical background. The final objective is to define a decision making scheme, useful to select the scope of work needed to assure pipeline protection and to obtain maximum benefits from the associated investments. (author)

  18. Lipid droplets induced by secreted phospholipase A2 and unsaturated fatty acids protect breast cancer cells from nutrient and lipotoxic stress.

    Science.gov (United States)

    Jarc, Eva; Kump, Ana; Malavašič, Petra; Eichmann, Thomas O; Zimmermann, Robert; Petan, Toni

    2018-03-01

    Cancer cells driven by the Ras oncogene scavenge unsaturated fatty acids (FAs) from their environment to counter nutrient stress. The human group X secreted phospholipase A 2 (hGX sPLA 2 ) releases FAs from membrane phospholipids, stimulates lipid droplet (LD) biogenesis in Ras-driven triple-negative breast cancer (TNBC) cells and enables their survival during starvation. Here we examined the role of LDs, induced by hGX sPLA 2 and unsaturated FAs, in protection of TNBC cells against nutrient stress. We found that hGX sPLA 2 releases a mixture of unsaturated FAs, including ω-3 and ω-6 polyunsaturated FAs (PUFAs), from TNBC cells. Starvation-induced breakdown of LDs induced by low micromolar concentrations of unsaturated FAs, including PUFAs, was associated with protection from cell death. Interestingly, adipose triglyceride lipase (ATGL) contributed to LD breakdown during starvation, but it was not required for the pro-survival effects of hGX sPLA 2 and unsaturated FAs. High micromolar concentrations of PUFAs, but not OA, induced oxidative stress-dependent cell death in TNBC cells. Inhibition of triacylglycerol (TAG) synthesis suppressed LD biogenesis and potentiated PUFA-induced cell damage. On the contrary, stimulation of LD biogenesis by hGX sPLA 2 and suppression of LD breakdown by ATGL depletion reduced PUFA-induced oxidative stress and cell death. Finally, lipidomic analyses revealed that sequestration of PUFAs in LDs by sPLA 2 -induced TAG remodelling and retention of PUFAs in LDs by inhibition of ATGL-mediated TAG lipolysis protect from PUFA lipotoxicity. LDs are thus antioxidant and pro-survival organelles that guard TNBC cells against nutrient and lipotoxic stress and emerge as attractive targets for novel therapeutic interventions. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Line Differential Protection Scheme Modelling for Underground 420 kV Cable Systems, EMTDC/PSCAD Relays Modelling

    DEFF Research Database (Denmark)

    Bak, Claus Leth; Sztykiel, Michal; Dollerup, Sebastian

    2011-01-01

    Based on the analysis of a specific relay model and an HVAC (High Voltage Alternating Current) cable system, a new approach to EMTDC/PSCAD modelling of protective relays is presented. Such approach allows creating complex and accurate relay models derived from the original algorithms. Relay models...... can be applied with various systems, allowing obtaining the most optimal configuration of the protective relaying. The present paper describes modelling methodology on the basis of Siemens SIPROTEC 4 7SD522/610. Relay model was verified experimentally with its real equivalent by both EMTP......-simulated and real world generated current signals connected to the relay....

  20. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    Science.gov (United States)

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.

  1. Analysis of multi drug resistant tuberculosis (MDR-TB) financial protection policy: MDR-TB health insurance schemes, in Chhattisgarh state, India.

    Science.gov (United States)

    Kundu, Debashish; Sharma, Nandini; Chadha, Sarabjit; Laokri, Samia; Awungafac, George; Jiang, Lai; Asaria, Miqdad

    2018-01-27

    There are significant financial barriers to access treatment for multi drug resistant tuberculosis (MDR-TB) in India. To address these challenges, Chhattisgarh state in India has established a MDR-TB financial protection policy by creating MDR-TB benefit packages as part of the universal health insurance scheme that the state has rolled out in their effort towards attaining Universal Health Coverage for all its residents. In these schemes the state purchases health insurance against set packages of services from third party health insurance agencies on behalf of all its residents. Provider payment reform by strategic purchasing through output based payments (lump sum fee is reimbursed as per the MDR-TB benefit package rates) to the providers - both public and private health facilities empanelled under the insurance scheme was the key intervention. To understand the implementation gap between policy and practice of the benefit packages with respect to equity in utilization of package claims by the poor patients in public and private sector. Data from primary health insurance claims from January 2013 to December 2015, were analysed using an extension of 'Kingdon's multiple streams for policy implementation framework' to explain the implementation gap between policy and practice of the MDR-TB benefit packages. The total number of claims for MDR-TB benefit packages increased over the study period mainly from poor patients treated in public facilities, particularly for the pre-treatment evaluation and hospital stay packages. Variations and inequities in utilizing the packages were observed between poor and non-poor beneficiaries in public and private sector. Private providers participation in the new MDR-TB financial protection mechanism through the universal health insurance scheme was observed to be much lower than might be expected given their share of healthcare provision overall in India. Our findings suggest that there may be an implementation gap due to weak

  2. Early secreted antigen ESAT-6 of Mycobacterium tuberculosis promotes protective T helper 17 cell responses in a toll-like receptor-2-dependent manner.

    Directory of Open Access Journals (Sweden)

    Samit Chatterjee

    2011-11-01

    Full Text Available Despite its relatively poor efficacy, Bacillus Calmette-Guérin (BCG has been used as a tuberculosis (TB vaccine since its development in 1921. BCG induces robust T helper 1 (Th1 immune responses but, for many individuals, this is not sufficient for host resistance against Mycobacterium tuberculosis (M. tb infection. Here we provide evidence that early secreted antigenic target protein 6 (ESAT-6, expressed by the virulent M. tb strain H37Rv but not by BCG, promotes vaccine-enhancing Th17 cell responses. These activities of ESAT-6 were dependent on TLR-2/MyD88 signalling and involved IL-6 and TGF-β production by dendritic cells. Thus, animals that were previously infected with H37Rv or recombinant BCG containing the RD1 region (BCG::RD1 exhibited improved protection upon re-challenge with virulent H37Rv compared with mice previously infected with BCG or RD1-deficient H37Rv (H37RvΔRD1. However, TLR-2 knockout (TLR-2⁻/⁻ animals neither showed Th17 responses nor exhibited improved protection in response to immunization with H37Rv. Furthermore, H37Rv and BCG::RD1 infection had little effect on the expression of the anti-inflammatory microRNA-146a (miR146a in dendritic cells (DCs, whereas BCG and H37RvΔRD1 profoundly induced its expression in DCs. Consistent with these findings, ESAT-6 had no effect on miR146a expression in uninfected DCs, but dramatically inhibited its upregulation in BCG-infected or LPS-treated DCs. Collectively, our findings indicate that, in addition to Th1 immunity induced by BCG, RD1/ESAT-6-induced Th17 immune responses are essential for optimal vaccine efficacy.

  3. The digital integrated protective scheme for 1,300 MW power stations. Performance in the presence of failures. Survivability

    International Nuclear Information System (INIS)

    Loubet, Jean; Colling, J.M.

    1982-01-01

    The new 1,300 MW nuclear power stations will be provided with a protective system making use of modern technologies, and of microprocessors in particular. One of the primary objectives taken into account at the design stage is the search for means of giving the system the ability to fulfil its duty even in the presence of failures. The characteristics that contribute to the achievement of this objective are tied to the overall architecture adopted, but also to a set of provisions, in the form of both hardware and software, that intervene, on fault occurrences, to limit and control the effects of these faults [fr

  4. A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Science.gov (United States)

    Wen, Fengtong

    2013-12-01

    User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.

  5. Secret Places.

    Science.gov (United States)

    Ridolfi, Kerry

    1997-01-01

    Argues that children are as deep as the ocean, with secret places inside of them waiting to be opened. Notes that it is powerful for students to learn they can make sense of the world through words, and describes inviting them into poetry as they read poetry, create poetry packets, and write and revise poems. (SR)

  6. Inhibition of cholinergic potentiation of insulin secretion from pancreatic islets by chronic elevation of glucose and fatty acids: Protection by casein kinase 2 inhibitor

    Directory of Open Access Journals (Sweden)

    Nicolai M. Doliba

    2017-10-01

    Conclusions: These results show that chronic FA treatment decreases acetylcholine potentiation of insulin secretion and that this effect is strictly glucose dependent and might involve CK2 phosphorylation of β-cell M3 muscarinic receptors.

  7. Security of a kind of quantum secret sharing with entangled states.

    Science.gov (United States)

    Wang, Tian-Yin; Liu, Ying-Zhao; Wei, Chun-Yan; Cai, Xiao-Qiu; Ma, Jian-Feng

    2017-05-30

    We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others' cooperation. Furthermore, we establish a general model for this kind of quantum secret sharing schemes and then give some necessary conditions to design a secure quantum secret sharing scheme under this model.

  8. Multiparty Quantum Secret Sharing of Secure Direct Communication Using Teleportation

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojing

    2007-01-01

    We present an (n,n) threshold quantum secret sharing scheme of secure direct communication using Greenberger-Horne-Zeilinger state and teleportation. After ensuring the security of the quantum channel, the sender encodes the secret message directly on a sequence of particle states and transmits it to the receivers by teleportation. The receivers can recover the secret message by combining their measurement results with the sender's result. If a perfect quantum channel is used, our scheme is completely secure because the transmitting particle sequence does not carry the secret message. We also show our scheme is secure for noise quantum channel.

  9. Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups

    DEFF Research Database (Denmark)

    Cramer, Ronald; Fehr, Serge

    2002-01-01

    A black-box secret sharing scheme for the threshold access structure T t,n is one which works over any finite Abelian group G. Briefly, such a scheme differs from an ordinary linear secret sharing scheme (over, say, a given finite field) in that distribution matrix and reconstruction vectors...... are defined over ℤ and are designed independently of the group G from which the secret and the shares are sampled. This means that perfect completeness and perfect privacy are guaranteed regardless of which group G is chosen. We define the black-box secret sharing problem as the problem of devising......, for an arbitrary given T t,n , a scheme with minimal expansion factor, i.e., where the length of the full vector of shares divided by the number of players n is minimal. Such schemes are relevant for instance in the context of distributed cryptosystems based on groups with secret or hard to compute group order...

  10. Threshold quantum secret sharing based on single qubit

    Science.gov (United States)

    Lu, Changbin; Miao, Fuyou; Meng, Keju; Yu, Yue

    2018-03-01

    Based on unitary phase shift operation on single qubit in association with Shamir's ( t, n) secret sharing, a ( t, n) threshold quantum secret sharing scheme (or ( t, n)-QSS) is proposed to share both classical information and quantum states. The scheme uses decoy photons to prevent eavesdropping and employs the secret in Shamir's scheme as the private value to guarantee the correctness of secret reconstruction. Analyses show it is resistant to typical intercept-and-resend attack, entangle-and-measure attack and participant attacks such as entanglement swapping attack. Moreover, it is easier to realize in physic and more practical in applications when compared with related ones. By the method in our scheme, new ( t, n)-QSS schemes can be easily constructed using other classical ( t, n) secret sharing.

  11. Intradermal delivery of Shigella IpaB and IpaD type III secretion proteins: kinetics of cell recruitment and antigen uptake, mucosal and systemic immunity, and protection across serotypes.

    Science.gov (United States)

    Heine, Shannon J; Diaz-McNair, Jovita; Andar, Abhay U; Drachenberg, Cinthia B; van de Verg, Lillian; Walker, Richard; Picking, Wendy L; Pasetti, Marcela F

    2014-02-15

    Shigella is one of the leading pathogens contributing to the vast pediatric diarrheal disease burden in low-income countries. No licensed vaccine is available, and the existing candidates are only partially effective and serotype specific. Shigella type III secretion system proteins IpaB and IpaD, which are conserved across Shigella spp., are candidates for a broadly protective, subunit-based vaccine. In this study, we investigated the immunogenicity and protective efficacy of IpaB and IpaD administered intradermally (i.d.) with a double-mutant of the Escherichia coli heat-labile enterotoxin (dmLT) adjuvant using microneedles. Different dosage levels of IpaB and IpaD, with or without dmLT, were tested in mice. Vaccine delivery into the dermis, recruitment of neutrophils, macrophages, dendritic cells, and Langerhans cells, and colocalization of vaccine Ag within skin-activated APC were demonstrated through histology and immunofluorescence microscopy. Ag-loaded neutrophils, macrophages, dendritic cells, and Langerhans cells remained in the tissue at least 1 wk. IpaB, IpaD, and dmLT-specific serum IgG- and IgG-secreting cells were produced following i.d. immunization. The protective efficacy was 70% against Shigella flexneri and 50% against Shigella sonnei. Similar results were obtained when the vaccine was administered intranasally, with the i.d. route requiring 25-40 times lower doses. Distinctively, IgG was detected in mucosal secretions; secretory IgA, as well as mucosal and systemic IgA Ab-secreting cells, were seemingly absent. Vaccine-induced T cells produced IFN-γ, IL-2, TNF-α, IL-17, IL-4, IL-5, and IL-10. These results demonstrate the potential of i.d. vaccination with IpaB and IpaD to prevent Shigella infection and support further studies in humans.

  12. 40 CFR 370.64 - What information can I claim as trade secret or confidential?

    Science.gov (United States)

    2010-07-01

    ... secret or confidential? 370.64 Section 370.64 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... secret or confidential? (a) Trade secrets. You may be able to withhold the name of a specific chemical... trade secret. The requirements for withholding trade secret information are set forth in EPCRA section...

  13. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation

    NARCIS (Netherlands)

    R.J.F. Cramer (Ronald); I.B. Damgård (Ivan); Y. Ishai

    2005-01-01

    htmlabstractWe present a method for converting shares of a secret into shares of the same secret in a different secret-sharing scheme using only local computation and no communication between players. In particular, shares in a replicated scheme based on a CNF representation of the access structure

  14. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  15. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Science.gov (United States)

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication.

  16. The Bordetella pertussis Type III Secretion System Tip Complex Protein Bsp22 Is Not a Protective Antigen and Fails To Elicit Serum Antibody Responses during Infection of Humans and Mice

    Science.gov (United States)

    Villarino Romero, Rodrigo; Bibova, Ilona; Cerny, Ondrej; Vecerek, Branislav; Wald, Tomas; Benada, Oldrich; Zavadilova, Jana; Sebo, Peter

    2013-01-01

    The type III secretion system (T3SS) of pathogenic bordetellae employs a self-associating tip complex protein Bsp22. This protein is immunogenic during infections by Bordetella bronchiseptica and could be used as a protective antigen to immunize mice against B. bronchiseptica challenge. Since low-passage clinical isolates of the human pathogen Bordetella pertussis produce a highly homologous Bsp22 protein (97% homology), we examined its vaccine and diagnostic potential. No Bsp22-specific antibodies were, however, detected in serum samples from 36 patients with clinically and serologically confirmed whooping cough disease (pertussis syndrome). Moreover, although the induction of Bsp22 secretion by the laboratory-adapted 18323 strain in the course of mice lung infection was observed, the B. pertussis 18323-infected mice did not mount any detectable serum antibody response against Bsp22. Furthermore, immunization with recombinant Bsp22 protein yielded induction of high Bsp22-specific serum antibody titers but did not protect mice against an intranasal challenge with B. pertussis 18323. Unlike for B. bronchiseptica, hence, the Bsp22 protein is nonimmunogenic, and/or the serum antibody response to it is suppressed, during B. pertussis infections of humans and mice. PMID:23690400

  17. On Secret Sharing with Nonlinear Product Reconstruction

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Cramer, Ronald; Mirandola, Diego

    2015-01-01

    Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty computation and, since recently, in the area of two-party cryptography as well. In a nutshell, this notion guarantees that the product of two secrets is obtained as a linear function of the vector......-necessarily-linear “product reconstruction function.” Is the resulting notion equivalent to multiplicative linear secret sharing? We show the (perhaps somewhat counterintuitive) result that this relaxed notion is strictly more general. Concretely, fix a finite field ${\\mathbb F}_q$ as the base field over which linear secret...... sharing is considered. Then we show there exists an (exotic) linear secret sharing scheme with an unbounded number of players $n$ such that it has $t$-privacy with $t = \\Omega(n)$ and such that it does admit a product reconstruction function, yet this function is necessarily nonlinear. In addition, we...

  18. Tradable schemes

    NARCIS (Netherlands)

    J.K. Hoogland (Jiri); C.D.D. Neumann

    2000-01-01

    textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing

  19. Quantum secret sharing via local operations and classical communication.

    Science.gov (United States)

    Yang, Ying-Hui; Gao, Fei; Wu, Xia; Qin, Su-Juan; Zuo, Hui-Juan; Wen, Qiao-Yan

    2015-11-20

    We investigate the distinguishability of orthogonal multipartite entangled states in d-qudit system by restricted local operations and classical communication. According to these properties, we propose a standard (2, n)-threshold quantum secret sharing scheme (called LOCC-QSS scheme), which solves the open question in [Rahaman et al., Phys. Rev. A, 91, 022330 (2015)]. On the other hand, we find that all the existing (k, n)-threshold LOCC-QSS schemes are imperfect (or "ramp"), i.e., unauthorized groups can obtain some information about the shared secret. Furthermore, we present a (3, 4)-threshold LOCC-QSS scheme which is close to perfect.

  20. Multiparty Quantum Secret Sharing of Quantum States Using Entanglement States

    International Nuclear Information System (INIS)

    Ying, Guo; Da-Zu, Huang; Gui-Hua, Zeng; Ho, Lee Moon

    2008-01-01

    A multi-partite-controlled quantum secret sharing scheme using several non-orthogonal entanglement states is presented with unconditional security. In this scheme, the participants share the secret quantum state by exchanging the secret polarization angles of the disordered travel particles. The security of the secret quantum state is also guaranteed by the non-orthogonal multi-partite-controlled entanglement states, the participants' secret polarizations, and the disorder of the travelling particles. Moreover, the present scheme is secure against the particle-number splitting attack and the intercept-and-resend attack. It may be still secure even if the distributed quantum state is embedded in a not-so-weak coherent-state pulse

  1. SECURE VISUAL SECRET SHARING BASED ON DISCRETE WAVELET TRANSFORM

    Directory of Open Access Journals (Sweden)

    S. Jyothi Lekshmi

    2015-08-01

    Full Text Available Visual Cryptography Scheme (VCS is an encryption method to encode secret written materials. This method converts the secret written material into an image. Then encode this secret image into n shadow images called shares. For the recreation of the original secret, all or some selected subsets of shares are needed; individual shares are of no use on their own. The secret image can be recovered simply by selecting some subset of these n shares, makes transparencies of them and stacking on top of each other. Nowadays, the data security has an important role. The shares can be altered by an attacker. So providing security to the shares is important. This paper proposes a method of adding security to cryptographic shares. This method uses two dimensional discrete wavelet transform to hide visual secret shares. Then the hidden secrets are distributed among participants through the internet. All hidden shares are extracted to reconstruct the secret.

  2. Comment on ‘Authenticated quantum secret sharing with quantum dialogue based on Bell states’

    Science.gov (United States)

    Gao, Gan; Wang, Yue; Wang, Dong; Ye, Liu

    2018-02-01

    In the paper (2016 Phys. Scr. 91 085101), Abulkasim et al proposed a authenticated quantum secret sharing scheme. We study the security of the multiparty case in the proposed scheme and find that it is not secure.

  3. Multi-group dynamic quantum secret sharing with single photons

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Hongwei [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Ma, Haiqiang, E-mail: hqma@bupt.edu.cn [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Wei, Kejin [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Yang, Xiuqing [School of Science, Beijing Jiaotong University, Beijing 100044 (China); Qu, Wenxiu; Dou, Tianqi; Chen, Yitian; Li, Ruixue; Zhu, Wu [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2016-07-15

    In this letter, we propose a novel scheme for the realization of single-photon dynamic quantum secret sharing between a boss and three dynamic agent groups. In our system, the boss can not only choose one of these three groups to share the secret with, but also can share two sets of independent keys with two groups without redistribution. Furthermore, the security of communication is enhanced by using a control mode. Compared with previous schemes, our scheme is more flexible and will contribute to a practical application. - Highlights: • A multi-group dynamic quantum secret sharing with single photons scheme is proposed. • Any one of the groups can be chosen to share secret through controlling the polarization of photons. • Two sets of keys can be shared simultaneously without redistribution.

  4. Secret Sharing and Secure Computing from Monotone Formulae

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Kölker, Jonas; Miltersen, Peter Bro

    2012-01-01

    We present a construction of log-depth formulae for various threshold functions based on atomic threshold gates of constant size. From this, we build a new family of linear secret sharing schemes that are multiplicative, scale well as the number of players increases and allows to raise a shared...... of our scheme for pseudorandom secret sharing as defined by Cramer, Damgård and Ishai...

  5. Glutathione transferase-M2-2 secreted from glioblastoma cell protects SH-SY5Y cells from aminochrome neurotoxicity.

    Science.gov (United States)

    Cuevas, Carlos; Huenchuguala, Sandro; Muñoz, Patricia; Villa, Monica; Paris, Irmgard; Mannervik, Bengt; Segura-Aguilar, Juan

    2015-04-01

    U373MG cells are able to take up aminochrome that induces glutathione transferase M2-2 (GSTM2) expression in a concentration-dependent manner where 100 µM aminochrome increases GSTM2 expression by 2.1-fold (P protects SH-SY5Y cells incubated with 10 µM aminochrome. The significant protection provided by U373MG-conditioned medium in SH-SY5Y cells incubated with aminochrome was dependent on GSTM2 internalization into SH-SY5Y cells as evidenced by (i) uptake of (14)C-GSTM2 released from U373MG cells into SH-SY5Y cells, a process inhibited by anti-GSTM2 antiserum; (ii) lack of protection of U373MG-conditioned medium in the presence of anti-GSTM2 antiserum on SH-SY5Y cells treated with aminochrome; and (iii) lack of protection of conditioned medium from U373MGsiGST6 that expresses an siRNA directed against GSTM2 on SH-SY5Y cells treated with aminochrome. In conclusion, our results demonstrated that U373MG cells protect SH-SY5Y cells against aminochrome neurotoxicity by releasing GSTM2 into the conditioned medium and subsequent internalization of GSTM2 into SH-SY5Y cells. These results suggest a new mechanism of protection of dopaminergic neurons mediated by astrocytes by releasing GSTM2 into the intersynaptic space and subsequent internalization into dopaminergic neuron in order to protect these cells against aminochrome neurotoxicity.

  6. IMPORTANCE OF THE AGRI-ENVIRONMENTAL AND CLIMATE SCHEME WITHIN THE FRAMEWORK OF THE ENVIRONMENTAL PROTECTION SYSTEM (IN THE LIGHT OF THE POLISH RURAL DEVELOPMENT PROGRAMME 2014–2020

    Directory of Open Access Journals (Sweden)

    Bartosz Mickiewicz

    2015-12-01

    Full Text Available The study discusses the agri-environment scheme, which gained a high position in the process of integration of environmental protection in the framework of the CAP. The purpose of the payments was to encourage farmers to protect and improve the environment. The farmers were required to apply environmentally friendly techniques and practices for a period of fi ve years. Received payments had additional reimbursement of extra costs and decreased income resulting from the application of environment-friendly practices. Agrienvironmental scheme was realized through packages and variants, whose number diff ered in time. In 2004–2006, agrienvironmental scheme included approximately 70 thousand of agricultural holdings, which labored on the surface of the 1.4 million ha. In the next programming period (2007–2013 the benefi ciaries submitted 448,6 thousand applications, and the level of payment amounted to PLN 6.7 billion. The program of the current fi nancial perspective (2014–2020 includes 2058,9 thousand ha of agricultural land, as compared to the total area of agricultural land in the country in the amount of 14609 ha of agricultural land represents 14.1%

  7. Laser Protection TIL

    Data.gov (United States)

    Federal Laboratory Consortium — The Laser Protection TIL conducts research and analysis of laser protection materials along with integration schemes. The lab's objectives are to limit energy coming...

  8. Secure direct communication based on secret transmitting order of particles

    International Nuclear Information System (INIS)

    Zhu Aidong; Zhang Shou; Xia Yan; Fan Qiubo

    2006-01-01

    We propose the schemes of quantum secure direct communication based on a secret transmitting order of particles. In these protocols, the secret transmitting order of particles ensures the security of communication, and no secret messages are leaked even if the communication is interrupted for security. This strategy of security for communication is also generalized to a quantum dialogue. It not only ensures the unconditional security but also improves the efficiency of communication

  9. Secret and research

    Directory of Open Access Journals (Sweden)

    André PETITAT

    2013-12-01

    Full Text Available The postures of secrecy and revelation maintain our common relational dynamics between sharing and not sharing. Science, which has become the dominant form of knowledge, is a rational and empirical knowledge sharing. For this purpose, the knowledge articulates languages, if possible unambiguous, spaces of rational deliberation, technical devices and resources of the imagination. This activity meets other logics called power, prestige, status, profit, customer, blind adherence and revealed truth, in which the postures of secret invite themselves massively. The codes of ethics attempt to regulate this mix of contradictory logics by setting standards of scientific exchanges, recalling the person rights and particularly the subjects observed rights, protecting the working conditions of the researcher, preserving its autonomy from funders and policy makers, and ensuring the dissemination of its results.

  10. Identification Of Environmental Variables For Use In Monitoring For The Evaluation Of The Rural Environment Protection Scheme – End of Project Report - 5190a

    OpenAIRE

    Finn, John; Kavanagh, Brendan P; Flynn, Maeve

    2005-01-01

    The aim of this study was to identify and select quantitative environmental attributes for a monitoring programme that may be integrated into an environmental evaluation of Ireland’s agri-environmental scheme. This was achieved primarily by reviewing a range of agri-environmental indicators and suggesting indicators that would be appropriate for monitoring the REPS. The study conducted a desk review to collate information on current best practice in monitoring for environmental quality. A Pro...

  11. Cost Comparison Among Provable Data Possession Schemes

    Science.gov (United States)

    2016-03-01

    of Acronyms and Abbreviations AE authenticated encryption AWS Amazon Web Services CIO Chief Information Officer DISA Defense Information Systems Agency...the number of possible challenges, H be a cryptographic hash function, AE be an authenticated encryption scheme, f be a keyed pseudo-random function...key kenc R←− Kenc for symmetric encryption scheme Enc, and a random HMAC key kmac R←− Kmac. The secret key is sk = 〈kenc, kmac〉 and public key is pk

  12. Secure biometric image sensor and authentication scheme based on compressed sensing.

    Science.gov (United States)

    Suzuki, Hiroyuki; Suzuki, Masamichi; Urabe, Takuya; Obi, Takashi; Yamaguchi, Masahiro; Ohyama, Nagaaki

    2013-11-20

    It is important to ensure the security of biometric authentication information, because its leakage causes serious risks, such as replay attacks using the stolen biometric data, and also because it is almost impossible to replace raw biometric information. In this paper, we propose a secure biometric authentication scheme that protects such information by employing an optical data ciphering technique based on compressed sensing. The proposed scheme is based on two-factor authentication, the biometric information being supplemented by secret information that is used as a random seed for a cipher key. In this scheme, a biometric image is optically encrypted at the time of image capture, and a pair of restored biometric images for enrollment and verification are verified in the authentication server. If any of the biometric information is exposed to risk, it can be reenrolled by changing the secret information. Through numerical experiments, we confirm that finger vein images can be restored from the compressed sensing measurement data. We also present results that verify the accuracy of the scheme.

  13. Secret-key expansion from covert communication

    Science.gov (United States)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  14. Characterisation of vaccine-induced, broadly cross-reactive IFN-γ secreting T cell responses that correlate with rapid protection against classical swine fever virus.

    Science.gov (United States)

    Graham, Simon P; Haines, Felicity J; Johns, Helen L; Sosan, Olubukola; La Rocca, S Anna; Lamp, Benjamin; Rümenapf, Till; Everett, Helen E; Crooke, Helen R

    2012-04-05

    Live attenuated C-strain classical swine fever viruses (CSFV) provide a rapid onset of protection, but the lack of a serological test that can differentiate vaccinated from infected animals limits their application in CSF outbreaks. Since immunity may precede antibody responses, we examined the kinetics and specificity of peripheral blood T cell responses from pigs vaccinated with a C-strain vaccine and challenged after five days with a genotypically divergent CSFV isolate. Vaccinated animals displayed virus-specific IFN-γ responses from day 3 post-challenge, whereas, unvaccinated challenge control animals failed to mount a detectable response. Both CD4(+) and cytotoxic CD8(+) T cells were identified as the cellular source of IFN-γ. IFN-γ responses showed extensive cross-reactivity when T cells were stimulated with CSFV isolates spanning the major genotypes. To determine the specificity of these responses, T cells were stimulated with recombinant CSFV proteins and a proteome-wide peptide library from a related virus, BVDV. Major cross-reactive peptides were mapped on the E2 and NS3 proteins. Finally, IFN-γ was shown to exert potent antiviral effects on CSFV in vitro. These data support the involvement of broadly cross-reactive T cell IFN-γ responses in the rapid protection conferred by the C-strain vaccine and this information should aid the development of the next generation of CSFV vaccines. Crown Copyright © 2012. Published by Elsevier Ltd. All rights reserved.

  15. Behavior of temperature dependent SRAM-PUFs, and consequences for secret-key capacity

    NARCIS (Netherlands)

    Kusters, C.J.; Ignatenko, T.; Willems, F.M.J.

    2017-01-01

    Physical Unclonable Functions (PUFs) are a resource for generating and sharing secret keys. The mutual information between two respective observations of the same PUF gives an upper bound for the achievable secret-key rate of a secret-sharing scheme that relies on this PUF. This mutual information

  16. Secret Sharing of a Quantum State.

    Science.gov (United States)

    Lu, He; Zhang, Zhen; Chen, Luo-Kan; Li, Zheng-Da; Liu, Chang; Li, Li; Liu, Nai-Le; Ma, Xiongfeng; Chen, Yu-Ao; Pan, Jian-Wei

    2016-07-15

    Secret sharing of a quantum state, or quantum secret sharing, in which a dealer wants to share a certain amount of quantum information with a few players, has wide applications in quantum information. The critical criterion in a threshold secret sharing scheme is confidentiality: with less than the designated number of players, no information can be recovered. Furthermore, in a quantum scenario, one additional critical criterion exists: the capability of sharing entangled and unknown quantum information. Here, by employing a six-photon entangled state, we demonstrate a quantum threshold scheme, where the shared quantum secrecy can be efficiently reconstructed with a state fidelity as high as 93%. By observing that any one or two parties cannot recover the secrecy, we show that our scheme meets the confidentiality criterion. Meanwhile, we also demonstrate that entangled quantum information can be shared and recovered via our setting, which shows that our implemented scheme is fully quantum. Moreover, our experimental setup can be treated as a decoding circuit of the five-qubit quantum error-correcting code with two erasure errors.

  17. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  18. Trade Secrets in Life Science and Pharmaceutical Companies

    Science.gov (United States)

    Nealey, Tara; Daignault, Ronald M.; Cai, Yu

    2015-01-01

    Trade secret protection arises under state common law and state statutes. In general, a trade secret is information that is not generally known to the public and is maintained as a secret, and it provides a competitive advantage or economic benefit to the trade secret holder. Trade secrets can be worth tens or hundreds of millions of dollars, and damage awards in trade secret litigation have been high; often, there is a lot at stake. Obtaining a trade secret through “improper means” is misappropriation. If the alleged trade secret, however, was developed independently, known publicly, or not maintained as a secret, then those defenses may successfully overcome a claim for trade secret misappropriation. With today’s interconnectedness in the biotechnology and pharmaceutical fields, more collaborations, joint ventures, and outsourcing arrangements among firms, and increased mobility of employees’ careers, life science companies need to not only understand how to protect their trade secrets, but also know how to defend against a claim for trade secret theft. PMID:25414378

  19. Trade secrets in life science and pharmaceutical companies.

    Science.gov (United States)

    Nealey, Tara; Daignault, Ronald M; Cai, Yu

    2014-11-20

    Trade secret protection arises under state common law and state statutes. In general, a trade secret is information that is not generally known to the public and is maintained as a secret, and it provides a competitive advantage or economic benefit to the trade secret holder. Trade secrets can be worth tens or hundreds of millions of dollars, and damage awards in trade secret litigation have been high; often, there is a lot at stake. Obtaining a trade secret through "improper means" is misappropriation. If the alleged trade secret, however, was developed independently, known publicly, or not maintained as a secret, then those defenses may successfully overcome a claim for trade secret misappropriation. With today's interconnectedness in the biotechnology and pharmaceutical fields, more collaborations, joint ventures, and outsourcing arrangements among firms, and increased mobility of employees' careers, life science companies need to not only understand how to protect their trade secrets, but also know how to defend against a claim for trade secret theft. Copyright © 2015 Cold Spring Harbor Laboratory Press; all rights reserved.

  20. Protective

    Directory of Open Access Journals (Sweden)

    Wessam M. Abdel-Wahab

    2013-10-01

    Full Text Available Many active ingredients extracted from herbal and medicinal plants are extensively studied for their beneficial effects. Antioxidant activity and free radical scavenging properties of thymoquinone (TQ have been reported. The present study evaluated the possible protective effects of TQ against the toxicity and oxidative stress of sodium fluoride (NaF in the liver of rats. Rats were divided into four groups, the first group served as the control group and was administered distilled water whereas the NaF group received NaF orally at a dose of 10 mg/kg for 4 weeks, TQ group was administered TQ orally at a dose of 10 mg/kg for 5 weeks, and the NaF-TQ group was first given TQ for 1 week and was secondly administered 10 mg/kg/day NaF in association with 10 mg/kg TQ for 4 weeks. Rats intoxicated with NaF showed a significant increase in lipid peroxidation whereas the level of reduced glutathione (GSH and the activity of superoxide dismutase (SOD, catalase (CAT, glutathione S-transferase (GST and glutathione peroxidase (GPx were reduced in hepatic tissues. The proper functioning of the liver was also disrupted as indicated by alterations in the measured liver function indices and biochemical parameters. TQ supplementation counteracted the NaF-induced hepatotoxicity probably due to its strong antioxidant activity. In conclusion, the results obtained clearly indicated the role of oxidative stress in the induction of NaF toxicity and suggested hepatoprotective effects of TQ against the toxicity of fluoride compounds.

  1. Security of helper data Schemes for SRAM-PUF in multiple enrollment scenarios

    NARCIS (Netherlands)

    Kusters, C.J.; Ignatenko, T.; Maes, R.; van der Sluis, E.; Selimis, G.; Willems, F.M.J.

    2017-01-01

    Fuzzy commitment and syndrome-based schemes are two well-known helper data schemes used to bind and generate, respectively, a secret key to/from SRAM-PUF observations. To allow the decoder to reconstruct this secret key from a new (verification) observation of an SRAM-PUF, an encoder has to generate

  2. A New Quantum Communication Scheme by Using Bell States

    International Nuclear Information System (INIS)

    Cao Haijing; Chen Jing; Song Heshan

    2006-01-01

    A new quantum communication scheme based on entanglement swapping is presented. Simplified calculation symbols are adopted to realize the process. Quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. Two legitimate communicators can secretly share four certain key bits and four random key bits via three EPR pairs (quantum channels).

  3. Quantum secret sharing using orthogonal multiqudit entangled states

    Science.gov (United States)

    Bai, Chen-Ming; Li, Zhi-Hui; Liu, Cheng-Ji; Li, Yong-Ming

    2017-12-01

    In this work, we investigate the distinguishability of orthogonal multiqudit entangled states under restricted local operations and classical communication. According to these properties, we propose a quantum secret sharing scheme to realize three types of access structures, i.e., the ( n, n)-threshold, the restricted (3, n)-threshold and restricted (4, n)-threshold schemes (called LOCC-QSS scheme). All cooperating players in the restricted threshold schemes are from two disjoint groups. In the proposed protocol, the participants use the computational basis measurement and classical communication to distinguish between those orthogonal states and reconstruct the original secret. Furthermore, we also analyze the security of our scheme in four primary quantum attacks and give a simple encoding method in order to better prevent the participant conspiracy attack.

  4. Trade Secrets in the Legal Studies Curriculum--A Case Study

    Science.gov (United States)

    Evans, Michelle

    2012-01-01

    Trade secrets can be a valuable company asset because of their potential to last forever. Unfortunately, along with such a significant benefit, there is also a significant risk--the risk that the trade secret can be lost in an instant if it is not sufficiently protected. Companies must be vigilant in protecting these secrets. However, the law is…

  5. A Reliable Image Watermarking Scheme Based on Redistributed Image Normalization and SVD

    Directory of Open Access Journals (Sweden)

    Musrrat Ali

    2016-01-01

    Full Text Available Digital image watermarking is the process of concealing secret information in a digital image for protecting its rightful ownership. Most of the existing block based singular value decomposition (SVD digital watermarking schemes are not robust to geometric distortions, such as rotation in an integer multiple of ninety degree and image flipping, which change the locations of the pixels but don’t make any changes to the pixel’s intensity of the image. Also, the schemes have used a constant scaling factor to give the same weightage to the coefficients of different magnitudes that results in visible distortion in some regions of the watermarked image. Therefore, to overcome the problems mentioned here, this paper proposes a novel image watermarking scheme by incorporating the concepts of redistributed image normalization and variable scaling factor depending on the coefficient’s magnitude to be embedded. Furthermore, to enhance the security and robustness the watermark is shuffled by using the piecewise linear chaotic map before the embedding. To investigate the robustness of the scheme several attacks are applied to seriously distort the watermarked image. Empirical analysis of the results has demonstrated the efficiency of the proposed scheme.

  6. On the diversity-multiplexing tradeoff of secret-key agreement over multiple-antenna channels

    KAUST Repository

    Zorgui, Marwen

    2014-09-01

    We consider secret-key agreement with public discussion over Rayleigh fading quasi-static channels. First, the secret-key diversity gain and the secret-key multiplexing gain are defined. Then, the secret-key diversity multiplexing tradeoff (DMT) is established. The eavesdropper is shown to \\'steal\\' only transmit antennas. We show that likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information (CSI) at the transmitter (CSI-T). This insensitivity of secret-key DMT toward CSI-T highlights a fundamental difference between secret-key agreement and the wiretap channel whose secret DMT depends crucially on CSI-T. Several secret-key DMT-achieving schemes are presented in case of full CSI-T.

  7. On the diversity-multiplexing tradeoff of secret-key agreement over multiple-antenna channels

    KAUST Repository

    Zorgui, Marwen; Rezki, Zouheir; Alomair, Basel; Alouini, Mohamed-Slim

    2014-01-01

    We consider secret-key agreement with public discussion over Rayleigh fading quasi-static channels. First, the secret-key diversity gain and the secret-key multiplexing gain are defined. Then, the secret-key diversity multiplexing tradeoff (DMT) is established. The eavesdropper is shown to 'steal' only transmit antennas. We show that likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information (CSI) at the transmitter (CSI-T). This insensitivity of secret-key DMT toward CSI-T highlights a fundamental difference between secret-key agreement and the wiretap channel whose secret DMT depends crucially on CSI-T. Several secret-key DMT-achieving schemes are presented in case of full CSI-T.

  8. A Finite Equivalence of Verifiable Multi-secret Sharing

    Directory of Open Access Journals (Sweden)

    Hui Zhao

    2012-02-01

    Full Text Available We give an abstraction of verifiable multi-secret sharing schemes that is accessible to a fully mechanized analysis. This abstraction is formalized within the applied pi-calculus by using an equational theory which characterizes the cryptographic semantics of secret share. We also present an encoding from the equational theory into a convergent rewriting system, which is suitable for the automated protocol verifier ProVerif. Based on that, we verify the threshold certificate protocol in ProVerif.

  9. The central importance of the EU emission trading scheme for achievement of the German climate protection target of 40% until 2020

    International Nuclear Information System (INIS)

    Hermann, Hauke; Cludius, Johanna

    2014-02-01

    Both Germany and the European Union have set themselves targets for the reduction of greenhouse gas (GHG) emissions. The EU was the forerunner in 2008 when it adopted the Climate and Energy package and set a target of reducing GHG emissions by 20 % by 2020 compared to 1990. Two years later, Germany adopted a range of national GHG targets in the context of the German government's Energy Concept. This includes a 40% emissions reduction target to be met by 2020. One of the main instruments for achieving GHG emissions reduction targets is the EU Emissions Trading Scheme (EU ETS), which covers all large industrial and combustion installations in Europe. According to the agreement made in 2008 (Climate and Energy Package), the effort to achieve the EU's 20 % reduction target by 2020 was split between the ETS sector (2/3 of the reduction effort, representing a 21 % reduction in GHG emissions for installations covered under the ETS compared to 2005) and the non-ETS sector (1/3 of the reduction effort, representing a 10 % reduction compared to 2005). Logically, GHG emissions reductions occurring in German ETS installations count both towards the EU and the national target. This research project has been commissioned to analyse whether the ETS in its cur-rent design can contribute its fair share in efforts to meet the national emissions reduc-tion target. This question is particularly relevant in light of the following considerations: - The new German Coalition Agreement, signed in December 2013, reiterated the national target of a 40 % reduction of GHG emissions by 2020 compared to 1990 levels. - At the same time, the new Coalition Agreement stated that changes to the ETS are only to be considered if the EU GHG emissions reduction target will not be met. - There is a surplus of CO2 allowances on the ETS market, which undermines the credibility of the instrument as well as the integrity of the emissions reduction tar-gets (both European and national). At the same time, the

  10. An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service

    Directory of Open Access Journals (Sweden)

    Pan Yang

    2017-01-01

    Full Text Available Homomorphic encryption can protect user’s privacy when operating on user’s data in cloud computing. But it is not practical for wide using as the data and services types in cloud computing are diverse. Among these data types, digital image is an important personal data for users. There are also many image processing services in cloud computing. To protect user’s privacy in these services, this paper proposed a scheme using homomorphic encryption in image processing. Firstly, a secret key homomorphic encryption (IGHE was constructed for encrypting image. IGHE can operate on encrypted floating numbers efficiently to adapt to the image processing service. Then, by translating the traditional image processing methods into the operations on encrypted pixels, the encrypted image can be processed homomorphically. That is, service can process the encrypted image directly, and the result after decryption is the same as processing the plain image. To illustrate our scheme, three common image processing instances were given in this paper. The experiments show that our scheme is secure, correct, and efficient enough to be used in practical image processing applications.

  11. An authentication scheme for secure access to healthcare services.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  12. Employees, Trade Secrets and Restrictive Covenants

    NARCIS (Netherlands)

    Kamperman Sanders, Anselm; Heath, C.

    2017-01-01

    The book covers the protection of trade secrets and the law on post-contractual non-compete clauses (restrictive covenants) in an employment context. The topic is approached on an international and comparative level (chapters 1–3 and 10), and by way of country reports covering several European and

  13. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input......-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  14. An Efficient V2I Authentication Scheme for VANETs

    Directory of Open Access Journals (Sweden)

    Yousheng Zhou

    2018-01-01

    Full Text Available The advent of intelligent transportation system has a crucial impact on the traffic safety and efficiency. To cope with security issues such as spoofing attack and forgery attack, many authentication schemes for vehicular ad hoc networks (VANETs have been developed, which are based on the hypothesis that secret keys are kept perfectly secure. However, key exposure is inevitable on account of the openness of VANET environment. To address this problem, key insulation is introduced in our proposed scheme. With a helper device, vehicles could periodically update their own secret keys. In this way, the forward and backward secrecy has been achieved. In addition, the elliptic curve operations have been integrated to improve the performance. The random oracle model is adopted to prove the security of the proposed scheme, and the experiment has been conducted to demonstrate the comparison between our scheme and the existing similar schemes.

  15. The mechanism of biliary lipid secretion and its defects

    NARCIS (Netherlands)

    Elferink, R. P.; Groen, A. K.

    1999-01-01

    Biliary lipid secretion is an important physiological event; not only for the disposal of cholesterol from the body, but also for the protection of cells lining the biliary tree against bile salts. Insight into the (patho)physiological role of biliary lipid secretion has been recently expanded

  16. Incretin secretion: direct mechanisms

    DEFF Research Database (Denmark)

    Balk-Møller, Emilie; Holst, Jens Juul; Kuhre, Rune Ehrenreich

    2014-01-01

    The incretin hormones glucose-dependent insulinotropic polypeptide (GIP) and glucagon-like peptide 1 (GLP-1) are secreted from gastro-intestinal K- and L-cells, respectively, and play an important role in post-prandial blood glucose regulation. They do this by direct stimulation of the pancreatic β...... enzyme responsible for incretin degradation (dipeptidyl peptidase-4) is inhibited (drugs are already on the market) while the secretion of endogenous GLP-1 secretion is stimulated at the same time may prove particularly rewarding. In this section we review current knowledge on the mechanisms for direct...

  17. Improving the Authentication Scheme and Access Control Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Wei-Chen Wu

    2014-11-01

    Full Text Available Privacy and security are very important in vehicular ad hoc networks (VANETs. VANETs are negatively affected by any malicious user’s behaviors, such as bogus information and replay attacks on the disseminated messages. Among various security threats, privacy preservation is one of the new challenges of protecting users’ private information. Existing authentication protocols to secure VANETs raise challenges, such as certificate distribution and reduction of the strong reliance on tamper-proof devices. In 2011, Yeh et al. proposed a PAACP: a portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. However, PAACP in the authorization phase is breakable and cannot maintain privacy in VANETs. In this paper, we present a cryptanalysis of an attachable blind signature and demonstrate that the PAACP’s authorized credential (AC is not secure and private, even if the AC is secretly stored in a tamper-proof device. An eavesdropper can construct an AC from an intercepted blind document. Any eavesdropper can determine who has which access privileges to access which service. For this reason, this paper copes with these challenges and proposes an efficient scheme. We conclude that an improving authentication scheme and access control protocol for VANETs not only resolves the problems that have appeared, but also is more secure and efficient.

  18. Secret quality of love.

    Science.gov (United States)

    Strachan-Hall, Elaine

    2016-09-01

    Many of us can recite three Donabedian dimensions of the quality of care of structure, process and outcome. Recently, I was introduced to another of Avedis Donabedian's quotes about the 'secret quality of love'.

  19. Six secrets of champagne

    Science.gov (United States)

    Liger-Belair, Gérard

    2015-12-01

    Popping open a bottle of champagne is one of life's great delights, but how much do you really know about the science behind this greatest of wines? Gérard Liger-Belair reveals his six favourite champagne secrets.

  20. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  1. Economic burden of gastrointestinal cancer under the protection of the New Rural Cooperative Medical Scheme in a region of rural China with high incidence of oesophageal cancer: cross-sectional survey.

    Science.gov (United States)

    Li, Xiang; Cai, Hong; Wang, Chaoyi; Guo, Chuanhai; He, Zhonghu; Ke, Yang

    2016-07-01

    To evaluate the financial burden of oesophageal cancer under the protection of the new Rural Cooperative Medical Scheme (NCMS) and to provide evidence and suggestions to policymakers in a high-incidence region in China. We analysed inpatient claim data for oesophageal cancer, gastric cancer and colorectal cancer from 1 January to 31 December 2013. The data were extracted from the NCMS management system of Hua County, Henan Province, a typical high-risk region for oesophageal cancer in China. Cancer-specific health economic indicators were calculated to evaluate the financial burden under the protection of the local NCMS. The total cost of oesophageal cancer was 2.7-3.6 times higher than that of gastric cancer and colorectal cancer, respectively, due to high incidence of oesophageal cancer. For each hospitalisation to treat oesophageal cancer, the average total cost and out-of-pocket expenses after reimbursement equalled an entire year's gross domestic product per capita and per capita disposable income, respectively, for the local area. The average total cost per hospitalisation for oesophageal cancer increased monotonically with hospital level for surgical hospitalisations, and it increased more rapidly for non-surgical hospitalisations (from $301 to $2589, 860%) than for gastric cancer (from $289 to $1453, 503%) and colorectal cancer (from $359 to $1610, 448%). Vulnerable groups with less access to high-level hospitals were found in different gender and age groups. Oesophageal cancer imposes serious financial burdens on communities and patients' households in this high-incidence region, and no preferential policy from the local NCMS has been designed to address this issue. A special supportive policy should be developed on the basis of local disease profiles and population characteristics to alleviate the financial burden of populations at high risk for certain high-cost diseases. © 2016 John Wiley & Sons Ltd.

  2. Plasma Cell Alloantigen 1 and IL-10 Secretion Define Two Distinct Peritoneal B1a B Cell Subsets With Opposite Functions, PC1high Cells Being Protective and PC1low Cells Harmful for the Growing Fetus

    Directory of Open Access Journals (Sweden)

    Anne Schumacher

    2018-05-01

    Full Text Available B cells possess various immuno regulatory functions. However, research about their participation in tolerance induction toward the fetus is just emerging. Accumulating evidence supports the idea that B cells can play seemingly conflicting roles during pregnancy, either protecting or harming the fetus. Previous findings indicated the presence of two different peritoneal B cell subsets, defined by the expression of the plasma cell alloantigen 1 (PC1 and with distinct immune modulatory functions. Here, we aimed to study the participation of these two B cell subsets, on pregnancy outcome in a murine model of disturbed fetal tolerance. The frequencies and cell numbers of peritoneal and splenic CD19+IL-10+ and CD19+CD5+IL-10+PC1+ cells were assessed in virgin as well as normal pregnant (NP and abortion-prone (AP females during the course of gestation. Peritoneal PC1low or PC1high B1a B cells were sorted, analyzed for their ability to secrete IL-10 and adoptively transferred into NP or AP females. On gestation day (gd 12, the abortion rate as well as the frequencies and cell numbers of regulatory T cells, TH1 and TH17 cells were determined in spleens and decidua. In addition, mRNA expression of IL-10, TGF-β, IFN-γ, and TNF-α was analyzed in decidual tissue. Peritoneal CD19+IL-10+ and CD19+CD5+IL-10+PC1+ frequencies fluctuated during the progression of normal pregnancies while no significant changes were observed in spleen. AP females showed significantly reduced frequencies of both B cell populations and exhibited an altered peritoneal PC1high/PC1low ratio at gd10. Adoptive transfers of PC1low B1a B cells into NP females increased the abortion rate in association with a reduced splenic regulatory T/TH17 ratio. By contrast, the transfer of PC1high B1a B cells into AP females significantly diminished the fetal rejection rate and significantly reduced the numbers of splenic TH17 cells. Our results suggest that the peritoneum harbors two distinct B1a B

  3. Key Recovery Using Noised Secret Sharing with Discounts over Large Clouds

    OpenAIRE

    JAJODIA , Sushil; Litwin , Witold; Schwarz , Thomas

    2013-01-01

    Encryption key loss problem is the Achilles's heel of cryptography. Key escrow helps, but favors disclosures. Schemes for recoverable encryption keys through noised secret sharing alleviate the dilemma. Key owner escrows a specifically encrypted backup. The recovery needs a large cloud. Cloud cost, money trail should rarefy illegal attempts. We now propose noised secret sharing schemes supporting discounts. The recovery request with discount code lowers the recovery complexity, easily by orde...

  4. A unifying view on template protection schemes

    NARCIS (Netherlands)

    Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, R.N.J.; Veldhuis, Raymond N.J.; Cronie, H.S.

    2007-01-01

    We show that there is a direct relation between the maximum length keys extracted from biometric data and the error rates of the biometric system. This information can be used a-priori to evaluate the potential of the biometric data in the context of a specific cryptographic application. We model

  5. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  6. Finite Difference Schemes as Algebraic Correspondences between Layers

    Science.gov (United States)

    Malykh, Mikhail; Sevastianov, Leonid

    2018-02-01

    For some differential equations, especially for Riccati equation, new finite difference schemes are suggested. These schemes define protective correspondences between the layers. Calculation using these schemes can be extended to the area beyond movable singularities of exact solution without any error accumulation.

  7. Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks

    DEFF Research Database (Denmark)

    Fehr, Serge; Maurer, Ueli M.

    2002-01-01

    . VSS and DC are main building blocks for unconditional secure multi-party computation protocols. This general approach covers all known linear VSS and DC schemes. The main theorem states that the security of a scheme is equivalent to a pure linear-algebra condition on the linear mappings (e.......g. described as matrices and vectors) describing the scheme. The security of all known schemes follows as corollaries whose proofs are pure linear-algebra arguments, in contrast to some hybrid arguments used in the literature. Our approach is demonstrated for the CDM DC scheme, which we generalize to be secure......We present a general treatment of all non-cryptographic (i.e., information-theoretically secure) linear veriable-secret-sharing (VSS) and distributed-commitment (DC) schemes, based on an underlying secret sharing scheme, pairwise checks between players, complaints, and accusations of the dealer...

  8. 40 CFR 350.15 - Public petitions requesting disclosure of chemical identity claimed as trade secret.

    Science.gov (United States)

    2010-07-01

    ... of chemical identity claimed as trade secret. 350.15 Section 350.15 Protection of Environment... TRADE SECRECY CLAIMS FOR EMERGENCY PLANNING AND COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET... chemical identity claimed as trade secret. (a) The public may request the disclosure of chemical identity...

  9. Quantum secret sharing based on quantum error-correcting codes

    International Nuclear Information System (INIS)

    Zhang Zu-Rong; Liu Wei-Tao; Li Cheng-Zu

    2011-01-01

    Quantum secret sharing(QSS) is a procedure of sharing classical information or quantum information by using quantum states. This paper presents how to use a [2k − 1, 1, k] quantum error-correcting code (QECC) to implement a quantum (k, 2k − 1) threshold scheme. It also takes advantage of classical enhancement of the [2k − 1, 1, k] QECC to establish a QSS scheme which can share classical information and quantum information simultaneously. Because information is encoded into QECC, these schemes can prevent intercept-resend attacks and be implemented on some noisy channels. (general)

  10. Intranasal Administration of 2/6-Rotavirus-Like Particles with Mutant Escherichia coli Heat-Labile Toxin (LT-R192G) Induces Antibody-Secreting Cell Responses but Not Protective Immunity in Gnotobiotic Pigs

    Science.gov (United States)

    Yuan, Lijuan; Geyer, Annelise; Hodgins, Douglas C.; Fan, Zhiqian; Qian, Yuan; Chang, Kyeong-Ok; Crawford, Sue E.; Parreño, Viviana; Ward, Lucy A.; Estes, Mary K.; Conner, Margaret E.; Saif, Linda J.

    2000-01-01

    We investigated the immunogenicity of recombinant double-layered rotavirus-like particle (2/6-VLPs) vaccines derived from simian SA11 or human (VP6) Wa and bovine RF (VP2) rotavirus strains. The 2/6-VLPs were administered to gnotobiotic pigs intranasally (i.n.) with a mutant Escherichia coli heat-labile toxin, LT-R192G (mLT), as mucosal adjuvant. Pigs were challenged with virulent Wa (P1A[8],G1) human rotavirus at postinoculation day (PID) 21 (two-dose VLP regimen) or 28 (three-dose VLP regimen). In vivo antigen-activated antibody-secreting cells (ASC) (effector B cells) and in vitro antigen-reactivated ASC (derived from memory B cells) from intestinal and systemic lymphoid tissues (duodenum, ileum, mesenteric lymph nodes [MLN], spleen, peripheral blood lymphocytes [PBL], and bone marrow lymphocytes) collected at selected times were quantitated by enzyme-linked immunospot assays. Rotavirus-specific immunoglobulin M (IgM), IgA, and IgG ASC and memory B-cell responses were detected by PID 21 or 28 in intestinal and systemic lymphoid tissues after i.n. inoculation with two or three doses of 2/6-VLPs with or without mLT. Greater mean numbers of virus-specific ASC and memory B cells in all tissues prechallenge were induced in pigs inoculated with two doses of SA11 2/6-VLPs plus mLT compared to SA11 2/6-VLPs without mLT. After challenge, anamnestic IgA and IgG ASC and memory B-cell responses were detected in intestinal lymphoid tissues of all VLP-inoculated groups, but serum virus-neutralizing antibody titers were not significantly enhanced compared to the challenged controls. Pigs inoculated with Wa-RF 2/6-VLPs (with or without mLT) developed higher anamnestic IgA and IgG ASC responses in ileum after challenge compared to pigs inoculated with SA11 2/6-VLPs (with or without mLT). Three doses of SA 11 2/6-VLP plus mLT induced the highest mean numbers of IgG memory B cells in MLN, spleen, and PBL among all groups postchallenge. However, no significant protection against

  11. A note on Wang et al's attack on Zhang et al's multiparty quantum secret sharing

    International Nuclear Information System (INIS)

    Gao Gan

    2012-01-01

    Recently, Wang et al (2008 Phys. Lett. A 373 65) proposed an attack on Zhang et al's (2007 Opt. Commun. 269 418) multiparty quantum secret sharing scheme, in which the first and the last agent are reported to be able to cooperatively eavesdrop on all the secret messages without being detected. In this paper, we show that in Wang et al's attack, on average no more than half the secret messages can be eavesdropped. (paper)

  12. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  13. Distributed public key schemes secure against continual leakage

    DEFF Research Database (Denmark)

    Akavia, Adi; Goldwasser, Shafi; Hazay, Carmit

    2012-01-01

    -secure against continual memory leakage. Our DPKE scheme also implies a secure storage system on leaky devices, where a value s can be secretely stored on devices that continually leak information about their internal state to an external attacker. The devices go through a periodic refresh protocol......In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly...... against continual memory leakage, under the Bilinear Decisional Diffie-Hellman and $2$-linear assumptions. Our schemes have the following properties: 1. Our DPKE and DIBE schemes tolerate leakage at all times, including during refresh. During refresh the tolerated leakage is a (1/2-o (1),1)-fraction...

  14. (t, n) Threshold d-Level Quantum Secret Sharing.

    Science.gov (United States)

    Song, Xiu-Li; Liu, Yan-Bing; Deng, Hong-Yao; Xiao, Yong-Gang

    2017-07-25

    Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares are collected. Compared with (n, n) threshold 2-level QSS, the proposed QSS provides better universality, flexibility, and practicability. Moreover, in this scheme, any one of the participants does not know the other participants' shares, even the trusted reconstructor Bob 1 is no exception. The transformation of the particles includes some simple operations such as d-level CNOT, Quantum Fourier Transform(QFT), Inverse Quantum Fourier Transform(IQFT), and generalized Pauli operator. The transformed particles need not to be transmitted from one participant to another in the quantum channel. Security analysis shows that the proposed scheme can resist intercept-resend attack, entangle-measure attack, collusion attack, and forgery attack. Performance comparison shows that it has lower computation and communication costs than other similar schemes when 2 < t < n - 1.

  15. Sequential Quantum Secret Sharing Using a Single Qudit

    Science.gov (United States)

    Bai, Chen-Ming; Li, Zhi-Hui; Li, Yong-Ming

    2018-05-01

    In this paper we propose a novel and efficient quantum secret sharing protocol using d-level single particle, which it can realize a general access structure via the thought of concatenation. In addition, Our scheme includes all advantages of Tavakoli’s scheme [Phys. Rev. A 92 (2015) 030302(R)]. In contrast to Tavakoli’s scheme, the efficiency of our scheme is 1 for the same situation, and the access structure is more general and has advantages in practical significance. Furthermore, we also analyze the security of our scheme in the primary quantum attacks. Sponsored by the National Natural Science Foundation of China under Grant Nos. 61373150 and 61602291, and Industrial Research and Development Project of Science and Technology of Shaanxi Province under Grant No. 2013k0611

  16. Cryptanalysis of a computer cryptography scheme based on a filter bank

    International Nuclear Information System (INIS)

    Arroyo, David; Li Chengqing; Li Shujun; Alvarez, Gonzalo

    2009-01-01

    This paper analyzes the security of a recently-proposed signal encryption scheme based on a filter bank. A very critical weakness of this new signal encryption procedure is exploited in order to successfully recover the associated secret key.

  17. Quantum secure direct communication scheme using a W state and teleportation

    International Nuclear Information System (INIS)

    Cao Haijing; Song Heshan

    2006-01-01

    A theoretical scheme for quantum secure direct communication (QSDC) is proposed, where a three-qubit symmetric W state functions as a quantum channel. Two legitimate communicators can transmit their secret information by using quantum teleportation and local measurements

  18. Type VI secretion system.

    Science.gov (United States)

    Salomon, Dor; Orth, Kim

    2015-03-30

    Bacteria employ a variety of tools to survive in a competitive environment. Salomon and Orth describe one such tool-the Type 6 Secretion Systems used by bacteria to deliver a variety of toxins into competing cells. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. Salivary Gland Secretion.

    Science.gov (United States)

    Dorman, H. L.; And Others

    1981-01-01

    Describes materials and procedures for an experiment utilizing a live dog to demonstrate: (1) physiology of the salivary gland; (2) parasympathetic control of the salivary gland; (3) influence of varying salivary flow rates on sodium and potassium ions, osmolarity and pH; and (4) salivary secretion as an active process. (DS)

  20. 'Secret' Shuttle payloads revealed

    Science.gov (United States)

    Powell, Joel W.

    1993-05-01

    A secret military payload carried by the orbiter Discovery launched on January 24 1985 is discussed. Secondary payloads on the military Shuttle flights are briefly reviewed. Most of the military middeck experiments were sponsored by the Space Test Program established at the Pentagon to oversee all Defense Department space research projects.

  1. Inappropriate Antidiuretic Hormone Secretion

    African Journals Online (AJOL)

    1974-06-08

    Jun 8, 1974 ... with Addison's disease, diarrhoea or salt-losing nephritis. (asymptomatic hyponatraemia).~ Schwartz et al.3 stud;ed two patients with anaplastic bronchus carcinoma and hyponatraemia in 1957, and they suggested that there was an inappropriate secretion of antidiuretic hormone (ADH). It is now well ...

  2. Physiology of bile secretion.

    Science.gov (United States)

    Esteller, Alejandro

    2008-10-07

    The formation of bile depends on the structural and functional integrity of the bile-secretory apparatus and its impairment, in different situations, results in the syndrome of cholestasis. The structural bases that permit bile secretion as well as various aspects related with its composition and flow rate in physiological conditions will first be reviewed. Canalicular bile is produced by polarized hepatocytes that hold transporters in their basolateral (sinusoidal) and apical (canalicular) plasma membrane. This review summarizes recent data on the molecular determinants of this primary bile formation. The major function of the biliary tree is modification of canalicular bile by secretory and reabsorptive processes in bile-duct epithelial cells (cholangiocytes) as bile passes through bile ducts. The mechanisms of fluid and solute transport in cholangiocytes will also be discussed. In contrast to hepatocytes where secretion is constant and poorly controlled, cholangiocyte secretion is regulated by hormones and nerves. A short section dedicated to these regulatory mechanisms of bile secretion has been included. The aim of this revision was to set the bases for other reviews in this series that will be devoted to specific issues related with biliary physiology and pathology.

  3. A Public Secret

    DEFF Research Database (Denmark)

    Bregnbæk, Susanne

    2011-01-01

    This article is based on anthropological fieldwork undertaken at two elite universities in Beijing. It addresses the paradoxical situation of the many instances of suicide among Chinese elite university students in Beijing, which constitute a public secret. The pressure of education weighs heavily...

  4. MONA Implementation Secrets

    DEFF Research Database (Denmark)

    Klarlund, Nils; Møller, Anders; Schwartzbach, Michael Ignatieff

    2002-01-01

    a period of six years. Compared to the first naive version, the present tool is faster by several orders of magnitude. This speedup is obtained from many different contributions working on all levels of the compilation and execution of formulas. We present a selection of implementation "secrets" that have...

  5. Labelling schemes: From a consumer perspective

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2000-01-01

    Labelling of food products attracts a lot of political attention these days. As a result of a number of food scandals, most European countries have acknowledged the need for more information and better protection of consumers. Labelling schemes are one way of informing and guiding consumers....... However, initiatives in relation to labelling schemes seldom take their point of departure in consumers' needs and expectations; and in many cases, the schemes are defined by the institutions guaranteeing the label. It is therefore interesting to study how consumers actually value labelling schemes....... A recent MAPP study has investigated the value consumers attach the Government-controlled labels 'Ø-mærket' and 'Den Blå Lup' and the private supermarket label 'Mesterhakket' when they purchase minced meat. The results reveal four consumer segments that use labelling schemes for food products very...

  6. Wrapped up in Covers: Preschoolers' Secrets and Secret Hiding Places

    Science.gov (United States)

    Corson, Kimberly; Colwell, Malinda J.; Bell, Nancy J.; Trejos-Castillo, Elizabeth

    2014-01-01

    In this qualitative study, interviews about children's secret hiding places were conducted with 3-5-year-olds (n?=?17) in a university sponsored preschool programme using art narratives. Since prior studies indicate that children understand the concept of a secret as early as five and that they associate secrets with hiding places, the purpose of…

  7. Symmetric weak ternary quantum homomorphic encryption schemes

    Science.gov (United States)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  8. Quantum information theoretical analysis of various constructions for quantum secret sharing

    NARCIS (Netherlands)

    Rietjens, K.P.T.; Schoenmakers, B.; Tuyls, P.T.

    2005-01-01

    Recently, an information theoretical model for quantum secret sharing (QSS) schemes was introduced. By using this model, we prove that pure state quantum threshold schemes (QTS) can be constructed from quantum MDS codes and vice versa. In particular, we consider stabilizer codes and give a

  9. Transport safety and struggle against malevolent acts: a synergy to be developed - Protecting transports against malevolent acts, Synergies between security and safety: lessons learned from the IAEA international conference, Role of the IRSN transport operational level in the field of safety, Transparency and secret in the field of nuclear material transport

    International Nuclear Information System (INIS)

    Riac, Christian; Flory, Denis; Loiseau, Olivier; Mermaz, Frederic; Demolins, Laurent

    2012-01-01

    The first article proposes an interview with the chief of the security department within the French ministry of Ecology, Sustainable Development, Transports and Housing who comments his missions and his relationships with the ASN and the French Home Office for the protection and control of nuclear materials. A second article discusses the lessons learned from an IAEA international conference about the relationship between the approaches to security and to safety. The third article briefly describes the role of the IRSN transport operational level in the field of safety. The last article discusses how opposite notions like transparency and secret are managed in the case of nuclear material transport

  10. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  11. Extracellular secretion of recombinant proteins

    Science.gov (United States)

    Linger, Jeffrey G.; Darzins, Aldis

    2014-07-22

    Nucleic acids encoding secretion signals, expression vectors containing the nucleic acids, and host cells containing the expression vectors are disclosed. Also disclosed are polypeptides that contain the secretion signals and methods of producing polypeptides, including methods of directing the extracellular secretion of the polypeptides. Exemplary embodiments include cellulase proteins fused to secretion signals, methods to produce and isolate these polypeptides, and methods to degrade lignocellulosic biomass.

  12. A novel quantum steganography scheme for color images

    Science.gov (United States)

    Li, Panchi; Liu, Xiande

    In quantum image steganography, embedding capacity and security are two important issues. This paper presents a novel quantum steganography scheme using color images as cover images. First, the secret information is divided into 3-bit segments, and then each 3-bit segment is embedded into the LSB of one color pixel in the cover image according to its own value and using Gray code mapping rules. Extraction is the inverse of embedding. We designed the quantum circuits that implement the embedding and extracting process. The simulation results on a classical computer show that the proposed scheme outperforms several other existing schemes in terms of embedding capacity and security.

  13. Pathophysiology of glucagon secretion

    International Nuclear Information System (INIS)

    Boettger, J.; Pabst, H.W.

    1980-01-01

    Pathophysiology of glucagon secretion is reviewed in brief separating hyperglucagonemic from hypoclucagonemic states. Many questions concerning the role of glucagon in diabetes mellitus and in other diseases are still unresolved. The clucagon RIA is of clinical significance in a few diseases like glucagonoma, which may present without symptoms of the 'glucagonoma syndrome', the probably very rare hyperglucagonemia and some of the spontaneous hypoglycemias. Glucagon secretion may be evaluated by the determination of fasting immunoreactive glucagon (IRG) and by appropriate function tests as stimulation with i.v. arginine and suppression with oral glucose. However, the glucagon RIA at present is not a routine method, although commercial kits are available. Many pitfalls of radioimmunological glucagon determination still exist. (orig.) [de

  14. Bucarest, Strictement Secret

    Directory of Open Access Journals (Sweden)

    Ionela Mihai

    2010-07-01

    Full Text Available L’émission Bucarest, strictement secret représente un documentaire organisésous la forme d’une série télé, qui dépeint le Bucarest à partir de deux perspectives: de l’histoire, de la conte et du lieu. La valeur d’une cité réside dans l’existence d’une mystique, d’un romantisme abscons, à part et des caractères empruntés de drames de Shakespeare, mystérieux, serrés d’angoisse et des secrets qui assombrissent leur existence. Par conséquence, le rôle du metteur en scène est de dévoiler leur vraie identité et de remettre en place, autant que possible, la vérité.

  15. Bile Formation and Secretion

    Science.gov (United States)

    Boyer, James L.

    2014-01-01

    Bile is a unique and vital aqueous secretion of the liver that is formed by the hepatocyte and modified down stream by absorptive and secretory properties of the bile duct epithelium. Approximately 5% of bile consists of organic and inorganic solutes of considerable complexity. The bile-secretory unit consists of a canalicular network which is formed by the apical membrane of adjacent hepatocytes and sealed by tight junctions. The bile canaliculi (~1 μm in diameter) conduct the flow of bile countercurrent to the direction of portal blood flow and connect with the canal of Hering and bile ducts which progressively increase in diameter and complexity prior to the entry of bile into the gallbladder, common bile duct, and intestine. Canalicular bile secretion is determined by both bile salt-dependent and independent transport systems which are localized at the apical membrane of the hepatocyte and largely consist of a series of adenosine triphosphate-binding cassette transport proteins that function as export pumps for bile salts and other organic solutes. These transporters create osmotic gradients within the bile canalicular lumen that provide the driving force for movement of fluid into the lumen via aquaporins. Species vary with respect to the relative amounts of bile salt-dependent and independent canalicular flow and cholangiocyte secretion which is highly regulated by hormones, second messengers, and signal transduction pathways. Most determinants of bile secretion are now characterized at the molecular level in animal models and in man. Genetic mutations serve to illuminate many of their functions. PMID:23897680

  16. Lipids in airway secretions

    International Nuclear Information System (INIS)

    Bhaskar, K.R.; DeFeudis O'Sullivan, D.; Opaskar-Hincman, H.; Reid, L.M.

    1987-01-01

    Lipids form a significant portion of airway mucus yet they have not received the same attention that epithelial glycoproteins have. We have analysed, by thin layer chromatography, lipids present in airway mucus under 'normal' and hypersecretory (pathological) conditions.The 'normals' included (1) bronchial lavage obtained from healthy human volunteers and from dogs and (2) secretions produced ''in vitro'' by human (bronchial) and canine (tracheal) explants. Hypersecretory mucus samples included (1) lavage from dogs made bronchitic by exposure to SO 2 , (2) bronchial aspirates from acute and chronic tracheostomy patients, (3) sputum from patients with cystic fibrosis and chronic bronchitis and (4) postmortem secretions from patients who died from sudden infant death syndrome (SIDS) or from status asthmaticus. Cholesterol was found to be the predominant lipid in 'normal' mucus with lesser amounts of phospholipids. No glycolipids were detected. In the hypersecretory mucus, in addition to neutral and phospholipids, glycolipids were present in appreciable amounts, often the predominant species, suggesting that these may be useful as markers of disease. Radioactive precursors 14 C acetate and 14 C palmitate were incorporated into lipids secreted ''in vitro'' by canine tracheal explants indicating that they are synthesised by the airway. (author)

  17. Catechin secretion and phytotoxicity

    Science.gov (United States)

    Kaushik, Shail

    2010-01-01

    Research indicates that the invasiveness of Centaurea stoebe is attributed to the stronger allelopathic effects on the native North American species than on the related European species, which is one of the unquestionable aspects of the “novel weapons hypothesis (NWH).” Studies originating from controlled to field conditions have shown that C. stoebe utilizes its biochemical potential to exert its invasiveness. The roots of C. stoebe secrete a potent phytotoxin, catechin, which has a detrimental effect on the surrounding plant species. Although, studies on catechin secretion and phytotoxicity represent one of the most well studied systems describing negative plant-plant interactions, it has also sparked controversies lately due to its phytotoxicity dosages and secretion effluxes. Previous reports negate the phytotoxic and pro-oxidant nature of catechin.1–3 In our recent study we have shown that catechin is highly phytotoxic against Arabidopsis thaliana and Festuca idahoensis. We also show that (±) catechin applied to roots of A. thaliana induces reactive oxygen species (ROS) confirming the pro-oxidant nature of catechin. In addition, activation of signature cell death genes such as acd2 and cad1 post catechin treatment in A. thaliana ascertains the phytotoxic nature of catechin. PMID:21057643

  18. Dynamic secrets in communication security

    CERN Document Server

    Xiao, Sheng; Towsley, Donald

    2013-01-01

    Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. 'Dynamic Secrets in Communication Security' presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic

  19. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  20. Breaking a chaos-noise-based secure communication scheme

    Science.gov (United States)

    Li, Shujun; Álvarez, Gonzalo; Chen, Guanrong; Mou, Xuanqin

    2005-03-01

    This paper studies the security of a secure communication scheme based on two discrete-time intermittently chaotic systems synchronized via a common random driving signal. Some security defects of the scheme are revealed: 1) The key space can be remarkably reduced; 2) the decryption is insensitive to the mismatch of the secret key; 3) the key-generation process is insecure against known/chosen-plaintext attacks. The first two defects mean that the scheme is not secure enough against brute-force attacks, and the third one means that an attacker can easily break the cryptosystem by approximately estimating the secret key once he has a chance to access a fragment of the generated keystream. Yet it remains to be clarified if intermittent chaos could be used for designing secure chaotic cryptosystems.

  1. Enhanced ID-Based Authentication Scheme Using OTP in Smart Grid AMI Environment

    Directory of Open Access Journals (Sweden)

    Sang-Soo Yeo

    2014-01-01

    Full Text Available This paper presents the vulnerabilities analyses of KL scheme which is an ID-based authentication scheme for AMI network attached SCADA in smart grid and proposes a security-enhanced authentication scheme which satisfies forward secrecy as well as security requirements introduced in KL scheme and also other existing schemes. The proposed scheme uses MDMS which is the supervising system located in an electrical company as a time-synchronizing server in order to synchronize smart devices at home and conducts authentication between smart meter and smart devices using a new secret value generated by an OTP generator every session. The proposed scheme has forward secrecy, so it increases overall security, but its communication and computation overhead reduce its performance slightly, comparing the existing schemes. Nonetheless, hardware specification and communication bandwidth of smart devices will have better conditions continuously, so the proposed scheme would be a good choice for secure AMI environment.

  2. Windows 8 secrets

    CERN Document Server

    Thurrott, Paul

    2012-01-01

    Tips, tricks, treats, and secrets revealed on Windows 8 Microsoft is introducing a major new release of its Windows operating system, Windows 8, and what better way to learn all its ins and outs than from two internationally recognized Windows experts and Microsoft insiders, authors Paul Thurrott and Rafael Rivera? They cut through the hype to get at useful information you'll not find anywhere else, including what role this new OS plays in a mobile and tablet world. Regardless of your level of knowledge, you'll discover little-known facts about how things work, what's new and different, and h

  3. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  4. A New Proxy Electronic Voting Scheme Achieved by Six-Particle Entangled States

    Science.gov (United States)

    Cao, Hai-Jing; Ding, Li-Yuan; Jiang, Xiu-Li; Li, Peng-Fei

    2018-03-01

    In this paper, we use quantum proxy signature to construct a new secret electronic voting scheme. In our scheme, six particles entangled states function as quantum channels. The voter Alice, the Vote Management Center Bob, the scrutineer Charlie only perform two particles measurements on the Bell bases to realize the electronic voting process. So the scheme reduces the technical difficulty and increases operation efficiency. We use quantum key distribution and one-time pad to guarantee its unconditional security. The significant advantage of our scheme is that transmitted information capacity is twice as much as the capacity of other schemes.

  5. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...

  6. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  7. Deterministic MDI QKD with two secret bits per shared entangled pair

    Science.gov (United States)

    Zebboudj, Sofia; Omar, Mawloud

    2018-03-01

    Although quantum key distribution schemes have been proven theoretically secure, they are based on assumptions about the devices that are not yet satisfied with today's technology. The measurement-device-independent scheme has been proposed to shorten the gap between theory and practice by removing all detector side-channel attacks. On the other hand, two-way quantum key distribution schemes have been proposed to raise the secret key generation rate. In this paper, we propose a new quantum key distribution scheme able to achieve a relatively high secret key generation rate based on two-way quantum key distribution that also inherits the robustness of the measurement-device-independent scheme against detector side-channel attacks.

  8. Evaluating statistical cloud schemes

    OpenAIRE

    Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix

    2015-01-01

    Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...

  9. Gamma spectrometry; level schemes

    International Nuclear Information System (INIS)

    Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.

    1977-01-01

    The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr

  10. Scheme of energy utilities

    International Nuclear Information System (INIS)

    2002-04-01

    This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)

  11. Adaptive Image Transmission Scheme over Wavelet-Based OFDM System

    Institute of Scientific and Technical Information of China (English)

    GAOXinying; YUANDongfeng; ZHANGHaixia

    2005-01-01

    In this paper an adaptive image transmission scheme is proposed over Wavelet-based OFDM (WOFDM) system with Unequal error protection (UEP) by the design of non-uniform signal constellation in MLC. Two different data division schemes: byte-based and bitbased, are analyzed and compared. Different bits are protected unequally according to their different contribution to the image quality in bit-based data division scheme, which causes UEP combined with this scheme more powerful than that with byte-based scheme. Simulation results demonstrate that image transmission by UEP with bit-based data division scheme presents much higher PSNR values and surprisingly better image quality. Furthermore, by considering the tradeoff of complexity and BER performance, Haar wavelet with the shortest compactly supported filter length is the most suitable one among orthogonal Daubechies wavelet series in our proposed system.

  12. Robust anonymous authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  13. Salmonella-secreted Virulence Factors

    Energy Technology Data Exchange (ETDEWEB)

    Heffron, Fred; Niemann, George; Yoon, Hyunjin; Kidwai, Afshan S.; Brown, Roslyn N.; McDermott, Jason E.; Smith, Richard D.; Adkins, Joshua N.

    2011-05-01

    In this short review we discuss secreted virulence factors of Salmonella, which directly affect Salmonella interaction with its host. Salmonella secretes protein to subvert host defenses but also, as discussed, to reduce virulence thereby permitting the bacteria to persist longer and more successfully disperse. The type III secretion system (TTSS) is the best known and well studied of the mechanisms that enable secretion from the bacterial cytoplasm to the host cell cytoplasm. Other secretion systems include outer membrane vesicles, which are present in all Gram-negative bacteria examined to date, two-partner secretion, and type VI secretion will also be addressed. Excellent reviews of Salmonella secreted effectors have focused on themes such as actin rearrangements, vesicular trafficking, ubiquitination, and the activities of the virulence factors themselves. This short review is based on S. Typhimurium infection of mice because it is a model of typhoid like disease in humans. We have organized effectors in terms of events that happen during the infection cycle and how secreted effectors may be involved.

  14. Circular from January 26, 2004, taken for the enforcement of the by-law from January 26, 2004, relative to the national defense secrecy protection in the domain of nuclear materials protection and control; Circulaire du 26 janvier 2004 prise pour l'application de l'arrete du 26 janvier 2004 relatif a la protection du secret de la defense nationale dans le domaine de la protection et du controle des matieres nucleaires

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-01-15

    The by-law of January 26, 2004 gives a regulatory foundation to the classification of sensible informations relative to the security and physical protection of nuclear materials. This circular recalls, in this framework, the conditions of implementation of the regulation relative to the protection of national defense secrecies in the domain of the protection of nuclear facilities and materials. (J.S.)

  15. Expressed prostatic secretion biomarkers improve stratification of NCCN active surveillance candidates: performance of secretion capacity and TMPRSS2:ERG models.

    Science.gov (United States)

    Whelan, Christopher; Kawachi, Mark; Smith, David D; Linehan, Jennifer; Babilonia, Gail; Mejia, Rosa; Wilson, Timothy; Smith, Steven S

    2014-01-01

    Active surveillance is a viable patient option for prostate cancer provided that a clinical determination of low risk and presumably organ confined disease can be made. To standardize risk stratification schemes the NCCN (National Comprehensive Cancer Network®) provides guidelines for the active surveillance option. We determined the effectiveness of expressed prostatic secretion biomarkers for detecting occult risk factors in NCCN active surveillance candidates. Expressed prostatic secretion specimens were obtained before robot-assisted radical prostatectomy. Secretion capacity biomarkers, including total RNA and expressed prostatic secretion specimen volume, were measured by standard techniques. RNA expression biomarkers, including TXNRD1 mRNA, prostate specific antigen mRNA, TMPRSS2:ERG fusion mRNA and PCA3 mRNA, were measured by quantitative reverse-transcription polymerase chain reaction. Of the 528 patients from whom expressed prostatic secretions were collected 216 were eligible for active surveillance under NCCN guidelines. Variable selection on logistic regression identified 2 models, including one featuring types III and VI TMPRSS2:ERG variants, and one featuring 2 secretion capacity biomarkers. Of the 2 high performing models the secretion capacity model was most effective for detecting cases in this group that were up-staged or up-staged plus upgraded. It decreased the risk of up-staging in patients with a negative test almost eightfold and decreased the risk of up-staging plus upgrading about fivefold while doubling the prevalence of up-staging in the positive test group. Noninvasive expressed prostatic secretion testing may improve patient acceptance of active surveillance by dramatically reducing the presence of occult risk factors among those eligible for active surveillance under NCCN guidelines. Copyright © 2014 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All rights reserved.

  16. The problem of using trade secrets in economic relations

    Directory of Open Access Journals (Sweden)

    А. О. Олефір

    2015-05-01

    Full Text Available Problem setting. In a market economy and increased competition between enterprises become increasingly important concepts such as business information, trade secrets, know-how, confidential information, the information with restricted access. Given the fact that only one patent protection is unable to meet the needs of researchers, in addition to formal public protection and secured legal means we would like to pay attention at private legal measures, particular, the mode of trade secrets. Recent research and publications analysis. Different aspects of the protection of trade secrets were investigated by specialists such as G. Androschuk, J. Berzhye, I. Davydov, O. Davydyuk, D. Zadyhaylo, P. Kraynov, G. Nikiforov, S. Nikiforov, V. Rubanov, E. Solovyov, L. Hoffman, V. Chaplygin, A. Cherniavsky and others. However, at present there is a lack of comprehensive research of this legal phenomenon, equally useful for innovators and businesses that actively protect corporate security. Paper objective. This article is planned to determine the legal characteristics, structural elements and mechanisms by which the use of trade secrets in business have a positive impact on innovation development and corporate security entities. Paper main body. On the basis of requirements of Art. 505 Civil Code of Ukraine and art. 39 of the TRIPS Agreement we formulated commercial information signs under which it receives legal protection as an object of intellectual property: (1 privacy (real or potential in the sense that it is as a whole or in a precise combination of aggregate and its components are not generally known or available to persons in the circles that normally deal with such information; (2 commercial value (not purely industrial or industrial, due to its secrecy; this information is unknown to others, which is a commercial interest; (3 the lawful holder of the information provides active special measures (technical, organizational, legal to preserve secrecy

  17. Vote Markets, Latent Opportunism, and the Secret Ballot

    DEFF Research Database (Denmark)

    Justesen, Mogens Kamp; Bøttkjær, Louise Thorn; Gates, Scott

    The secret ballot is a cornerstone of modern democracy because it protects voter autonomy and allows voters to express their political preferences freely without fear of repercussions. In theory, the secret ballot is supposed to prevent vote buying – the exchange of votes for money or material...... goods – from operating during elections. Yet, empirical evidence from surveys around the world suggests that vote buying is a common feature of elections in new democracies. Indeed, a fundamental puzzle concerns why political parties use vote buying to mobilize electoral support when the secret ballot...... allows voters to renege on their commitments and vote as they please. In this paper, we address this puzzle by arguing that voter perceptions of ballot secrecy affect their responses to vote buying offers. Theoretically, we develop a game theoretical model, where voter beliefs in the secret ballot guide...

  18. Protection Coordination in Electrical Substation Part-2 Unit Protections (Differential and Distance Protection)

    OpenAIRE

    TÜR, Mehmet Rida; Shobole, Abdulfetah; Baysal, Mustafa; Wadi, Mohammed

    2018-01-01

    Power systemsmust be protected against faults to ensure quality and reliable generation,transmission and distribution of power systems. Power system protection is providedby the protection relays. This paper is the second part of the ProtectionCoordination study for the Siddik Kardesler Substation. The protection fortransmission lines, transformer, bus bars and customer feeders is provided byovercurrent protection, differential and distance protection schemes. In thispaper, issues related wit...

  19. Multiparty Quantum Direct Secret Sharing of Classical Information with Bell States and Bell Measurements

    Science.gov (United States)

    Song, Yun; Li, Yongming; Wang, Wenhua

    2018-02-01

    This paper proposed a new and efficient multiparty quantum direct secret sharing (QDSS) by using swapping quantum entanglement of Bell states. In the proposed scheme, the quantum correlation between the possible measurement results of the members (except dealer) and the original local unitary operation encoded by the dealer was presented. All agents only need to perform Bell measurements to share dealer's secret by recovering dealer's operation without performing any unitary operation. Our scheme has several advantages. The dealer is not required to retain any photons, and can further share a predetermined key instead of a random key to the agents. It has high capacity as two bits of secret messages can be transmitted by an EPR pair and the intrinsic efficiency approaches 100%, because no classical bit needs to be transmitted except those for detection. Without inserting any checking sets for detecting the eavesdropping, the scheme can resist not only the existing attacks, but also the cheating attack from the dishonest agent.

  20. A Secure and Scalable Data Communication Scheme in Smart Grids

    Directory of Open Access Journals (Sweden)

    Chunqiang Hu

    2018-01-01

    Full Text Available The concept of smart grid gained tremendous attention among researchers and utility providers in recent years. How to establish a secure communication among smart meters, utility companies, and the service providers is a challenging issue. In this paper, we present a communication architecture for smart grids and propose a scheme to guarantee the security and privacy of data communications among smart meters, utility companies, and data repositories by employing decentralized attribute based encryption. The architecture is highly scalable, which employs an access control Linear Secret Sharing Scheme (LSSS matrix to achieve a role-based access control. The security analysis demonstrated that the scheme ensures security and privacy. The performance analysis shows that the scheme is efficient in terms of computational cost.

  1. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  2. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  3. A trade secret model for genomic biobanking.

    Science.gov (United States)

    Conley, John M; Mitchell, Robert; Cadigan, R Jean; Davis, Arlene M; Dobson, Allison W; Gladden, Ryan Q

    2012-01-01

    Genomic biobanks present ethical challenges that are qualitatively unique and quantitatively unprecedented. Many critics have questioned whether the current system of informed consent can be meaningfully applied to genomic biobanking. Proposals for reform have come from many directions, but have tended to involve incremental change in current informed consent practice. This paper reports on our efforts to seek new ideas and approaches from those whom informed consent is designed to protect: research subjects. Our model emerged from semi-structured interviews with healthy volunteers who had been recruited to join either of two biobanks (some joined, some did not), and whom we encouraged to explain their concerns and how they understood the relationship between specimen contributors and biobanks. These subjects spoke about their DNA and the information it contains in ways that were strikingly evocative of the legal concept of the trade secret. They then described the terms and conditions under which they might let others study their DNA, and there was a compelling analogy to the commonplace practice of trade secret licensing. We propose a novel biobanking model based on this trade secret concept, and argue that it would be a practical, legal, and ethical improvement on the status quo. © 2012 American Society of Law, Medicine & Ethics, Inc.

  4. New analytic unitarization schemes

    International Nuclear Information System (INIS)

    Cudell, J.-R.; Predazzi, E.; Selyugin, O. V.

    2009-01-01

    We consider two well-known classes of unitarization of Born amplitudes of hadron elastic scattering. The standard class, which saturates at the black-disk limit includes the standard eikonal representation, while the other class, which goes beyond the black-disk limit to reach the full unitarity circle, includes the U matrix. It is shown that the basic properties of these schemes are independent of the functional form used for the unitarization, and that U matrix and eikonal schemes can be extended to have similar properties. A common form of unitarization is proposed interpolating between both classes. The correspondence with different nonlinear equations are also briefly examined.

  5. First multivendor scheme in CFE to protection of 400 kV transmission line, using optical TC's, digital relays and bus IEC 61850-9-2; Primer esquema multivendedor en CFE para proteccion de linea de transmision de 400 kV, utilizando TC's opticos, relevadores digitales y bus IEC 61850-9-2

    Energy Technology Data Exchange (ETDEWEB)

    Garcia-Colon, V.R; Rasgado, J.P [Instituto de Investigaciones Electricas, Cuernavaca, Morelos (Mexico); Lara C, H; Melendez, C; Juarez, N [Subdireccion de Transmision, Comision Federal de Electricidad (Mexico)

    2013-03-15

    This paper presents the details of design, installation and putting into service in the Comision Federal de Electricidad (CFE), of the first multi-vendor scheme that exists in the world, for the protection of a 400kV transmission line, which uses optical current transformers and digital relays IEC 61850-9-2. This system arises as a pilot project of the Subdireccion de Transmision of the CFE with the Instituto de Investigaciones Electricas (IIE). To ensure success in the implementation of the protection scheme, CFE joined a team coordinated by the Instituto de Investigaciones Electricas (IIE)involving nine international companies and a university. Pilot protection scheme is in operation under continuous monitoring, in one of the transmission lines of CFE that interconnect Manuel Moreno Torres with El Juile substations. The construction features, the challenges that were overcome and the first results obtained in operation are presented below. [Spanish] Este articulo presenta los detalles del diseno, instalacion y puesta en servicio en la Comision Federal de Electricidad (CFE) del primer esquema multivendedor que existe en el mundo, para la proteccion de una linea de transmision de 400kV, que utiliza transformadores de corriente opticos y relevadores digitales IEC 61850-9-2. Este sistema surge como un proyecto piloto de la Subdireccion de Transmision de la CFE con el Instituto de Investigaciones Electricas (IIE). Para asegurar el exito en la implementacion del esquema de proteccion, la CFE integro un equipo de trabajo coordinado por el Instituto de Investigaciones Electricas (IIE) en el que participaron 9 empresas internacionales y una universidad. El esquema de proteccion piloto, se encuentra en operacion bajo monitoreo continuo, en una de las lineas de transmision de la CFE que interconecta las subestaciones de Manuel Moreno Torres y El Juile. Las caracteristicas de construccion, los retos que fueron vencidos y los primeros resultados obtenidos en su operacion se

  6. Pheochromocytomas and secreting paragangliomas

    Directory of Open Access Journals (Sweden)

    Gimenez-Roqueplo Anne-Paule

    2006-12-01

    Full Text Available Abstract Catecholamine-producing tumors may arise in the adrenal medulla (pheochromocytomas or in extraadrenal chromaffin cells (secreting paragangliomas. Their prevalence is about 0.1% in patients with hypertension and 4% in patients with a fortuitously discovered adrenal mass. An increase in the production of catecholamines causes symptoms (mainly headaches, palpitations and excess sweating and signs (mainly hypertension, weight loss and diabetes reflecting the effects of epinephrine and norepinephrine on α- and β-adrenergic receptors. Catecholamine-producing tumors mimic paroxysmal conditions with hypertension and/or cardiac rhythm disorders, including panic attacks, in which sympathetic activation linked to anxiety reproduces the same signs and symptoms. These tumors may be sporadic or part of any of several genetic diseases: familial pheochromocytoma-paraganglioma syndromes, multiple endocrine neoplasia type 2, neurofibromatosis 1 and von Hippel-Lindau disease. Familial cases are diagnosed earlier and are more frequently bilateral and recurring than sporadic cases. The most specific and sensitive diagnostic test for the tumor is the determination of plasma or urinary metanephrines. The tumor can be located by computed tomography, magnetic resonance imaging and metaiodobenzylguanidine scintigraphy. Treatment requires resection of the tumor, generally by laparoscopic surgery. About 10% of tumors are malignant either at first operation or during follow-up, malignancy being diagnosed by the presence of lymph node, visceral or bone metastases. Recurrences and malignancy are more frequent in cases with large or extraadrenal tumors. Patients, especially those with familial or extraadrenal tumors, should be followed-up indefinitely.

  7. A joint asymmetric watermarking and image encryption scheme

    Science.gov (United States)

    Boato, G.; Conotter, V.; De Natale, F. G. B.; Fontanari, C.

    2008-02-01

    Here we introduce a novel watermarking paradigm designed to be both asymmetric, i.e., involving a private key for embedding and a public key for detection, and commutative with a suitable encryption scheme, allowing both to cipher watermarked data and to mark encrypted data without interphering with the detection process. In order to demonstrate the effectiveness of the above principles, we present an explicit example where the watermarking part, based on elementary linear algebra, and the encryption part, exploiting a secret random permutation, are integrated in a commutative scheme.

  8. protective relay studies for the nigerian national electric 330 kv

    African Journals Online (AJOL)

    user

    1985-09-01

    Sep 1, 1985 ... protective relay schemes of the National Electric Power Authority. Some of the basic ... Nigerian special system characteristics, schemes to correct existing protection inadequacies .... relays buried in the transformer. A reach of ...

  9. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  10. Contract saving schemes

    NARCIS (Netherlands)

    Ronald, R.; Smith, S.J.; Elsinga, M.; Eng, O.S.; Fox O'Mahony, L.; Wachter, S.

    2012-01-01

    Contractual saving schemes for housing are institutionalised savings programmes normally linked to rights to loans for home purchase. They are diverse types as they have been developed differently in each national context, but normally fall into categories of open, closed, compulsory, and ‘free

  11. Alternative reprocessing schemes evaluation

    International Nuclear Information System (INIS)

    1979-02-01

    This paper reviews the parameters which determine the inaccessibility of the plutonium in reprocessing plants. Among the various parameters, the physical and chemical characteristics of the materials, the various processing schemes and the confinement are considered. The emphasis is placed on that latter parameter, and the advantages of an increased confinement in the socalled PIPEX reprocessing plant type are presented

  12. Introduction to association schemes

    NARCIS (Netherlands)

    Seidel, J.J.

    1991-01-01

    The present paper gives an introduction to the theory of association schemes, following Bose-Mesner (1959), Biggs (1974), Delsarte (1973), Bannai-Ito (1984) and Brouwer-Cohen-Neumaier (1989). Apart from definitions and many examples, also several proofs and some problems are included. The paragraphs

  13. Reaction schemes of immunoanalysis

    International Nuclear Information System (INIS)

    Delaage, M.; Barbet, J.

    1991-01-01

    The authors apply a general theory for multiple equilibria to the reaction schemes of immunoanalysis, competition and sandwich. This approach allows the manufacturer to optimize the system and provide the user with interpolation functions for the standard curve and its first derivative as well, thus giving access to variance [fr

  14. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  15. How to Split a Shared Secret into Shared Bits in Constant-Round

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Fitzi, Matthias; Nielsen, Jesper Buus

    $ such that $l = \\lceil \\log_2(p) \\rceil$, $a_0, \\ldots, a_{l-1} \\in \\{0,1\\}$ and $a = \\sum_{i=0}^{l-1} a_i 2^i$. Our protocol is secure against active adversaries and works for any linear secret sharing scheme with a multiplication protocol. This result immediately implies solutions to other long-standing open...... problems, such as constant-round and unconditionally secure protocols for comparing shared numbers and deciding whether a shared number is zero. The complexity of our protocol is $O(l \\log(l))$ invocations of the multiplication protocol for the underlying secret sharing scheme, carried out in $O(1)$....

  16. Quantum Watermarking Scheme Based on INEQR

    Science.gov (United States)

    Zhou, Ri-Gui; Zhou, Yang; Zhu, Changming; Wei, Lai; Zhang, Xiafen; Ian, Hou

    2018-04-01

    Quantum watermarking technology protects copyright by embedding invisible quantum signal in quantum multimedia data. In this paper, a watermarking scheme based on INEQR was presented. Firstly, the watermark image is extended to achieve the requirement of embedding carrier image. Secondly, the swap and XOR operation is used on the processed pixels. Since there is only one bit per pixel, XOR operation can achieve the effect of simple encryption. Thirdly, both the watermark image extraction and embedding operations are described, where the key image, swap operation and LSB algorithm are used. When the embedding is made, the binary image key is changed. It means that the watermark has been embedded. Of course, if the watermark image is extracted, the key's state need detected. When key's state is |1>, this extraction operation is carried out. Finally, for validation of the proposed scheme, both the Signal-to-noise ratio (PSNR) and the security of the scheme are analyzed.

  17. 37 CFR 10.57 - Preservation of confidences and secrets of a client.

    Science.gov (United States)

    2010-07-01

    ... and secrets of a client. 10.57 Section 10.57 Patents, Trademarks, and Copyrights UNITED STATES PATENT... confidences and secrets of a client. (a) “Confidence” refers to information protected by the attorney-client or agent-client privilege under applicable law. “Secret” refers to other information gained in the...

  18. The Secret of Future Victories

    Science.gov (United States)

    1992-02-01

    Copy S of 320 copies AD--A25 0 718 IDA PAPER P-265 3 THE SECRET OF FUTURE VICTORIES Paul F. Gormnan General, USA (Retired) DTIC 05M February 1992 NAY...TYPE AND DATES COVERED IFebruary 1992 Final--June 1991-January 1992 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS The Secret of Future Victories C -MDA...8 2N0-102 IDA PAPER P-2653 THE SECRET OF FUTURE VICTORIES Paul F. Gorman General. LUSA (Retired) February 1992 Approved for public release

  19. Robust Multiparty Quantum Secret Key Sharing Over Two Collective-Noise Channels via Three-Photon Mixed States

    International Nuclear Information System (INIS)

    Wang Zhangyin; Yuan Hao; Gao Gan; Shi Shouhua

    2006-01-01

    We present a robust (n,n)-threshold scheme for multiparty quantum secret sharing of key over two collective-noise channels (i.e., the collective dephasing channel and the collective rotating channel) via three-photon mixed states. In our scheme, only if all the sharers collaborate together can they establish a joint key with the message sender and extract the secret message from the sender's encrypted message. This scheme can be implemented using only a Bell singlet, a one-qubit state and polarization identification of single photon, so it is completely feasible according to the present-day technique.

  20. Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint

    KAUST Repository

    Zorgui, Marwen; Rezki, Zouheir; Alomair, Basel; Alouini, Mohamed-Slim

    2016-01-01

    This paper considers the problem of secret-key agreement with public discussion subject to a peak power constraint A on the channel input. The optimal input distribution is proved to be discrete with finite support. To overcome the computationally heavy search for the optimal discrete distribution, several suboptimal schemes are proposed and shown numerically to perform close to the capacity. Moreover, lower and upper bounds for the secret-key capacity are provided and used to prove that the secret-key capacity converges for asymptotic high values of A, to the secret-key capacity with an average power constraint A2. Finally, when the amplitude constraint A is small (A ! 0), the secret-key capacity is proved to be asymptotically equal to the capacity of the legitimate user with an amplitude constraint A and no secrecy constraint.

  1. Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

    Science.gov (United States)

    Yoeseph, N. M.; Purnomo, F. A.; Riasti, B. K.; Safiie, M. A.; Hidayat, T. N.

    2016-11-01

    The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography. The weakness of this combination technique is the data was centralized. Therefore, a steganography technique is develop by using combination of spread spectrum and secret sharing technique. In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum. Secret sharing scheme used was Shamir's Secret Sharing. The result showed that steganography with spread spectrum combined with Shamir's Secret Share using MP3 files as medium produce a technique that could hid data into several cover. To extract and reconstruct the data hidden in stego object, it is needed the amount of stego object which more or equal to its threshold. Furthermore, stego objects were imperceptible and robust.

  2. Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint

    KAUST Repository

    Zorgui, Marwen

    2016-04-06

    This paper considers the problem of secret-key agreement with public discussion subject to a peak power constraint A on the channel input. The optimal input distribution is proved to be discrete with finite support. To overcome the computationally heavy search for the optimal discrete distribution, several suboptimal schemes are proposed and shown numerically to perform close to the capacity. Moreover, lower and upper bounds for the secret-key capacity are provided and used to prove that the secret-key capacity converges for asymptotic high values of A, to the secret-key capacity with an average power constraint A2. Finally, when the amplitude constraint A is small (A ! 0), the secret-key capacity is proved to be asymptotically equal to the capacity of the legitimate user with an amplitude constraint A and no secrecy constraint.

  3. Keeping our patients' secrets.

    Science.gov (United States)

    Clough, J D; Rowan, D W; Nickelson, D E

    1999-10-01

    Protecting the privacy of the patient's medical record is a central issue in current discussions about a patient bill of rights, and controversy over a proposed "unique health identifier" has raised the decibel level of these discussions. At the heart of the debate is how best to resolve the inherent conflict between the individual's right to privacy and the need for access to patients' health information for reasons of public health, research, and health care management.

  4. A novel image authentication scheme based on hyper-chaotic cell neural network

    International Nuclear Information System (INIS)

    Gao Tiegang; Gu Qiaolun; Emmanuel, Sabu

    2009-01-01

    This paper presents a new image authentication scheme based on cell neural network with hyper-chaos characteristics (HCCNN). In the scheme, the authentication code, which is used as secret key and the pixel values of image are used for the input of HCCNN. The secret information that HCCNN produces is transmitted to the receiving end through secret channel. The receiver can then use the received secret information to authenticate the suspect image by comparing the original authentication code with that calculated from the suspect image. Simulations show that the suggested image authentication algorithm has the advantages of large key space and high security, and moreover, it can detect and locate the position of any slightly tampered parts of a suspect image.

  5. The Diversity-Multiplexing Tradeoff of Secret-Key Agreement over Multiple-Antenna Channels

    KAUST Repository

    Zorgui, Marwen

    2015-10-26

    We study the problem of secret-key agreement between two legitimate parties, Alice and Bob, in presence an of eavesdropper Eve. There is a public channel with unlimited capacity that is available to the legitimate parties and is also observed by Eve. Our focus is on Rayleigh fading quasi-static channels. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge of their channels. We study the system in the high-power regime. First, we define the secret-key diversity gain and the secret-key multiplexing gain. Second, we establish the secret-key diversity multiplexing tradeoff (DMT) under no channel state information (CSI) at the transmitter (CSI-T). The eavesdropper is shown to “steal” only transmit antennas. We show that, likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information at the transmitter. This insensitivity of secret-key DMT toward CSI-T features a fundamental difference between secret-key agreement and the wiretap channel, in which secret DMT depends heavily on CSI-T. Finally, we present several secret-key DMT-achieving schemes in case of full CSI-T. We argue that secret DMT-achieving schemes are also key DMT-achieving. Moreover, we show formally that artificial noise (AN), likewise zero-forcing (ZF), is DMT-achieving. We also show that the public feedback channel improves the outage performance without having any effect on the DMT.

  6. The Diversity-Multiplexing Tradeoff of Secret-Key Agreement over Multiple-Antenna Channels

    KAUST Repository

    Zorgui, Marwen; Rezki, Zouheir; Alomair, Basel; Alouini, Mohamed-Slim

    2015-01-01

    We study the problem of secret-key agreement between two legitimate parties, Alice and Bob, in presence an of eavesdropper Eve. There is a public channel with unlimited capacity that is available to the legitimate parties and is also observed by Eve. Our focus is on Rayleigh fading quasi-static channels. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge of their channels. We study the system in the high-power regime. First, we define the secret-key diversity gain and the secret-key multiplexing gain. Second, we establish the secret-key diversity multiplexing tradeoff (DMT) under no channel state information (CSI) at the transmitter (CSI-T). The eavesdropper is shown to “steal” only transmit antennas. We show that, likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information at the transmitter. This insensitivity of secret-key DMT toward CSI-T features a fundamental difference between secret-key agreement and the wiretap channel, in which secret DMT depends heavily on CSI-T. Finally, we present several secret-key DMT-achieving schemes in case of full CSI-T. We argue that secret DMT-achieving schemes are also key DMT-achieving. Moreover, we show formally that artificial noise (AN), likewise zero-forcing (ZF), is DMT-achieving. We also show that the public feedback channel improves the outage performance without having any effect on the DMT.

  7. A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability.

    Science.gov (United States)

    Lee, Che-Wei; Tsai, Wen-Hsiang

    2012-01-01

    A new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images via the use of the Portable Network Graphics (PNG) image is proposed. An authentication signal is generated for each block of a grayscale document image, which, together with the binarized block content, is transformed into several shares using the Shamir secret sharing scheme. The involved parameters are carefully chosen so that as many shares as possible are generated and embedded into an alpha channel plane. The alpha channel plane is then combined with the original grayscale image to form a PNG image. During the embedding process, the computed share values are mapped into a range of alpha channel values near their maximum value of 255 to yield a transparent stego-image with a disguise effect. In the process of image authentication, an image block is marked as tampered if the authentication signal computed from the current block content does not match that extracted from the shares embedded in the alpha channel plane. Data repairing is then applied to each tampered block by a reverse Shamir scheme after collecting two shares from unmarked blocks. Measures for protecting the security of the data hidden in the alpha channel are also proposed. Good experimental results prove the effectiveness of the proposed method for real applications.

  8. Selectively strippable paint schemes

    Science.gov (United States)

    Stein, R.; Thumm, D.; Blackford, Roger W.

    1993-03-01

    In order to meet the requirements of more environmentally acceptable paint stripping processes many different removal methods are under evaluation. These new processes can be divided into mechanical and chemical methods. ICI has developed a paint scheme with intermediate coat and fluid resistant polyurethane topcoat which can be stripped chemically in a short period of time with methylene chloride free and phenol free paint strippers.

  9. Scalable Nonlinear Compact Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  10. Cryptanalysis of Two Fault Countermeasure Schemes

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey

    2015-01-01

    function with some additional randomness and computes the value of the function. The second called the unmasking function, is computed securely using a different register and undoes the effect of the masking with random bits. We will show that there exists a weakness in the way in which both these schemes...... is meant for the protection of block ciphers like AES. The second countermeasure was proposed in IEEE-HOST 2015 and protects the Grain-128 stream cipher. The design divides the output function used in Grain-128 into two components. The first called the masking function, masks the input bits to the output...

  11. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.

    Science.gov (United States)

    Wang, Shangping; Ye, Jian; Zhang, Yaling

    2018-01-01

    Ciphertext-policy attribute-based encryption (CP-ABE) scheme is a new type of data encryption primitive, which is very suitable for data cloud storage for its fine-grained access control. Keyword-based searchable encryption scheme enables users to quickly find interesting data stored in the cloud server without revealing any information of the searched keywords. In this work, we provide a keyword searchable attribute-based encryption scheme with attribute update for cloud storage, which is a combination of attribute-based encryption scheme and keyword searchable encryption scheme. The new scheme supports the user's attribute update, especially in our new scheme when a user's attribute need to be updated, only the user's secret key related with the attribute need to be updated, while other user's secret key and the ciphertexts related with this attribute need not to be updated with the help of the cloud server. In addition, we outsource the operation with high computation cost to cloud server to reduce the user's computational burden. Moreover, our scheme is proven to be semantic security against chosen ciphertext-policy and chosen plaintext attack in the general bilinear group model. And our scheme is also proven to be semantic security against chosen keyword attack under bilinear Diffie-Hellman (BDH) assumption.

  12. Stimulation of amphibian gastroduodenal bicarbonate secretion by sucralfate and aluminium: role of local prostaglandin metabolism.

    Science.gov (United States)

    Crampton, J R; Gibbons, L C; Rees, W D

    1988-01-01

    The present studies were designed to explore the possible mode of protective and ulcer healing actions of sucralfate by examining its effect on gastroduodenal bicarbonate secretion by isolated amphibian mucosa. Luminal sucralfate (0.5 g/l) significantly increased bicarbonate secretion by fundic and antral mucosa without influencing transmucosal potential difference. Significant stimulation of duodenal bicarbonate secretion occurred only at 1.0 g/l without change in potential difference. Aluminium, a component of sucralfate, produced similar increases in bicarbonate secretion, while the sucrose and sulphate components were without effect. Pretreatment of mucosae with the cyclooxygenase inhibitor, indomethacin (10 5M) did not abolish the secretory response to sucralfate or aluminium. The results suggest that stimulation of gastroduodenal bicarbonate secretion, possibly by the aluminium moiety of sucralfate, may play a role in its protective and ulcer healing actions. PMID:3260886

  13. On alternative approach for verifiable secret sharing

    OpenAIRE

    Kulesza, Kamil; Kotulski, Zbigniew; Pieprzyk, Joseph

    2002-01-01

    Secret sharing allows split/distributed control over the secret (e.g. master key). Verifiable secret sharing (VSS) is the secret sharing extended by verification capacity. Usually verification comes at the price. We propose "free lunch", the approach that allows to overcome this inconvenience.

  14. Protection using telecommunications

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    Deregulation in both the telecommunication and electric power industry, together with new telecommunication network technologies and advances in numerical protection, has resulted in the need to reconsider traditional methods of delivering tele-protection schemes and their associated bearer services. Fibre-optic technology is commonly deployed in new telecommunication networks for inter-station communication and utility-owned and public telecommunication networks from third parties are available for protection purposes. (author)

  15. ESCAP mobile training scheme.

    Science.gov (United States)

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.

  16. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  17. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    . In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire...... it into consideration when I go shopping. The respondent was asked to pick the most suitable answer, which described her use of each label. 29% - also called 'the labelling blind' - responded that they basically only knew the recycling label and the Government controlled organic label 'Ø-mærket'. Another segment of 6...

  18. Scheme of stepmotor control

    International Nuclear Information System (INIS)

    Grashilin, V.A.; Karyshev, Yu.Ya.

    1982-01-01

    A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given

  19. Toric Varieties and Codes, Error-correcting Codes, Quantum Codes, Secret Sharing and Decoding

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    We present toric varieties and associated toric codes and their decoding. Toric codes are applied to construct Linear Secret Sharing Schemes (LSSS) with strong multiplication by the Massey construction. Asymmetric Quantum Codes are obtained from toric codes by the A.R. Calderbank P.W. Shor and A.......M. Steane construction of stabilizer codes (CSS) from linear codes containing their dual codes....

  20. Histaminergic regulation of prolactin secretion

    DEFF Research Database (Denmark)

    Knigge, U P

    1990-01-01

    Histamine (HA), which acts as a neurotransmitter in the central nervous system, participates in the neuroendocrine regulation of prolactin (PRL) secretion. HA has a predominant stimulatory effect which is mediated via H2-receptors following central administration and via H1-receptors following...... systemic infusion of the amine. In addition, HA seems to exert a minor inhibitory effect on PRL secretion, an effect unmasked only during blockade of the receptor mediating the stimulatory effect. Following central administration the inhibitory effect is mediated via H1-receptors, while following systemic...... administration this effect is mediated via H2-receptors. In accordance with these findings, the H2-receptor antagonist cimetidine (CIM) has an inhibitory (following central administration) or stimulatory (following systemic administration) effect on PRL secretion. However, high doses of CIM possess an additional...

  1. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  2. A full quantum network scheme

    International Nuclear Information System (INIS)

    Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu

    2014-01-01

    We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)

  3. Impaired Follistatin Secretion in Cirrhosis

    DEFF Research Database (Denmark)

    Rinnov, Anders Rasmussen; Plomgaard, Peter; Pedersen, Bente Klarlund

    2016-01-01

    compared to healthy control participants. DESIGN, SETTING, AND PARTICIPANTS: To experimentally increase the glucagon-insulin ratio (mimicking the hormonal effect of exercise), we infused glucagon/somatostatin (to inhibit insulin secretion) and compared the acute follistatin increase in eight male cirrhosis...... controls (27.6 ± 3.8 vs 34.5 ± 2.9%, respectively; P = .001). CONCLUSIONS: Patients with cirrhosis show impaired capacity to acutely secrete follistatin. The decrease in acute follistatin release may contribute to the loss of muscle mass in liver cirrhosis....

  4. Secrets and Disclosures: How Young Children Handle Secrets

    Science.gov (United States)

    Anagnostaki, Lida; Wright, Michael J.; Papathanasiou, Athanasia

    2013-01-01

    The authors examined the influence of content and verbal cues on young children's understanding of secret information and of its disclosure. Participants were 209 5- and 6-year-old children in an experiment where a puppet, named Zinc, was the protagonist. Children were asked to whom Zinc would disclose a list of pieces of information, some of…

  5. Quantum secret sharing based on Smolin states alone

    International Nuclear Information System (INIS)

    He Guangping; Wang, Z D; Bai, Yankui

    2008-01-01

    It was indicated (Yu 2007 Phys. Rev. A 75 066301) that a previously proposed quantum secret sharing (QSS) protocol based on Smolin states (Augusiak 2006 Phys. Rev. A 73 012318) is insecure against an internal cheater. Here we build a different QSS protocol with Smolin states alone, and prove it to be secure against known cheating strategies. Thus we open a promising venue for building secure QSS using merely Smolin states, which is a typical kind of bound entangled states. We also propose a feasible scheme to implement the protocol experimentally

  6. a Thtee-Dimensional Variational Assimilation Scheme for Satellite Aod

    Science.gov (United States)

    Liang, Y.; Zang, Z.; You, W.

    2018-04-01

    A three-dimensional variational data assimilation scheme is designed for satellite AOD based on the IMPROVE (Interagency Monitoring of Protected Visual Environments) equation. The observation operator that simulates AOD from the control variables is established by the IMPROVE equation. All of the 16 control variables in the assimilation scheme are the mass concentrations of aerosol species from the Model for Simulation Aerosol Interactions and Chemistry scheme, so as to take advantage of this scheme in providing comprehensive analyses of species concentrations and size distributions as well as be calculating efficiently. The assimilation scheme can save computational resources as the IMPROVE equation is a quadratic equation. A single-point observation experiment shows that the information from the single-point AOD is effectively spread horizontally and vertically.

  7. The Victorian government`s clean technology incentive scheme

    Energy Technology Data Exchange (ETDEWEB)

    Connor, M.A. [Melbourne Univ., Parkville, VIC (Australia). Dept. of Chemical Engineering; Reeve, D. [Environment Protection Authority, Melbourne, VIC (Australia)

    1993-12-31

    Over the past decade environment policies have placed increasing emphasis on waste minimization and cleaner production techniques. The Environment Protection Authority in Victoria, Australia, has sought to encourage waste minimization by establishing a Clean Technology Incentive Scheme. The Scheme was established in 1988 and since then 35 offers of loans have been made. Results to date are encouraging. In this work, case studies of three especially successful projects are presented. 2 refs.

  8. The Victorian government`s clean technology incentive scheme

    Energy Technology Data Exchange (ETDEWEB)

    Connor, M A [Melbourne Univ., Parkville, VIC (Australia). Dept. of Chemical Engineering; Reeve, D [Environment Protection Authority, Melbourne, VIC (Australia)

    1994-12-31

    Over the past decade environment policies have placed increasing emphasis on waste minimization and cleaner production techniques. The Environment Protection Authority in Victoria, Australia, has sought to encourage waste minimization by establishing a Clean Technology Incentive Scheme. The Scheme was established in 1988 and since then 35 offers of loans have been made. Results to date are encouraging. In this work, case studies of three especially successful projects are presented. 2 refs.

  9. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme.

    Directory of Open Access Journals (Sweden)

    Chengqi Wang

    Full Text Available With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks.

  10. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme

    Science.gov (United States)

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.’s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks. PMID:26866606

  11. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme.

    Science.gov (United States)

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks.

  12. Raspberry Pi for secret agents

    CERN Document Server

    Sjogelid, Stefan

    2015-01-01

    This book is an easy-to-follow guide with practical examples in each chapter. Suitable for the novice and expert alike, each topic provides a fast and easy way to get started with exciting applications and also guides you through setting up the Raspberry Pi as a secret agent toolbox.

  13. Unraveling the Wnt secretion pathway

    NARCIS (Netherlands)

    Harterink, M.

    2011-01-01

    The Wnt family of signaling proteins has essential functions in development and adult tissue homeostasis throughout the animal kingdom. Although signaling cascades triggered by Wnt proteins have been extensively studied, much remains to be learned about how Wnts are produced and secreted and how

  14. VIP secreting tumours in infancy

    International Nuclear Information System (INIS)

    Davies, R.P.; Slavotinek, J.P.; Dorney, S.F.A.

    1990-01-01

    Vasoactive intestinal polypeptide (VIP) secreting neural crest tumours are an uncommon but important treatable cause of intractable childhood diarrhoea. The radiological appearances of two cases are presented with a review of radiological findings in childhood VIP secreting neural crest tumours. Twenty eight cases of childhood VIP secreting neural crest tumours were reviewed. Nineteen (68%) were ganglioneuroblastomas and nine (32%) were ganglioneuromas. The majority of tumours (66%) were in a paravertebral location in the abdomen indicating that a search for such a tumour should be initiated at this site. Eighteen of the twenty eight cases reviewed discussed relevant radiological investigations. Calcification was detected in 50% of abdominal radiographs. Gut dilatation was often a prominent feature. A mass was detected in 5 of 5 cases where ultrasound findings were reported, and seven of seven cases with CT findings reported. Prior to the availability of CT and ultrasound the most useful investigation was IVU which demonstrated evidence of a mass in 5 of 9 cases. The presence of paravertebral calcification and gut dilatation on the plain radiograph of a child with intractable diarrhoea suggests the presence of a VIP secreting neural crest tumour. If an abdominal tumour is not found in the appropriate clinical setting and VIP levels are elevated, a widespread search of the paravertebral region is indicated. (orig.)

  15. Large-Capacity Three-Party Quantum Digital Secret Sharing Using Three Particular Matrices Coding

    International Nuclear Information System (INIS)

    Lai Hong; Tao Li; Liu Zhi-Ming; Luo Ming-Xing; Pieprzyk, Josef; Orgun, Mehmet A.

    2016-01-01

    In this paper, we develop a large-capacity quantum digital secret sharing (QDSS) scheme, combined the Fibonacci- and Lucas-valued orbital angular momentum (OAM) entanglement with the recursive Fibonacci and Lucas matrices. To be exact, Alice prepares pairs of photons in the Fibonacci- and Lucas-valued OAM entangled states, and then allocates them to two participants, say, Bob and Charlie, to establish the secret key. Moreover, the available Fibonacci and Lucas values from the matching entangled states are used as the seed for generating the Fibonacci and Lucas matrices. This is achieved because the entries of the Fibonacci and Lucas matrices are recursive. The secret key can only be obtained jointly by Bob and Charlie, who can further recover the secret. Its security is based on the facts that nonorthogonal states are indistinguishable, and Bob or Charlie detects a Fibonacci number, there is still a twofold uncertainty for Charlie' (Bob') detected value. (paper)

  16. A robust cloud access scheme with mutual authentication

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2016-01-01

    Full Text Available Due to the progress of network technology, we can access some information through remote servers, and we also can save and access lots of personal data in remote servers. Therefore, to protect these data and resist unauthorized access is an important issue. Some researchers proposed authentication scheme, but there still exist some security weaknesses. This article is based on the concept of HDFS (Hadoop Distributed File System, and offers a robust authentication scheme. The proposed scheme achieves mutual authentication, prevents re-play attack, solves asynchronous issue, and prevents offline password guessing attack.

  17. An efficient quantum scheme for Private Set Intersection

    Science.gov (United States)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    Private Set Intersection allows a client to privately compute set intersection with the collaboration of the server, which is one of the most fundamental and key problems within the multiparty collaborative computation of protecting the privacy of the parties. In this paper, we first present a cheat-sensitive quantum scheme for Private Set Intersection. Compared with classical schemes, our scheme has lower communication complexity, which is independent of the size of the server's set. Therefore, it is very suitable for big data services in Cloud or large-scale client-server networks.

  18. Protective Relay Studies for the Nigerian National Electric 330 KV ...

    African Journals Online (AJOL)

    The fundamental reasons for requiring these specific protective relaying features are also reviewed. Other protective relaying schemes that can accomplish the same basic protection objectives are presented. Based on the Nigerian special system characteristics, schemes to correct existing protection inadequacies are ...

  19. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  20. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  1. Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

    Directory of Open Access Journals (Sweden)

    Tzu-Chuen Lu

    2017-10-01

    Full Text Available The concept of a dual-image based scheme in information sharing consists of concealing secret messages in two cover images; only someone who has both stego-images can extract the secret messages. In 2015, Lu et al. proposed a center-folding strategy where each secret symbol is folded into the reduced digit to reduce the distortion of the stego-image. Then, in 2016, Lu et al. used a frequency-based encoding strategy to reduce the distortion of the frequency of occurrence of the maximum absolute value. Because the folding strategy can obviously reduce the value, the proposed scheme includes the folding operation twice to further decrease the reduced digit. We use a frequency-based encoding strategy to encode a secret message and then use the block folding technique by performing the center-folding operation twice to embed secret messages. An indicator is needed to identify the sequence number of the folding operation. The proposed scheme collects several indicators to produce a combined code and hides the code in a pixel to reduce the size of the indicators. The experimental results show that the proposed method can achieve higher image quality under the same embedding rate or higher payload, which is better than other methods.

  2. 29 CFR 1903.9 - Trade secrets.

    Science.gov (United States)

    2010-07-01

    ... INSPECTIONS, CITATIONS AND PROPOSED PENALTIES § 1903.9 Trade secrets. (a) Section 15 of the Act provides: “All... concerns or relates to the trade secrets, processes, operations, style of work, or apparatus, or to the...

  3. Pituitary-hormone secretion by thyrotropinomas

    NARCIS (Netherlands)

    Roelfsema, Ferdinand; Kok, Simon; Kok, Petra; Pereira, Alberto M.; Biermasz, Nienke R.; Smit, Jan W.; Frolich, Marijke; Keenan, Daniel M.; Veldhuis, Johannes D.; Romijn, Johannes A.

    2009-01-01

    Hormone secretion by somatotropinomas, corticotropinomas and prolactinomas exhibits increased pulse frequency, basal and pulsatile secretion, accompanied by greater disorderliness. Increased concentrations of growth hormone (GH) or prolactin (PRL) are observed in about 30% of thyrotropinomas leading

  4. Sur les usages publics du secret : les archives du Service Secret Communiste Roumain

    Directory of Open Access Journals (Sweden)

    Andi Mihalache

    2009-10-01

    Full Text Available L’étude s’occupe des dossiers de l’ancienne police politique du régime communiste de Roumanie, la Securitate. Il a comme point de départ le fait que la mémoire sociale, le contexte politique et les débats publics actuels influencent la recherche historique, modifiant les perceptions sur le document d’archive. Ce dernier n’est plus vu seulement comme source principale de la recherche historique, devenant outil redoutable dans les disputes électorales, car, en base des informations extraites d’un dossier de la Securitate, l’on peut évincer un adversaire incommode. Se montrant utile à dénoncer la collaboration de quelqu’un sous le régime communiste, le document d’archive a acquis des mises symboliques imprévues, étant caché, protégé, volé, racheté, truqué, perdu et redécouvert à commande. Toutes ces pratiques compromettent de plus en plus les chances des historiens de reconstituer de manière crédible l’histoire récente des Roumains. On obtient difficilement l’accès aux dossiers de la Securitate, la patrimonialisation excessive des documents - en vérité leur trésorisation - étant conséquence directe du prestige idéologique et social que le secret détenait au temps communiste.This article focuses on the Securitate files as a political stake, but also as first rank sources for academic research, not from the current perspective of recent history, but from that of cultural history. In post-communist Romania, silence is the secret’s poor relative and confidentiality its respectable form. Ironically or not, we could state that in our country the secrets of communist repression are literally protected by law. The secret is an unbidden, illegitimate competence. In its ethics it does not matter what is good and what is bad, what is true and what is false. The main interest is what is said and what isn’t. The secret being a convention, a pact, the gesture of not saying seems to be more important than

  5. Proteomic Identification of Novel Secreted Antibacterial Toxins of the Serratia marcescens Type VI Secretion System*

    Science.gov (United States)

    Fritsch, Maximilian J.; Trunk, Katharina; Diniz, Juliana Alcoforado; Guo, Manman; Trost, Matthias; Coulthurst, Sarah J.

    2013-01-01

    It has recently become apparent that the Type VI secretion system (T6SS) is a complex macromolecular machine used by many bacterial species to inject effector proteins into eukaryotic or bacterial cells, with significant implications for virulence and interbacterial competition. “Antibacterial” T6SSs, such as the one elaborated by the opportunistic human pathogen, Serratia marcescens, confer on the secreting bacterium the ability to rapidly and efficiently kill rival bacteria. Identification of secreted substrates of the T6SS is critical to understanding its role and ability to kill other cells, but only a limited number of effectors have been reported so far. Here we report the successful use of label-free quantitative mass spectrometry to identify at least eleven substrates of the S. marcescens T6SS, including four novel effector proteins which are distinct from other T6SS-secreted proteins reported to date. These new effectors were confirmed as antibacterial toxins and self-protecting immunity proteins able to neutralize their cognate toxins were identified. The global secretomic study also unexpectedly revealed that protein phosphorylation-based post-translational regulation of the S. marcescens T6SS differs from that of the paradigm, H1-T6SS of Pseudomonas aeruginosa. Combined phosphoproteomic and genetic analyses demonstrated that conserved PpkA-dependent threonine phosphorylation of the T6SS structural component Fha is required for T6SS activation in S. marcescens and that the phosphatase PppA can reverse this modification. However, the signal and mechanism of PpkA activation is distinct from that observed previously and does not appear to require cell–cell contact. Hence this study has not only demonstrated that new and species-specific portfolios of antibacterial effectors are secreted by the T6SS, but also shown for the first time that PpkA-dependent post-translational regulation of the T6SS is tailored to fit the needs of different bacterial

  6. Image communication scheme based on dynamic visual cryptography and computer generated holography

    Science.gov (United States)

    Palevicius, Paulius; Ragulskis, Minvydas

    2015-01-01

    Computer generated holograms are often exploited to implement optical encryption schemes. This paper proposes the integration of dynamic visual cryptography (an optical technique based on the interplay of visual cryptography and time-averaging geometric moiré) with Gerchberg-Saxton algorithm. A stochastic moiré grating is used to embed the secret into a single cover image. The secret can be visually decoded by a naked eye if only the amplitude of harmonic oscillations corresponds to an accurately preselected value. The proposed visual image encryption scheme is based on computer generated holography, optical time-averaging moiré and principles of dynamic visual cryptography. Dynamic visual cryptography is used both for the initial encryption of the secret image and for the final decryption. Phase data of the encrypted image are computed by using Gerchberg-Saxton algorithm. The optical image is decrypted using the computationally reconstructed field of amplitudes.

  7. An improved biometrics-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Guo, Dianli; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2015-03-01

    Telecare medical information system (TMIS) offers healthcare delivery services and patients can acquire their desired medical services conveniently through public networks. The protection of patients' privacy and data confidentiality are significant. Very recently, Mishra et al. proposed a biometrics-based authentication scheme for telecare medical information system. Their scheme can protect user privacy and is believed to resist a range of network attacks. In this paper, we analyze Mishra et al.'s scheme and identify that their scheme is insecure to against known session key attack and impersonation attack. Thereby, we present a modified biometrics-based authentication scheme for TMIS to eliminate the aforementioned faults. Besides, we demonstrate the completeness of the proposed scheme through BAN-logic. Compared to the related schemes, our protocol can provide stronger security and it is more practical.

  8. An enhanced dynamic ID-based authentication scheme for telecare medical information systems

    Directory of Open Access Journals (Sweden)

    Ankita Chaturvedi

    2017-01-01

    Full Text Available The authentication schemes for telecare medical information systems (TMIS try to ensure secure and authorized access. ID-based authentication schemes address secure communication, but privacy is not properly addressed. In recent times, dynamic ID-based remote user authentication schemes for TMIS have been presented to protect user’s privacy. The dynamic ID-based authentication schemes efficiently protect the user’s privacy. Unfortunately, most of the existing dynamic ID-based authentication schemes for TMIS ignore the input verifying condition. This makes login and password change phases inefficient. Inefficiency of the password change phase may lead to denial of service attack in the case of incorrect input in the password change phase. To overcome these weaknesses, we proposed a new dynamic ID-based authentication scheme using a smart card. The proposed scheme can quickly detect incorrect inputs which makes the login and password change phase efficient. We adopt the approach with the aim to protect privacy, and efficient login and password change phases. The proposed scheme also resists off-line password guessing attack and denial of service attack. We also demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham logic. In addition, our scheme is comparable in terms of the communication and computational overheads with relevant schemes for TMIS.

  9. Dynamic (2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication

    International Nuclear Information System (INIS)

    Lai Hong; Xiao Jing-Hua; Mehmet, Orgun A.; Josef, Pieprzyk; Xue Li-Yin

    2015-01-01

    In this paper, we show that a (2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely. (paper)

  10. Pancreatic bicarbonate secretion involves two proton pumps

    DEFF Research Database (Denmark)

    Novak, Ivana; Wang, Jing; Henriksen, Katrine L.

    2011-01-01

    Pancreas secretes fluid rich in digestive enzymes and bicarbonate. The alkaline secretion is important in buffering of acid chyme entering duodenum and for activation of enzymes. This secretion is formed in pancreatic ducts, and studies to date show that plasma membranes of duct epithelium expres...

  11. 5 CFR 2421.15 - Secret ballot.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Secret ballot. 2421.15 Section 2421.15... FEDERAL LABOR RELATIONS AUTHORITY MEANING OF TERMS AS USED IN THIS SUBCHAPTER § 2421.15 Secret ballot. Secret ballot means the expression by ballot, voting machine or otherwise, but in no event by proxy, of a...

  12. 29 CFR 452.97 - Secret ballot.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Secret ballot. 452.97 Section 452.97 Labor Regulations... OF 1959 Election Procedures; Rights of Members § 452.97 Secret ballot. (a) A prime requisite of elections regulated by title IV is that they be held by secret ballot among the members or in appropriate...

  13. 29 CFR 401.11 - Secret ballot.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Secret ballot. 401.11 Section 401.11 Labor Regulations Relating to Labor OFFICE OF LABOR-MANAGEMENT STANDARDS, DEPARTMENT OF LABOR LABOR-MANAGEMENT STANDARDS MEANING OF TERMS USED IN THIS SUBCHAPTER § 401.11 Secret ballot. Secret ballot means the expression by...

  14. 22 CFR 1421.15 - Secret ballot.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Secret ballot. 1421.15 Section 1421.15 Foreign Relations FOREIGN SERVICE LABOR RELATIONS BOARD; FEDERAL LABOR RELATIONS AUTHORITY; GENERAL COUNSEL OF THE... THIS SUBCHAPTER § 1421.15 Secret ballot. Secret ballot means the expression by ballot, voting machine...

  15. 29 CFR 1202.4 - Secret ballot.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Secret ballot. 1202.4 Section 1202.4 Labor Regulations Relating to Labor (Continued) NATIONAL MEDIATION BOARD RULES OF PROCEDURE § 1202.4 Secret ballot. In conducting such investigation, the Board is authorized to take a secret ballot of the employees involved, or...

  16. Some Economics of Trade Secret Law

    OpenAIRE

    David D. Friedman; William M. Landes; Richard A. Posner

    1991-01-01

    Despite the practical importance of trade secrets to the business community, the law of trade secrets is a neglected orphan in economic analysis. This paper sketches an approach to the economics of trade secret law that connects it more closely both to other areas of intellectual property and to broader issues in the positive economic theory of the common law.

  17. Jones index, secret sharing and total quantum dimension

    Science.gov (United States)

    Fiedler, Leander; Naaijkens, Pieter; Osborne, Tobias J.

    2017-02-01

    We study the total quantum dimension in the thermodynamic limit of topologically ordered systems. In particular, using the anyons (or superselection sectors) of such models, we define a secret sharing scheme, storing information invisible to a malicious party, and argue that the total quantum dimension quantifies how well we can perform this task. We then argue that this can be made mathematically rigorous using the index theory of subfactors, originally due to Jones and later extended by Kosaki and Longo. This theory provides us with a ‘relative entropy’ of two von Neumann algebras and a quantum channel, and we argue how these can be used to quantify how much classical information two parties can hide form an adversary. We also review the total quantum dimension in finite systems, in particular how it relates to topological entanglement entropy. It is known that the latter also has an interpretation in terms of secret sharing schemes, although this is shown by completely different methods from ours. Our work provides a different and independent take on this, which at the same time is completely mathematically rigorous. This complementary point of view might be beneficial, for example, when studying the stability of the total quantum dimension when the system is perturbed.

  18. Secreted factors as synaptic organizers.

    Science.gov (United States)

    Johnson-Venkatesh, Erin M; Umemori, Hisashi

    2010-07-01

    A critical step in synaptic development is the differentiation of presynaptic and postsynaptic compartments. This complex process is regulated by a variety of secreted factors that serve as synaptic organizers. Specifically, fibroblast growth factors, Wnts, neurotrophic factors and various other intercellular signaling molecules are proposed to regulate presynaptic and/or postsynaptic differentiation. Many of these factors appear to function at both the neuromuscular junction and in the central nervous system, although the specific function of the molecules differs between the two. Here we review secreted molecules that organize the synaptic compartments and discuss how these molecules shape synaptic development, focusing on mammalian in vivo systems. Their critical role in shaping a functional neural circuit is underscored by their possible link to a wide range of neurological and psychiatric disorders both in animal models and by mutations identified in human patients. © The Authors (2010). Journal Compilation © Federation of European Neuroscience Societies and Blackwell Publishing Ltd.

  19. Weegee’s City Secrets

    OpenAIRE

    TRACHTENBERG, Alan

    2011-01-01

    En tant que photographe indépendant de meurtres, d’accidents, d’incendies, mais aussi de moments de loisirs dans la ville — de scènes de violence et de plaisir — Weegee travaillait essentiellement la nuit et utilisait un flash puissant associé à son appareil-photo de presse. Ses « secrets pour réaliser des photographies avec un flash » consistent à donner des conseils pratiques et techniques pour débutants. Mais au cœur de la rhétorique de ses « secrets » se trouvent des réflexions subtiles e...

  20. Copyright, Patent, and Trade Secret Protection of Software

    Science.gov (United States)

    1986-06-01

    programs, patent in- ment counts on the ground that Apple fringement, unfair competition, and misap- failed to comply with the procedural re- propriation...operation of appellants’ claimed in- khms: of art in the computer field and refers to mi. so £0w. lemnts. Fo a uber f haslie. s graum agenra-prpoe...cornmis- how to arrange the informatiors on each sion from plaintiff for sales he had facili- screen. It is the organization of the JMS Eated . During

  1. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    . The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...

  2. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  3. Transporter-mediated biofuel secretion.

    Science.gov (United States)

    Doshi, Rupak; Nguyen, Tuan; Chang, Geoffrey

    2013-05-07

    Engineering microorganisms to produce biofuels is currently among the most promising strategies in renewable energy. However, harvesting these organisms for extracting biofuels is energy- and cost-intensive, limiting the commercial feasibility of large-scale production. Here, we demonstrate the use of a class of transport proteins of pharmacological interest to circumvent the need to harvest biomass during biofuel production. We show that membrane-embedded transporters, better known to efflux lipids and drugs, can be used to mediate the secretion of intracellularly synthesized model isoprenoid biofuel compounds to the extracellular milieu. Transporter-mediated biofuel secretion sustainably maintained an approximate three- to fivefold boost in biofuel production in our Escherichia coli test system. Because the transporters used in this study belong to the ubiquitous ATP-binding cassette protein family, we propose their use as "plug-and-play" biofuel-secreting systems in a variety of bacteria, cyanobacteria, diatoms, yeast, and algae used for biofuel production. This investigation showcases the potential of expressing desired membrane transport proteins in cell factories to achieve the export or import of substances of economic, environmental, or therapeutic importance.

  4. The central importance of the EU emission trading scheme for achievement of the German climate protection target of 40% until 2020; Die zentrale Bedeutung des EU-Emissionshandels zur Erreichung des deutschen Klimaziels in Hoehe von 40 % bis 2020

    Energy Technology Data Exchange (ETDEWEB)

    Hermann, Hauke; Cludius, Johanna

    2014-02-15

    Both Germany and the European Union have set themselves targets for the reduction of greenhouse gas (GHG) emissions. The EU was the forerunner in 2008 when it adopted the Climate and Energy package and set a target of reducing GHG emissions by 20 % by 2020 compared to 1990. Two years later, Germany adopted a range of national GHG targets in the context of the German government's Energy Concept. This includes a 40% emissions reduction target to be met by 2020. One of the main instruments for achieving GHG emissions reduction targets is the EU Emissions Trading Scheme (EU ETS), which covers all large industrial and combustion installations in Europe. According to the agreement made in 2008 (Climate and Energy Package), the effort to achieve the EU's 20 % reduction target by 2020 was split between the ETS sector (2/3 of the reduction effort, representing a 21 % reduction in GHG emissions for installations covered under the ETS compared to 2005) and the non-ETS sector (1/3 of the reduction effort, representing a 10 % reduction compared to 2005). Logically, GHG emissions reductions occurring in German ETS installations count both towards the EU and the national target. This research project has been commissioned to analyse whether the ETS in its cur-rent design can contribute its fair share in efforts to meet the national emissions reduc-tion target. This question is particularly relevant in light of the following considerations: - The new German Coalition Agreement, signed in December 2013, reiterated the national target of a 40 % reduction of GHG emissions by 2020 compared to 1990 levels. - At the same time, the new Coalition Agreement stated that changes to the ETS are only to be considered if the EU GHG emissions reduction target will not be met. - There is a surplus of CO2 allowances on the ETS market, which undermines the credibility of the instrument as well as the integrity of the emissions reduction tar-gets (both European and national). At the same

  5. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    Science.gov (United States)

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  6. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    Science.gov (United States)

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  7. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    Directory of Open Access Journals (Sweden)

    Younghwa An

    2012-01-01

    Full Text Available Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das’s authentication scheme, and we have shown that Das’s authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das’s authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  8. Two-out-of-two color matching based visual cryptography schemes.

    Science.gov (United States)

    Machizaud, Jacques; Fournel, Thierry

    2012-09-24

    Visual cryptography which consists in sharing a secret message between transparencies has been extended to color prints. In this paper, we propose a new visual cryptography scheme based on color matching. The stacked printed media reveal a uniformly colored message decoded by the human visual system. In contrast with the previous color visual cryptography schemes, the proposed one enables to share images without pixel expansion and to detect a forgery as the color of the message is kept secret. In order to correctly print the colors on the media and to increase the security of the scheme, we use spectral models developed for color reproduction describing printed colors from an optical point of view.

  9. A Novel Deterministic Secure Quantum Communication Scheme with Einstein—Podolsky—Rosen Pairs and Single Photons

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Liu Xiao; Shang Tao

    2013-01-01

    A novel deterministic secure quantum communication (DSQC) scheme is presented based on Einstein-Podolsky-Rosen (EPR) pairs and single photons in this study. In this scheme, the secret message can be encoded directly on the first particles of the prepared Bell states by simple unitary operations and decoded by performing the Bell-basis measurement after the additional classic information is exchanged. In addition, the strategy with two-step transmission of quantum data blocks and the technique of decoy-particle checking both are exploited to guarantee the security of the communication. Compared with some previous DSQC schemes, this scheme not only has a higher resource capacity, intrinsic efficiency and total efficiency, but also is more realizable in practical applications. Security analysis shows that the proposed scheme is unconditionally secure against various attacks over an ideal quantum channel and still conditionally robust over a noisy and lossy quantum channel. (general)

  10. QIM blind video watermarking scheme based on Wavelet transform and principal component analysis

    Directory of Open Access Journals (Sweden)

    Nisreen I. Yassin

    2014-12-01

    Full Text Available In this paper, a blind scheme for digital video watermarking is proposed. The security of the scheme is established by using one secret key in the retrieval of the watermark. Discrete Wavelet Transform (DWT is applied on each video frame decomposing it into a number of sub-bands. Maximum entropy blocks are selected and transformed using Principal Component Analysis (PCA. Quantization Index Modulation (QIM is used to quantize the maximum coefficient of the PCA blocks of each sub-band. Then, the watermark is embedded into the selected suitable quantizer values. The proposed scheme is tested using a number of video sequences. Experimental results show high imperceptibility. The computed average PSNR exceeds 45 dB. Finally, the scheme is applied on two medical videos. The proposed scheme shows high robustness against several attacks such as JPEG coding, Gaussian noise addition, histogram equalization, gamma correction, and contrast adjustment in both cases of regular videos and medical videos.

  11. A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems.

    Science.gov (United States)

    Wang, Zhiheng; Huo, Zhanqiang; Shi, Wenbo

    2015-01-01

    With rapid development of computer technology and wide use of mobile devices, the telecare medicine information system has become universal in the field of medical care. To protect patients' privacy and medial data's security, many authentication schemes for the telecare medicine information system have been proposed. Due to its better performance, chaotic maps have been used in the design of authentication schemes for the telecare medicine information system. However, most of them cannot provide user's anonymity. Recently, Lin proposed a dynamic identity based authentication scheme using chaotic maps for the telecare medicine information system and claimed that their scheme was secure against existential active attacks. In this paper, we will demonstrate that their scheme cannot provide user anonymity and is vulnerable to the impersonation attack. Further, we propose an improved scheme to fix security flaws in Lin's scheme and demonstrate the proposed scheme could withstand various attacks.

  12. The Rhetorical Algorithm: WikiLeaks and the Elliptical Secrets of Donald J. Trump

    Directory of Open Access Journals (Sweden)

    Atilla Hallsby

    2018-02-01

    Full Text Available Algorithms were a generative force behind many of the leaks and secrets that dominated the 2016 election season. Taking the form of the identity-anonymizing Tor software that protected the identity of leakers, mathematical protocols occupied a prominent place in the secrets generated during the presidential campaign. This essay suggests that the rhetorical trope of ellipsis offers an equally crucial, algorithmic formula for explaining the public production of these secrets and leaks. It then describes the 2016 DNC leak and Donald Trump’s “I love Wikileaks” moment using the trope of ellipsis, which marks a discursive omission or gap in official executive discourse.

  13. Central effects of humanin on hepatic triglyceride secretion.

    Science.gov (United States)

    Gong, Zhenwei; Su, Kai; Cui, Lingguang; Tas, Emir; Zhang, Ting; Dong, H Henry; Yakar, Shoshana; Muzumdar, Radhika H

    2015-08-01

    Humanin (HN) is an endogenous mitochondria-associated peptide that has been shown to protect against various Alzheimer's disease-associated insults, myocardial ischemia-reperfusion injury, and reactive oxygen species-induced cell death. We have shown previously that HN improves whole body glucose homeostasis by improving insulin sensitivity and increasing glucose-stimulated insulin secretion (GSIS) from the β-cells. Here, we report that intraperitoneal treatment with one of HN analogs, HNG, decreases body weight gain, visceral fat, and hepatic triglyceride (TG) accumulation in high-fat diet-fed mice. The decrease in hepatic TG accumulation is due to increased activity of hepatic microsomal triglyceride transfer protein (MTTP) and increased hepatic TG secretion. Both intravenous (iv) and intracerebroventricular (icv) infusion of HNG acutely increase TG secretion from the liver. Vagotomy blocks the effect on both iv and icv HNG on TG secretion, suggesting that the effects of HNG on hepatic TG flux are centrally mediated. Our data suggest that HN is a new player in central regulation of peripheral lipid metabolism. Copyright © 2015 the American Physiological Society.

  14. Semiquantum secret sharing using entangled states

    International Nuclear Information System (INIS)

    Li Qin; Chan, W. H.; Long Dongyang

    2010-01-01

    Secret sharing is a procedure for sharing a secret among a number of participants such that only the qualified subsets of participants have the ability to reconstruct the secret. Even in the presence of eavesdropping, secret sharing can be achieved when all the members are quantum. So what happens if not all the members are quantum? In this paper, we propose two semiquantum secret sharing protocols by using maximally entangled Greenberger-Horne-Zeilinger-type states in which quantum Alice shares a secret with two classical parties, Bob and Charlie, in a way that both parties are sufficient to obtain the secret, but one of them cannot. The presented protocols are also shown to be secure against eavesdropping.

  15. LcrG secretion is not required for blocking of Yops secretion in Yersinia pestis

    Directory of Open Access Journals (Sweden)

    Matson Jyl S

    2008-02-01

    Full Text Available Abstract Background LcrG, a negative regulator of the Yersinia type III secretion apparatus has been shown to be primarily a cytoplasmic protein, but is secreted at least in Y. pestis. LcrG secretion has not been functionally analyzed and the relevance of LcrG secretion on LcrG function is unknown. Results An LcrG-GAL4AD chimera, originally constructed for two-hybrid analyses to analyze LcrG protein interactions, appeared to be not secreted but the LcrG-GAL4AD chimera retained the ability to regulate Yops secretion. This result led to further investigation to determine the significance of LcrG secretion on LcrG function. Additional analyses including deletion and substitution mutations of amino acids 2–6 in the N-terminus of LcrG were constructed to analyze LcrG secretion and LcrG's ability to control secretion. Some changes to the N-terminus of LcrG were found to not affect LcrG's secretion or LcrG's secretion-controlling activity. However, substitution of poly-isoleucine in the N-terminus of LcrG did eliminate LcrG secretion but did not affect LcrG's secretion controlling activity. Conclusion These results indicate that secretion of LcrG, while observable and T3SS mediated, is not relevant for LcrG's ability to control secretion.

  16. Targeting tumor antigens to secreted membrane vesicles in vivo induces efficient antitumor immune responses.

    Science.gov (United States)

    Zeelenberg, Ingrid S; Ostrowski, Matias; Krumeich, Sophie; Bobrie, Angélique; Jancic, Carolina; Boissonnas, Alexandre; Delcayre, Alain; Le Pecq, Jean-Bernard; Combadière, Béhazine; Amigorena, Sebastian; Théry, Clotilde

    2008-02-15

    Expression of non-self antigens by tumors can induce activation of T cells in vivo, although this activation can lead to either immunity or tolerance. CD8+ T-cell activation can be direct (if the tumor expresses MHC class I molecules) or indirect (after the capture and cross-presentation of tumor antigens by dendritic cells). The modes of tumor antigen capture by dendritic cells in vivo remain unclear. Here we examine the immunogenicity of the same model antigen secreted by live tumors either in association with membrane vesicles (exosomes) or as a soluble protein. We have artificially addressed the antigen to secreted vesicles by coupling it to the factor VIII-like C1C2 domain of milk fat globule epidermal growth factor-factor VIII (MFG-E8)/lactadherin. We show that murine fibrosarcoma tumor cells that secrete vesicle-bound antigen grow slower than tumors that secrete soluble antigen in immunocompetent, but not in immunodeficient, host mice. This growth difference is due to the induction of a more potent antigen-specific antitumor immune response in vivo by the vesicle-bound than by the soluble antigen. Finally, in vivo secretion of the vesicle-bound antigen either by tumors or by vaccination with naked DNA protects against soluble antigen-secreting tumors. We conclude that the mode of secretion can determine the immunogenicity of tumor antigens and that manipulation of the mode of antigen secretion may be used to optimize antitumor vaccination protocols.

  17. hybrid modulation scheme fo rid modulation scheme fo dulation

    African Journals Online (AJOL)

    eobe

    control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.

  18. A blind reversible robust watermarking scheme for relational databases.

    Science.gov (United States)

    Chang, Chin-Chen; Nguyen, Thai-Son; Lin, Chia-Chen

    2013-01-01

    Protecting the ownership and controlling the copies of digital data have become very important issues in Internet-based applications. Reversible watermark technology allows the distortion-free recovery of relational databases after the embedded watermark data are detected or verified. In this paper, we propose a new, blind, reversible, robust watermarking scheme that can be used to provide proof of ownership for the owner of a relational database. In the proposed scheme, a reversible data-embedding algorithm, which is referred to as "histogram shifting of adjacent pixel difference" (APD), is used to obtain reversibility. The proposed scheme can detect successfully 100% of the embedded watermark data, even if as much as 80% of the watermarked relational database is altered. Our extensive analysis and experimental results show that the proposed scheme is robust against a variety of data attacks, for example, alteration attacks, deletion attacks, mix-match attacks, and sorting attacks.

  19. Applying regional planning schemes in East Jutland, Denmark

    DEFF Research Database (Denmark)

    Grunfelder, Julien; Fertner, Christian

    2010-01-01

    landscapes. A common regional planning scheme is discussed for a while, but nothing is agreed on yet. Our objective is to apply three interesting spatial schemes to our case study region. The three planning schemes are well known for their simple and clear approach: The Fingerplan of Copenhagen urban region...... a development aligned along mass-transport corridors. In the Montpellier case, the planning scheme has the particularity of having a “sight inversion”. Thus, the landscape is presented as an integrated part of the reflection on regional development. In other words, it protects natural and agricultural areas......In the eastern part of Jutland, Denmark, a polycentric urban region is emerging. Besides Århus, the second biggest city of Denmark, several medium-sized cities are located in the area. The region is expected to experience further urbanisation which might result in urban sprawl and threaten valuable...

  20. A digital memories based user authentication scheme with privacy preservation.

    Directory of Open Access Journals (Sweden)

    JunLiang Liu

    Full Text Available The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key, which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users' privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results.

  1. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  2. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Directory of Open Access Journals (Sweden)

    Hakjun Lee

    Full Text Available With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  3. Salinity Alters the Polyisoprenoid Alcohol Content and Composition of Both Salt-Secreting and Non–Salt-Secreting Mangrove Seedlings

    Directory of Open Access Journals (Sweden)

    Mohammad Basyuni

    2017-10-01

    Full Text Available The effects of salinity on the polyisoprenoid alcohol content and composition of the salt-secreting mangrove species Avicennia marina and Sonneratia alba and the non–salt-secreting species Bruguiera gymnorrhiza and Kandelia obovata were studied. The seedlings of mangroves were grown for 5 months under 0% and 3% salt concentrations. The occurrence, content, and distribution of four mangrove seedlings were analyzed by two-dimensional thin layer chromatography. The structural groups of the polyprenols and dolichols in the leaves and roots were classified into two types (I and II. In type I, dolichols predominated over polyprenols (more than 90%, whereas in type II, the occurrence of both polyprenols and dolichols was observed. Polyprenols were not detected in the leaves of A. marina and B. gymnorrhiza under 0% salt (control, but were detected in small amounts in K. obovata leaves; however, significant amounts were found in the 3% salinity group. This finding in A. marina, B. gymnorrhiza, and K. obovata leaves implies a change to the structural group: under 0% salt concentrations, the groups are classified as type I, but become type II under 3% salt concentrations. The occurrence of ficaprenol (C50–55 was found only in the leaves of the non–salt-secreting species B. gymnorrhiza and K. obovata under 3% salinity and not in the salt-secreting species A. marina or S. alba. It is noteworthy that the polyisoprenoid type in the roots of the four species showed no change under salinity; the two salt-secreting species A. marina and S. alba contained type I under 0% and 3% salt concentrations. On the other hand, type II polyisoprenoids were identified in the non–salt-secreting species B. gymnorrhiza and K. obovata under 0% and 3% salinity conditions. This finding suggested that polyisoprenoids play a protective role against salinity in the mangrove leaves of both salt-secreting and non–salt-secreting species.

  4. Towards a security model for computational puzzle schemes

    NARCIS (Netherlands)

    Tang, Qiang; Jeckmans, Arjan

    2011-01-01

    In the literature, computational puzzle schemes have been considered as a useful tool for a number of applications, such as constructing timed cryptography, fighting junk emails, and protecting critical infrastructure from denial-of-service attacks. However, there is a lack of a general security

  5. Native Small Airways Secrete Bicarbonate

    OpenAIRE

    Shamsuddin, A. K. M.; Quinton, Paul M.

    2014-01-01

    Since the discovery of Cl− impermeability in cystic fibrosis (CF) and the cloning of the responsible channel, CF pathology has been widely attributed to a defect in epithelial Cl− transport. However, loss of bicarbonate (HCO3−) transport also plays a major, possibly more critical role in CF pathogenesis. Even though HCO3− transport is severely affected in the native pancreas, liver, and intestines in CF, we know very little about HCO3− secretion in small airways, the principle site of morbidi...

  6. Secret sharing via quantum entanglement

    International Nuclear Information System (INIS)

    Hillery, M.; Buzek, V.

    1999-01-01

    Secret sharing is a procedure for splitting a message into several parts so that no single part is sufficient to read the message, but the entire set is. This procedure can be implemented using either GHZ states or two-particle entangled states. In the quantum case the presence of an eavesdropper will introduce errors so that her presence can be detected. We also discuss how quantum information can be split into parts so that the message can be reconstructed from a sufficiently large subset of the parts. (Authors)

  7. Weegee’s City Secrets

    Directory of Open Access Journals (Sweden)

    Alan TRACHTENBERG

    2010-03-01

    Full Text Available En tant que photographe indépendant de meurtres, d’accidents, d’incendies, mais aussi de moments de loisirs dans la ville — de scènes de violence et de plaisir — Weegee travaillait essentiellement la nuit et utilisait un flash puissant associé à son appareil-photo de presse. Ses « secrets pour réaliser des photographies avec un flash » consistent à donner des conseils pratiques et techniques pour débutants. Mais au cœur de la rhétorique de ses « secrets » se trouvent des réflexions subtiles et convaincantes révélant la relation entre la lumière et l’obscurité, et plus particulièrement la manière dont la lumière du flash permet de rendre visible l’obscurité. Dans le récit de Weegee, le flash confère à la photographie le pouvoir d’écrire — d’écrire avec la lumière, un mode de représentation singulièrement approprié pour enregistrer des instants de vie dans les rues nocturnes de la ville.As a freelance photographer of crime, accidents, fires, and also of the recreational life of the city—scenes of violence and of pleasure—Weegee worked mainly at night and employed a powerful photoflash attachment to his press camera. His "secrets of shooting with photoflash" consist of practical technical advice for beginners. But within the rhetoric of his "secrets" there lie cogent and subtle reflections on the relation of light to darkness, especially on the way the flash of light makes darkness visible. In Weegee’s account, the photoflash gives photography the power of writing—writing with light, a mode of picturing uniquely suited to recording instants of life on city streets at night.

  8. Secretion management in the mechanically ventilated patient.

    Science.gov (United States)

    Branson, Richard D

    2007-10-01

    Secretion management in the mechanically ventilated patient includes routine methods for maintaining mucociliary function, as well as techniques for secretion removal. Humidification, mobilization of the patient, and airway suctioning are all routine procedures for managing secretions in the ventilated patient. Early ambulation of the post-surgical patient and routine turning of the ventilated patient are common secretion-management techniques that have little supporting evidence of efficacy. Humidification is a standard of care and a requisite for secretion management. Both active and passive humidification can be used. The humidifier selected and the level of humidification required depend on the patient's condition and the expected duration of intubation. In patients with thick, copious secretions, heated humidification is superior to a heat and moisture exchanger. Airway suctioning is the most important secretion removal technique. Open-circuit and closed-circuit suctioning have similar efficacy. Instilling saline prior to suctioning, to thin the secretions or stimulate a cough, is not supported by the literature. Adequate humidification and as-needed suctioning are the foundation of secretion management in the mechanically ventilated patient. Intermittent therapy for secretion removal includes techniques either to simulate a cough, to mechanically loosen secretions, or both. Patient positioning for secretion drainage is also widely used. Percussion and postural drainage have been widely employed for mechanically ventilated patients but have not been shown to reduce ventilator-associated pneumonia or atelectasis. Manual hyperinflation and insufflation-exsufflation, which attempt to improve secretion removal by simulating a cough, have been described in mechanically ventilated patients, but neither has been studied sufficiently to support routine use. Continuous lateral rotation with a specialized bed reduces atelectasis in some patients, but has not been shown

  9. Quantum tagging for tags containing secret classical data

    International Nuclear Information System (INIS)

    Kent, Adrian

    2011-01-01

    Various authors have considered schemes for quantum tagging, that is, authenticating the classical location of a classical tagging device by sending and receiving quantum signals from suitably located distant sites, in an environment controlled by an adversary whose quantum information processing and transmitting power is potentially unbounded. All of the schemes proposed elsewhere in the literature assume that the adversary is able to inspect the interior of the tagging device. All of these schemes have been shown to be breakable if the adversary has unbounded predistributed entanglement. We consider here the case in which the tagging device contains a finite key string shared with distant sites but kept secret from the adversary, and show this allows the location of the tagging device to be authenticated securely and indefinitely. Our protocol relies on quantum key distribution between the tagging device and at least one distant site, and demonstrates a new practical application of quantum key distribution. It also illustrates that the attainable security in position-based cryptography can depend crucially on apparently subtle details in the security scenario considered.

  10. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  11. Optimum RA reactor fuelling scheme

    International Nuclear Information System (INIS)

    Strugar, P.; Nikolic, V.

    1965-10-01

    Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr

  12. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  13. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called

  14. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  15. Assessing the impacts of distributed generation on the protection ...

    African Journals Online (AJOL)

    There is the refore, a need for a protection scheme to be adopted whose devices can “coordinate” as well as offer a reliable protection to the network. This paper proposes a protection scheme design using coordinated behaviours of relay - operated reclosers and sectionalizers, as well as manages the effect distributed ...

  16. On the finite-SNR diversity-multiplexing tradeoff of zero-forcing transmit scheme under secrecy constraint

    KAUST Repository

    Rezki, Zouheir

    2011-06-01

    In this paper, we address the finite Signal-to-Noise Ratio (SNR) Diversity-Multiplexing Tradeoff (DMT) of the Multiple Input Multiple Output (MIMO) wiretap channel, where a Zero-Forcing (ZF) transmit scheme, that intends to send the secret information in the orthogonal space of the eavesdropper channel, is used. First, we introduce the secret multiplexing gain at finite-SNR that generalizes the definition at high-SNR. Then, we provide upper and lower bounds on the outage probability under secrecy constraint, from which secret diversity gain estimates of ZF are derived. Through asymptotic analysis, we show that the upper bound underestimates the secret diversity gain, whereas the lower bound is tight at high-SNR, and thus its related diversity gain estimate is equal to the actual asymptotic secret diversity gain of the Multiple-Input Multiple-Output (MIMO) wiretap channel. © 2011 IEEE.

  17. Normal and abnormal secretion by haemopoietic cells

    Science.gov (United States)

    STINCHCOMBE, JANE C; GRIFFITHS, GILLIAN M

    2001-01-01

    The secretory lysosomes found in haemopoietic cells provide a very efficient mechanism for delivering the effector proteins of many immune cells in response to antigen recognition. Although secretion shows some similarities to the secretion of specialized granules in other secretory cell types, some aspects of secretory lysosome release appear to be unique to melanocytes and cells of the haemopoietic lineage. Mast cells and platelets have provided excellent models for studying secretion, but recent advances in characterizing the immunological synapse allow a very fine dissection of the secretory process in T lymphocytes. These studies show that secretory lysosomes are secreted from the centre of the talin ring at the synapse. Proper secretion requires a series of Rab and cytoskeletal elements which play critical roles in the specialized secretion of lysosomes in haemopoietic cells. PMID:11380687

  18. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  19. Stochastic Actuarial Modelling of a Defined-Benefit Social Security Pension Scheme: An Analytical Approach

    OpenAIRE

    Iyer, Subramaniam

    2017-01-01

    Among the systems in place in different countries for the protection of the population against the long-term contingencies of old-age (or retirement), disability and death (or survivorship), defined-benefit social security pension schemes, i.e. social insurance pension schemes, by far predominate, despite the recent trend towards defined-contribution arrangements in social security reforms. Actuarial valuations of these schemes, unlike other branches of insurance, continue to be carried out a...

  20. Monitoring in radiological protection scheme; Pemonitoran dalam skim perlindungan radiologi

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1988-12-31

    The chapter briefly discussed the following subjects: function and responsibility of the monitoring, planning of monitoring programme i.e working area for external radiation, monitoring of workers for external radiation, monitoring of working area for surface contamination, monitoring of working area for air contamination, monitoring of workers for internal contamination, and the evaluation of monitoring results.

  1. Collaborative Protection and Control Schemes for Shipboard Electrical Systems

    Science.gov (United States)

    2007-03-26

    for fast reclosing capability that the CB can provide. Secondly, as it will be shown later, the provision of two primary busses on the system allows...advantages of using a fast reclosing CB are nullified. And thirdly, the maintenance and the paraphernalia (current transducer, CB power supply and relay

  2. Design of an adaptive overcurrent protection scheme for microgrids

    African Journals Online (AJOL)

    For example equipment like. M.V motors have a voltage ... The faulted section is detected using time OC characteristics of directional OC relays. This adaptive .... Samples of system Current Transformers CTs ratio selection. CT. Max. FLA. (A).

  3. Melatonin Secretion Pattern in Critically Ill Patients

    DEFF Research Database (Denmark)

    Boyko, Yuliya; Holst, René; Jennum, Poul

    2017-01-01

    effect of remifentanil on melatonin secretion. We found that the risk of atypical sleep compared to normal sleep was significantly lower (p REM) sleep was only observed during the nonsedation period. We found preserved diurnal pattern of melatonin...... secretion in these patients. Remifentanil did not affect melatonin secretion but was associated with lower risk of atypical sleep pattern. REM sleep was only registered during the period of nonsedation.......Critically ill patients have abnormal circadian and sleep homeostasis. This may be associated with higher morbidity and mortality. The aims of this pilot study were (1) to describe melatonin secretion in conscious critically ill mechanically ventilated patients and (2) to describe whether melatonin...

  4. Thymidine secretion by hybridoma and myeloma cells

    International Nuclear Information System (INIS)

    Spilsberg, Bjorn; Rise, Frode; Petersen, Dirk; Nissen-Meyer, Jon

    2006-01-01

    Secretion of thymidine appeared to be a common property of hybridoma and myeloma cells, but not of other cell types, which were tested. Of three hybridoma cell lines tested, all secreted thymidine in amounts resulting in the accumulation of thymidine to concentrations of 10-20 μM in the culture medium. Also three of five myeloma cell lines that were analyzed secrete thymidine, but none of the other cell types that were studied. Thymidine was purified to homogeneity (4 mg purified from 3 l of culture medium) and identified as such by nuclear magnetic resonance spectroscopy. The cells that secreted thymidine showed high resistance to the growth inhibitory effect of thymidine

  5. Innovation: the impact of grace period to protect intellectual property

    OpenAIRE

    Coulibaly, Mantiaba

    2010-01-01

    Firms protect their innovations by mobilizing mechanisms like patent and secret. Using these means of protection they aim to obtain value and knowledge (Hannah, 2005). Each means of protection present particularities according to the countries and legislations. Indeed, there are different requirements to hold a patent: 1) a patent holder must work on the invention within a specified time limit; 2) the patent application is kept secret until a patent is granted; 3) the rule of the “first-to-in...

  6. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim

    2012-01-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  7. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  8. A robust trust establishment scheme for wireless sensor networks.

    Science.gov (United States)

    Ishmanov, Farruh; Kim, Sung Won; Nam, Seung Yeob

    2015-03-23

    Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms.

  9. A Robust Trust Establishment Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farruh Ishmanov

    2015-03-01

    Full Text Available Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms.

  10. Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

    Directory of Open Access Journals (Sweden)

    Kefei Mao

    2016-01-01

    Full Text Available Wireless Health Monitoring Systems (WHMS have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients’ information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.

  11. Unequal error control scheme for dimmable visible light communication systems

    Science.gov (United States)

    Deng, Keyan; Yuan, Lei; Wan, Yi; Li, Huaan

    2017-01-01

    Visible light communication (VLC), which has the advantages of a very large bandwidth, high security, and freedom from license-related restrictions and electromagnetic-interference, has attracted much interest. Because a VLC system simultaneously performs illumination and communication functions, dimming control, efficiency, and reliable transmission are significant and challenging issues of such systems. In this paper, we propose a novel unequal error control (UEC) scheme in which expanding window fountain (EWF) codes in an on-off keying (OOK)-based VLC system are used to support different dimming target values. To evaluate the performance of the scheme for various dimming target values, we apply it to H.264 scalable video coding bitstreams in a VLC system. The results of the simulations that are performed using additive white Gaussian noises (AWGNs) with different signal-to-noise ratios (SNRs) are used to compare the performance of the proposed scheme for various dimming target values. It is found that the proposed UEC scheme enables earlier base layer recovery compared to the use of the equal error control (EEC) scheme for different dimming target values and therefore afford robust transmission for scalable video multicast over optical wireless channels. This is because of the unequal error protection (UEP) and unequal recovery time (URT) of the EWF code in the proposed scheme.

  12. Review analysis of properties for an ideal secure biometric template scheme

    CSIR Research Space (South Africa)

    Mzila, Phiwa

    2016-02-01

    Full Text Available privacy and system security. To mitigate this problem, various biometric protection techniques have been proposed. Most of these schemes aim to satisfy diversity, revocability, security and performance properties, as requirements for ideal secured...

  13. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    Full Text Available With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  14. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    Science.gov (United States)

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  15. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Science.gov (United States)

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  16. Importance biasing scheme implemented in the PRIZMA code

    International Nuclear Information System (INIS)

    Kandiev, I.Z.; Malyshkin, G.N.

    1997-01-01

    PRIZMA code is intended for Monte Carlo calculations of linear radiation transport problems. The code has wide capabilities to describe geometry, sources, material composition, and to obtain parameters specified by user. There is a capability to calculate path of particle cascade (including neutrons, photons, electrons, positrons and heavy charged particles) taking into account possible transmutations. Importance biasing scheme was implemented to solve the problems which require calculation of functionals related to small probabilities (for example, problems of protection against radiation, problems of detection, etc.). The scheme enables to adapt trajectory building algorithm to problem peculiarities

  17. Resilience from coastal protection.

    Science.gov (United States)

    Ewing, Lesley C

    2015-10-28

    Coastal areas are important residential, commercial and industrial areas; but coastal hazards can pose significant threats to these areas. Shoreline/coastal protection elements, both built structures such as breakwaters, seawalls and revetments, as well as natural features such as beaches, reefs and wetlands, are regular features of a coastal community and are important for community safety and development. These protection structures provide a range of resilience to coastal communities. During and after disasters, they help to minimize damages and support recovery; during non-disaster times, the values from shoreline elements shift from the narrow focus on protection. Most coastal communities have limited land and resources and few can dedicate scarce resources solely for protection. Values from shore protection can and should expand to include environmental, economic and social/cultural values. This paper discusses the key aspects of shoreline protection that influence effective community resilience and protection from disasters. This paper also presents ways that the economic, environmental and social/cultural values of shore protection can be evaluated and quantified. It presents the Coastal Community Hazard Protection Resilience (CCHPR) Index for evaluating the resilience capacity to coastal communities from various protection schemes and demonstrates the use of this Index for an urban beach in San Francisco, CA, USA. © 2015 The Author(s).

  18. Modified Baptista type chaotic cryptosystem via matrix secret key

    International Nuclear Information System (INIS)

    Ariffin, M.R.K.; Noorani, M.S.M.

    2008-01-01

    In 1998, M.S. Baptista proposed a chaotic cryptosystem using the ergodicity property of the simple low-dimensional and chaotic logistic equation. Since then, many cryptosystems based on Baptista's work have been proposed. However, over the years research has shown that this cryptosystem is predictable and vulnerable to attacks and is widely discussed. Among the weaknesses are the non-uniform distribution of ciphertexts and succumbing to the one-time pad attack (a type of chosen plaintext attack). In this Letter, our objective is to modify the chaotic cryptographic scheme proposed previously. We use a matrix secret key such that the cryptosystem would no longer succumb to the one-time pad attack

  19. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  20. Signal multiplexing scheme for LINAC

    International Nuclear Information System (INIS)

    Sujo, C.I.; Mohan, Shyam; Joshi, Gopal; Singh, S.K.; Karande, Jitendra

    2004-01-01

    For the proper operation of the LINAC some signals, RF (radio frequency) as well as LF (low frequency) have to be available at the Master Control Station (MCS). These signals are needed to control, calibrate and characterize the RF fields in the resonators. This can be achieved by proper multiplexing of various signals locally and then routing the selected signals to the MCS. A multiplexing scheme has been designed and implemented, which will allow the signals from the selected cavity to the MCS. High isolation between channels and low insertion loss for a given signal are important issues while selecting the multiplexing scheme. (author)

  1. Capacity-achieving CPM schemes

    OpenAIRE

    Perotti, Alberto; Tarable, Alberto; Benedetto, Sergio; Montorsi, Guido

    2008-01-01

    The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The s...

  2. "The Secret Garden": A Literary Journey.

    Science.gov (United States)

    Jordan, Anne Devereaux

    1998-01-01

    Outlines the life of Frances Hodgson Burnett, author of "The Secret Garden." Argues that it not only tells an enthralling tale, but takes readers on a journey through the history of English literature. Discusses the gothic tradition and romanticism of "The Secret Garden." Lists classic elements in the book and offers five ideas…

  3. Gastric secretion elicited by conditioning in rats.

    Science.gov (United States)

    Caboclo, José Liberato Ferreira; Cury, Francico de Assis; Borin, Aldenis Albanese; Caboclo, Luís Otávio Sales Ferreira; Ribeiro, Maria Fernanda Sales Caboclo; de Freitas, Pedro José; Andersson, Sven

    2009-01-01

    To investigate whether interdigestive gastric acid secretion can be controlled by a possible memory-related cortical mechanism. To evaluate gastric secretion in rats, we used a methodology that allows gastric juice collection in rats in their habitual conditions (without any restraining) by pairing sound as the conditioning stimulus (CS) and food as the unconditioning stimulus (US). The levels of gastric acid secretion under basal conditions and under sound stimulation were recorded and the circulating gastrin levels determined. When the gastric juice was collected in the course of the conditioning procedure, the results showed that under noise stimulation a significant increase in gastric acid secretion occurred after 10 days of conditioning (p<0.01). The significance was definitively demonstrated after 13 days of conditioning (p<0.001). Basal secretions of the conditioned rats reached a significant level after 16 days of conditioning. The levels of noise-stimulated gastric acid secretion were the highest so far described in physiological experiments carried out in rats and there were no significant increases in the circulating gastrin levels. The results point to the important role played by cortical structures in the control of interdigestive gastric acid secretion in rats. If this mechanism is also present in humans, it may be involved in diseases caused by inappropriate gastric acid secretion during the interprandial periods.

  4. Secret rate - Privacy leakage in biometric systems

    NARCIS (Netherlands)

    Ignatenko, T.; Willems, F.M.J.

    2009-01-01

    Ahlswede and Csiszár [1993] introduced the concept of secret sharing. In their source model two terminals observe two correlated sequences. It is the objective of the terminals to form a common secret by interchanging a public message (helper data) in such a way that the secrecy leakage is

  5. Cryptanalysis of 'less short' RSA secret exponents

    NARCIS (Netherlands)

    Verheul, E.R.; Tilborg, van H.C.A.

    1997-01-01

    In some applications of RSA, it is desirable to have a short secret exponent d. Wiener [6], describes a technique to use continued fractions (CF) in a cryptanalytic attack on an RSA cryptosystem having a ‘short’ secret exponent. Let n=p¿·¿q be the modulus of the system. In the typical case that

  6. Dig It! The Secrets of Soil

    Science.gov (United States)

    It! The Secrets of Soil Come and Explore! Discover the amazing world of soils with images and information from the Dig It! The Secrets of Soil exhibit from the Smithsonian's National Museum of Natural and new web content will be added over the coming months including a new soil blog. New Interactives

  7. SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users

    Directory of Open Access Journals (Sweden)

    Fenghua Li

    2018-02-01

    Full Text Available With the development of online social networks (OSNs and modern smartphones, sharing photos with friends has become one of the most popular social activities. Since people usually prefer to give others a positive impression, impression management during photo sharing is becoming increasingly important. However, most of the existing privacy-aware solutions have two main drawbacks: ① Users must decide manually whether to share each photo with others or not, in order to build the desired impression; and ② users run a high risk of leaking sensitive relational information in group photos during photo sharing, such as their position as part of a couple, or their sexual identity. In this paper, we propose a social relation impression-management (SRIM scheme to protect relational privacy and to automatically recommend an appropriate photo-sharing policy to users. To be more specific, we have designed a lightweight face-distance measurement that calculates the distances between users’ faces within group photos by relying on photo metadata and face-detection results. These distances are then transformed into relations using proxemics. Furthermore, we propose a relation impression evaluation algorithm to evaluate and manage relational impressions. We developed a prototype and employed 21 volunteers to verify the functionalities of the SRIM scheme. The evaluation results show the effectiveness and efficiency of our proposed scheme. Keywords: Impression management, Relational privacy, Photo sharing, Policy recommendation, Proxemics

  8. Ionizing radiation in secret services' conspirative actions

    International Nuclear Information System (INIS)

    Vogel, H.; Lotz, P.; Vogel, B.

    2007-01-01

    Introduction: The death of Litvinenko has been reported by the media. It has raised the question whether this case had been unique. The fall of the wall has allowed a glimpse in the planning and comporting of a secret service. Material and method: Documents of the secret service of the former German democratic republic (GDR), books of defectors, and media reports about secret service actions with radiating substances have been analyzed. Results: Since decades, secret services have been using radioactive nuclides and radiation for their tasks. Several killings with radiation have been reported. A complicated logistic had been developed. Conclusion: Only singular cases of the employment of radiating substances have become known. It is probable that the majority rests unknown. Government support seems necessary in secret services' conspirative actions with radiating substance

  9. Unconventional Pathways of Secretion Contribute to Inflammation

    Directory of Open Access Journals (Sweden)

    Michael J. D. Daniels

    2017-01-01

    Full Text Available In the conventional pathway of protein secretion, leader sequence-containing proteins leave the cell following processing through the endoplasmic reticulum (ER and Golgi body. However, leaderless proteins also enter the extracellular space through mechanisms collectively known as unconventional secretion. Unconventionally secreted proteins often have vital roles in cell and organism function such as inflammation. Amongst the best-studied inflammatory unconventionally secreted proteins are interleukin (IL-1β, IL-1α, IL-33 and high-mobility group box 1 (HMGB1. In this review we discuss the current understanding of the unconventional secretion of these proteins and highlight future areas of research such as the role of nuclear localisation.

  10. Current Therapies That Modify Glucagon Secretion

    DEFF Research Database (Denmark)

    Grøndahl, Magnus F.; Keating, Damien J.; Vilsbøll, Tina

    2017-01-01

    and provide insights into how antidiabetic drugs influence glucagon secretion as well as a perspective on the future of glucagon-targeting drugs. Recent Findings: Several older as well as recent investigations have evaluated the effect of antidiabetic agents on glucagon secretion to understand how glucagon...... may be involved in the drugs’ efficacy and safety profiles. Based on these findings, modulation of glucagon secretion seems to play a hitherto underestimated role in the efficacy and safety of several glucose-lowering drugs. Summary: Numerous drugs currently available to diabetologists are capable...... of altering glucagon secretion: metformin, sulfonylurea compounds, insulin, glucagon-like peptide-1 receptor agonists, dipeptidyl peptidase-4 inhibitors, sodium-glucose cotransporter 2 inhibitors and amylin mimetics. Their diverse effects on glucagon secretion are of importance for their individual efficacy...

  11. Characterization of a secreted Chlamydia protease

    DEFF Research Database (Denmark)

    Shaw, A.C.; Vandahl, B.B.; Larsen, M.R.

    2002-01-01

    Chlamydiae are obligate intracellular bacteria that are important human pathogens. The Chlamydia genomes contain orthologues to secretion apparatus proteins from other intracellular bacteria, but only a few secreted proteins have been identified. Most likely, effector proteins are secreted in order...... to promote infection. Effector proteins cannot be identified by motif or similarity searches. As a new strategy for identification of secreted proteins we have compared 2D-PAGE profiles of [35S]-labelled Chlamydia proteins from whole lysates of infected cells to 2D-PAGE profiles of proteins from purified...... Chlamydia. Several secretion candidates from Chlamydia trachomatis D and Chlamydia pneumoniae were detected by this method. Two protein spots were identified among the candidates. These represent fragments of the 'chlamydial protease- or proteasome-like activity factor' (CPAF) and were clearly present in 2D...

  12. Pituitary-hormone secretion by thyrotropinomas.

    Science.gov (United States)

    Roelfsema, Ferdinand; Kok, Simon; Kok, Petra; Pereira, Alberto M; Biermasz, Nienke R; Smit, Jan W; Frolich, Marijke; Keenan, Daniel M; Veldhuis, Johannes D; Romijn, Johannes A

    2009-01-01

    Hormone secretion by somatotropinomas, corticotropinomas and prolactinomas exhibits increased pulse frequency, basal and pulsatile secretion, accompanied by greater disorderliness. Increased concentrations of growth hormone (GH) or prolactin (PRL) are observed in about 30% of thyrotropinomas leading to acromegaly or disturbed sexual functions beyond thyrotropin (TSH)-induced hyperthyroidism. Regulation of non-TSH pituitary hormones in this context is not well understood. We there therefore evaluated TSH, GH and PRL secretion in 6 patients with up-to-date analytical and mathematical tools by 24-h blood sampling at 10-min intervals in a clinical research laboratory. The profiles were analyzed with a new deconvolution method, approximate entropy, cross-approximate entropy, cross-correlation and cosinor regression. TSH burst frequency and basal and pulsatile secretion were increased in patients compared with controls. TSH secretion patterns in patients were more irregular, but the diurnal rhythm was preserved at a higher mean with a 2.5 h phase delay. Although only one patient had clinical acromegaly, GH secretion and IGF-I levels were increased in two other patients and all three had a significant cross-correlation between the GH and TSH. PRL secretion was increased in one patient, but all patients had a significant cross-correlation with TSH and showed decreased PRL regularity. Cross-ApEn synchrony between TSH and GH did not differ between patients and controls, but TSH and PRL synchrony was reduced in patients. We conclude that TSH secretion by thyrotropinomas shares many characteristics of other pituitary hormone-secreting adenomas. In addition, abnormalities in GH and PRL secretion exist ranging from decreased (joint) regularity to overt hypersecretion, although not always clinically obvious, suggesting tumoral transformation of thyrotrope lineage cells.

  13. On 165Ho level scheme

    International Nuclear Information System (INIS)

    Ardisson, Claire; Ardisson, Gerard.

    1976-01-01

    A 165 Ho level scheme was constructed which led to the interpretation of sixty γ rays belonging to the decay of 165 Dy. A new 702.9keV level was identified to be the 5/2 - member of the 1/2 ) 7541{ Nilsson orbit. )] [fr

  14. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min; Ma, Guancong; Wu, Ying; Yang, Zhiyu; Sheng, Ping

    2014-01-01

    the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost

  15. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  16. New practicable Siberian Snake schemes

    International Nuclear Information System (INIS)

    Steffen, K.

    1983-07-01

    Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)

  17. Quantum secret sharing based on modulated high-dimensional time-bin entanglement

    International Nuclear Information System (INIS)

    Takesue, Hiroki; Inoue, Kyo

    2006-01-01

    We propose a scheme for quantum secret sharing (QSS) that uses a modulated high-dimensional time-bin entanglement. By modulating the relative phase randomly by {0,π}, a sender with the entanglement source can randomly change the sign of the correlation of the measurement outcomes obtained by two distant recipients. The two recipients must cooperate if they are to obtain the sign of the correlation, which is used as a secret key. We show that our scheme is secure against intercept-and-resend (IR) and beam splitting attacks by an outside eavesdropper thanks to the nonorthogonality of high-dimensional time-bin entangled states. We also show that a cheating attempt based on an IR attack by one of the recipients can be detected by changing the dimension of the time-bin entanglement randomly and inserting two 'vacant' slots between the packets. Then, cheating attempts can be detected by monitoring the count rate in the vacant slots. The proposed scheme has better experimental feasibility than previously proposed entanglement-based QSS schemes

  18. Fractalkine (CX3CL1, a new factor protecting β-cells against TNFα

    Directory of Open Access Journals (Sweden)

    Sabine Rutti

    2014-10-01

    Conclusions: We demonstrate for the first time that human islets express and secrete CX3CL1 and CX3CL1 impacts them by decreasing glucagon secretion without affecting insulin secretion. Moreover, CX3CL1 decreases basal apoptosis of human β-cells. We further demonstrate that CX3CL1 protects β-cells from the adverse effects of TNFα on their function by restoring the expression and phosphorylation of key proteins of the insulin secretion pathway.

  19. The vascular secret of Klotho

    DEFF Research Database (Denmark)

    Lewin, Ewa; Olgaard, Klaus

    2015-01-01

    Klotho is an evolutionarily highly conserved protein related to longevity. Increasing evidence of a vascular protecting effect of the Klotho protein has emerged and might be important for future treatments of uremic vascular calcification. It is still disputed whether Klotho is locally expressed ...

  20. THE BUFFER CAPACITY OF AIRWAY EPITHELIAL SECRETIONS

    Directory of Open Access Journals (Sweden)

    Dusik eKim

    2014-06-01

    Full Text Available The pH of airway epithelial secretions influences bacterial killing and mucus properties and is reduced by acidic pollutants, gastric reflux, and respiratory diseases such as cystic fibrosis (CF. The effect of acute acid loads depends on buffer capacity, however the buffering of airway secretions has not been well characterized. In this work we develop a method for titrating micro-scale (30 µl volumes and use it to study fluid secreted by the human airway epithelial cell line Calu-3, a widely used model for submucosal gland serous cells. Microtitration curves revealed that HCO3- is the major buffer. Peak buffer capacity (β increased from 17 to 28 mM/pH during forskolin stimulation, and was reduced by >50% in fluid secreted by cystic fibrosis transmembrane conductance regulator (CFTR-deficient Calu-3 monolayers, confirming an important role of CFTR in HCO3- secretion. Back-titration with NaOH revealed non-volatile buffer capacity due to proteins synthesized and released by the epithelial cells. Lysozyme and mucin concentrations were too low to buffer Calu-3 fluid significantly, however model titrations of porcine gastric mucins at concentrations near the sol-gel transition suggest that mucins may contribute to the buffer capacity of ASL in vivo. We conclude that CFTR-dependent HCO3- secretion and epithelially-derived proteins are the predominant buffers in Calu-3 secretions.

  1. Analysis of secreted proteins from Aspergillus flavus.

    Science.gov (United States)

    Medina, Martha L; Haynes, Paul A; Breci, Linda; Francisco, Wilson A

    2005-08-01

    MS/MS techniques in proteomics make possible the identification of proteins from organisms with little or no genome sequence information available. Peptide sequences are obtained from tandem mass spectra by matching peptide mass and fragmentation information to protein sequence information from related organisms, including unannotated genome sequence data. This peptide identification data can then be grouped and reconstructed into protein data. In this study, we have used this approach to study protein secretion by Aspergillus flavus, a filamentous fungus for which very little genome sequence information is available. A. flavus is capable of degrading the flavonoid rutin (quercetin 3-O-glycoside), as the only source of carbon via an extracellular enzyme system. In this continuing study, a proteomic analysis was used to identify secreted proteins from A. flavus when grown on rutin. The growth media glucose and potato dextrose were used to identify differentially expressed secreted proteins. The secreted proteins were analyzed by 1- and 2-DE and MS/MS. A total of 51 unique A. flavus secreted proteins were identified from the three growth conditions. Ten proteins were unique to rutin-, five to glucose- and one to potato dextrose-grown A. flavus. Sixteen secreted proteins were common to all three media. Fourteen identifications were of hypothetical proteins or proteins of unknown functions. To our knowledge, this is the first extensive proteomic study conducted to identify the secreted proteins from a filamentous fungus.

  2. Recommendations on European data protection certification

    NARCIS (Netherlands)

    Kamara, Irene; Burnik, Jelena

    2017-01-01

    The objective of this report is to identify and analyse challenges and opportunities of data protection certification mechanisms, including seals and marks, as introduced by the GDPR, focusing also on existing initiatives and voluntary schemes.

  3. Physics for radiation protection

    CERN Document Server

    Martin, James E

    2013-01-01

    A much-needed working resource for health physicists and other radiation protection professionals, this volume presents clear, thorough, up-to-date explanations of the basic physics necessary to address real-world problems in radiation protection. Designed for readers with limited as well as basic science backgrounds, Physics for Radiation Protection emphasizes applied concepts and carefully illustrates all topics through examples as well as practice problems. Physics for Radiation Protection draws substantially on current resource data available for health physics use, providing decay schemes and emission energies for approximately 100 of the most common radionuclides encountered by practitioners. Excerpts of the Chart of the Nuclides, activation cross sections, fission yields, fission-product chains, photon attenuation coefficients, and nuclear masses are also provided.

  4. Ingredients of protection engineering

    International Nuclear Information System (INIS)

    Latorre, V.R.; Spogen, L.R. Jr.

    1974-01-01

    The protection of an electronic/electrical system from an electromagnetic environment requires a systematic approach and a clear and concise identification of the data requirements and tools (analytical and experimental) for the vulnerability assessment. In this paper, a basic protection engineering concept is developed. The concept is general and therefore applicable to many systems. It consists of five stages: (1) systems analysis, (2) subsystem degradation, (3) interaction and coupling, (4) protection trade-off analysis, and (5) fabrication and operation. A detailed discussion of all functions performed in each stage is described; the input data to these functions identified; and means (tools) by which the functional operations are satisfied are summarized. Simple examples are used throughout the paper to illustrate the definitions of various functions and to emphasize the iterative process required in arriving at a protection scheme. (U.S.)

  5. A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model

    Directory of Open Access Journals (Sweden)

    Lili Zhang

    2014-01-01

    Full Text Available A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. Up to date, most proxy blind signature schemes rely on hard number theory problems, discrete logarithm, and bilinear pairings. Unfortunately, the above underlying number theory problems will be solvable in the postquantum era. Lattice-based cryptography is enjoying great interest these days, due to implementation simplicity and provable security reductions. Moreover, lattice-based cryptography is believed to be hard even for quantum computers. In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles. The new scheme is proven to be strongly unforgeable under the standard hardness assumption of the short integer solution problem (SIS and the inhomogeneous small integer solution problem (ISIS. Furthermore, the secret key size and the signature length of our scheme are invariant and much shorter than those of the previous lattice-based proxy blind signature schemes. To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model.

  6. Design and evaluation of sparse quantization index modulation watermarking schemes

    Science.gov (United States)

    Cornelis, Bruno; Barbarien, Joeri; Dooms, Ann; Munteanu, Adrian; Cornelis, Jan; Schelkens, Peter

    2008-08-01

    In the past decade the use of digital data has increased significantly. The advantages of digital data are, amongst others, easy editing, fast, cheap and cross-platform distribution and compact storage. The most crucial disadvantages are the unauthorized copying and copyright issues, by which authors and license holders can suffer considerable financial losses. Many inexpensive methods are readily available for editing digital data and, unlike analog information, the reproduction in the digital case is simple and robust. Hence, there is great interest in developing technology that helps to protect the integrity of a digital work and the copyrights of its owners. Watermarking, which is the embedding of a signal (known as the watermark) into the original digital data, is one method that has been proposed for the protection of digital media elements such as audio, video and images. In this article, we examine watermarking schemes for still images, based on selective quantization of the coefficients of a wavelet transformed image, i.e. sparse quantization-index modulation (QIM) watermarking. Different grouping schemes for the wavelet coefficients are evaluated and experimentally verified for robustness against several attacks. Wavelet tree-based grouping schemes yield a slightly improved performance over block-based grouping schemes. Additionally, the impact of the deployment of error correction codes on the most promising configurations is examined. The utilization of BCH-codes (Bose, Ray-Chaudhuri, Hocquenghem) results in an improved robustness as long as the capacity of the error codes is not exceeded (cliff-effect).

  7. DLP system and the secret of personal correspondence

    Directory of Open Access Journals (Sweden)

    Mavrinskaya T.V.

    2017-04-01

    Full Text Available according to the authors, every day a number of threats to information security increases, and this requires an increase in resources (systems of information protection of organizations and enterprises. There are many information security tools with different functionality, but the main mean of preventing information leakage is the Date Loss Prevention (DLP system. If you need to establish control over the leak of confidential information there appear a number of questions of conformity of decisions with the legislation and regulations. This article describes the issue of compliance functionality of a DLP system the provisions and requirements of the legislation in the sphere of protection of family and personal secrets, as well as compliance with the Constitutional right of citizens to privacy of correspondence.

  8. Biliary and pancreatic secretions in abdominal irradiation

    International Nuclear Information System (INIS)

    Becciolini, A.; Cionini, L.; Cappellini, M.; Atzeni, G.

    1979-01-01

    The biliary and pancreatic secretions have been determined in patients given pelvic or para-aortic irradiation, with a dose of 50 Gy in the former group and between 36 and 40 Gy in the latter. A test meal containing polyethylene glycol (PEG) as reference substance was used. Each sample of the duodenal content was assayed for volume, PEG content, amylase and trypsin activity, pH and biliary secretion. No significant modifications of biliary and pancreatic secretions were demonstrated after irradiation, suggesting that these functions are not involved in the pathogenesis of the malabsorption radiation syndrome. (Auth.)

  9. [Secret drug tribulations and French legislation].

    Science.gov (United States)

    Charlot, Colette

    2002-01-01

    From an official Montpellier prefecture paper of 18th century, we are interested in a secret drug from Provence origin: the Irroë powder. This purgative will pass from "secret" drug status to "patent" drug. It's notoriety will come from its arrival to Paris. The law of 21th germinal year XI, the decret of 25 prairial year XIII and this of 18th 1810 imposed to give the drug composition to an official status; that examined and permit it's sale. This secret will be produce for half century.

  10. Air Force UAVs: The Secret History

    Science.gov (United States)

    2010-07-01

    iA Mitchell Institute Study i Air Force UAVs The Secret History A Mitchell Institute Study July 2010 By Thomas P. Ehrhard Report Documentation Page...DATES COVERED 00-00-2010 to 00-00-2010 4. TITLE AND SUBTITLE Air Force UAVs The Secret History 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...opening phases of Operation Enduring Freedom in Afghanistan. By Thomas P. Ehrhard a miTchEll insTiTuTE sTudy July 2010 Air Force UAVs The Secret History

  11. Code-Hopping Based Transmission Scheme for Wireless Physical-Layer Security

    Directory of Open Access Journals (Sweden)

    Liuguo Yin

    2018-01-01

    Full Text Available Due to the broadcast and time-varying natures of wireless channels, traditional communication systems that provide data encryption at the application layer suffer many challenges such as error diffusion. In this paper, we propose a code-hopping based secrecy transmission scheme that uses dynamic nonsystematic low-density parity-check (LDPC codes and automatic repeat-request (ARQ mechanism to jointly encode and encrypt source messages at the physical layer. In this scheme, secret keys at the transmitter and the legitimate receiver are generated dynamically upon the source messages that have been transmitted successfully. During the transmission, each source message is jointly encoded and encrypted by a parity-check matrix, which is dynamically selected from a set of LDPC matrices based on the shared dynamic secret key. As for the eavesdropper (Eve, the uncorrectable decoding errors prevent her from generating the same secret key as the legitimate parties. Thus she cannot select the correct LDPC matrix to recover the source message. We demonstrate that our scheme can be compatible with traditional cryptosystems and enhance the security without sacrificing the error-correction performance. Numerical results show that the bit error rate (BER of Eve approaches 0.5 as the number of transmitted source messages increases and the security gap of the system is small.

  12. Degraded voltage protection at nuclear plant safety buses

    International Nuclear Information System (INIS)

    Haddad, S.Z.; Berger, W.E.

    1989-01-01

    This paper reviews the events that led to the NRC's degraded voltage protection requirement and outlines the related NRC positions. It describes problems that have occurred with the protection scheme and identifies the measures required to minimize the occurrence of these problems. The paper recommends new guidelines for degraded voltage protection and proposes a protection scheme logic that aims at enhancing the reliability of the safety systems

  13. BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2011-01-01

    Full Text Available In smart grid, phaser measurement units (PMUs can upload readings to utility centers via supervisory control and data acquisition (SCADA or energy management system (EMS to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this problem. They are public key based scheme (PKS, password based scheme (PWS and billed value-based scheme (BVS. BVS can achieve forward and backward security and only relies on hash functions. Security analysis justifies that the proposed schemes, especially BVS, can attain the security goals with low computation and storage cost.

  14. Consolidating the social health insurance schemes in China: towards an equitable and efficient health system.

    Science.gov (United States)

    Meng, Qingyue; Fang, Hai; Liu, Xiaoyun; Yuan, Beibei; Xu, Jin

    2015-10-10

    Fragmentation in social health insurance schemes is an important factor for inequitable access to health care and financial protection for people covered by different health insurance schemes in China. To fulfil its commitment of universal health coverage by 2020, the Chinese Government needs to prioritise addressing this issue. After analysing the situation of fragmentation, this Review summarises efforts to consolidate health insurance schemes both in China and internationally. Rural migrants, elderly people, and those with non-communicable diseases in China will greatly benefit from consolidation of the existing health insurance schemes with extended funding pools, thereby narrowing the disparities among health insurance schemes in fund level and benefit package. Political commitments, institutional innovations, and a feasible implementation plan are the major elements needed for success in consolidation. Achievement of universal health coverage in China needs systemic strategies including consolidation of the social health insurance schemes. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. An improved anonymous authentication scheme for roaming in ubiquitous networks

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575

  16. Multi-area layered multicast scheme for MPLS networks

    Science.gov (United States)

    Ma, Yajie; Yang, Zongkai; Wang, Yuming; Chen, Jingwen

    2005-02-01

    Multi-protocol label switching (MPLS) is multiprotocols both at layer 2 and layer 3. It is suggested to overcome the shortcomings of performing complex longest prefix matching in layer 3 routing by using short, fixed length labels. The MPLS community has put more effort into the label switching of unicast IP traffic, but less in the MPLS multicast mechanism. The reasons are the higher label consumption, the dynamical mapping of L3 multicast tree to L2 LSPs and the 20-bit shim header which is much fewer than the IPv4 IP header. On the other hand, heterogeneity of node capability degrades total performance of a multicast group. In order to achieve the scalability as well as the heterogeneity in MPLS networks, a novel scheme of MPLS-based Multi-area Layered Multicast Scheme (MALM) is proposed. Unlike the existing schemes which focus on aggregating the multicast stream, we construct the multicast tree based on the virtual topology aggregation. The MPLS area is divided into different sub-areas to form the hierarchical virtual topology and the multicast group is reconstructed into multiple layers according to the node capability. At the same time, the label stack is used to save the label space. For stability of the MALM protocol, a multi-layer protection scheme is also discussed. The experiment results show that the proposed scheme saves label space and decrease the Multicast Forwarding Table in much degree.

  17. Support Schemes and Ownership Structures

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana

    , Denmark, France and Portugal. Another crucial aspect for the diffusion of the mCHP technology is possible ownership structures. These may range from full consumer ownership to ownership by utilities and energy service companies, which is discussed in Section 6. Finally, a conclusion (Section 7) wraps up......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... of support scheme simultaneously affects risk and technological development, which is the focus of Section 4. Subsequent to this conceptual overview, Section 5 takes a glance at the national application of support schemes for mCHP in practice, notably in the three country cases of the FC4Home project...

  18. [PICS: pharmaceutical inspection cooperation scheme].

    Science.gov (United States)

    Morénas, J

    2009-01-01

    The pharmaceutical inspection cooperation scheme (PICS) is a structure containing 34 participating authorities located worldwide (October 2008). It has been created in 1995 on the basis of the pharmaceutical inspection convention (PIC) settled by the European free trade association (EFTA) in1970. This scheme has different goals as to be an international recognised body in the field of good manufacturing practices (GMP), for training inspectors (by the way of an annual seminar and experts circles related notably to active pharmaceutical ingredients [API], quality risk management, computerized systems, useful for the writing of inspection's aide-memoires). PICS is also leading to high standards for GMP inspectorates (through regular crossed audits) and being a room for exchanges on technical matters between inspectors but also between inspectors and pharmaceutical industry.

  19. Project financing renewable energy schemes

    International Nuclear Information System (INIS)

    Brandler, A.

    1993-01-01

    The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)

  20. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    -in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators......At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular...

  1. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...

  2. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements...... classification inherited a lot of its structure from the existing system and rendered requirements that transcended the framework laid out by the existing system almost invisible. As a result, the requirements classification became a defining element of the requirements-engineering process, though its main...... effects remained largely implicit. The requirements classification contributed to constraining the requirements-engineering process by supporting the software engineers in maintaining some level of control over the process. This way, the requirements classification provided the software engineers...

  3. Cambridge community Optometry Glaucoma Scheme.

    Science.gov (United States)

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  4. New schemes for particle accelerators

    International Nuclear Information System (INIS)

    Nishida, Y.

    1985-01-01

    In the present paper, the authors propose new schemes for realizing the v/sub p/xB accelerator, by using no plasma system for producing the strong longitudinal waves. The first method is to use a grating for obtaining extended interaction of an electron beam moving along the grating surface with light beam incident also along the surface. Here, the light beam propagates obliquely to the grating grooves for producing strong electric field, and the electron beam propagates in parallel to the light beam. The static magnetic field is applied perpendicularly to the grating surface. In the present system, the beam interacts synchronously with the p-polarized wave which has the electric field be parallel to the grating surface. Another conventional scheme is to use a delay circuit. Here, the light beam propagates obliquely between a pair of array of conductor fins or slots. The phase velocity of the spatial harmonics in the y-direction (right angle to the array of slots) is slower than the speed of light. With the aid of powerful laser light or microwave source, it should be possible to miniaturise linacs by using the v/sub p/xB effect and schemes proposed here

  5. A Memory Efficient Network Encryption Scheme

    Science.gov (United States)

    El-Fotouh, Mohamed Abo; Diepold, Klaus

    In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.

  6. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  7. Protective role of allicin (diallyl thiosulfinate) on cell surface ...

    African Journals Online (AJOL)

    cell membranes. Glycoconjugates are released into the circulation through increased turnover, secretion, and/or shedding from ... present in medicinal plant possess protective effects [15]. ... The protein-bound hexose in plasma, erythrocyte.

  8. Selective condensation drives partitioning and sequential secretion of cyst wall proteins in differentiating Giardia lamblia.

    Directory of Open Access Journals (Sweden)

    Christian Konrad

    2010-04-01

    Full Text Available Controlled secretion of a protective extracellular matrix is required for transmission of the infective stage of a large number of protozoan and metazoan parasites. Differentiating trophozoites of the highly minimized protozoan parasite Giardia lamblia secrete the proteinaceous portion of the cyst wall material (CWM consisting of three paralogous cyst wall proteins (CWP1-3 via organelles termed encystation-specific vesicles (ESVs. Phylogenetic and molecular data indicate that Diplomonads have lost a classical Golgi during reductive evolution. However, neogenesis of ESVs in encysting Giardia trophozoites transiently provides basic Golgi functions by accumulating presorted CWM exported from the ER for maturation. Based on this "minimal Golgi" hypothesis we predicted maturation of ESVs to a trans Golgi-like stage, which would manifest as a sorting event before regulated secretion of the CWM. Here we show that proteolytic processing of pro-CWP2 in maturing ESVs coincides with partitioning of CWM into two fractions, which are sorted and secreted sequentially with different kinetics. This novel sorting function leads to rapid assembly of a structurally defined outer cyst wall, followed by slow secretion of the remaining components. Using live cell microscopy we find direct evidence for condensed core formation in maturing ESVs. Core formation suggests that a mechanism controlled by phase transitions of the CWM from fluid to condensed and back likely drives CWM partitioning and makes sorting and sequential secretion possible. Blocking of CWP2 processing by a protease inhibitor leads to mis-sorting of a CWP2 reporter. Nevertheless, partitioning and sequential secretion of two portions of the CWM are unaffected in these cells. Although these cysts have a normal appearance they are not water resistant and therefore not infective. Our findings suggest that sequential assembly is a basic architectural principle of protective wall formation and requires

  9. Proton pump inhibitors inhibit pancreatic secretion

    DEFF Research Database (Denmark)

    Wang, Jing; Barbuskaite, Dagne; Tozzi, Marco

    2015-01-01

    +/K+-ATPases are expressed and functional in human pancreatic ducts and whether proton pump inhibitors (PPIs) have effect on those. Here we show that the gastric HKα1 and HKβ subunits (ATP4A; ATP4B) and non-gastric HKα2 subunits (ATP12A) of H+/K+-ATPases are expressed in human pancreatic cells. Pumps have similar...... of major ions in secretion follow similar excretory curves in control and PPI treated animals. In addition to HCO3-, pancreas also secretes K+. In conclusion, this study calls for a revision of the basic model for HCO3- secretion. We propose that proton transport is driving secretion, and that in addition...

  10. Experimental Study on Gastric Juice Secretion by ...

    African Journals Online (AJOL)

    管理平台

    2012-05-29

    May 29, 2012 ... Study on stomach physiological functions by ... mechanism of regulating gastric electrical activity and gastric juice secretion might become true by the .... samples was used in comparism among these different groups.

  11. Applying secret sharing for HIS backup exchange.

    Science.gov (United States)

    Kuroda, Tomohiro; Kimura, Eizen; Matsumura, Yasushi; Yamashita, Yoshinori; Hiramatsu, Haruhiko; Kume, Naoto; Sato, Atsushi

    2013-01-01

    To secure business continuity is indispensable for hospitals to fulfill its social responsibility under disasters. Although to back up the data of the hospital information system (HIS) at multiple remote sites is a key strategy of business continuity plan (BCP), the requirements to treat privacy sensitive data jack up the cost for the backup. The secret sharing is a method to split an original secret message up so that each individual piece is meaningless, but putting sufficient number of pieces together to reveal the original message. The secret sharing method eases us to exchange HIS backups between multiple hospitals. This paper evaluated the feasibility of the commercial secret sharing solution for HIS backup through several simulations. The result shows that the commercial solution is feasible to realize reasonable HIS backup exchange platform when template of contract between participating hospitals is ready.

  12. EPCRA Trade Secret Form Instructions (PDF)

    Science.gov (United States)

    Detail on what information is required for each section of the form. Only the specific chemical identity required to be disclosed in EPCRA sections 303, 311,312, and 313 submissions may be claimed trade secret on the EPCRA report.

  13. (LH) secretion in fasted prepubertal ewes

    African Journals Online (AJOL)

    DR. NJ TONUKARI

    2012-01-10

    Jan 10, 2012 ... decreased luteinizing hormone (LH) secretion in fasted prepubertal ewes .... kisspeptin-10 injection could restore the baseline levels of. LH changed by ..... Terasawa E (2005). Role of GABA in the mechanism of the onset of.

  14. Regulation of glucagon secretion by incretins

    DEFF Research Database (Denmark)

    Holst, Jens Juul; Christensen, M; Lund, A

    2011-01-01

    Glucagon secretion plays an essential role in the regulation of hepatic glucose production, and elevated fasting and postprandial plasma glucagon concentrations in patients with type 2 diabetes (T2DM) contribute to their hyperglycaemia. The reason for the hyperglucagonaemia is unclear, but recent...... studies have shown lack of suppression after oral but preserved suppression after isoglycaemic intravenous glucose, pointing to factors from the gut. Gastrointestinal hormones that are secreted in response to oral glucose include glucagon-like peptide-1 (GLP-1) that strongly inhibits glucagon secretion......, and GLP-2 and GIP, both of which stimulate secretion. When the three hormones are given together on top of isoglycaemic intravenous glucose, glucagon suppression is delayed in a manner similar to that observed after oral glucose. Studies with the GLP-1 receptor antagonist, exendin 9-39, suggest...

  15. Cortisol secretion in patients with normoprolactinemic amenorrhea

    DEFF Research Database (Denmark)

    Boesgaard, S; Hagen, C; Andersen, A N

    1988-01-01

    with normoprolactinemic amenorrhea have elevated basal serum cortisol, the reason probably being hypersecretion of corticotropin-releasing hormone. Secondly that dopaminergic blockade with metoclopramide stimulates ACTH and cortisol secretion in patients presumed to have raised dopaminergic activity....

  16. Cell Secretion: Current Structural and Biochemical Insights

    Directory of Open Access Journals (Sweden)

    Saurabh Trikha

    2010-01-01

    Full Text Available Essential physiological functions in eukaryotic cells, such as release of hormones and digestive enzymes, neurotransmission, and intercellular signaling, are all achieved by cell secretion. In regulated (calcium-dependent secretion, membrane-bound secretory vesicles dock and transiently fuse with specialized, permanent, plasma membrane structures, called porosomes or fusion pores. Porosomes are supramolecular, cup-shaped lipoprotein structures at the cell plasma membrane that mediate and control the release of vesicle cargo to the outside of the cell. The sizes of porosomes range from 150nm in diameter in acinar cells of the exocrine pancreas to 12nm in neurons. In recent years, significant progress has been made in our understanding of the porosome and the cellular activities required for cell secretion, such as membrane fusion and swelling of secretory vesicles. The discovery of the porosome complex and the molecular mechanism of cell secretion are summarized in this article.

  17. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  18. Cholecystokinin inhibits gastrin secretion independently of paracrine somatostatin secretion in the pig

    DEFF Research Database (Denmark)

    Schmidt, P T; Hansen, L; Hilsted, L

    2004-01-01

    BACKGROUND: Cholecystokinin inhibits the secretion of gastrin from antral G cells, an effect that is speculated to be mediated by D cells secreting somatostatin. The aim of the study was to test directly whether cholecystokinin inhibition of antral gastrin secretion is mediated by somatostatin....... METHODS: The effects of CCK on gastrin and somatostatin secretion were studied in isolated vascularly perfused preparations of pig antrum before and after immunoneutralization brought about by infusion of large amounts of a high affinity monoclonal antibody against somatostatin. RESULTS: CCK infusion...... at 10(-9) M and 10(-8) M decreased gastrin output to 70.5% +/- 7.6% (n = 8) and 76.3% +/- 3.6% (n = 7) of basal output, respectively. CCK at 10(-10) M had no effect (n = 6). Somatostatin secretion was dose-dependently increased by CCK infusion and increased to 268 +/- 38.2% (n = 7) of basal secretion...

  19. Three-party quantum secret sharing of secure direct communication based on χ-type entangled states

    International Nuclear Information System (INIS)

    Yu-Guang, Yang; Wei-Feng, Cao; Qiao-Yan, Wen

    2010-01-01

    Based on χ-type entangled states and the two-step protocol [Deng F G, Long G L and Liu X S 2003 Phys. Rev. A 68 042317], a quantum secret sharing protocol of secure direct communication based on χ-type entangled states |χ 00 ) 3214 is proposed. Using some interesting entanglement properties of this state, the agent entirety can directly obtain the secret message from the message sender only if they collaborate together. The security of the scheme is also discussed. (general)

  20. Matryoshka: Hiding Secret Communication in Plain Sight

    OpenAIRE

    Safaka, Iris; Fragouli, Christina; Argyraki, Katerina

    2016-01-01

    We want to enable a pair of communicating users to exchange secret messages while hiding the fact that secret communication is taking place. We propose a linguistic steganography approach, where each human message is hidden in another human-like message. A hard open question is how to keep the steganographic message small -- existing related tools tend to blow up its size, thereby revealing the use of steganography. We encrypt by compressing each message, mapping it to a plausible sequence of...

  1. Peptides and neurotransmitters that affect renin secretion

    Science.gov (United States)

    Ganong, W. F.; Porter, J. P.; Bahnson, T. D.; Said, S. I.

    1984-01-01

    Substance P inhibits renin secretion. This polypeptide is a transmitter in primary afferent neurons and is released from the peripheral as well as the central portions of these neurons. It is present in afferent nerves from the kidneys. Neuropeptide Y, which is a cotransmitter with norepinephrine and epinephrine, is found in sympathetic neurons that are closely associated with and presumably innervate the juxtagolmerular cells. Its effect on renin secretion is unknown, but it produces renal vasoconstriction and natriuresis. Vasoactive intestinal polypeptide (VIP) is a cotransmitter with acetylocholine in cholinergic neurons, and this polypeptide stimulates renin secretion. We cannot find any evidence for its occurence in neurons in the kidneys, but various stimuli increase plasma VIP to levels comparable to those produced by doses of exogenous VIP which stimulated renin secretion. Neostigmine increases plasma VIP and plasma renin activity, and the VIP appears to be responsible for the increase in renin secretion, since the increase is not blocked by renal denervation or propranolol. Stimulation of various areas in the brain produces sympathetically mediated increases in plasma renin activity associated with increases in blood pressure. However, there is pharmacological evidence that the renin response can be separated from the blood pressure response. In anaesthetized dogs, drugs that increase central serotonergic discharge increase renin secretion without increasing blood pressure. In rats, activation of sertonergic neurons in the dorsal raphe nucleus increases renin secretion by a pathway that projects from this nucleus to the ventral hypothalamus, and from there to the kidneys via the sympathetic nervous system. The serotonin releasing drug parachloramphetamine also increases plasma VIP, but VIP does not appear to be the primary mediator of the renin response. There is preliminary evidence that the serotonergic neurons in the dorsal raphe nucleus are part of the

  2. Percolation of secret correlations in a network

    OpenAIRE

    Leverrier, Anthony; García-Patrón, Raúl

    2011-01-01

    In this work, we explore the analogy between entanglement and secret classical correlations in the context of large networks, more precisely the question of percolation of secret correlations in a network. It is known that entanglement percolation in quantum networks can display a highly nontrivial behavior depending on the topology of the network and on the presence of entanglement between the nodes. Here we show that this behavior, thought to be of a genuine quantum nature, also occurs in a...

  3. Percolation of secret correlations in a network

    Energy Technology Data Exchange (ETDEWEB)

    Leverrier, Anthony; Garcia-Patron, Raul [ICFO-Institut de Ciencies Fotoniques, 08860 Castelldefels (Barcelona) (Spain); Research Laboratory of Electronics, MIT, Cambridge, MA 02139 (United States) and Max-Planck Institut fur Quantenoptik, Hans-Kopfermann Str. 1, D-85748 Garching (Germany)

    2011-09-15

    In this work, we explore the analogy between entanglement and secret classical correlations in the context of large networks--more precisely, the question of percolation of secret correlations in a network. It is known that entanglement percolation in quantum networks can display a highly nontrivial behavior depending on the topology of the network and on the presence of entanglement between the nodes. Here we show that this behavior, thought to be of a genuine quantum nature, also occurs in a classical context.

  4. Percolation of secret correlations in a network

    International Nuclear Information System (INIS)

    Leverrier, Anthony; Garcia-Patron, Raul

    2011-01-01

    In this work, we explore the analogy between entanglement and secret classical correlations in the context of large networks--more precisely, the question of percolation of secret correlations in a network. It is known that entanglement percolation in quantum networks can display a highly nontrivial behavior depending on the topology of the network and on the presence of entanglement between the nodes. Here we show that this behavior, thought to be of a genuine quantum nature, also occurs in a classical context.

  5. Pituitary-hormone secretion by thyrotropinomas

    OpenAIRE

    Roelfsema, Ferdinand; Kok, Simon; Kok, Petra; Pereira, Alberto M.; Biermasz, Nienke R.; Smit, Jan W.; Frolich, Marijke; Keenan, Daniel M.; Veldhuis, Johannes D.; Romijn, Johannes A.

    2008-01-01

    Hormone secretion by somatotropinomas, corticotropinomas and prolactinomas exhibits increased pulse frequency, basal and pulsatile secretion, accompanied by greater disorderliness. Increased concentrations of growth hormone (GH) or prolactin (PRL) are observed in about 30% of thyrotropinomas leading to acromegaly or disturbed sexual functions beyond thyrotropin (TSH)-induced hyperthyroidism. Regulation of non-TSH pituitary hormones in this context is not well understood. We there therefore ev...

  6. An unexpected knock on Corrigan's secret door.

    Science.gov (United States)

    Woywodt, Alexander

    2010-10-01

    Corrigan's secret door describes a metaphorical escape route for busy physicians. The term was derived from the successful and exceptionally busy professional life of Irish physician Dominic John Corrigan (1802-80). It is claimed that Corrigan's outpatient clinic was so busy that he required a secret door in his consulting rooms to escape from the ever-growing queue of eager patients. The origins of this charming story are unknown, and the door may have never existed. However, at present, Corrigan's secret door is often quoted when busy physicians have their own little ways in surviving a stressful professional life. Generations of British-trained doctors have grown up with Corrigan's secret door, as it was featured in the introduction of the Oxford Handbook of Clinical Medicine. Accordingly, trainees as well as more senior doctors are often reminded that having a 'secret door' is vital in surviving in the medical profession. My own escape is through classical music and the violoncello, in particular. As the name implies, my own secret door is normally invisible to colleagues and patients. This little article is about a patient who found me out, and a reflection on the role of classical music and the cello in my professional life.

  7. Ozone: The secret greenhouse gas

    International Nuclear Information System (INIS)

    Berntsen, Terje; Tjernshaugen, Andreas

    2001-01-01

    The atmospheric ozone not only protects against harmful ultraviolet radiation; it also contributes to the greenhouse effect. Ozone is one of the jokers to make it difficult to calculate the climatic effect of anthropogenic emissions. The greenhouse effect and the ozone layer should not be confused. The greenhouse effect creates problems when it becomes enhanced, so that the earth becomes warmer. The problem with the ozone layer, on the contrary, is that it becomes thinner and so more of the harmful ultraviolet radiation gets through to the earth. However, ozone is also a greenhouse gas and so the greenhouse effect and the ozone layer are connected

  8. Cryptanalysis of a chaotic communication scheme using adaptive observer.

    Science.gov (United States)

    Liu, Ying; Tang, Wallace K S

    2008-12-01

    This paper addresses the cryptanalysis of a secure communication scheme recently proposed by Wu [Chaos 16, 043118 (2006)], where the information signal is modulated into a system parameter of a unified chaotic system. With the Kerckhoff principle, assuming that the structure of the cryptosystem is known, an adaptive observer can be designed to synchronize the targeted system, so that the transmitted information and the user-specific parameters are obtained. The success of adaptive synchronization is mathematically proved with the use of Lyapunov stability theory, based on the original assumption, i.e., the dynamical evolution of the information signal is available. A more practical case, but yet much more difficult, is also considered. As demonstrated with simulations, generalized synchronization is still possible, even if the derivative of the information signal is kept secret. Hence, the message can be coarsely estimated, making the security of the considered system questionable.

  9. Decoupling schemes for the SSC Collider

    International Nuclear Information System (INIS)

    Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.

    1993-05-01

    A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper

  10. Renormalization scheme-invariant perturbation theory

    International Nuclear Information System (INIS)

    Dhar, A.

    1983-01-01

    A complete solution to the problem of the renormalization scheme dependence of perturbative approximants to physical quantities is presented. An equation is derived which determines any physical quantity implicitly as a function of only scheme independent variables. (orig.)

  11. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  12. Quantum dual signature scheme based on coherent states with entanglement swapping

    International Nuclear Information System (INIS)

    Liu Jia-Li; Shi Rong-Hua; Shi Jin-Jing; Lv Ge-Li; Guo Ying

    2016-01-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. (paper)

  13. Quantum dual signature scheme based on coherent states with entanglement swapping

    Science.gov (United States)

    Liu, Jia-Li; Shi, Rong-Hua; Shi, Jin-Jing; Lv, Ge-Li; Guo, Ying

    2016-08-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519) and the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012).

  14. Commercial secret as an instrument of company competitive strategy effectiveness increase

    Directory of Open Access Journals (Sweden)

    Peskova Dinara

    2017-01-01

    Full Text Available Modern companies are very much diversified in scale, sectoral affiliation, marketing behavior. There are many theoretical and applied studies in effective competitiveness strategies (see Porter, M. (2002, 1998, Kramer, M. (1998, Fatkhutdinov, R. A. (2000, Feigelson, V. M. (1996 and others.They present famous approaches and probably there is no need to repeat them in this article. We would like to feature a different concept (suggested by Yudanov A. and followers with terminology adopted from natural sciences and show the way the commercial secret can increase effectiveness of competitiveness strategy. We also perform valid methods of commercial secret protection.

  15. A Power System Emergency Control Scheme in the Presence of High Wind Power Penetration

    DEFF Research Database (Denmark)

    Hoseinzadeh, Bakhtyar

    developed in this project may also constitute the lower level of a hierarchical control strategy, which can be activated in case of losing the communication with the control center. Modern power protection relays often provide several protection schemes inside of one common package. However, they normally...... from distant units to the incidence place. In this thesis, localization of both load-frequency control an load shedding are fulfilled using locally measured voltage drop data in the decentralized control strategy. The proposed load shedding scheme is coordinated with existing plant protection relays......, which are normally installed on the conventional synchronous machines. Considering the frequency-time characteristic of plant protection relays in the load curtailing plan makes the proposed scheme preventive against successive outage of generation units by them, which worsen the stability of power...

  16. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  17. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  18. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks.

    Science.gov (United States)

    Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun

    2017-12-08

    Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie-Hellman problem.

  19. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks

    Science.gov (United States)

    Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun

    2017-01-01

    Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem. PMID:29292792

  20. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yousheng Zhou

    2017-12-01

    Full Text Available Vehicle sensor networks (VSNs are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem.