WorldWideScience

Sample records for signatures revised extended

  1. Anisotropy signature in reverse-time migration extended images

    KAUST Repository

    Sava, Paul C.; Alkhalifah, Tariq Ali

    2014-01-01

    Reverse-time migration can accurately image complex geologic structures in anisotropic media. Extended images at selected locations in the Earth, i.e., at common-image-point gathers, carry rich information to characterize the angle-dependent illumination and to provide measurements for migration velocity analysis. However, characterizing the anisotropy influence on such extended images is a challenge. Extended common-image-point gathers are cheap to evaluate since they sample the image at sparse locations indicated by the presence of strong reflectors. Such gathers are also sensitive to velocity error that manifests itself through moveout as a function of space and time lags. Furthermore, inaccurate anisotropy leaves a distinctive signature in common-image-point gathers, which can be used to evaluate anisotropy through techniques similar to the ones used in conventional wavefield tomography. It specifically admits a V-shaped residual moveout with the slope of the "V" flanks depending on the anisotropic parameter η regardless of the complexity of the velocity model. It reflects the fourth-order nature of the anisotropy influence on moveout as it manifests itself in this distinct signature in extended images after handling the velocity properly in the imaging process. Synthetic and real data observations support this assertion.

  2. Anisotropy signature in reverse-time migration extended images

    KAUST Repository

    Sava, Paul C.

    2014-11-04

    Reverse-time migration can accurately image complex geologic structures in anisotropic media. Extended images at selected locations in the Earth, i.e., at common-image-point gathers, carry rich information to characterize the angle-dependent illumination and to provide measurements for migration velocity analysis. However, characterizing the anisotropy influence on such extended images is a challenge. Extended common-image-point gathers are cheap to evaluate since they sample the image at sparse locations indicated by the presence of strong reflectors. Such gathers are also sensitive to velocity error that manifests itself through moveout as a function of space and time lags. Furthermore, inaccurate anisotropy leaves a distinctive signature in common-image-point gathers, which can be used to evaluate anisotropy through techniques similar to the ones used in conventional wavefield tomography. It specifically admits a V-shaped residual moveout with the slope of the "V" flanks depending on the anisotropic parameter η regardless of the complexity of the velocity model. It reflects the fourth-order nature of the anisotropy influence on moveout as it manifests itself in this distinct signature in extended images after handling the velocity properly in the imaging process. Synthetic and real data observations support this assertion.

  3. Methods of extending crop signatures from one area to another

    Science.gov (United States)

    Minter, T. C. (Principal Investigator)

    1979-01-01

    Efforts to develop a technology for signature extension during LACIE phases 1 and 2 are described. A number of haze and Sun angle correction procedures were developed and tested. These included the ROOSTER and OSCAR cluster-matching algorithms and their modifications, the MLEST and UHMLE maximum likelihood estimation procedures, and the ATCOR procedure. All these algorithms were tested on simulated data and consecutive-day LANDSAT imagery. The ATCOR, OSCAR, and MLEST algorithms were also tested for their capability to geographically extend signatures using LANDSAT imagery.

  4. Signatures of Extended Storage of Used Nuclear Fuel Comprehensive Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Rauch, Eric Benton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-09-21

    This report serves as a comprehensive overview of the Extended Storage of Used Nuclear Fuel work performed for the Material Protection, Accounting and Control Technologies campaign under the Department of Energy Office of Nuclear Energy. This paper describes a signature based on the source and fissile material distribution found within a population of used fuel assemblies combined with the neutron absorbers found within cask design that is unique to a specific cask with its specific arrangement of fuel. The paper describes all the steps used in producing and analyzing this signature from the beginning to the project end.

  5. Anisotropy signature in extended images from reverse-time migration

    KAUST Repository

    Sava, Paul

    2012-11-04

    Reverse-time migration can accurately image complex geologic structures in anisotropic media. Extended images at selected locations in the earth, i.e. at common-image-point gathers (CIPs), carry enough information to characterize the angle-dependent illumination and to provide measurements for migration velocity analysis. Furthermore, inaccurate anisotropy leaves a distinctive signature in CIPs, which can be used to evaluate anisotropy through techniques similar to the ones used in conventional wavefield tomography.

  6. Anisotropy signature in extended images from reverse-time migration

    KAUST Repository

    Sava, Paul; Alkhalifah, Tariq Ali

    2012-01-01

    Reverse-time migration can accurately image complex geologic structures in anisotropic media. Extended images at selected locations in the earth, i.e. at common-image-point gathers (CIPs), carry enough information to characterize the angle-dependent illumination and to provide measurements for migration velocity analysis. Furthermore, inaccurate anisotropy leaves a distinctive signature in CIPs, which can be used to evaluate anisotropy through techniques similar to the ones used in conventional wavefield tomography.

  7. A revised 3-column classification approach for the surgical planning of extended lateral tibial plateau fractures.

    Science.gov (United States)

    Hoekstra, H; Kempenaers, K; Nijs, S

    2017-10-01

    Variable angle locking compression plates allow for lateral buttress and support of the posterolateral joint surface of tibial plateau fractures. This gives room for improvement of the surgical 3-column classification approach. Our aim was to revise and validate the 3-column classification approach to better guide the surgical planning of tibial plateau fractures extending into the posterolateral corner. In contrast to the 3-column classification approach, in the revised approach the posterior border of the lateral column in the revised approach lies posterior instead of anterior of the fibula. According to the revised 3-column classification approach, extended lateral column fractures are defined as single lateral column fractures extending posteriorly into the posterolateral corner. CT-images of 36 patients were reviewed and classified twice online according to Schatzker and revised 3-column classification approach by five observers. The intraobserver reliability was calculated using the Cohen's kappa and the interobserver reliability was calculated using the Fleiss' kappa. The intraobserver reliability showed substantial agreement according to Landis and Koch for both Schatzker and the revised 3-column classification approach (0.746 vs. 0.782 p = 0.37, Schatzker vs. revised 3-column, respectively). However, the interobserver reliability of the revised 3-column classification approach was significantly higher as compared to the Schatzker classification (0.531 vs. 0.669 p column, respectively). With the introduction of variable angle locking compression plates, the revised 3-column classification approach is a very helpful tool in the preoperative surgical planning of tibial plateau fractures, in particular, lateral column fractures that extend into the posterolateral corner. The revised 3-column classification approach is rather a practical supplement to the Schatzker classification. It has a significantly higher interobserver reliability as compared to the

  8. Revised and extended analysis of trebly ionized bromine: Br IV

    International Nuclear Information System (INIS)

    Tauheed, A; Jabeen, S; Joshi, Y N

    2008-01-01

    The spectrum of Br IV has been studied in the wavelength region 320-1290 A based on the recordings made on a 3-m normal incidence spectrograph at Antigonish Laboratory and on a 6.65-m grazing incidence spectrograph at Zeeman Laboratory, Amsterdam.The light sources used were a triggered spark and sliding spark, respectively. The 4s 2 4p 2 -[4s4p 3 +4s 2 4p (4d+5d+6d+5s+6s+7s)] transition array has been investigated using Hartree-Fock (HF) and least squares fitting (LSF) parametric calculations. Previous analysis has been revised and extended considerably. A value of 1 S 0 level of the ground configuration 4s 2 4p 2 has been found at 33575.5 cm -1 . One hundred and forty-two lines have been classified in this spectrum to establish 61 energy levels out of which 43 are new. The wavelength accuracy of our measurements for sharp lines is ±0.005 A. A revised value of the ionization potential of Br IV has been found to be 385 400±250 cm -1 (47.77±0.03 eV).

  9. Extending the similarity-based XML multicast approach with digital signatures

    DEFF Research Database (Denmark)

    Azzini, Antonia; Marrara, Stefania; Jensen, Meiko

    2009-01-01

    This paper investigates the interplay between similarity-based SOAP message aggregation and digital signature application. An overview on the approaches resulting from the different orders for the tasks of signature application, verification, similarity aggregation and splitting is provided....... Depending on the intersection between similarity-aggregated and signed SOAP message parts, the paper discusses three different cases of signature application, and sketches their applicability and performance implications....

  10. Real Traceable Signatures

    Science.gov (United States)

    Chow, Sherman S. M.

    Traceable signature scheme extends a group signature scheme with an enhanced anonymity management mechanism. The group manager can compute a tracing trapdoor which enables anyone to test if a signature is signed by a given misbehaving user, while the only way to do so for group signatures requires revealing the signer of all signatures. Nevertheless, it is not tracing in a strict sense. For all existing schemes, T tracing agents need to recollect all N' signatures ever produced and perform RN' “checks” for R revoked users. This involves a high volume of transfer and computations. Increasing T increases the degree of parallelism for tracing but also the probability of “missing” some signatures in case some of the agents are dishonest.

  11. 75 FR 14633 - Notice of Intent To Seek Approval To Extend and Revise a Current Information Collection

    Science.gov (United States)

    2010-03-26

    ... Expenditures and are available electronically on the World Wide Web. The survey is a fully automated Web data... NATIONAL SCIENCE FOUNDATION Notice of Intent To Seek Approval To Extend and Revise a Current Information Collection AGENCY: National Science Foundation. ACTION: Notice and request for comments. SUMMARY...

  12. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  13. Signatures of Extended Storage of Used Nuclear Fuel in Casks

    Energy Technology Data Exchange (ETDEWEB)

    Rauch, Eric Benton [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-09-28

    As the amount of used nuclear fuel continues to grow, more and more used nuclear fuel will be transferred to storage casks. A consolidated storage facility is currently in the planning stages for storing these casks, where at least 10,000 MTHM of fuel will be stored. This site will have potentially thousands of casks once it is operational. A facility this large presents new safeguards and nuclear material accounting concerns. A new signature based on the distribution of neutron sources and multiplication within casks was part of the Department of Energy Office of Nuclear Energy’s Material Protection, Account and Control Technologies (MPACT) campaign. Under this project we looked at fingerprinting each cask's neutron signature. Each cask has a unique set of fuel, with a unique spread of initial enrichment, burnup, cooling time, and power history. The unique set of fuel creates a unique signature of neutron intensity based on the arrangement of the assemblies. The unique arrangement of neutron sources and multiplication produces a reliable and unique identification of the cask that has been shown to be relatively constant over long time periods. The work presented here could be used to restore from a loss of continuity of knowledge at the storage site. This presentation will show the steps used to simulate and form this signature from the start of the effort through its conclusion in September 2016.

  14. Radar Signature Calculation Facility

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: The calculation, analysis, and visualization of the spatially extended radar signatures of complex objects such as ships in a sea multipath environment and...

  15. Molecular signatures database (MSigDB) 3.0.

    Science.gov (United States)

    Liberzon, Arthur; Subramanian, Aravind; Pinchback, Reid; Thorvaldsdóttir, Helga; Tamayo, Pablo; Mesirov, Jill P

    2011-06-15

    Well-annotated gene sets representing the universe of the biological processes are critical for meaningful and insightful interpretation of large-scale genomic data. The Molecular Signatures Database (MSigDB) is one of the most widely used repositories of such sets. We report the availability of a new version of the database, MSigDB 3.0, with over 6700 gene sets, a complete revision of the collection of canonical pathways and experimental signatures from publications, enhanced annotations and upgrades to the web site. MSigDB is freely available for non-commercial use at http://www.broadinstitute.org/msigdb.

  16. Retail applications of signature verification

    Science.gov (United States)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  17. Signature Pedagogy/Powerful Pedagogy: The Oxford Tutorial System in the Humanities

    Science.gov (United States)

    Horn, Julia

    2013-01-01

    Lee Shulman's concept of signature pedagogies in the professions has captured the imagination of many researchers and educators. In higher education, the concept has been extended to teaching in particular disciplines, and it is here argued that the concept of signature pedagogy can be usefully extended to an influential teaching system in the…

  18. An in-vitro biomechanical study of different fixation techniques for the extended trochanteric osteotomy in revision THA.

    Science.gov (United States)

    Zhu, Zhonglin; Ding, Hui; Shao, Hongyi; Zhou, Yixin; Wang, Guangzhi

    2013-04-09

    The wire fixation and the cable grip fixation have been developed for the extended trochanteric osteotomy (ETO) in the revision of total hip arthroplasty (THA). Many studies reported the postoperative performance of the patients, but with little quantitative biomechanical comparison of the two fixation systems. An in-vitro testing approach was designed to record the loosening between the femoral bed and the greater trochanter after fixations. Ten cadaveric femurs were chosen in this study. Each femur underwent the THA, revision by ETO and fixations. The tension to the greater trochanter was from 0 to 500N in vertical and lateral direction, respectively. The translation and rotation of the greater trochanter with respect to the bony bed were captured by an optical tracking system. In the vertical tension tests, the overall translation of the greater trochanter was observed 0.4 mm in the cable fixations and 7.0 mm in the wire fixations. In the lateral tension tests, the overall motion of the greater trochanter was 2.0 mm and 1.2° in the cable fixations, while it was 6.2 mm and 5.3° in the wire fixations. The result was significantly different between the two fixation systems. The stability of the proximal femur after ETO using different fixations in the revision THA was investigated. The cable grip fixation was significantly more stable than the wire fixation.

  19. Selective forgery of RSA signatures with fixed-pattern padding

    NARCIS (Netherlands)

    Lenstra, A.K.; Shparlinski, I.E.; Naccache, D.; Paillier, P.

    2002-01-01

    We present a practical selective forgery attack against RSA signatures with fixed-pattern padding shorter than two thirds of the modulus length. Our result extends the practical existential forgery of such RSA signatures that was presented at Crypto 2001. For an n-bit modulus the heuristic

  20. Quantum signature in heavy-ion pion production

    International Nuclear Information System (INIS)

    Buvel, R.L.

    1985-01-01

    A revised model for pion production in heavy-ion peripheral collisions is presented. The pion-production mechanism investigated here is a two step process involving the formation and subsequent decay of an isobar resonance in the projectile nucleus. The independent-particle shell model with harmonic oscillator states is used to approximate the internal structure of the nucleus. The inclusion of the internal structure of the projectile nucleus led to the discovery of a quantum signature in the pion-production differential cross section. The quantum signature involves a matching condition where the pion-production differential cross section goes to zero for a particular value of the pion kinetic energy. The theory is compared to a recent experiment, but the results of this comparison are inconclusive

  1. Revising and editing for translators

    CERN Document Server

    Mossop, Brian

    2014-01-01

    Revising and Editing for Translators provides guidance and learning materials for translation students learning to edit texts written by others, and professional translators wishing to improve their self-revision ability or learning to revise the work of others. Editing is understood as making corrections and improvements to texts, with particular attention to tailoring them to the given readership. Revising is this same task applied to draft translations. The linguistic work of editors and revisers is related to the professional situations in which they work. Mossop offers in-depth coverage of a wide range of topics, including copyediting, style editing, structural editing, checking for consistency, revising procedures and principles, and translation quality assessment. This third edition provides extended coverage of computer aids for revisers, and of the different degrees of revision suited to different texts. The inclusion of suggested activities and exercises, numerous real-world examples, a proposed gra...

  2. Incorporating X–ray summing into gamma–gamma signature quantification

    International Nuclear Information System (INIS)

    Britton, R.; Jackson, M.J.; Davies, A.V.

    2016-01-01

    A method for quantifying coincidence signatures has been extended to incorporate the effects of X–ray summing, and tested using a high–efficiency γ–γ system. An X–ray library has been created, allowing all possible γ, X–ray and conversion electron cascades to be generated. The equations for calculating efficiency and cascade summing corrected coincidence signature probabilities have also been extended from a two γ, two detector ‘special case’ to an arbitrarily large system. The coincidence library generated is fully searchable by energy, nuclide, coincidence pair, γ multiplicity, cascade probability and the half–life of the cascade, allowing the user to quickly identify coincidence signatures of interest. The method and software described is inherently flexible, as it only requires evaluated nuclear data, an X–ray library, and accurate efficiency characterisations to quickly and easily calculate coincidence signature probabilities for a variety of systems. Additional uses for the software include the fast identification of γ coincidence signals with required multiplicities and branching ratios, identification of the optimal coincidence signatures to measure for a particular system, and the calculation of cascade summing corrections for single detector systems. - Highlights: • Method for incorporating X-ray summing into coincidence measurements developed. • Calculation routines have been extended to an arbitrarily large detector system, and re-written to take advantage of multiple computing cores. • Data collected in list-mode with all events timestamped for offline coincidence analysis. • Coincidence analysis of environmental samples will dramatically improve the detection sensitivity achievable.

  3. Revocable identity-based proxy re-signature against signing key exposure.

    Science.gov (United States)

    Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.

  4. Supernovae with two peaks in the optical light curve and the signature of progenitors with low-mass extended envelopes

    Energy Technology Data Exchange (ETDEWEB)

    Nakar, Ehud [Raymond and Beverly Sackler School of Physics and Astronomy, Tel Aviv University, Tel Aviv 69978 (Israel); Piro, Anthony L. [Theoretical Astrophysics, California Institute of Technology, 1200 East California Boulevard, M/C 350-17, Pasadena, CA 91125 (United States)

    2014-06-20

    Early observations of supernova light curves are powerful tools for shedding light on the pre-explosion structures of their progenitors and their mass-loss histories just prior to explosion. Some core-collapse supernovae that are detected during the first days after the explosion prominently show two peaks in the optical bands, including the R and I bands, where the first peak appears to be powered by the cooling of shocked surface material and the second peak is clearly powered by radioactive decay. Such light curves have been explored in detail theoretically for SN 1993J and 2011dh, where it was found that they may be explained by progenitors with extended, low-mass envelopes. Here, we generalize these results. We first explore whether any double-peaked light curve of this type can be generated by a progenitor with a 'standard' density profile, such as a red supergiant or a Wolf-Rayet star. We show that a standard progenitor (1) cannot produce a double-peaked light curve in the R and I bands and (2) cannot exhibit a fast drop in the bolometric luminosity as is seen after the first peak. We then explore the signature of a progenitor with a compact core surrounded by extended, low-mass material. This may be a hydrostatic low-mass envelope or material ejected just prior to the explosion. We show that it naturally produces both of these features. We use this result to provide simple formulae to estimate (1) the mass of the extended material from the time of the first peak, (2) the extended material radius from the luminosity of the first peak, and (3) an upper limit on the core radius from the luminosity minimum between the two peaks.

  5. On Hunting Animals of the Biometric Menagerie for Online Signature.

    Directory of Open Access Journals (Sweden)

    Nesma Houmani

    Full Text Available Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  6. On Hunting Animals of the Biometric Menagerie for Online Signature.

    Science.gov (United States)

    Houmani, Nesma; Garcia-Salicetti, Sonia

    2016-01-01

    Individuals behave differently regarding to biometric authentication systems. This fact was formalized in the literature by the concept of Biometric Menagerie, defining and labeling user groups with animal names in order to reflect their characteristics with respect to biometric systems. This concept was illustrated for face, fingerprint, iris, and speech modalities. The present study extends the Biometric Menagerie to online signatures, by proposing a novel methodology that ties specific quality measures for signatures to categories of the Biometric Menagerie. Such measures are combined for retrieving automatically writer categories of the extended version of the Biometric Menagerie. Performance analysis with different types of classifiers shows the pertinence of our approach on the well-known MCYT-100 database.

  7. SOFIA: MQ-based signatures in the QROM

    NARCIS (Netherlands)

    Chen, Ming Shing; Hülsing, Andreas; Rijneveld, Joost; Samardjiska, Simona; Schwabe, Peter

    2018-01-01

    We propose SOFIA, the first MQ -based signature scheme provably secure in the quantum-accessible random oracle model (QROM). Our construction relies on an extended version of Unruh’s transform for 5-pass identification schemes that we describe and prove secure both in the ROM and QROM. Based on a

  8. Plan-Belief Revision in Jason

    DEFF Research Database (Denmark)

    Jensen, Andreas Schmidt; Villadsen, Jørgen

    2015-01-01

    When information is shared between agents of unknown reliability, it is possible that their belief bases become inconsistent. In such cases, the belief base must be revised to restore consistency, so that the agent is able to reason. In some cases the inconsistent information may be due to use of...... of incorrect plans. We extend work by Alechina et al. to revise belief bases in which plans can be dynamically added and removed. We present an implementation of the algorithm in the AgentSpeak implementation Jason....

  9. Arbitrated Quantum Signature with Hamiltonian Algorithm Based on Blind Quantum Computation

    Science.gov (United States)

    Shi, Ronghua; Ding, Wanting; Shi, Jinjing

    2018-03-01

    A novel arbitrated quantum signature (AQS) scheme is proposed motivated by the Hamiltonian algorithm (HA) and blind quantum computation (BQC). The generation and verification of signature algorithm is designed based on HA, which enables the scheme to rely less on computational complexity. It is unnecessary to recover original messages when verifying signatures since the blind quantum computation is applied, which can improve the simplicity and operability of our scheme. It is proved that the scheme can be deployed securely, and the extended AQS has some extensive applications in E-payment system, E-government, E-business, etc.

  10. The nuclear liability conventions revised

    International Nuclear Information System (INIS)

    Reyners, P.

    2004-01-01

    The signature on 12 February 2004 of the Protocols amending respectively the 1960 Paris Convention and the 1963 Brussels Supplementary Convention was the second step of the process of modernisation of the international nuclear liability regime after the adoption in September 1997 of a Protocol revising the 1963 Vienna Convention and of a new Convention on Supplementary Compensation for Nuclear Damage. The common objective of the new instruments is to provide more funds to compensate a larger number of potential victims in respect of a broader range of damage. Another goal of the revision exercise was to maintain the compatibility between the Paris and Vienna based systems, a commitment enshrined in the 1988 Joint Protocol, as well as to ascertain that Paris/Brussels countries could also become a Party to the Convention on Supplementary Compensation. However, while generally consistent vis a vis the Joint Protocol, the provisions of the Paris and Vienna Conventions, as revised, differ on some significant aspects. Another remaining issue is whether the improved international nuclear liability regime will succeed in attracting in the future a larger number of countries, particularly outside Europe, and will so become truly universal. Therefore, the need for international co-operation to address these issues, to facilitate the adoption of new implementing legislation and to ensure that this special regime keeps abreast of economic and technological developments, is in no way diminished after the revision of the Conventions.(author)

  11. LAVA: An Open-Source Approach To Designing LAMP (Loop-Mediated Isothermal Amplification DNA Signatures

    Directory of Open Access Journals (Sweden)

    Gardner Shea N

    2011-06-01

    Full Text Available Abstract Background We developed an extendable open-source Loop-mediated isothermal AMPlification (LAMP signature design program called LAVA (LAMP Assay Versatile Analysis. LAVA was created in response to limitations of existing LAMP signature programs. Results LAVA identifies combinations of six primer regions for basic LAMP signatures, or combinations of eight primer regions for LAMP signatures with loop primers, which can be used as LAMP signatures. The identified primers are conserved among target organism sequences. Primer combinations are optimized based on lengths, melting temperatures, and spacing among primer sites. We compare LAMP signature candidates for Staphylococcus aureus created both by LAVA and by PrimerExplorer. We also include signatures from a sample run targeting all strains of Mycobacterium tuberculosis. Conclusions We have designed and demonstrated new software for identifying signature candidates appropriate for LAMP assays. The software is available for download at http://lava-dna.googlecode.com/.

  12. An Efficient Identity-Based Proxy Blind Signature for Semioffline Services

    Directory of Open Access Journals (Sweden)

    Hongfei Zhu

    2018-01-01

    Full Text Available Fog computing extends the cloud computing to the network edge and allows deploying a new type of semioffline services, which can provide real-time transactions between two entities, while the central cloud server is offline and network edge devices are online. For an e-payment system and e-voting with such feature, proxy blind signature is a cornerstone to protect users’ privacy. However, the signature based on number theorem, such as hard mathematical problems on factoring problem, discrete logarithm problem, and bilinear pairings, cannot defeat quantum computers attack. Meanwhile, these schemes need to depend on complex public key infrastructure. Thus, we construct an identity-based proxy blind signature scheme based on number theorem research unit lattice, which can defeat quantum computers attack and does not need to depend on public key infrastructure. The security of the proposed scheme is dependent on Ring-Small Integer Solution problem over number theorem research unit lattice. The proposed scheme meets the properties of blind signature and proxy signature. Then we compare the proposed scheme with other existing proxy blind signature schemes; the result shows that the proposed scheme outperforms ZM scheme except in proxy signer’s signature size and can be more secure than TA scheme and MMHP scheme.

  13. Hyperspectral Imagery Target Detection Using Improved Anomaly Detection and Signature Matching Methods

    National Research Council Canada - National Science Library

    Smetek, Timothy E

    2007-01-01

    This research extends the field of hyperspectral target detection by developing autonomous anomaly detection and signature matching methodologies that reduce false alarms relative to existing benchmark detectors...

  14. Revised STandards for Reporting Interventions in Clinical Trials of Acupuncture (STRICTA): extending the CONSORT statement

    Science.gov (United States)

    MacPherson, Hugh; Altman, Douglas G; Hammerschlag, Richard; Li, Youping; Wu, Taixiang; White, Adrian; Moher, David

    2010-01-01

    The STandards for Reporting Interventions in Clinical Trials of Acupuncture (STRICTA) were published in five journals in 2001 and 2002. These guidelines, in the form of a checklist and explanations for use by authors and journal editors, were designed to improve reporting of acupuncture trials, particularly the interventions, thereby facilitating their interpretation and replication. Subsequent reviews of the application and impact of STRICTA have highlighted the value of STRICTA as well as scope for improvements and revision. To manage the revision process a collaboration between the STRICTA Group, the CONSORT Group and the Chinese Cochrane Centre was developed in 2008. An expert panel with 47 participants was convened that provided electronic feedback on a revised draft of the checklist. At a subsequent face-to-face meeting in Freiburg, a group of 21 participants further revised the STRICTA checklist and planned dissemination. The new STRICTA checklist, which is an official extension of CONSORT, includes 6 items and 17 subitems. These set out reporting guidelines for the acupuncture rationale, the details of needling, the treatment regimen, other components of treatment, the practitioner background and the control or comparator interventions. In addition, and as part of this revision process, the explanations for each item have been elaborated, and examples of good reporting for each item are provided. In addition, the word ‘controlled’ in STRICTA is replaced by ‘clinical’, to indicate that STRICTA is applicable to a broad range of clinical evaluation designs, including uncontrolled outcome studies and case reports. It is intended that the revised STRICTA checklist, in conjunction with both the main CONSORT statement and extension for non-pharmacological treatment, will raise the quality of reporting of clinical trials of acupuncture. PMID:20615861

  15. Searches for Electroweak Signatures of Supersymmetry at ATLAS and CMS

    CERN Document Server

    Khoo, Teng Jian; The ATLAS collaboration

    2018-01-01

    Searches for strongly-produced superparticles at the Large Hadron Collider have excluded gluinos and squarks of all generations up to the TeV scale. While limited by statistics, electroweak signatures remain less thoroughly explored, and in particular the Higgsino sector has proven challenging. Conventional searches for leptons associated with missing transverse momentum do not fully cover the phase space, requiring new approaches to extend experimental sensitivity. Dedicated reconstruction techniques address the challenge posed by mass-degenerate spectra. By looking beyond the assumption of leptonic signatures, searches for gauge-mediated supersymmetry have broken new ground.

  16. Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature

    Directory of Open Access Journals (Sweden)

    Tao Shang

    2018-04-01

    Full Text Available With the practical implementation of continuous-variable quantum cryptographic protocols, security problems resulting from measurement-device loopholes are being given increasing attention. At present, research on measurement-device independency analysis is limited in quantum key distribution protocols, while there exist different security problems for different protocols. Considering the importance of quantum digital signature in quantum cryptography, in this paper, we attempt to analyze the measurement-device independency of continuous-variable quantum digital signature, especially continuous-variable quantum homomorphic signature. Firstly, we calculate the upper bound of the error rate of a protocol. If it is negligible on condition that all measurement devices are untrusted, the protocol is deemed to be measurement-device-independent. Then, we simplify the calculation by using the characteristics of continuous variables and prove the measurement-device independency of the protocol according to the calculation result. In addition, the proposed analysis method can be extended to other quantum cryptographic protocols besides continuous-variable quantum homomorphic signature.

  17. Nuclear safety guide: TID--7016, Revision 2

    International Nuclear Information System (INIS)

    Thomas, J.T.

    1978-01-01

    The Nuclear Safety Guide was first issued in 1956 as classified AEC report LA-2063 and was reprinted the next year, unclassified, as TID-7016. Revision 1, published in 1961, extended the scope and refined the guiding information. Revision 2 of the Guide differs significantly from its predecessor in that the latter was intentionally conservative in its recommendations. Firmly based on experimental evidence of criticality, the original Guide and the first revision were considered to be of most value to organizations whose activities with fissionable materials were not extensive and, secondarily, that it would serve as a point of departure for members of established nuclear safety teams experienced in the field. The advance of calculational capability has permitted validated calculations to extend and substitute for experimental data. The broadened data base has enabled better interpolation, extension, and understanding of available information, especially in areas previously addressed by undefined but adequate factors of safety. The content has been thereby enriched in qualitative guidance. The information inherently contains, and the user can recapture, the quantitative guidance characteristic of the former Guides by employing appropriate safety factors

  18. Hyperspectral signature analysis of skin parameters

    Science.gov (United States)

    Vyas, Saurabh; Banerjee, Amit; Garza, Luis; Kang, Sewon; Burlina, Philippe

    2013-02-01

    The temporal analysis of changes in biological skin parameters, including melanosome concentration, collagen concentration and blood oxygenation, may serve as a valuable tool in diagnosing the progression of malignant skin cancers and in understanding the pathophysiology of cancerous tumors. Quantitative knowledge of these parameters can also be useful in applications such as wound assessment, and point-of-care diagnostics, amongst others. We propose an approach to estimate in vivo skin parameters using a forward computational model based on Kubelka-Munk theory and the Fresnel Equations. We use this model to map the skin parameters to their corresponding hyperspectral signature. We then use machine learning based regression to develop an inverse map from hyperspectral signatures to skin parameters. In particular, we employ support vector machine based regression to estimate the in vivo skin parameters given their corresponding hyperspectral signature. We build on our work from SPIE 2012, and validate our methodology on an in vivo dataset. This dataset consists of 241 signatures collected from in vivo hyperspectral imaging of patients of both genders and Caucasian, Asian and African American ethnicities. In addition, we also extend our methodology past the visible region and through the short-wave infrared region of the electromagnetic spectrum. We find promising results when comparing the estimated skin parameters to the ground truth, demonstrating good agreement with well-established physiological precepts. This methodology can have potential use in non-invasive skin anomaly detection and for developing minimally invasive pre-screening tools.

  19. Methods of extending signatures and training without ground information. [data processing, pattern recognition

    Science.gov (United States)

    Henderson, R. G.; Thomas, G. S.; Nalepka, R. F.

    1975-01-01

    Methods of performing signature extension, using LANDSAT-1 data, are explored. The emphasis is on improving the performance and cost-effectiveness of large area wheat surveys. Two methods were developed: ASC, and MASC. Two methods, Ratio, and RADIFF, previously used with aircraft data were adapted to and tested on LANDSAT-1 data. An investigation into the sources and nature of between scene data variations was included. Initial investigations into the selection of training fields without in situ ground truth were undertaken.

  20. Cambridge IGCSE mathematics core and extended

    CERN Document Server

    Pimentel, Ric

    2013-01-01

    The most cost effective and straightforward way to teach the revised syllabus, with all the core and extended content covered by a single book and accompanying free digital resources.  . This title has been written for the revised Cambridge IGCSE Mathematics (0580) syllabus, for first teaching from 2013.  . ·         Gives students the practice they require to deepen their understanding through plenty of questions. ·         Consolidates learning with unique digital resources on the CD, included free with every Student's Book.  . We are working with Cambridge International Examinations to gain

  1. Dualities and signatures of G++-invariant theories

    International Nuclear Information System (INIS)

    Buyl, Sophie de; Houart, Laurent; Tabti, Nassiba

    2005-01-01

    The G ++ -content of the formulation of gravity and M-theories as very-extended Kac-Moody invariant theories is further analysed. The different exotic phases of all the G ++ B -theories, which admit exact solutions describing intersecting branes smeared in all directions but one, are derived. This is achieved by analysing for all G ++ the signatures which are related to the conventional one (1,D-1) by 'dualities' generated by the Weyl reflections

  2. Signature-based User Authentication

    OpenAIRE

    Hámorník, Juraj

    2015-01-01

    This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Si...

  3. Arsenic complexes optical signatures in As-doped HgCdTe

    Energy Technology Data Exchange (ETDEWEB)

    Gemain, F.; Robin, I. C.; Brochen, S.; Ballet, P.; Gravrand, O.; Feuillet, G. [CEA-LETI Minatec Campus, 17 rue des Martyrs, 38000 Grenoble (France)

    2013-04-08

    In this paper, the optical signatures of arsenic complexes in As-doped HgCdTe samples grown by molecular beam epitaxy are clearly identified using comparison between photoluminescence spectra, Extended X-Ray Absorption Fine Structure, and Hall measurements. The ionization energies of the different complexes are measured both by photoluminescence and Hall measurements.

  4. Arsenic complexes optical signatures in As-doped HgCdTe

    International Nuclear Information System (INIS)

    Gemain, F.; Robin, I. C.; Brochen, S.; Ballet, P.; Gravrand, O.; Feuillet, G.

    2013-01-01

    In this paper, the optical signatures of arsenic complexes in As-doped HgCdTe samples grown by molecular beam epitaxy are clearly identified using comparison between photoluminescence spectra, Extended X-Ray Absorption Fine Structure, and Hall measurements. The ionization energies of the different complexes are measured both by photoluminescence and Hall measurements.

  5. Extended trochanteric osteotomy: current concepts review.

    Science.gov (United States)

    Sambandam, Senthil Nathan; Duraisamy, Gopinath; Chandrasekharan, Jayadev; Mounasamy, Varatharaj

    2016-04-01

    Revision total hip arthroplasty is a technically demanding procedure which has gained importance for more than two decades. It was a nightmare for revision surgeons during its initial years of inception before the advent of extended trochanteric osteotomy (ETO). This technique gains access to the femoral medullary canal without compromising the bone stock and aids removal of primary implant and cement mantle without further damaging the parent bone. Like any other surgery, ETO does have certain limitations and complications as reported by various authors. Though it has been routinely used by revision surgeons, thorough knowledge of technical details of ETO is still lacking. So this review article is aimed at addressing the indications, surgical procedure, fixation technique, implant selection and complication of ETO which has been presented over a period of years by various authors. We searched in the most commonly used portals like MEDLINE (PubMed) and Google scholar using appropriate terminologies for the literature regarding the various preoperative, intraoperative and postoperative clinical scenarios in which revision surgeons utilized ETO. ETO is an important tool in the revision surgeon's armamentarium and can be used in variety of clinical scenarios and for various intraoperative needs and goals. Awareness about biomechanics of ETO, indications, implants selection, fixation techniques and complications is paramount for good intraoperative and postoperative outcome. ETO by posterior approach continues to be a work horse approach for most revision surgeons all over the world.

  6. Revised and extended analysis of Br IV

    Science.gov (United States)

    Riyaz, A.; Rahimullah, K.; Tauheed, A.

    2014-01-01

    The spectrum of three-times ionized bromine Br IV has been studied in the 319-2350 Å wavelength region. The spectrum was recorded on a 3-m normal incidence vacuum spectrograph at the St. Francis Xavier University, Antigonish (Canada) and 6.65-m grazing incidence spectrograph at the Zeeman laboratory (Amsterdam). The light sources used were a triggered spark and sliding spark, respectively. The ground configuration of Br IV 3d104s24p2, the excited configurations 3d104s4p3+3d104s24p (4d+5d+6d+5s+6s+7s) in the odd parity system and 3d104s24p (5p+4f+5f)+3d104s4p2 (4d+5s)+3d104p4 in the even parity system have been studied. Relativistic Hartree-Fock (HFR) and least squares fitted (LSF) parametric calculations were used to interpret the observed spectrum. 120 Levels of Br IV have now been established, 58 being new. Among 424 spectral lines, 277 are newly classified. The levels 4s4p35S2, 4s24p4d 3F4 and 4p5p (3P0, 1, 3D1, 2, 3S1) are revised. We estimate the accuracy of our measured wavelength for sharp and unblended lines to be ±0.005 Å. The ionization limit is determined as 385,390±100 cm-1 (47.782±0.012 eV).

  7. Signature Balancing

    NARCIS (Netherlands)

    Noordkamp, H.W.; Brink, M. van den

    2006-01-01

    Signatures are an important part of the design of a ship. In an ideal situation, signatures must be as low as possible. However, due to budget constraints it is most unlikely to reach this ideal situation. The arising question is which levels of signatures are optimal given the different scenarios

  8. Extending an evidence hierarchy to include topics other than treatment: revising the Australian 'levels of evidence'

    Science.gov (United States)

    2009-01-01

    Background In 1999 a four-level hierarchy of evidence was promoted by the National Health and Medical Research Council in Australia. The primary purpose of this hierarchy was to assist with clinical practice guideline development, although it was co-opted for use in systematic literature reviews and health technology assessments. In this hierarchy interventional study designs were ranked according to the likelihood that bias had been eliminated and thus it was not ideal to assess studies that addressed other types of clinical questions. This paper reports on the revision and extension of this evidence hierarchy to enable broader use within existing evidence assessment systems. Methods A working party identified and assessed empirical evidence, and used a commissioned review of existing evidence assessment schema, to support decision-making regarding revision of the hierarchy. The aim was to retain the existing evidence levels I-IV but increase their relevance for assessing the quality of individual diagnostic accuracy, prognostic, aetiologic and screening studies. Comprehensive public consultation was undertaken and the revised hierarchy was piloted by individual health technology assessment agencies and clinical practice guideline developers. After two and a half years, the hierarchy was again revised and commenced a further 18 month pilot period. Results A suitable framework was identified upon which to model the revision. Consistency was maintained in the hierarchy of "levels of evidence" across all types of clinical questions; empirical evidence was used to support the relationship between study design and ranking in the hierarchy wherever possible; and systematic reviews of lower level studies were themselves ascribed a ranking. The impact of ethics on the hierarchy of study designs was acknowledged in the framework, along with a consideration of how harms should be assessed. Conclusion The revised evidence hierarchy is now widely used and provides a common

  9. Extending an evidence hierarchy to include topics other than treatment: revising the Australian 'levels of evidence'

    Directory of Open Access Journals (Sweden)

    Merlin Tracy

    2009-06-01

    Full Text Available Abstract Background In 1999 a four-level hierarchy of evidence was promoted by the National Health and Medical Research Council in Australia. The primary purpose of this hierarchy was to assist with clinical practice guideline development, although it was co-opted for use in systematic literature reviews and health technology assessments. In this hierarchy interventional study designs were ranked according to the likelihood that bias had been eliminated and thus it was not ideal to assess studies that addressed other types of clinical questions. This paper reports on the revision and extension of this evidence hierarchy to enable broader use within existing evidence assessment systems. Methods A working party identified and assessed empirical evidence, and used a commissioned review of existing evidence assessment schema, to support decision-making regarding revision of the hierarchy. The aim was to retain the existing evidence levels I-IV but increase their relevance for assessing the quality of individual diagnostic accuracy, prognostic, aetiologic and screening studies. Comprehensive public consultation was undertaken and the revised hierarchy was piloted by individual health technology assessment agencies and clinical practice guideline developers. After two and a half years, the hierarchy was again revised and commenced a further 18 month pilot period. Results A suitable framework was identified upon which to model the revision. Consistency was maintained in the hierarchy of "levels of evidence" across all types of clinical questions; empirical evidence was used to support the relationship between study design and ranking in the hierarchy wherever possible; and systematic reviews of lower level studies were themselves ascribed a ranking. The impact of ethics on the hierarchy of study designs was acknowledged in the framework, along with a consideration of how harms should be assessed. Conclusion The revised evidence hierarchy is now widely

  10. A Framework for Mixing Methods in Quantitative Measurement Development, Validation, and Revision: A Case Study

    Science.gov (United States)

    Luyt, Russell

    2012-01-01

    A framework for quantitative measurement development, validation, and revision that incorporates both qualitative and quantitative methods is introduced. It extends and adapts Adcock and Collier's work, and thus, facilitates understanding of quantitative measurement development, validation, and revision as an integrated and cyclical set of…

  11. Extended Irreversible Thermodynamics

    CERN Document Server

    Jou, David

    2010-01-01

    This is the 4th edition of the highly acclaimed monograph on Extended Irreversible Thermodynamics, a theory that goes beyond the classical theory of irreversible processes. In contrast to the classical approach, the basic variables describing the system are complemented by non-equilibrium quantities. The claims made for extended thermodynamics are confirmed by the kinetic theory of gases and statistical mechanics. The book covers a wide spectrum of applications, and also contains a thorough discussion of the foundations and the scope of the current theories on non-equilibrium thermodynamics. For this new edition, the authors critically revised existing material while taking into account the most recent developments in fast moving fields such as heat transport in micro- and nanosystems or fast solidification fronts in materials sciences. Several fundamental chapters have been revisited emphasizing physics and applications over mathematical derivations. Also, fundamental questions on the definition of non-equil...

  12. Some Proxy Signature and Designated verifier Signature Schemes over Braid Groups

    OpenAIRE

    Lal, Sunder; Verma, Vandani

    2009-01-01

    Braids groups provide an alternative to number theoretic public cryptography and can be implemented quite efficiently. The paper proposes five signature schemes: Proxy Signature, Designated Verifier, Bi-Designated Verifier, Designated Verifier Proxy Signature And Bi-Designated Verifier Proxy Signature scheme based on braid groups. We also discuss the security aspects of each of the proposed schemes.

  13. Signature inversion in doubly odd 124La

    International Nuclear Information System (INIS)

    Chantler, H.J.; Paul, E.S.; Boston, A.J.; Choy, P.T.W.; Nolan, P.J.; Carpenter, M.P.; Davids, C.N.; Seweryniak, D.; Charity, R.; Devlin, M.; Sarantites, D.G.; Chiara, C.J.; Fossan, D.B.; Koike, T.; LaFosse, D.R.; Starosta, K.; Fletcher, A.M.; Smith, J.F.; Jenkins, D.G.; Kelsall, N.S.

    2002-01-01

    High-spin states have been studied in neutron-deficient 57 124 La 67 , populated through the 64 Zn( 64 Zn,3pn) reaction at 260 MeV. The Gammasphere γ-ray spectrometer has been used in conjunction with the Microball charged-particle detector, the Neutron Shell, and the Argonne Fragment Mass Analyzer, in order to select evaporation residues of interest. The known band structures have been extended and new bands found. Most of the bands are linked together, allowing more consistent spin and parity assignments. Comparison of band properties to cranking calculations has allowed configuration assignments to be made and includes the first identification of the g 9/2 proton-hole in an odd-odd lanthanum isotope. Two bands have been assigned a πh 11/2 xνh 11/2 structure; the yrast one exhibits a signature inversion in its level energies below I=18.5(ℎ/2π), while the excited one exhibits a signature inversion above I=18.5(ℎ/2π)

  14. On the security of a novel probabilistic signature based on bilinear square Diffie-Hellman problem and its extension.

    Science.gov (United States)

    Zhao, Zhenguo; Shi, Wenbo

    2014-01-01

    Probabilistic signature scheme has been widely used in modern electronic commerce since it could provide integrity, authenticity, and nonrepudiation. Recently, Wu and Lin proposed a novel probabilistic signature (PS) scheme using the bilinear square Diffie-Hellman (BSDH) problem. They also extended it to a universal designated verifier signature (UDVS) scheme. In this paper, we analyze the security of Wu et al.'s PS scheme and UDVS scheme. Through concrete attacks, we demonstrate both of their schemes are not unforgeable. The security analysis shows that their schemes are not suitable for practical applications.

  15. The Revised Space Environment Models in CREME-MC: A Replacement for CREME96

    Science.gov (United States)

    Adams, James H., Jr.; Barghouty, Abdulnasser F.; Mendenhall, Marcus H.; Reed, Robert A.; Sierawski, Brian; Watts, John W.; Weller, Robert A.

    2010-01-01

    The CREME96 model has been available on the WWW for more than 10 years now. While principally for the estimation of radiation effects on spacecraft electronics, it contains space radiation environment models that have been used for instrument design calculations, estimation of instrumental background, estimation of radiation hazards and many other purposes. Because of the evolution of electronic part design we have found it necessary to revise CREME96, creating CREME-MC. As part of this revision, we are revising and extending the environmental models in CREME96. This talk will describe the revised radiation environment models that are being made available in CREME-MC

  16. SIGNATURE: A workbench for gene expression signature analysis

    Directory of Open Access Journals (Sweden)

    Chang Jeffrey T

    2011-11-01

    Full Text Available Abstract Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/.

  17. Validity of a Pediatric Version of the Glasgow Outcome Scale–Extended

    OpenAIRE

    Beers, Sue R.; Wisniewski, Stephen R.; Garcia-Filion, Pamela; Tian, Ye; Hahner, Thomas; Berger, Rachel P.; Bell, Michael J.; Adelson, P. David

    2012-01-01

    The Glasgow Outcome Scale (GOS) and its most recent revision, the GOS–Extended (GOS-E), provide the gold standard for measuring traumatic brain injury (TBI) outcome. The GOS-E exhibits validity when used with adults and some adolescents, but validity with younger children is not established. Because the GOS-E lacks the developmental specificity necessary to evaluate children, toddlers, and infants, we modified the original version to create the GOS-E Pediatric Revision (GOS-E Peds), a develop...

  18. Signature of an aggregation-prone conformation of tau

    Science.gov (United States)

    Eschmann, Neil A.; Georgieva, Elka R.; Ganguly, Pritam; Borbat, Peter P.; Rappaport, Maxime D.; Akdogan, Yasar; Freed, Jack H.; Shea, Joan-Emma; Han, Songi

    2017-03-01

    The self-assembly of the microtubule associated tau protein into fibrillar cell inclusions is linked to a number of devastating neurodegenerative disorders collectively known as tauopathies. The mechanism by which tau self-assembles into pathological entities is a matter of much debate, largely due to the lack of direct experimental insights into the earliest stages of aggregation. We present pulsed double electron-electron resonance measurements of two key fibril-forming regions of tau, PHF6 and PHF6*, in transient as aggregation happens. By monitoring the end-to-end distance distribution of these segments as a function of aggregation time, we show that the PHF6(*) regions dramatically extend to distances commensurate with extended β-strand structures within the earliest stages of aggregation, well before fibril formation. Combined with simulations, our experiments show that the extended β-strand conformational state of PHF6(*) is readily populated under aggregating conditions, constituting a defining signature of aggregation-prone tau, and as such, a possible target for therapeutic interventions.

  19. A revision of the Thyropygus allevatus group. Part V

    DEFF Research Database (Denmark)

    Pimvichai, Piyatida; Enghoff, Henrik; Panha, Somsak

    2016-01-01

    The Thyropygus opinatus subgroup (Diplopoda: Harpagophoridae) of the T. allevatus group in Thailand is revised. Based on a phylogenetic analysis of mtDNA sequence data, it is merged with the T. bifurcus subgroup to form an extended T. opinatus subgroup. Nine new species are described: Thyropygus ...

  20. An extended data mining method for identifying differentially expressed assay-specific signatures in functional genomic studies

    Directory of Open Access Journals (Sweden)

    Rollins Derrick K

    2010-12-01

    Full Text Available Abstract Background Microarray data sets provide relative expression levels for thousands of genes for a small number, in comparison, of different experimental conditions called assays. Data mining techniques are used to extract specific information of genes as they relate to the assays. The multivariate statistical technique of principal component analysis (PCA has proven useful in providing effective data mining methods. This article extends the PCA approach of Rollins et al. to the development of ranking genes of microarray data sets that express most differently between two biologically different grouping of assays. This method is evaluated on real and simulated data and compared to a current approach on the basis of false discovery rate (FDR and statistical power (SP which is the ability to correctly identify important genes. Results This work developed and evaluated two new test statistics based on PCA and compared them to a popular method that is not PCA based. Both test statistics were found to be effective as evaluated in three case studies: (i exposing E. coli cells to two different ethanol levels; (ii application of myostatin to two groups of mice; and (iii a simulated data study derived from the properties of (ii. The proposed method (PM effectively identified critical genes in these studies based on comparison with the current method (CM. The simulation study supports higher identification accuracy for PM over CM for both proposed test statistics when the gene variance is constant and for one of the test statistics when the gene variance is non-constant. Conclusions PM compares quite favorably to CM in terms of lower FDR and much higher SP. Thus, PM can be quite effective in producing accurate signatures from large microarray data sets for differential expression between assays groups identified in a preliminary step of the PCA procedure and is, therefore, recommended for use in these applications.

  1. Revised and extended analysis of Br IV

    International Nuclear Information System (INIS)

    Riyaz, A.; Rahimullah, K.; Tauheed, A.

    2014-01-01

    The spectrum of three-times ionized bromine Br IV has been studied in the 319–2350 Å wavelength region. The spectrum was recorded on a 3-m normal incidence vacuum spectrograph at the St. Francis Xavier University, Antigonish (Canada) and 6.65-m grazing incidence spectrograph at the Zeeman laboratory (Amsterdam). The light sources used were a triggered spark and sliding spark, respectively. The ground configuration of Br IV 3d 10 4s 2 4p 2 , the excited configurations 3d 10 4s4p 3 +3d 10 4s 2 4p (4d+5d+6d+5s+6s+7s) in the odd parity system and 3d 10 4s 2 4p (5p+4f+5f)+3d 10 4s4p 2 (4d+5s)+3d 10 4p 4 in the even parity system have been studied. Relativistic Hartree–Fock (HFR) and least squares fitted (LSF) parametric calculations were used to interpret the observed spectrum. 120 Levels of Br IV have now been established, 58 being new. Among 424 spectral lines, 277 are newly classified. The levels 4s4p 35 S 2 , 4s 2 4p4d 3 F 4 and 4p5p ( 3 P 0,1 , 3 D 1,2 , 3 S 1 ) are revised. We estimate the accuracy of our measured wavelength for sharp and unblended lines to be ±0.005 Å. The ionization limit is determined as 385,390±100 cm −1 (47.782±0.012 eV). -- Highlights: • The spectrum of Br was recorded on a 3-m spectrograph with triggered spark source. • Atomic transitions for Br IV were identified to established new energy levels. • CI calculations with relativistic corrections were made for theoretical predictions. • Weighted oscillator strength (gf) and transition probabilities (gA) were calculated. • Ionization potential of Br IV was determined experimentally

  2. Does Extended Telephone Callback Counselling Prevent Smoking Relapse?

    Science.gov (United States)

    Segan, C. J.; Borland, R.

    2011-01-01

    This randomized controlled trial tested whether extended callback counselling that proactively engaged ex-smokers with the task of embracing a smoke-free lifestyle (four to six calls delivered 1-3 months after quitting, i.e. when craving levels and perceived need for help had declined) could reduce relapse compared with a revised version of…

  3. WASTE CERTIFICATION PROGRAM PLAN - REVISION 7

    International Nuclear Information System (INIS)

    MORGAN, LK

    2002-01-01

    The primary changes that have been made to this revision reflect the relocation of the Waste Certification Official (WCO) organizationally from the Quality Services Division (QSD) into the Laboratory Waste Services (LWS) Organization. Additionally, the responsibilities for program oversight have been differentiated between the QSD and LWS. The intent of this effort is to ensure that those oversight functions, which properly belonged to the WCO, moved with that function; but retain an independent oversight function outside of the LWS Organization ensuring the potential for introduction of organizational bias, regarding programmatic and technical issues, is minimized. The Waste Certification Program (WCP) itself has been modified to allow the waste certification function to be performed by any of the personnel within the LWS Waste Acceptance/Certification functional area. However, a single individual may not perform both the technical waste acceptance review and the final certification review on the same 2109 data package. Those reviews must be performed by separate individuals in a peer review process. There will continue to be a designated WCO who will have lead programmatic responsibility for the WCP and will exercise overall program operational oversite as well as determine the overall requirements of the certification program. The quality assurance organization will perform independent, outside oversight to ensure that any organizational bias does not degrade the integrity of the waste certification process. The core elements of the previous WCP have been retained, however, the terms and process structure have been modified.. There are now two ''control points,'' (1) the data package enters the waste certification process with the signature of the Generator Interface/Generator Interface Equivalent (GI/GIE), (2) the package is ''certified'', thus exiting the process. The WCP contains three steps, (1) the technical review for waste acceptance, (2) a review of the

  4. Unconditionally Secure Quantum Signatures

    Directory of Open Access Journals (Sweden)

    Ryan Amiri

    2015-08-01

    Full Text Available Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols—signatures based on the Rivest–Adleman–Shamir (RSA algorithm, the digital signature algorithm (DSA, and the elliptic curve digital signature algorithm (ECDSA—are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  5. 78 FR 29774 - Endangered and Threatened Wildlife and Plants; Draft Revised Supplement to the Grizzly Bear...

    Science.gov (United States)

    2013-05-21

    ...] Endangered and Threatened Wildlife and Plants; Draft Revised Supplement to the Grizzly Bear Recovery Plan... extending the public comment period for a Draft Revised Supplement to the Grizzly Bear Recovery Plan in the... to the Grizzly Bear Recovery Plan is available at http://www.fws.gov/mountain-prairie/species/mammals...

  6. Extended long term functional outcome of inflatable penile prosthesis in a single institution.

    LENUS (Irish Health Repository)

    Thomas, A Z

    2011-02-01

    We sought to evaluate the extended long term functional outcome of the AMS700 three piece inflatable prosthesis in men with erectile dysfunction in a single urological department and assess our revision rates. Patients that underwent first-time insertion or revision of an AMS700 3 piece inflatable penile prosthesis between 1984-2007 were included. Data was obtained from medical records and long term follow up of patients was conducted by telephone interview. The medical records of 38 patients were available for review. Of these 38 men, 56 prostheses were inserted. The mean follow up was 8.4 years (101 months). The revision rate at 50 months postoperatively was 7\\/38 (18%). The overall revision rate was 18\\/38 (47%). The mean time to revision in these 18 patients was 72 months (12-156 months) after initial insertion of AMS700 penile prosthesis. This study highlights that with longer follow u revision rates markedly increase after 72 months.

  7. Smoking-gun signatures of little Higgs models

    Energy Technology Data Exchange (ETDEWEB)

    Han Tao [Department of Physics, University of Wisconsin, Madison, Wisconsin 53706 (United States); Institute of Theoretical Physics, Academia Sinica, Beijing 100080 (China); Logan, Heather E. [Department of Physics, University of Wisconsin, Madison, Wisconsin 53706 (United States); Wang, L.-T. [Department of Physics, University of Wisconsin, Madison, Wisconsin 53706 (United States); Jefferson Laboratory of Physics, Harvard University, Cambridge, Massachusetts 02138 (United States)

    2006-01-15

    Little Higgs models predict new gauge bosons, fermions and scalars at the TeV scale that stabilize the Higgs mass against quadratically divergent one-loop radiative corrections. We categorize the many little Higgs models into two classes based on the structure of the extended electroweak gauge group and examine the experimental signatures that identify the little Higgs mechanism in addition to those that identify the particular little Higgs model. We find that by examining the properties of the new heavy fermion(s) at the LHC, one can distinguish the structure of the top quark mass generation mechanism and test the little Higgs mechanism in the top sector. Similarly, by studying the couplings of the new gauge bosons to the light Higgs boson and to the Standard Model fermions, one can confirm the little Higgs mechanism and determine the structure of the extended electroweak gauge group.

  8. Revised Sunspot Numbers and the Effects on Understanding the Sunspot Cycle

    Science.gov (United States)

    Hathaway, D. H.

    2014-12-01

    While sunspot numbers provide only limited information about the sunspot cycle, they provide that information for at least twice as many sunspot cycles as any other direct solar observation. In particular, sunspot numbers are available before, during, and immediately after the Maunder Minimum (1645-1715). The instruments and methods used to count sunspots have changed over the last 400+ years. This leads to systematic changes in the sunspot number that can mask, or artificially introduce, characteristics of the sunspot cycle. The most widely used sunspot number is the International (Wolf/Zurich) sunspot number which is now calculated at the Solar Influences Data Center in Brussels, Belgium. These numbers extend back to 1749. The Group sunspot number extends back to the first telescopic observations of the Sun in 1610. There are well-known and significant differences between these two numbers where they overlap. Recent work has helped us to understand the sources of these differences and has led to proposed revisions in the sunspot numbers. Independent studies now support many of these revisions. These revised sunspot numbers suggest changes to our understanding of the sunspot cycle itself and to our understanding of its connection to climate change.

  9. Radiation signatures

    International Nuclear Information System (INIS)

    McGlynn, S.P.; Varma, M.N.

    1992-01-01

    A new concept for modelling radiation risk is proposed. This concept is based on the proposal that the spectrum of molecular lesions, which we dub ''the radiation signature'', can be used to identify the quality of the causal radiation. If the proposal concerning radiation signatures can be established then, in principle, both prospective and retrospective risk determination can be assessed on an individual basis. A major goal of biophysical modelling is to relate physical events such as ionization, excitation, etc. to the production of radiation carcinogenesis. A description of the physical events is provided by track structure. The track structure is determined by radiation quality, and it can be considered to be the ''physical signature'' of the radiation. Unfortunately, the uniqueness characteristics of this signature are dissipated in biological systems in ∼10 -9 s. Nonetheless, it is our contention that this physical disturbance of the biological system eventuates later, at ∼10 0 s, in molecular lesion spectra which also characterize the causal radiation. (author)

  10. A genome-wide scan for selection signatures in Nellore cattle.

    Science.gov (United States)

    Somavilla, A L; Sonstegard, T S; Higa, R H; Rosa, A N; Siqueira, F; Silva, L O C; Torres Júnior, R A A; Coutinho, L L; Mudadu, M A; Alencar, M M; Regitano, L C A

    2014-12-01

    Brazilian Nellore cattle (Bos indicus) have been selected for growth traits for over more than four decades. In recent years, reproductive and meat quality traits have become more important because of increasing consumption, exports and consumer demand. The identification of genome regions altered by artificial selection can potentially permit a better understanding of the biology of specific phenotypes that are useful for the development of tools designed to increase selection efficiency. Therefore, the aims of this study were to detect evidence of recent selection signatures in Nellore cattle using extended haplotype homozygosity methodology and BovineHD marker genotypes (>777,000 single nucleotide polymorphisms) as well as to identify corresponding genes underlying these signals. Thirty-one significant regions (P meat quality, fatty acid profiles and immunity. In addition, 545 genes were identified in regions harboring selection signatures. Within this group, 58 genes were associated with growth, muscle and adipose tissue metabolism, reproductive traits or the immune system. Using relative extended haplotype homozygosity to analyze high-density single nucleotide polymorphism marker data allowed for the identification of regions potentially under artificial selection pressure in the Nellore genome, which might be used to better understand autozygosity and the effects of selection on the Nellore genome. © 2014 Stichting International Foundation for Animal Genetics.

  11. Revised Paris and Vienna Nuclear Liability Conventions - Challenges for Nuclear Insurers

    International Nuclear Information System (INIS)

    Tetley, M.

    2006-01-01

    The revisions recently implemented to both the Vienna and Paris nuclear liability Conventions are intended to widen significantly the amount and scope of compensation payable in the event of a nuclear accident. Whilst this is a laudable objective, the final extent of the revisions leaves nuclear site operators and their insurers with greater uncertainty as a result of the wider and unquantifiable nature of some aspects of the revised nuclear damage definition, in particular where reference is made to environmental reinstatement and extended prescription periods. Incorporating broader definitions in the Convention revisions will therefore leave gaps in the insurance cover where insurers are unable to insure the new, wider scope of cover. If no insurance is available, then the liability for the revised scope of cover must fall upon either the operator or the national Government. This presentation will give an overview of where and why the major gaps in nuclear liability insurance cover will occur in the revised Conventions; it will also examine the problems in defining the revised scope of cover and will look at where these unquantifiable risks should now reside, to ensure there is equity between the liabilities imposed on the nuclear industry and those imposed on other industrial sectors. (author)

  12. Electronic Signature Policy

    Science.gov (United States)

    Establishes the United States Environmental Protection Agency's approach to adopting electronic signature technology and best practices to ensure electronic signatures applied to official Agency documents are legally valid and enforceable

  13. Low-cost computer classification of land cover in the Portland area, Oregon, by signature extension techniques

    Science.gov (United States)

    Gaydos, Leonard

    1978-01-01

    Computer-aided techniques for interpreting multispectral data acquired by Landsat offer economies in the mapping of land cover. Even so, the actual establishment of the statistical classes, or "signatures," is one of the relatively more costly operations involved. Analysts have therefore been seeking cost-saving signature extension techniques that would accept training data acquired for one time or place and apply them to another. Opportunities to extend signatures occur in preprocessing steps and in the classification steps that follow. In the present example, land cover classes were derived by the simplest and most direct form of signature extension: Classes statistically derived from a Landsat scene for the Puget Sound area, Wash., were applied to the Portland area, Oreg., using data for the next Landsat scene acquired less than 25 seconds down orbit. Many features can be recognized on the reduced-scale version of the Portland land cover map shown in this report, although no statistical assessment of its accuracy is available.

  14. Necessary storage as a signature of discharge variability: towards global maps

    Science.gov (United States)

    Takeuchi, Kuniyoshi; Masood, Muhammad

    2017-09-01

    This paper proposes the use of necessary storage to smooth out discharge variability to meet a discharge target as a signature of discharge variability in time. Such a signature has a distinct advantage over other statistical indicators such as standard deviation (SD) or coefficient of variation (CV) as it expresses hydrological variability in human terms, which directly indicates the difficulty and ease of managing discharge variation for water resource management. The signature is presented in the form of geographical distribution, in terms of both necessary storage (km3) and normalized necessary storage (months), and is related to the basin characteristics of hydrological heterogeneity. The signature is analyzed in different basins considering the Hurst equation of range as a reference. The slope of such a relation and the scatter of departures from the average relation are analyzed in terms of their relationship with basin characteristics. As a method of calculating necessary storage, the flood duration curve (FDC) and drought duration curve (DDC) methods are employed in view of their relative advantage over other methods to repeat the analysis over many grid points. The Ganges-Brahmaputra-Meghna (GBM) basin is selected as the case study and the BTOPMC hydrological model with Water and Global Change (WATCH) Forcing Data (WFD) is used for estimating FDC and DDC. It is concluded that the necessary storage serves as a useful signature of discharge variability, and its analysis could be extended to the entire globe and in this way seek new insights into hydrological variability in the storage domain at a larger range of scales.

  15. Necessary storage as a signature of discharge variability: towards global maps

    Directory of Open Access Journals (Sweden)

    K. Takeuchi

    2017-09-01

    Full Text Available This paper proposes the use of necessary storage to smooth out discharge variability to meet a discharge target as a signature of discharge variability in time. Such a signature has a distinct advantage over other statistical indicators such as standard deviation (SD or coefficient of variation (CV as it expresses hydrological variability in human terms, which directly indicates the difficulty and ease of managing discharge variation for water resource management. The signature is presented in the form of geographical distribution, in terms of both necessary storage (km3 and normalized necessary storage (months, and is related to the basin characteristics of hydrological heterogeneity. The signature is analyzed in different basins considering the Hurst equation of range as a reference. The slope of such a relation and the scatter of departures from the average relation are analyzed in terms of their relationship with basin characteristics. As a method of calculating necessary storage, the flood duration curve (FDC and drought duration curve (DDC methods are employed in view of their relative advantage over other methods to repeat the analysis over many grid points. The Ganges–Brahmaputra–Meghna (GBM basin is selected as the case study and the BTOPMC hydrological model with Water and Global Change (WATCH Forcing Data (WFD is used for estimating FDC and DDC. It is concluded that the necessary storage serves as a useful signature of discharge variability, and its analysis could be extended to the entire globe and in this way seek new insights into hydrological variability in the storage domain at a larger range of scales.

  16. Psychometric Properties of the Revised Teachers' Attitude toward Inclusion Scale

    Science.gov (United States)

    Monsen, Jeremy J.; Ewing, Donna L.; Boyle, James

    2015-01-01

    This paper presents the psychometric properties of a questionnaire measure that updates and extends Larrivee and Cook's (1979) Opinions Relative to Mainstreaming Scale in terms of structure, terminology, and language. The revised scale was tested using a sample of 106 teachers based in inclusive mainstream schools. Using Principal Component…

  17. Blinding for unanticipated signatures

    NARCIS (Netherlands)

    D. Chaum (David)

    1987-01-01

    textabstractPreviously known blind signature systems require an amount of computation at least proportional to the number of signature types, and also that the number of such types be fixed in advance. These requirements are not practical in some applications. Here, a new blind signature technique

  18. Building and testing models with extended Higgs sectors

    Science.gov (United States)

    Ivanov, Igor P.

    2017-07-01

    Models with non-minimal Higgs sectors represent a mainstream direction in theoretical exploration of physics opportunities beyond the Standard Model. Extended scalar sectors help alleviate difficulties of the Standard Model and lead to a rich spectrum of characteristic collider signatures and astroparticle consequences. In this review, we introduce the reader to the world of extended Higgs sectors. Not pretending to exhaustively cover the entire body of literature, we walk through a selection of the most popular examples: the two- and multi-Higgs-doublet models, as well as singlet and triplet extensions. We will show how one typically builds models with extended Higgs sectors, describe the main goals and the challenges which arise on the way, and mention some methods to overcome them. We will also describe how such models can be tested, what are the key observables one focuses on, and illustrate the general strategy with a subjective selection of results.

  19. 1 CFR 18.7 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 1 General Provisions 1 2010-01-01 2010-01-01 false Signature. 18.7 Section 18.7 General Provisions... PREPARATION AND TRANSMITTAL OF DOCUMENTS GENERALLY § 18.7 Signature. The original and each duplicate original... stamped beneath the signature. Initialed or impressed signatures will not be accepted. Documents submitted...

  20. Attribute-Based Digital Signature System

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, Muhammad; Petkovic, M.

    2011-01-01

    An attribute-based digital signature system comprises a signature generation unit (1) for signing a message (m) by generating a signature (s) based on a user secret key (SK) associated with a set of user attributes, wherein the signature generation unit (1) is arranged for combining the user secret

  1. Analysis of RTM extended images for VTI media

    KAUST Repository

    Li, Vladimir

    2015-08-19

    Extended images obtained from reverse-time migration (RTM) contain information about the accuracy of the velocity field and subsurface illumination at different incidence angles. Here, we evaluate the influence of errors in the anisotropy parameters on the shape of the residual moveout (RMO) in P-wave RTM extended images for VTI (transversely isotropic with a vertical symmetry axis) media. Considering the actual spatial distribution of the zero-dip NMO velocity (Vnmo), which could be approximately estimated by conventional techniques, we analyze the extended images obtained with distorted fields of the parameters η and δ. Differential semblance optimization (DSO) and stack-power estimates are employed to study the sensitivity of focusing to the anisotropy parameters. The results show that the signature of η is dip-dependent, whereas errors in δ cause defocusing only if that parameter is laterally varying. Hence, earlier results regarding the influence of η and δ on reflection moveout and migration velocity analysis remain generally valid in the extended image space for complex media. The dependence of RMO on errors in the anisotropy parameters provides essential insights for anisotropic wavefield tomography using extended images.

  2. 77 FR 36477 - Notice of Intent To Revise and Extend a Currently Approved Information Collection

    Science.gov (United States)

    2012-06-19

    ... Reports. Revision to burden hours will be needed due to changes in the size of the target population... Agriculture to help administer programs; by State agencies to develop, research, and promote the marketing of products; and by producers to find their best market opportunity(s). The current expiration date for this...

  3. The signature triality of Majorana-Weyl spacetimes

    International Nuclear Information System (INIS)

    Andrade, M.A. de; Rojas, M.; Toppan, F.

    2000-05-01

    The Higher dimensional Majorana-Weyl spacetimes present space-time dualities which are induced by the Spin (8) triality automorphisms. Different signature versions of theories such as 10-dimensional SYM's superstrings, five-branes, F-theory, are shown to be interconnected via the S 3 permutation group. Bilinear and trilinear invariants under spacetime triality are introduced and their possible relevance in building models possessing a space-versus-time exchange symmetry is discussed. Moreover the Cartan's vector/chiral spinor/antichiral spinor triality of SO (8) and SO(4,4) is analyzed in detail and explicit formulas are produced in a Majorana-Weyl basis. This paper is the extended version of hep-th/9907148. (author)

  4. Fair quantum blind signatures

    International Nuclear Information System (INIS)

    Tian-Yin, Wang; Qiao-Yan, Wen

    2010-01-01

    We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed. (general)

  5. Five Guidelines for Selecting Hydrological Signatures

    Science.gov (United States)

    McMillan, H. K.; Westerberg, I.; Branger, F.

    2017-12-01

    Hydrological signatures are index values derived from observed or modeled series of hydrological data such as rainfall, flow or soil moisture. They are designed to extract relevant information about hydrological behavior, such as to identify dominant processes, and to determine the strength, speed and spatiotemporal variability of the rainfall-runoff response. Hydrological signatures play an important role in model evaluation. They allow us to test whether particular model structures or parameter sets accurately reproduce the runoff generation processes within the watershed of interest. Most modeling studies use a selection of different signatures to capture different aspects of the catchment response, for example evaluating overall flow distribution as well as high and low flow extremes and flow timing. Such studies often choose their own set of signatures, or may borrow subsets of signatures used in multiple other works. The link between signature values and hydrological processes is not always straightforward, leading to uncertainty and variability in hydrologists' signature choices. In this presentation, we aim to encourage a more rigorous approach to hydrological signature selection, which considers the ability of signatures to represent hydrological behavior and underlying processes for the catchment and application in question. To this end, we propose a set of guidelines for selecting hydrological signatures. We describe five criteria that any hydrological signature should conform to: Identifiability, Robustness, Consistency, Representativeness, and Discriminatory Power. We describe an example of the design process for a signature, assessing possible signature designs against the guidelines above. Due to their ubiquity, we chose a signature related to the Flow Duration Curve, selecting the FDC mid-section slope as a proposed signature to quantify catchment overall behavior and flashiness. We demonstrate how assessment against each guideline could be used to

  6. Analysis of RTM extended images for VTI media

    KAUST Repository

    Li, Vladimir

    2016-04-28

    Extended images obtained from reverse time migration (RTM) contain information about the accuracy of the velocity field and subsurface illumination at different incidence angles. Here, we evaluate the influence of errors in the anisotropy parameters on the shape of the residual moveout (RMO) in P-wave RTM extended images for VTI (transversely isotropic with a vertical symmetry axis) media. Using the actual spatial distribution of the zero-dip NMO velocity (Vnmo), which could be approximately estimated by conventional techniques, we analyze the extended images obtained with distorted fields of the parameters η and δ. Differential semblance optimization (DSO) and stack-power estimates are employed to study the sensitivity of focusing to the anisotropy parameters. We also build angle gathers to facilitate interpretation of the shape of RMO in the extended images. The results show that the signature of η is dip-dependent, whereas errors in δ cause defocusing only if that parameter is laterally varying. Hence, earlier results regarding the influence of η and δ on reflection moveout and migration velocity analysis remain generally valid in the extended image space for complex media. The dependence of RMO on errors in the anisotropy parameters provides essential insights for anisotropic wavefield tomography using extended images.

  7. Analysis of RTM extended images for VTI media

    KAUST Repository

    Li, Vladimir; Tsvankin, Ilya; Alkhalifah, Tariq Ali

    2016-01-01

    Extended images obtained from reverse time migration (RTM) contain information about the accuracy of the velocity field and subsurface illumination at different incidence angles. Here, we evaluate the influence of errors in the anisotropy parameters on the shape of the residual moveout (RMO) in P-wave RTM extended images for VTI (transversely isotropic with a vertical symmetry axis) media. Using the actual spatial distribution of the zero-dip NMO velocity (Vnmo), which could be approximately estimated by conventional techniques, we analyze the extended images obtained with distorted fields of the parameters η and δ. Differential semblance optimization (DSO) and stack-power estimates are employed to study the sensitivity of focusing to the anisotropy parameters. We also build angle gathers to facilitate interpretation of the shape of RMO in the extended images. The results show that the signature of η is dip-dependent, whereas errors in δ cause defocusing only if that parameter is laterally varying. Hence, earlier results regarding the influence of η and δ on reflection moveout and migration velocity analysis remain generally valid in the extended image space for complex media. The dependence of RMO on errors in the anisotropy parameters provides essential insights for anisotropic wavefield tomography using extended images.

  8. Winter in the Ouachitas--a severe winter storm signature in Pinus echinata in the Ouachita Mountains of Oklahoma and Arkansas, USA

    Science.gov (United States)

    Douglas J. Stevenson; Thomas B. Lynch; Pradip Saud; Robert Heineman; Randal Holeman; Dennis Wilson; Keith Anderson; Chris Cerny; James M. Guldin

    2016-01-01

    Each year severe winter storms (≈ice storms) damage trees throughout the southern USA. Arkansas and Oklahoma have a history of severe winter storms. To extend that history back beyond the reach of written records, a distinctive tree ring pattern or signature is needed. Storm-caused breakage, branch loss and bending stress provide that signature. We found a severe storm...

  9. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-01-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme. (paper)

  10. Nuclear safety guide. TID-7016, Revision 2

    International Nuclear Information System (INIS)

    Thomas, J.T.

    1978-01-01

    The Nuclear Safety Guide was first issued in 1956 as classified AEC report LA-2063 and was reprinted the next year, unclassified, as TID-7016. Revision 1, published in 1961, extended the scope and refined the guiding information. The present revision of the Guide differs significantly from its predecessor in that the latter was intentionally conservative in its recommendations. Firmly based on experimental evidence of criticality, the original Guide and the first revision were considered to be of most value to organizations whose activities with fissionable materials were not extensive and, secondarily, that it would serve as a point of departure for members of established nuclear safety teams, experienced in the field. The reader will find a significant change in the character of information presented in this version. Nuclear Criticality Safety has matured in the past twelve years. The advance of calculational capability has permitted validated calculations to extend and substitute for experimental data. The broadened data base has enabled better interpolation, extension, and understanding of available information, especially in areas previously addressed by undefined but adequate factors of safety. The content has been thereby enriched in qualitative guidance. The information inherently contains, and the user can recapture, the quantitative guidance characteristic of the formerGuides by employing appropriate safety factors. In fact, it becomes incumbent on the Criticality Safety Specialist to necessarily impose safety factors consistent with the possible normal and abnormal credible contingencies of an operation as revealed by his evaluation. In its present form the Guide easily becomes a suitable module in any compendium or handbook tailored for internal use by organizations. It is hoped the Guide will continue to serve immediate needs and will encourage continuing and more comprehensive efforts toward organizing nuclear criticality safety information

  11. Nuclear safety guide. TID-7016, Revision 2

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, J T [ed.

    1978-05-01

    The Nuclear Safety Guide was first issued in 1956 as classified AEC report LA-2063 and was reprinted the next year, unclassified, as TID-7016. Revision 1, published in 1961, extended the scope and refined the guiding information. The present revision of the Guide differs significantly from its predecessor in that the latter was intentionally conservative in its recommendations. Firmly based on experimental evidence of criticality, the original Guide and the first revision were considered to be of most value to organizations whose activities with fissionable materials were not extensive and, secondarily, that it would serve as a point of departure for members of established nuclear safety teams, experienced in the field. The reader will find a significant change in the character of information presented in this version. Nuclear Criticality Safety has matured in the past twelve years. The advance of calculational capability has permitted validated calculations to extend and substitute for experimental data. The broadened data base has enabled better interpolation, extension, and understanding of available information, especially in areas previously addressed by undefined but adequate factors of safety. The content has been thereby enriched in qualitative guidance. The information inherently contains, and the user can recapture, the quantitative guidance characteristic of the formerGuides by employing appropriate safety factors. In fact, it becomes incumbent on the Criticality Safety Specialist to necessarily impose safety factors consistent with the possible normal and abnormal credible contingencies of an operation as revealed by his evaluation. In its present form the Guide easily becomes a suitable module in any compendium or handbook tailored for internal use by organizations. It is hoped the Guide will continue to serve immediate needs and will encourage continuing and more comprehensive efforts toward organizing nuclear criticality safety information.

  12. Uncertainty in hydrological signatures

    Science.gov (United States)

    McMillan, Hilary; Westerberg, Ida

    2015-04-01

    Information that summarises the hydrological behaviour or flow regime of a catchment is essential for comparing responses of different catchments to understand catchment organisation and similarity, and for many other modelling and water-management applications. Such information types derived as an index value from observed data are known as hydrological signatures, and can include descriptors of high flows (e.g. mean annual flood), low flows (e.g. mean annual low flow, recession shape), the flow variability, flow duration curve, and runoff ratio. Because the hydrological signatures are calculated from observed data such as rainfall and flow records, they are affected by uncertainty in those data. Subjective choices in the method used to calculate the signatures create a further source of uncertainty. Uncertainties in the signatures may affect our ability to compare different locations, to detect changes, or to compare future water resource management scenarios. The aim of this study was to contribute to the hydrological community's awareness and knowledge of data uncertainty in hydrological signatures, including typical sources, magnitude and methods for its assessment. We proposed a generally applicable method to calculate these uncertainties based on Monte Carlo sampling and demonstrated it for a variety of commonly used signatures. The study was made for two data rich catchments, the 50 km2 Mahurangi catchment in New Zealand and the 135 km2 Brue catchment in the UK. For rainfall data the uncertainty sources included point measurement uncertainty, the number of gauges used in calculation of the catchment spatial average, and uncertainties relating to lack of quality control. For flow data the uncertainty sources included uncertainties in stage/discharge measurement and in the approximation of the true stage-discharge relation by a rating curve. The resulting uncertainties were compared across the different signatures and catchments, to quantify uncertainty

  13. 76 FR 36518 - Notice of Intent To Request Approval To Revise and Extend an Information Collection

    Science.gov (United States)

    2011-06-22

    ... Survey. Revision to burden hours may be needed due to changes in the size of the target population... industry with current and future information on market supplies. This data is also used in preparing production, disposition, and income statistics which facilitate more orderly production, marketing, and...

  14. Software Technologies - 8th International Joint Conference, ICSOFT 2013 : Revised Selected Papers

    NARCIS (Netherlands)

    Cordeiro, José; van Sinderen, Marten J.

    2014-01-01

    The present book includes extended and revised versions of a set of selected papers from the 8th International Joint Conference on Software Technologies (ICSOFT 2013), which was co-organized by the Reykjavik University (RU) and sponsored by the Institute for Systems and Technologies of Information,

  15. Revising Translations

    DEFF Research Database (Denmark)

    Rasmussen, Kirsten Wølch; Schjoldager, Anne

    2011-01-01

    The paper explains the theoretical background and findings of an empirical study of revision policies, using Denmark as a case in point. After an overview of important definitions, types and parameters, the paper explains the methods and data gathered from a questionnaire survey and an interview...... survey. Results clearly show that most translation companies regard both unilingual and comparative revisions as essential components of professional quality assurance. Data indicate that revision is rarely fully comparative, as the preferred procedure seems to be a unilingual revision followed by a more...... or less comparative rereading. Though questionnaire data seem to indicate that translation companies use linguistic correctness and presentation as the only revision parameters, interview data reveal that textual and communicative aspects are also considered. Generally speaking, revision is not carried...

  16. 76 FR 30542 - Adult Signature Services

    Science.gov (United States)

    2011-05-26

    ... POSTAL SERVICE 39 CFR Part 111 Adult Signature Services AGENCY: Postal Service\\TM\\. ACTION: Final..., Domestic Mail Manual (DMM[supreg]) 503.8, to add a new extra service called Adult Signature. This new service has two available options: Adult Signature Required and Adult Signature Restricted Delivery. DATES...

  17. 76 FR 70108 - Notice of Intent To Request Approval To Revise and Extend an Information Collection

    Science.gov (United States)

    2011-11-10

    ... Milk Products Surveys. Revision to burden hours will be needed due to changes in the size of the target... collection of Dairy Product Prices. This data will be collected by the Agricultural Marketing Service (AMS... Agricultural Marketing Act of 1946. Authority: Voluntary dairy information reporting is conducted under...

  18. Lesson 6: Signature Validation

    Science.gov (United States)

    Checklist items 13 through 17 are grouped under the Signature Validation Process, and represent CROMERR requirements that the system must satisfy as part of ensuring that electronic signatures it receives are valid.

  19. 21 CFR 11.50 - Signature manifestations.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature manifestations. 11.50 Section 11.50 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. (a) Signed electronic...: (1) The printed name of the signer; (2) The date and time when the signature was executed; and (3...

  20. 21 CFR 11.70 - Signature/record linking.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Signature/record linking. 11.70 Section 11.70 Food... RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective...

  1. Expressiveness considerations of XML signatures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher

    2011-01-01

    XML Signatures are used to protect XML-based Web Service communication against a broad range of attacks related to man-in-the-middle scenarios. However, due to the complexity of the Web Services specification landscape, the task of applying XML Signatures in a robust and reliable manner becomes...... more and more challenging. In this paper, we investigate this issue, describing how an attacker can still interfere with Web Services communication even in the presence of XML Signatures. Additionally, we discuss the interrelation of XML Signatures and XML Encryption, focussing on their security...

  2. Revision total hip arthoplasty: factors associated with re-revision surgery.

    Science.gov (United States)

    Khatod, Monti; Cafri, Guy; Inacio, Maria C S; Schepps, Alan L; Paxton, Elizabeth W; Bini, Stefano A

    2015-03-04

    The survivorship of implants after revision total hip arthroplasty and risk factors associated with re-revision are not well defined. We evaluated the re-revision rate with use of the institutional total joint replacement registry. The purpose of this study was to determine patient, implant, and surgeon factors associated with re-revision total hip arthroplasty. A retrospective cohort study was conducted. The total joint replacement registry was used to identify patients who had undergone revision total hip arthroplasty for aseptic reasons from April 1, 2001, to December 31, 2010. The end point of interest was re-revision total hip arthroplasty. Risk factors evaluated for re-revision total hip arthroplasty included: patient risk factors (age, sex, body mass index, race, and general health status), implant risk factors (fixation type, bearing surface, femoral head size, and component replacement), and surgeon risk factors (volume and experience). A multivariable Cox proportional hazards model was used. Six hundred and twenty-nine revision total hip arthroplasties with sixty-three (10%) re-revisions were evaluated. The mean cohort age (and standard deviation) was 57.0 ± 12.4 years, the mean body mass index (and standard deviation) was 29.5 ± 6.1 kg/m(2), and most of the patients were women (64.5%) and white (81.9%) and had an American Society of Anesthesiologists score of associated with the risk of re-revision. For every ten-year increase in patient age, the hazard ratio for re-revision decreases by a factor of 0.72 (95% confidence interval, 0.58 to 0.90). For every five revision surgical procedures performed by a surgeon, the risk of revision decreases by a factor of 0.93 (95% confidence interval, 0.86 to 0.99). At the time of revision, a new or retained cemented femoral implant or all-cemented hip implant increases the risk of revision by a factor of 3.19 (95% confidence interval, 1.22 to 8.38) relative to a retained or new uncemented hip implant. A ceramic on a

  3. Digital Signature Schemes with Complementary Functionality and Applications

    OpenAIRE

    S. N. Kyazhin

    2012-01-01

    Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.

  4. 17 CFR 12.12 - Signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Signature. 12.12 Section 12.12... General Information and Preliminary Consideration of Pleadings § 12.12 Signature. (a) By whom. All... document on behalf of another person. (b) Effect. The signature on any document of any person acting either...

  5. High-speed high-security signatures

    NARCIS (Netherlands)

    Bernstein, D.J.; Duif, N.; Lange, T.; Schwabe, P.; Yang, B.Y.

    2011-01-01

    This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 108000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures

  6. The effects of extrinsic motivation on signature authorship opinions in forensic signature blind trials.

    Science.gov (United States)

    Dewhurst, Tahnee N; Found, Bryan; Ballantyne, Kaye N; Rogers, Doug

    2014-03-01

    Expertise studies in forensic handwriting examination involve comparisons of Forensic Handwriting Examiners' (FHEs) opinions with lay-persons on blind tests. All published studies of this type have reported real and demonstrable skill differences between the specialist and lay groups. However, critics have proposed that any difference shown may be indicative of a lack of motivation on the part of lay participants, rather than a real difference in skill. It has been suggested that qualified FHEs would be inherently more motivated to succeed in blinded validation trials, as their professional reputations could be at risk, should they perform poorly on the task provided. Furthermore, critics suggest that lay-persons would be unlikely to be highly motivated to succeed, as they would have no fear of negative consequences should they perform badly. In an effort to investigate this concern, a blind signature trial was designed and administered to forty lay-persons. Participants were required to compare known (exemplar) signatures of an individual to questioned signatures and asked to express an opinion regarding whether the writer of the known signatures wrote each of the questioned signatures. The questioned signatures comprised a mixture of genuine, disguised and simulated signatures. The forty participants were divided into two separate groupings. Group 'A' were requested to complete the trial as directed and were advised that for each correct answer they would be financially rewarded, for each incorrect answer they would be financially penalized, and for each inconclusive opinion they would receive neither penalty nor reward. Group 'B' was requested to complete the trial as directed, with no mention of financial recompense or penalty. The results of this study do not support the proposition that motivation rather than skill difference is the source of the statistical difference in opinions between individuals' results in blinded signature proficiency trials. Crown

  7. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  8. The quantitative analysis of data for magnetization of ferromagnet. Extended thermodynamic approach

    International Nuclear Information System (INIS)

    Bodryakov, V.Yu.; Bashkatov, A.N.

    2005-01-01

    A quantitative analysis of M(H,T) data on magnetization of a gadolinium single crystal in the vicinity of Curie point is accomplished within the frameworks of extended thermodynamic approach. It is established that actually observed behavior of temperature dependences of thermodynamic coefficients for gadolinium even near Curie point is sharply different from that in Landau theory. A discrepancy revealed leads to conclusion that traditional concepts should be revised. The solution of extended equation of a ferromagnet magnetic state is found and criteria of its stability are shown [ru

  9. Exotic signatures from supersymmetry

    International Nuclear Information System (INIS)

    Hall, L.J.

    1989-08-01

    Minor changes to the standard supersymmetric model, such as soft flavor violation and R parity violation, cause large changes in the signatures. The origin of these changes and the resulting signatures are discussed. 15 refs., 7 figs., 2 tabs

  10. Modeling CANDU type fuel behaviour during extended burnup irradiations using a revised version of the ELESIM code

    International Nuclear Information System (INIS)

    Arimescu, V.I.; Richmond, W.R.

    1992-05-01

    The high-burnup database for CANDU fuel, with a variety of cases, offers a good opportunity to check models of fuel behaviour, and to identify areas for improvement. Good agreement of calculated values of fission-gas release, and sheath hoop strain, with experimental data indicates that the global behaviour of the fuel element is adequately simulated by a computer code. Using, the ELESIM computer code, the fission-gas release, swelling, and fuel pellet expansion models were analysed, and changes made for gaseous swelling, and diffusional release of fission-gas atoms to the grain boundaries. Using this revised version of ELESIM, satisfactory agreement between measured values of fission-gas release was found for most of the high-burnup database cases. It is concluded that the revised version of the ELESIM code is able to simulate with reasonable accuracy high-burnup as well as low-burnup CANDU fuel

  11. Research on a New Signature Scheme on Blockchain

    Directory of Open Access Journals (Sweden)

    Chao Yuan

    2017-01-01

    Full Text Available With the rise of Bitcoin, blockchain which is the core technology of Bitcoin has received increasing attention. Privacy preserving and performance on blockchain are two research points in academia and business, but there are still some unresolved issues in both respects. An aggregate signature scheme is a digital signature that supports making signatures on many different messages generated by many different users. Using aggregate signature, the size of the signature could be shortened by compressing multiple signatures into a single signature. In this paper, a new signature scheme for transactions on blockchain based on the aggregate signature was proposed. It was worth noting that elliptic curve discrete logarithm problem and bilinear maps played major roles in our signature scheme. And the security properties of our signature scheme were proved. In our signature scheme, the amount will be hidden especially in the transactions which contain multiple inputs and outputs. Additionally, the size of the signature on transaction is constant regardless of the number of inputs and outputs that the transaction contains, which can improve the performance of signature. Finally, we gave an application scenario for our signature scheme which aims to achieve the transactions of big data on blockchain.

  12. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  13. BWR Water Chemistry Guidelines: 1993 Revision, Normal and hydrogen water chemistry

    International Nuclear Information System (INIS)

    Karlberg, G.; Goddard, C.; Fitzpatrick, S.

    1994-02-01

    The goal of water chemistry control is to extend the operating life of the reactor and rector coolant system, balance-of-plant components, and turbines while simultaneously controlling costs to safeguard the continued economic viability of the nuclear power generation investment. To further this goal an industry committee of chemistry personnel prepared guidelines to identify the benefits, risks, and costs associated with water chemistry in BWRs and to provide a template for an optimized water chemistry program. This document replaces the BWR Normal Water Chemistry Guidelines - 1986 Revision and the BWR Hydrogen Water Chemistry Guidelines -- 1987 Revision. It expands on the previous guidelines documents by covering the economic implications of BWR water chemistry control

  14. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  15. On reliable discovery of molecular signatures

    Directory of Open Access Journals (Sweden)

    Björkegren Johan

    2009-01-01

    Full Text Available Abstract Background Molecular signatures are sets of genes, proteins, genetic variants or other variables that can be used as markers for a particular phenotype. Reliable signature discovery methods could yield valuable insight into cell biology and mechanisms of human disease. However, it is currently not clear how to control error rates such as the false discovery rate (FDR in signature discovery. Moreover, signatures for cancer gene expression have been shown to be unstable, that is, difficult to replicate in independent studies, casting doubts on their reliability. Results We demonstrate that with modern prediction methods, signatures that yield accurate predictions may still have a high FDR. Further, we show that even signatures with low FDR may fail to replicate in independent studies due to limited statistical power. Thus, neither stability nor predictive accuracy are relevant when FDR control is the primary goal. We therefore develop a general statistical hypothesis testing framework that for the first time provides FDR control for signature discovery. Our method is demonstrated to be correct in simulation studies. When applied to five cancer data sets, the method was able to discover molecular signatures with 5% FDR in three cases, while two data sets yielded no significant findings. Conclusion Our approach enables reliable discovery of molecular signatures from genome-wide data with current sample sizes. The statistical framework developed herein is potentially applicable to a wide range of prediction problems in bioinformatics.

  16. Signatures of extended gauge sectors in e+e- → ν anti νγ

    International Nuclear Information System (INIS)

    Hewett, J.L.

    1997-03-01

    The ability of high energy e + e - colliders to indirectly probe the existence of heavy new charged gauge bosons via their exchange in the reaction e + e - → ν anti νγ is investigated. It is shown that examination of the resulting photon energy spectrum with polarized beams can extend the W' search reach above the center of mass energy

  17. Revision Total Hip Arthoplasty: Factors Associated with Re-Revision Surgery

    OpenAIRE

    Khatod, M; Cafri, G; Inacio, MCS; Schepps, AL; Paxton, EW; Bini, SA

    2015-01-01

    The survivorship of implants after revision total hip arthroplasty and risk factors associated with re-revision are not well defined. We evaluated the re-revision rate with use of the institutional total joint replacement registry. The purpose of this study was to determine patient, implant, and surgeon factors associated with re-revision total hip arthroplasty.A retrospective cohort study was conducted. The total joint replacement registry was used to identify patients who had undergone revi...

  18. Comparing Patterns of Natural Selection across Species Using Selective Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Shapiro, Jesse; Alm, Eric J.

    2007-12-01

    Comparing gene expression profiles over many different conditions has led to insights that were not obvious from single experiments. In the same way, comparing patterns of natural selection across a set of ecologically distinct species may extend what can be learned from individual genome-wide surveys. Toward this end, we show how variation in protein evolutionary rates, after correcting for genome-wide effects such as mutation rate and demographic factors, can be used to estimate the level and types of natural selection acting on genes across different species. We identify unusually rapidly and slowly evolving genes, relative to empirically derived genome-wide and gene family-specific background rates for 744 core protein families in 30 c-proteobacterial species. We describe the pattern of fast or slow evolution across species as the"selective signature" of a gene. Selective signatures represent aprofile of selection across species that is predictive of gene function: pairs of genes with correlated selective signatures are more likely to share the same cellular function, and genes in the same pathway can evolve in concert. For example,glycolysis and phenylalanine metabolism genes evolve rapidly in Idiomarina loihiensis, mirroring an ecological shift in carbon source from sugars to amino acids. In a broader context, our results suggest that the genomic landscape is organized into functional modules even at the level of natural selection, and thus it may be easier than expected to understand the complex evolutionary pressures on a cell.

  19. Comparing Patterns of Natural Selection Across Species Using Selective Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Alm, Eric J.; Shapiro, B. Jesse; Alm, Eric J.

    2007-12-18

    Comparing gene expression profiles over many different conditions has led to insights that were not obvious from single experiments. In the same way, comparing patterns of natural selection across a set of ecologically distinct species may extend what can be learned from individual genome-wide surveys. Toward this end, we show how variation in protein evolutionary rates, after correcting for genome-wide effects such as mutation rate and demographic factors, can be used to estimate the level and types of natural selection acting on genes across different species. We identify unusually rapidly and slowly evolving genes, relative to empirically derived genome-wide and gene family-specific background rates for 744 core protein families in 30 gamma-proteobacterial species. We describe the pattern of fast or slow evolution across species as the 'selective signature' of a gene. Selective signatures represent a profile of selection across species that is predictive of gene function: pairs of genes with correlated selective signatures are more likely to share the same cellular function, and genes in the same pathway can evolve in concert. For example, glycolysis and phenylalanine metabolism genes evolve rapidly in Idiomarina loihiensis, mirroring an ecological shift in carbon source from sugars to amino acids. In a broader context, our results suggest that the genomic landscape is organized into functional modules even at the level of natural selection, and thus it may be easier than expected to understand the complex evolutionary pressures on a cell.

  20. Real time gamma-ray signature identifier

    Science.gov (United States)

    Rowland, Mark [Alamo, CA; Gosnell, Tom B [Moraga, CA; Ham, Cheryl [Livermore, CA; Perkins, Dwight [Livermore, CA; Wong, James [Dublin, CA

    2012-05-15

    A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

  1. NPP License Renewal and Aging Management: Revised Guidance

    International Nuclear Information System (INIS)

    Hull, A.B.; Hiser, A.L.; Lindo-Talin, S.E.

    2012-01-01

    Based on the Atomic Energy Act, the NRC issues licenses for commercial power reactors to operate for up to 40 years and allows these licenses to be renewed for up to another 20 years. NRC has approved license renewal for well over 50% of U.S. located reactors originally licensed to operate for 40 years. Of these 104 reactors (69 PWRs, 35 BWRs), the NRC has issued renewed licenses for 71 units and is currently reviewing applications for another 15 units. As of May 1, 2012, ten plants at nine sites had entered their 41st year of operation and thus are in their first period of extended operation (PEO). Five more plants will enter the PEO by the end of 2012. One foundation of the license renewal process has been license renewal guidance documents (LRGDs). The U.S. Nuclear Regulatory Commission (NRC) revised key guidance documents used for nuclear power license renewal in 2010 and 2011. These include NUREG-1800, 'Standard Review Plan for Review of License Renewal Applications,' revision 2 (SRP-LR), and NUREG-1801, 'Generic Aging Lessons Learned (GALL) Report,' revision 2 (GALL Report). The guidance documents were updated to reflect lessons learned and operating experience gained since the guidance documents were last issued in 2005. (author)

  2. Electromagnetic signatures of far-field gravitational radiation in the 1 + 3 approach

    International Nuclear Information System (INIS)

    Chua, Alvin J K; Cañizares, Priscilla; Gair, Jonathan R

    2015-01-01

    Gravitational waves (GWs) from astrophysical sources can interact with background electromagnetic fields, giving rise to distinctive and potentially detectable electromagnetic signatures. In this paper, we study such interactions for far-field gravitational radiation using the 1 + 3 approach to relativity. Linearized equations for the electromagnetic field on perturbed Minkowski space are derived and solved analytically. The inverse Gertsenshteĭn conversion of GWs in a static electromagnetic field is rederived, and the resultant electromagnetic radiation is shown to be significant for highly magnetized pulsars in compact binary systems. We also obtain a variety of nonlinear interference effects for interacting gravitational and electromagnetic waves, although wave–wave resonances previously described in the literature are absent when the electric–magnetic self-interaction is taken into account. The fluctuation and amplification of electromagnetic energy flux as the GW strength increases towards the gravitational–electromagnetic frequency ratio is a possible signature of gravitational radiation from extended astrophysical sources. (paper)

  3. FISP5 - an extended and improved version of the fission product inventory code FISP

    International Nuclear Information System (INIS)

    Tobias, A.

    1978-05-01

    In order to accommodate the UKFPDD-1 fission product data library the CEGB fission product inventory code FISP4 has been modified and extended. The opportunity was taken to revise the algorithm used for calculating the nuclide concentrations during irradiation in order to reduce the problem of rounding errors which arise as a result of the computer limitation to a finite word length. The resulting code FISP5 is shown in addition to offer considerable improvement in execution time in comparison with FISP4. Details of the revised algorithm are given together with a brief users' guide to FISP5. (author)

  4. 42 CFR 424.36 - Signature requirements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Signature requirements. 424.36 Section 424.36... (CONTINUED) MEDICARE PROGRAM CONDITIONS FOR MEDICARE PAYMENT Claims for Payment § 424.36 Signature requirements. (a) General rule. The beneficiary's own signature is required on the claim unless the beneficiary...

  5. Unsupervised signature extraction from forensic logs

    NARCIS (Netherlands)

    Thaler, S.M.; Menkovski, V.; Petkovic, M.; Altun, Y.; Das, K.; Mielikäinen, T.; Malerba, D.; Stefanowski, J.; Read, J.; Žitnik, M.; Ceci, M.

    2017-01-01

    Signature extraction is a key part of forensic log analysis. It involves recognizing patterns in log lines such that log lines that originated from the same line of code are grouped together. A log signature consists of immutable parts and mutable parts. The immutable parts define the signature, and

  6. Revised and extended analysis of doubly ionized selenium: Se III

    International Nuclear Information System (INIS)

    Tauheed, A; Hala

    2012-01-01

    The spectrum of selenium was recorded on a 3 m normal incidence vacuum spectrograph of the Antigonish laboratory (Canada) in the wavelength region 300-2080 Å using a triggered spark source. The theoretical structure of doubly ionized selenium (Se III) was predicted by Cowan's multi-configuration interaction code. The ground configuration of Se III is 4s 2 4p 2 and the excited configurations are of the type 4s 2 4pnd (n≥4), 4s 2 4pns (n≥5) and the inner shell excitation gives rise to the 4s4p 3 configuration. The 4s 2 4p 2 -[4s4p 3 +4s 2 4p (4d+5d+6d+7d+5s+6s+7s+8s)] transition array has been analyzed. Several earlier reported levels have been revised and four new configurations have been added. All the levels of these configurations have been established. More than 180 spectral lines have been identified in this spectrum. A total of 75 energy levels belonging to the above-mentioned configurations have been established. Least-squares fitted parametric and Hartree-Fock calculations were used to interpret the observed spectrum. Excellent agreement with theoretical calculations was noticed. The standard deviation of least-squares fit is only 110 cm -1 . The ionization potential of Se III was found to be 255 650±150 cm -1 (31.696±0.018 eV). The accuracy of our wavelengths for sharp lines is better than ±0.005 Å.

  7. Revised

    DEFF Research Database (Denmark)

    Johannsen, Vivian Kvist; Nord-Larsen, Thomas; Riis-Nielsen, Torben

    This report is a revised analysis of the Danish data on CO2 emissions from forest, afforestation and deforestation for the period 1990 - 2008 and a prognosis for the period until 2020. Revision have included measurements from 2009 in the estimations. The report is funded by the Ministry of Climate...

  8. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  9. 7 CFR 718.9 - Signature requirements.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Signature requirements. 718.9 Section 718.9... MULTIPLE PROGRAMS General Provisions § 718.9 Signature requirements. (a) When a program authorized by this chapter or Chapter XIV of this title requires the signature of a producer; landowner; landlord; or tenant...

  10. 27 CFR 17.6 - Signature authority.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Signature authority. 17.6... PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond, tax return, or other required... other proper notification of signature authority has been filed with the TTB office where the required...

  11. Online Signature Verification on MOBISIG Finger-Drawn Signature Corpus

    Directory of Open Access Journals (Sweden)

    Margit Antal

    2018-01-01

    Full Text Available We present MOBISIG, a pseudosignature dataset containing finger-drawn signatures from 83 users captured with a capacitive touchscreen-based mobile device. The database was captured in three sessions resulting in 45 genuine signatures and 20 skilled forgeries for each user. The database was evaluated by two state-of-the-art methods: a function-based system using local features and a feature-based system using global features. Two types of equal error rate computations are performed: one using a global threshold and the other using user-specific thresholds. The lowest equal error rate was 0.01% against random forgeries and 5.81% against skilled forgeries using user-specific thresholds that were computed a posteriori. However, these equal error rates were significantly raised to 1.68% (random forgeries case and 14.31% (skilled forgeries case using global thresholds. The same evaluation protocol was performed on the DooDB publicly available dataset. Besides verification performance evaluations conducted on the two finger-drawn datasets, we evaluated the quality of the samples and the users of the two datasets using basic quality measures. The results show that finger-drawn signatures can be used by biometric systems with reasonable accuracy.

  12. 48 CFR 804.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... signature. 804.101 Section 804.101 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS GENERAL ADMINISTRATIVE MATTERS Contract Execution 804.101 Contracting officer's signature. (a) If a... signature. ...

  13. Perancangan Aplikasi Undeniable Digital Signature Dengan Algoritma Chaum’s Blind Signature

    OpenAIRE

    Simanjuntak, Martin Dennain

    2012-01-01

    Desperaty need a securiry system in the exchange of information via computer media, so that information can not be accessed by unauthorized parties. One of the security system is to use a system of digital signatures as a means of authenticating the authenticity of digital document that are exchanged. By using a digital a digital signature system is undeniable, the security system can be generated digital document exchange, where the system is free from the from of rejection...

  14. Practical quantum digital signature

    Science.gov (United States)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  15. 25 CFR 213.10 - Lessor's signature.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Lessor's signature. 213.10 Section 213.10 Indians BUREAU... MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature... thumbprint which shall be designated as “right” or “left” thumbmark. Such signatures must be witnessed by two...

  16. Initial Semantics for Strengthened Signatures

    Directory of Open Access Journals (Sweden)

    André Hirschowitz

    2012-02-01

    Full Text Available We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax. Our strengthened arities admit colimits, which allows the treatment of the λ-calculus with explicit substitution.

  17. Spectral signature selection for mapping unvegetated soils

    Science.gov (United States)

    May, G. A.; Petersen, G. W.

    1975-01-01

    Airborne multispectral scanner data covering the wavelength interval from 0.40-2.60 microns were collected at an altitude of 1000 m above the terrain in southeastern Pennsylvania. Uniform training areas were selected within three sites from this flightline. Soil samples were collected from each site and a procedure developed to allow assignment of scan line and element number from the multispectral scanner data to each sampling location. These soil samples were analyzed on a spectrophotometer and laboratory spectral signatures were derived. After correcting for solar radiation and atmospheric attenuation, the laboratory signatures were compared to the spectral signatures derived from these same soils using multispectral scanner data. Both signatures were used in supervised and unsupervised classification routines. Computer-generated maps using the laboratory and multispectral scanner derived signatures resulted in maps that were similar to maps resulting from field surveys. Approximately 90% agreement was obtained between classification maps produced using multispectral scanner derived signatures and laboratory derived signatures.

  18. Time Series Based for Online Signature Verification

    Directory of Open Access Journals (Sweden)

    I Ketut Gede Darma Putra

    2013-11-01

    Full Text Available Signature verification system is to match the tested signature with a claimed signature. This paper proposes time series based for feature extraction method and dynamic time warping for match method. The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test. The final result system was tested with 50 participants with 3 references. This test obtained that system accuracy without imposters is 90,44897959% at threshold 44 with rejection errors (FNMR is 5,2% and acceptance errors (FMR is 4,35102%, when with imposters system accuracy is 80,1361% at threshold 27 with error rejection (FNMR is 15,6% and acceptance errors (average FMR is 4,263946%, with details as follows: acceptance errors is 0,391837%, acceptance errors simple imposters is 3,2% and acceptance errors trained imposters is 9,2%.

  19. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures.

    Science.gov (United States)

    Pride, David T; Schoenfeld, Thomas

    2008-09-17

    Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC), where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of the Octopus and Bear Paw metagenomic contigs

  20. Signatures de l'invisible

    CERN Multimedia

    CERN Press Office. Geneva

    2000-01-01

    "Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:

  1. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  2. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  3. Maximizing biomarker discovery by minimizing gene signatures

    Directory of Open Access Journals (Sweden)

    Chang Chang

    2011-12-01

    Full Text Available Abstract Background The use of gene signatures can potentially be of considerable value in the field of clinical diagnosis. However, gene signatures defined with different methods can be quite various even when applied the same disease and the same endpoint. Previous studies have shown that the correct selection of subsets of genes from microarray data is key for the accurate classification of disease phenotypes, and a number of methods have been proposed for the purpose. However, these methods refine the subsets by only considering each single feature, and they do not confirm the association between the genes identified in each gene signature and the phenotype of the disease. We proposed an innovative new method termed Minimize Feature's Size (MFS based on multiple level similarity analyses and association between the genes and disease for breast cancer endpoints by comparing classifier models generated from the second phase of MicroArray Quality Control (MAQC-II, trying to develop effective meta-analysis strategies to transform the MAQC-II signatures into a robust and reliable set of biomarker for clinical applications. Results We analyzed the similarity of the multiple gene signatures in an endpoint and between the two endpoints of breast cancer at probe and gene levels, the results indicate that disease-related genes can be preferably selected as the components of gene signature, and that the gene signatures for the two endpoints could be interchangeable. The minimized signatures were built at probe level by using MFS for each endpoint. By applying the approach, we generated a much smaller set of gene signature with the similar predictive power compared with those gene signatures from MAQC-II. Conclusions Our results indicate that gene signatures of both large and small sizes could perform equally well in clinical applications. Besides, consistency and biological significances can be detected among different gene signatures, reflecting the

  4. The ionospheric signature of Pi 2 pulsations observed by STARE

    International Nuclear Information System (INIS)

    Sutcliffe, P.R.; Nielsen, E.

    1992-01-01

    This study extends the work of Sutcliffe and Nielsen (1990) in which a classical Pi 2 pulsation was first isolated in Scandinavian Twin Auroral Radar Experiment (STARE) data. A high-pass-filtering technique is used to remove the background electric field in the STARE data and so reveal the spatial and temporal ionospheric signatures of the Pi 2 pulsation electric fields. A number of events are identified and examples presented in which pulsation electric fields up to 50 mV/m are observed. Magnetic field oscillations computed from the filtered STARE data using the Biot-Savart law correlate well with pulsation magnetometer data. A 180 degree phase difference is observed between high- and low-altitude X component pulsations. The ionospheric signature of a Pi 2 is located slightly poleward of the core of the auroral breakup region where the southward, westward, and northward directed background electric fields coverage; the strongest pulsation fields occur in the region of equatorward directed electric fields. The ionospheric electric field patterns of the Pi 2 pulsations determined from the STARE data correlate well with those modeled for a transverse Alfven wave incident on an east-west aligned high-conductivity strip in the ionosphere

  5. Lattice-Based Revocable Certificateless Signature

    Directory of Open Access Journals (Sweden)

    Ying-Hao Hung

    2017-10-01

    Full Text Available Certificateless signatures (CLS are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization problems. These two problems would be solved by quantum computers in the future so that the signature schemes based on them will also become insecure. For post-quantum cryptography, lattice-based cryptography is significant due to its efficiency and security. However, no study on addressing the revocation problem in the existing lattice-based CLS schemes is presented. In this paper, we focus on the revocation issue and present the first revocable CLS (RCLS scheme over lattices. Based on the short integer solution (SIS assumption over lattices, the proposed lattice-based RCLS scheme is shown to be existential unforgeability against adaptive chosen message attacks. By performance analysis and comparisons, the proposed lattice-based RCLS scheme is better than the previously proposed lattice-based CLS scheme, in terms of private key size, signature length and the revocation mechanism.

  6. General Conversion for Obtaining Strongly Existentially Unforgeable Signatures

    Science.gov (United States)

    Teranishi, Isamu; Oyama, Takuro; Ogata, Wakaha

    We say that a signature scheme is strongly existentially unforgeable (SEU) if no adversary, given message/signature pairs adaptively, can generate a signature on a new message or a new signature on a previously signed message. We propose a general and efficient conversion in the standard model that transforms a secure signature scheme to SEU signature scheme. In order to construct that conversion, we use a chameleon commitment scheme. Here a chameleon commitment scheme is a variant of commitment scheme such that one can change the committed value after publishing the commitment if one knows the secret key. We define the chosen message security notion for the chameleon commitment scheme, and show that the signature scheme transformed by our proposed conversion satisfies the SEU property if the chameleon commitment scheme is chosen message secure. By modifying the proposed conversion, we also give a general and efficient conversion in the random oracle model, that transforms a secure signature scheme into a SEU signature scheme. This second conversion also uses a chameleon commitment scheme but only requires the key only attack security for it.

  7. [Osteosynthesis and cup revision in periprosthetic acetabulum fractures using a Kocher-Langenbeck approach].

    Science.gov (United States)

    Schwabe, P; Märdian, S; Perka, C; Schaser, K-D

    2016-04-01

    Reconstruction/stable fixation of the acetabular columns to create an adequate periacetabular requirement for the implantation of a revision cup. Displaced/nondisplaced fractures with involvement of the posterior column. Resulting instability of the cup in an adequate bone stock situation. Periprosthetic acetabulum fractures with inadequate bone stock. Extended periacetabular defects with loss of anchorage options. Isolated periprosthetic fractures of the anterior column. Septic loosening. Dorsal approach. Dislocation of hip. Mechanical testing of inlaying acetabular cup. With unstable cup situation explantation of the cup, fracture fixation of acetabulum with dorsal double plate osteosynthesis along the posterior column. Cup revision. Hip joint reposition. Early mobilization; partial weight bearing for 12 weeks. Thrombosis prophylaxis. Clinical and radiological follow-ups. Periprosthetic acetabular fracture in 17 patients with 9 fractures after primary total hip replacement (THR), 8 after revision THR. Fractures: 12 due to trauma, 5 spontaneously; 7 anterior column fractures, 5 transverse fractures, 4 posterior column fractures, 1 two column fracture after hemiendoprosthesis. 5 type 1 fractures and 12 type 2 fractures. Operatively treated cases (10/17) received 3 reinforcement ring, 2 pedestal cup, 1 standard revision cup, cup-1 cage construct, 1 ventral plate osteosynthesis, 1 dorsal plate osteosynthesis, and 1 dorsal plate osteosynthesis plus cup revision (10-month Harris Hip Score 78 points). Radiological follow-up for 10 patients: consolidation of fractures without dislocation and a fixed acetabular cup. No revision surgeries during follow-up; 2 hip dislocations, 1 transient sciatic nerve palsy.

  8. Radar micro-doppler signatures processing and applications

    CERN Document Server

    Chen, Victor C; Miceli, William J

    2014-01-01

    Radar Micro-Doppler Signatures: Processing and applications concentrates on the processing and application of radar micro-Doppler signatures in real world situations, providing readers with a good working knowledge on a variety of applications of radar micro-Doppler signatures.

  9. Physics Signatures at CLIC

    CERN Document Server

    Battaglia, Marco

    2001-01-01

    A set of signatures for physics processes of potential interests for the CLIC programme at = 1 - 5 TeV are discussed. These signatures, that may correspond to the manifestation of different scenarios of new physics as well as to Standard Model precision tests, are proposed as benchmarks for the optimisation of the CLIC accelerator parameters and for a first definition of the required detector response.

  10. Genome signature analysis of thermal virus metagenomes reveals Archaea and thermophilic signatures

    Directory of Open Access Journals (Sweden)

    Pride David T

    2008-09-01

    Full Text Available Abstract Background Metagenomic analysis provides a rich source of biological information for otherwise intractable viral communities. However, study of viral metagenomes has been hampered by its nearly complete reliance on BLAST algorithms for identification of DNA sequences. We sought to develop algorithms for examination of viral metagenomes to identify the origin of sequences independent of BLAST algorithms. We chose viral metagenomes obtained from two hot springs, Bear Paw and Octopus, in Yellowstone National Park, as they represent simple microbial populations where comparatively large contigs were obtained. Thermal spring metagenomes have high proportions of sequences without significant Genbank homology, which has hampered identification of viruses and their linkage with hosts. To analyze each metagenome, we developed a method to classify DNA fragments using genome signature-based phylogenetic classification (GSPC, where metagenomic fragments are compared to a database of oligonucleotide signatures for all previously sequenced Bacteria, Archaea, and viruses. Results From both Bear Paw and Octopus hot springs, each assembled contig had more similarity to other metagenome contigs than to any sequenced microbial genome based on GSPC analysis, suggesting a genome signature common to each of these extreme environments. While viral metagenomes from Bear Paw and Octopus share some similarity, the genome signatures from each locale are largely unique. GSPC using a microbial database predicts most of the Octopus metagenome has archaeal signatures, while bacterial signatures predominate in Bear Paw; a finding consistent with those of Genbank BLAST. When using a viral database, the majority of the Octopus metagenome is predicted to belong to archaeal virus Families Globuloviridae and Fuselloviridae, while none of the Bear Paw metagenome is predicted to belong to archaeal viruses. As expected, when microbial and viral databases are combined, each of

  11. 48 CFR 204.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Contracting officer's signature. 204.101 Section 204.101 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... officer's signature. Follow the procedures at PGI 204.101 for signature of contract documents. [71 FR 9268...

  12. Can specific transcriptional regulators assemble a universal cancer signature?

    Science.gov (United States)

    Roy, Janine; Isik, Zerrin; Pilarsky, Christian; Schroeder, Michael

    2013-10-01

    Recently, there is a lot of interest in using biomarker signatures derived from gene expression data to predict cancer progression. We assembled signatures of 25 published datasets covering 13 types of cancers. How do these signatures compare with each other? On one hand signatures answering the same biological question should overlap, whereas signatures predicting different cancer types should differ. On the other hand, there could also be a Universal Cancer Signature that is predictive independently of the cancer type. Initially, we generate signatures for all datasets using classical approaches such as t-test and fold change and then, we explore signatures resulting from a network-based method, that applies the random surfer model of Google's PageRank algorithm. We show that the signatures as published by the authors and the signatures generated with classical methods do not overlap - not even for the same cancer type - whereas the network-based signatures strongly overlap. Selecting 10 out of 37 universal cancer genes gives the optimal prediction for all cancers thus taking a first step towards a Universal Cancer Signature. We furthermore analyze and discuss the involved genes in terms of the Hallmarks of cancer and in particular single out SP1, JUN/FOS and NFKB1 and examine their specific role in cancer progression.

  13. 36 CFR 1150.22 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Signature of documents. 1150.22 Section 1150.22 Parks, Forests, and Public Property ARCHITECTURAL AND TRANSPORTATION BARRIERS... Documents for Proceedings on Citations § 1150.22 Signature of documents. The signature of a party...

  14. 17 CFR 201.65 - Identity and signature.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Identity and signature. 201.65... of 1934 § 201.65 Identity and signature. Applications pursuant to this subpart may omit the identity, mailing address, and signature of the applicant; provided, that such identity, mailing address and...

  15. 210Pb, 230Th, and 10Be in Central Indian Basin seamount sediments: Signatures of degassing and hydrothermal alteration of recent origin

    Digital Repository Service at National Institute of Oceanography (India)

    Nath, B.N.; Borole, D.V.; Aldahan, A.; Patil, S; Mascarenhas-Pereira, M.B.L.; Possnert, G.; Ericsson, T.; Ramaswamy, V.; Gupta, S

    , 230 Th, and 10 Be in Central Indian Basin seamount sediments: Signatures of degassing and hydrothermal alteration of recent origin B. N. Nath, 1 D. V. Borole, 1 A. Aldahan, 2 S. K. Patil, 3 M. B. L. Mascarenhas-Pereira, 1 G. Possnert, 4 T. Ericsson, 2... V. Ramaswamy, 1 and S. M. Gupta 1 Received 4 March 2008; revised 17 March 2008; accepted 8 April 2008; published 14 May 2008. [1] Isotopic ( 210 Pb, 238 U- 230 Th, 10 Be), major and trace elements, and micromorphological and microchemical data, were...

  16. 15 CFR 908.16 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Signature. 908.16 Section 908.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) NATIONAL OCEANIC... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the National...

  17. 34 CFR 101.32 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Signature of documents. 101.32 Section 101.32 Education Regulations of the Offices of the Department of Education OFFICE FOR CIVIL RIGHTS, DEPARTMENT OF EDUCATION... Documents § 101.32 Signature of documents. The signature of a party, authorized officer, employee or...

  18. 29 CFR 102.116 - Signature of orders.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Signature of orders. 102.116 Section 102.116 Labor Regulations Relating to Labor NATIONAL LABOR RELATIONS BOARD RULES AND REGULATIONS, SERIES 8 Certification and Signature of Documents § 102.116 Signature of orders. The executive secretary or the associate executive...

  19. The Importance of Hydrological Signature and Its Recurring Dynamics

    Science.gov (United States)

    Wendi, D.; Marwan, N.; Merz, B.

    2017-12-01

    Temporal changes in hydrology are known to be challenging to detect and attribute due to multiple drivers that include complex processes that are non-stationary and highly variable. These drivers, such as human-induced climate change, natural climate variability, implementation of flood defense, river training, and land use change, could impact variably on space-time scales and influence or mask each other. Besides, data depicting these drivers are often not available. One conventional approach of analyzing the change is based on discrete points of magnitude (e.g. the frequency of recurring extreme discharge) and often linearly quantified and hence do not reveal the potential change in the hydrological process. Moreover, discharge series are often subject to measurement errors, such as rating curve error especially in the case of flood peaks where observation are derived through extrapolation. In this study, the system dynamics inferred from the hydrological signature (i.e. the shape of hydrograph) is being emphasized. One example is to see if certain flood dynamics (instead of flood peak) in the recent years, had also occurred in the past (or rather extraordinary), and if so what is its recurring rate and if there had been a shift in its occurrence in time or seasonality (e.g. earlier snow melt dominant flood). The utilization of hydrological signature here is extended beyond those of classical hydrology such as base flow index, recession and rising limb slope, and time to peak. It is in fact all these characteristics combined i.e. from the start until the end of the hydrograph. Recurrence plot is used as a method to quantify and visualize the recurring hydrological signature through its phase space trajectories, and usually in the order of dimension above 2. Such phase space trajectories are constructed by embedding the time series into a series of variables (i.e. number of dimension) corresponding to the time delay. Since the method is rather novel in

  20. On signature change in p-adic space-times

    International Nuclear Information System (INIS)

    Dragovic, B.G.

    1991-01-01

    Change of signature by linear coordinate transformations in p-adic space-times is considered. In this paper it is shown that there exists arbitrary change of trivial signature in Q p n for all n ≥ 1 if p ≡ 1 (mod 4). In other cases it is possible to change only even number of the signs of the signature. The authors suggest new concept of signature with respect to distinct quadratic extensions, of Q p . If space-time dimension is restricted to four there is no signature change

  1. Signature Curves Statistics of DNA Supercoils

    OpenAIRE

    Shakiban, Cheri; Lloyd, Peter

    2004-01-01

    In this paper we describe the Euclidean signature curves for two dimensional closed curves in the plane and their generalization to closed space curves. The focus will be on discrete numerical methods for approximating such curves. Further we will apply these numerical methods to plot the signature curves related to three-dimensional simulated DNA supercoils. Our primary focus will be on statistical analysis of the data generated for the signature curves of the supercoils. We will try to esta...

  2. 45 CFR 81.32 - Signature of documents.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Signature of documents. 81.32 Section 81.32 Public... UNDER PART 80 OF THIS TITLE Form, Execution, Service and Filing of Documents § 81.32 Signature of documents. The signature of a party, authorized officer, employee or attorney constitutes a certificate that...

  3. Signature inversion in πh{sub 11/2} x νi{sub 13/2} band of {sup 152}Eu and {sup 154,156}Tb

    Energy Technology Data Exchange (ETDEWEB)

    Kumar, Sushil [Akal University, Department of Physics, Talwandi Sabo (India); Maharishi Markandeshwar University, Department of Physics, Mullana (India); Singh, Sukhjeet [Akal University, Department of Physics, Talwandi Sabo (India); Sharma, Vandana; Sharma, J.K. [Maharishi Markandeshwar University, Department of Physics, Mullana (India)

    2017-04-15

    The phenomenon of signature inversion observed in the πh{sub 11/2} x νi{sub 13/2} band of {sup 152}Eu and {sup 156}Tb nuclides is revisited through the axially symmetric two quasiparticle plus rotor model approach. The magnitude of experimentally observed signature splitting and point of signature inversion, which could not be explicitly reproduced in the earlier calculations, is successfully reproduced in the present study. Some of the critical issues, such as violation of the well-established Gallagher Moszkowski (GM) rule for eight GM doublets appearing in the basis space of earlier calculations of {sup 152}Eu and {sup 156}Tb, are fixed and also the ambiguity regarding spin assignment to this band observed in {sup 156}Tb is resolved. These calculations are further extended to the same band (πh{sub 11/2} x νi{sub 13/2}) observed in {sup 154}Tb nuclide and signature inversion observed in this band is successfully reproduced. (orig.)

  4. Modeling the lexical morphology of Western handwritten signatures.

    Directory of Open Access Journals (Sweden)

    Moises Diaz-Cabrera

    Full Text Available A handwritten signature is the final response to a complex cognitive and neuromuscular process which is the result of the learning process. Because of the many factors involved in signing, it is possible to study the signature from many points of view: graphologists, forensic experts, neurologists and computer vision experts have all examined them. Researchers study written signatures for psychiatric, penal, health and automatic verification purposes. As a potentially useful, multi-purpose study, this paper is focused on the lexical morphology of handwritten signatures. This we understand to mean the identification, analysis, and description of the signature structures of a given signer. In this work we analyze different public datasets involving 1533 signers from different Western geographical areas. Some relevant characteristics of signature lexical morphology have been selected, examined in terms of their probability distribution functions and modeled through a General Extreme Value distribution. This study suggests some useful models for multi-disciplinary sciences which depend on handwriting signatures.

  5. Signature molecular descriptor : advanced applications.

    Energy Technology Data Exchange (ETDEWEB)

    Visco, Donald Patrick, Jr. (Tennessee Technological University, Cookeville, TN)

    2010-04-01

    In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report

  6. Ship Signature Management System : Functionality

    NARCIS (Netherlands)

    Arciszewski, H.F.R.; Lier, L. van; Meijer, Y.G.S.; Noordkamp, H.W.; Wassenaar, A.S.

    2010-01-01

    A signature of a platform is the manner in which the platform manifests itself to a certain type of sensor and how observable it is when such a sensor is used to detect the platform. Because many military platforms use sensors in different media, it is the total of its different signatures that

  7. Revised guideline for the approval procedure of package designs in Germany

    International Nuclear Information System (INIS)

    Nitsche, F.; Roedel, R.

    2004-01-01

    The IAEA Regulations for the Safe Transport of Radioactive Material, TS-R-1 are applied in Germany through the implementation of the Dangerous Goods Transport Regulations for class 7 of the International Modal Organisations (ADR, RID, IMDG-Code, ICAO-TI). Based on this the approval procedures for packages designs applied in Germany are in compliance with the provisions of TS-R-1. The Guideline R 003 issued by the Ministry of Transport, Building and Housing (BMVBW) in 1991 is the basis for the package design approval procedures in Germany. This Guideline has been reviewed and revised to reflect latest developments in the regulations as well as in the regulatory practice. In particular it has been extended to the approval procedures of Type C packages, packages subject to transitional arrangements, special form and low dispersible radioactive material and provides more detailed information to the applicant about the requested documentation. Publication of this revised guideline has been delayed but it is expected to take place in October 2004. The paper gives an overview about the main parts and provisions of this revised Guideline R 003 with the focus on package design approval procedures

  8. Cell short circuit, preshort signature

    Science.gov (United States)

    Lurie, C.

    1980-01-01

    Short-circuit events observed in ground test simulations of DSCS-3 battery in-orbit operations are analyzed. Voltage signatures appearing in the data preceding the short-circuit event are evaluated. The ground test simulation is briefly described along with performance during reconditioning discharges. Results suggest that a characteristic signature develops prior to a shorting event.

  9. Revised and extended analysis of the fifth spectrum of bromine: Br V

    International Nuclear Information System (INIS)

    Tauheed, A; Joshi, Y N

    2009-01-01

    The spectrum of four-times ionized bromine (Br V) has been investigated in the 350-1850 A wavelength region, which was recorded on a 3-m normal incidence spectrograph at the Antigonish laboratory using a triggered spark light source and on a 6.65-m grazing incidence spectrograph at the Zeeman laboratory in Amsterdam using a sliding spark source. We have studied the 4s 2 (4p+5p+6p+4f)+4p 3 +4s4p4d+4s4p5s configurations in the odd parity system and the 4s4p 2 , 4s 2 (4d+5d+5s+6s+7s) configurations in the even parity system. Relativistic Hartree-Fock (HFR) and least squares fitted (LSF) parametric calculations were carried out to interpret the observed spectrum. Fifty-eight Br V levels have now been established, out of which 48 are new levels. Two hundred and sixteen spectral lines have been classified in this spectrum, out of which 202 are newly classified lines. A revised value of the ionization potential has been determined to be 480 670±200 cm -1 (59.60±0.02 eV).

  10. NPP License Renewal and Aging Management: Revised Guidance

    International Nuclear Information System (INIS)

    Hull, A.B.; Hiser, A.L.; Lindo-Talin, S.E.

    2012-01-01

    Based on the Atomic Energy Act, the NRC issues licenses for commercial power reactors to operate for up to 40 years and allows these licenses to be renewed for up to another 20 years. NRC has approved license renewal (LR) for well over 50% of U.S. located reactors originally licensed to operate for 40 years. Of these 104 reactors (69 PWRs, 35 BWRs), the NRC has issued renewed licenses for 71 units and is currently reviewing applications for another 15 units. As of May 1, 2012, ten plants at nine sites had entered their 41st year of operation and thus are in their first period of extended operation (PEO). Five more plants will enter the PEO by the end of 2012. One foundation of the license renewal process has been license renewal guidance documents (LRGDs). The U.S. Nuclear Regulatory Commission (NRC) revised key guidance documents used for nuclear power LR in 2010 and 2011. These include NUREG-1800, 'Standard Review Plan for Review of License Renewal Applications,' revision 2 (SRP-LR), and NUREG-1801, 'Generic Aging Lessons Learned (GALL) Report,' revision 2 (GALL Report). The guidance documents were updated to reflect lessons learned and operating experience gained since the guidance documents were last issued in 2005. The reactor LRGDs referenced in this poster can all be accessed at http://www.nrc.gov/reactors/operating/licensing/renewal/guidance.html (author)

  11. Fidelity study of superconductivity in extended Hubbard models

    Science.gov (United States)

    Plonka, N.; Jia, C. J.; Wang, Y.; Moritz, B.; Devereaux, T. P.

    2015-07-01

    The Hubbard model with local on-site repulsion is generally thought to possess a superconducting ground state for appropriate parameters, but the effects of more realistic long-range Coulomb interactions have not been studied extensively. We study the influence of these interactions on superconductivity by including nearest- and next-nearest-neighbor extended Hubbard interactions in addition to the usual on-site terms. Utilizing numerical exact diagonalization, we analyze the signatures of superconductivity in the ground states through the fidelity metric of quantum information theory. We find that nearest and next-nearest neighbor interactions have thresholds above which they destabilize superconductivity regardless of whether they are attractive or repulsive, seemingly due to competing charge fluctuations.

  12. Co-operation Agreement for the Promotion of Nuclear Science and Technology in Latin America and the Caribbean (ARCAL). Status list as of 30 September 2002. Signature and ratification. Declarations/reservations made upon signature

    International Nuclear Information System (INIS)

    2002-01-01

    The document reproduces the text of the Co-operation Agreement for the Promotion of Nuclear Science and Technology in Latin America and the Caribbean (ARCAL) which was opened for signature on 25 September 1998 and shall come into force after deposit of the instrument of ratification by ten Member States. It shall remain in force for ten years, and may be extended by periods of five years if the Member States so agree. By 30 September 2002, there were 18 Signatories to the above Agreement

  13. The electronic identification, signature and security of information systems

    Directory of Open Access Journals (Sweden)

    Horovèák Pavel

    2002-12-01

    Full Text Available The contribution deals with the actual methods and technologies of information and communication systems security. It introduces the overview of electronic identification elements such as static password, dynamic password and single sign-on. Into this category belong also biometric and dynamic characteristics of verified person. Widespread is authentication based on identification elements ownership, such as various cards and authentication calculators. In the next part is specified a definition and characterization of electronic signature, its basic functions and certificate categories. Practical utilization of electronic signature consists of electronic signature acquirement, signature of outgoing email message, receiving of electronic signature and verification of electronic signature. The use of electronic signature is continuously growing and in connection with legislation development it exercises in all resorts.

  14. Total hip arthroplasty revision due to infection: a cost analysis approach.

    Science.gov (United States)

    Klouche, S; Sariali, E; Mamoudy, P

    2010-04-01

    . The rate of transfer to a rehabilitation hospital (ORH) was 55% for primary THA, 77% in non infected revision cases and 65% in revisions due to infection. Moreover, 30% of these infected THA were prescribed HH. Non-infected THA revisions cost 1.4 times more than primary THA. THA revisions due to infection cost 3.6 times more than primary THA. The economic impact of THA infections is considerable. The extra costs are mainly due to an extended hospital stay and to longer rehabilitation consuming significant substantial human and material resources. The cost of treating infected THA is high. Treatment strategies should therefore be optimised to increase the success rate and minimise total costs. Level IV. Economic and decision analyses, retrospective study 2010 Elsevier Masson SAS. All rights reserved.

  15. COMPUTER-IMPLEMENTED METHOD OF PERFORMING A SEARCH USING SIGNATURES

    DEFF Research Database (Denmark)

    2017-01-01

    A computer-implemented method of processing a query vector and a data vector), comprising: generating a set of masks and a first set of multiple signatures and a second set of multiple signatures by applying the set of masks to the query vector and the data vector, respectively, and generating...... candidate pairs, of a first signature and a second signature, by identifying matches of a first signature and a second signature. The set of masks comprises a configuration of the elements that is a Hadamard code; a permutation of a Hadamard code; or a code that deviates from a Hadamard code...

  16. Signature effects in 2-qp rotational bands

    International Nuclear Information System (INIS)

    Jain, A.K.; Goel, A.

    1992-01-01

    The authors briefly review the progress in understanding the 2-qp rotational bands in odd-odd nuclei. Signature effects and the phenomenon of signature inversion are discussed. The Coriolis coupling appears to have all the ingredients to explain the inversion. Some recent work on signature dependence in 2-qp bands of even-even nuclei is also discussed; interesting features are pointed out

  17. Time-dependent delayed signatures from energetic photon interrogations

    International Nuclear Information System (INIS)

    Norman, Daren R.; Jones, James L.; Blackburn, Brandon W.; Haskell, Kevin J.; Johnson, James T.; Watson, Scott M.; Hunt, Alan W.; Spaulding, Randy; Harmon, Frank

    2007-01-01

    Pulsed photonuclear interrogation environments generated by 8-24 MeV electron linac are rich with time-dependent, material-specific, radiation signatures. Nitrogen-based explosives and nuclear materials can be detected by exploiting these signatures in different delayed-time regions. Numerical and experimental results presented in this paper show the unique time and energy dependence of these signatures. It is shown that appropriate delayed-time windows are essential to acquire material-specific signatures in pulsed photonuclear assessment environments. These developments demonstrate that pulsed, high-energy, photon-inspection environments can be exploited for time-dependent, material-specific signatures through the proper operation of specialized detectors and detection methods

  18. Peripheral blood signatures of lead exposure.

    Directory of Open Access Journals (Sweden)

    Heather G LaBreche

    Full Text Available BACKGROUND: Current evidence indicates that even low-level lead (Pb exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. METHODOLOGY/PRINCIPAL FINDING: Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. CONCLUSIONS/SIGNIFICANCE: The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway.

  19. Magnetic signature surveillance of nuclear fuel

    International Nuclear Information System (INIS)

    Bernatowicz, H.; Schoenig, F.C.

    1981-01-01

    Typical nuclear fuel material contains tramp ferromagnetic particles of random size and distribution. Also, selected amounts of paramagnetic or ferromagnetic material can be added at random or at known positions in the fuel material. The fuel material in its non-magnetic container is scanned along its length by magnetic susceptibility detecting apparatus whereby susceptibility changes along its length are obtained and provide a unique signal waveform of the container of fuel material as a signature thereof. The output signature is stored. At subsequent times in its life the container is again scanned and respective signatures obtained which are compared with the initially obtained signature, any differences indicating alteration or tampering with the fuel material. If the fuel material includes a paramagnetic additive by taking two measurements along the container the effects thereof can be cancelled out. (author)

  20. High School Teachers' Problem Solving Activities to Review and Extend Their Mathematical and Didactical Knowledge

    Science.gov (United States)

    Santos-Trigo, Manuel; Barrera-Mora, Fernando

    2011-01-01

    The study documents the extent to which high school teachers reflect on their need to revise and extend their mathematical and practicing knowledge. In this context, teachers worked on a set of tasks as a part of an inquiring community that promoted the use of different computational tools in problem solving approaches. Results indicated that the…

  1. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  2. Loosening After Acetabular Revision

    DEFF Research Database (Denmark)

    Beckmann, Nicholas A.; Weiss, Stefan; Klotz, Matthias C.M.

    2014-01-01

    The best method of revision acetabular arthroplasty remains unclear. Consequently, we reviewed the literature on the treatment of revision acetabular arthroplasty using revision rings (1541 cases; mean follow-up (FU) 5.7 years) and Trabecular Metal, or TM, implants (1959 cases; mean FU 3.7 years...

  3. Signature-based store checking buffer

    Science.gov (United States)

    Sridharan, Vilas; Gurumurthi, Sudhanva

    2015-06-02

    A system and method for optimizing redundant output verification, are provided. A hardware-based store fingerprint buffer receives multiple instances of output from multiple instances of computation. The store fingerprint buffer generates a signature from the content included in the multiple instances of output. When a barrier is reached, the store fingerprint buffer uses the signature to verify the content is error-free.

  4. Neutral signature Walker-VSI metrics

    International Nuclear Information System (INIS)

    Coley, A; McNutt, D; Musoke, N; Brooks, D; Hervik, S

    2014-01-01

    We will construct explicit examples of four-dimensional neutral signature Walker (but not necessarily degenerate Kundt) spaces for which all of the polynomial scalar curvature invariants vanish. We then investigate the properties of some particular subclasses of Ricci flat spaces. We also briefly describe some four-dimensional neutral signature Einstein spaces for which all of the polynomial scalar curvature invariants are constant. (paper)

  5. An interpretation of signature inversion

    International Nuclear Information System (INIS)

    Onishi, Naoki; Tajima, Naoki

    1988-01-01

    An interpretation in terms of the cranking model is presented to explain why signature inversion occurs for positive γ of the axially asymmetric deformation parameter and emerges into specific orbitals. By introducing a continuous variable, the eigenvalue equation can be reduced to a one dimensional Schroedinger equation by means of which one can easily understand the cause of signature inversion. (author)

  6. Acoustic Signature Monitoring and Management of Naval Platforms

    NARCIS (Netherlands)

    Basten, T.G.H.; Jong, C.A.F. de; Graafland, F.; Hof, J. van 't

    2015-01-01

    Acoustic signatures make naval platforms susceptible to detection by threat sensors. The variable operational conditions and lifespan of a platform cause variations in the acoustic signature. To deal with these variations, a real time signature monitoring capability is being developed, with advisory

  7. Cross-correlation of the cosmic microwave background with the 2MASS galaxy survey: Signatures of dark energy, hot gas, and point sources

    International Nuclear Information System (INIS)

    Afshordi, Niayesh; Loh, Yeong-Shang; Strauss, Michael A.

    2004-01-01

    We cross-correlate the cosmic microwave background temperature anisotropies observed by the Wilkinson Microwave Anisotropy Probe (WMAP) with the projected distribution of extended sources in the Two Micron All Sky Survey (2MASS). By modeling the theoretical expectation for this signal, we extract the signatures of dark energy [integrated Sachs-Wolfe effect (ISW)], hot gas [thermal Sunyaev-Zeldovich (SZ) effect], and microwave point sources in the cross-correlation. Our strongest signal is the thermal SZ, at the 3.1-3.7σ level, which is consistent with the theoretical prediction based on observations of x-ray clusters. We also see the ISW signal at the 2.5σ level, which is consistent with the expected value for the concordance ΛCDM cosmology, and is an independent signature of the presence of dark energy in the Universe. Finally, we see the signature of microwave point sources at the 2.7σ level

  8. 48 CFR 4.102 - Contractor's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contractor's signature. 4.102 Section 4.102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.102 Contractor's signature. (a) Individuals. A contract with an...

  9. DIGITAL SIGNATURE IN THE WAY OF LAW

    Directory of Open Access Journals (Sweden)

    Ruya Samlı

    2013-01-01

    Full Text Available Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can become beholden, donate his/her whole wealth, commits offences or do some judicial operations. Today, because many operations can be done with digital environments and internet, signature operation that provides identity validation must also be carried to digital environment. In this paper digital signature concept that is approved for this reason and its situation in international areas and Turkish laws are investigated.

  10. Signature change events: a challenge for quantum gravity?

    International Nuclear Information System (INIS)

    White, Angela; Weinfurtner, Silke; Visser, Matt

    2010-01-01

    Within the framework of either Euclidean (functional integral) quantum gravity or canonical general relativity the signature of the manifold is a priori unconstrained. Furthermore, recent developments in the emergent spacetime programme have led to a physically feasible implementation of (analogue) signature change events. This suggests that it is time to revisit the sometimes controversial topic of signature change in general relativity. Specifically, we shall focus on the behaviour of a quantum field defined on a manifold containing regions of different signature. We emphasize that regardless of the underlying classical theory, there are severe problems associated with any quantum field theory residing on a signature-changing background. (Such as the production of what is naively an infinite number of particles, with an infinite energy density.) We show how the problem of quantum fields exposed to finite regions of Euclidean-signature (Riemannian) geometry has similarities with the quantum barrier penetration problem. Finally we raise the question as to whether signature change transitions could be fully understood and dynamically generated within (modified) classical general relativity, or whether they require the knowledge of a theory of quantum gravity.

  11. Starry messages: Searching for signatures of interstellar archaeology

    Energy Technology Data Exchange (ETDEWEB)

    Carrigan, Richard A., Jr.; /Fermilab

    2009-12-01

    Searching for signatures of cosmic-scale archaeological artifacts such as Dyson spheres or Kardashev civilizations is an interesting alternative to conventional SETI. Uncovering such an artifact does not require the intentional transmission of a signal on the part of the original civilization. This type of search is called interstellar archaeology or sometimes cosmic archaeology. The detection of intelligence elsewhere in the Universe with interstellar archaeology or SETI would have broad implications for science. For example, the constraints of the anthropic principle would have to be loosened if a different type of intelligence was discovered elsewhere. A variety of interstellar archaeology signatures are discussed including non-natural planetary atmospheric constituents, stellar doping with isotopes of nuclear wastes, Dyson spheres, as well as signatures of stellar and galactic-scale engineering. The concept of a Fermi bubble due to interstellar migration is introduced in the discussion of galactic signatures. These potential interstellar archaeological signatures are classified using the Kardashev scale. A modified Drake equation is used to evaluate the relative challenges of finding various sources. With few exceptions interstellar archaeological signatures are clouded and beyond current technological capabilities. However SETI for so-called cultural transmissions and planetary atmosphere signatures are within reach.

  12. Signature Pedagogies in Support of Teachers' Professional Learning

    Science.gov (United States)

    Parker, Melissa; Patton, Kevin; O'Sullivan, Mary

    2016-01-01

    Signature pedagogies [Shulman, L. 2005. "Signature pedagogies in the professions." "Daedalus" 134 (3): 52--59.] are a focus of teacher educators seeking to improve teaching and teacher education. The purpose of this paper is to present a preliminary common language of signature pedagogies for teacher professional development…

  13. Characteristics and Validation Techniques for PCA-Based Gene-Expression Signatures

    Directory of Open Access Journals (Sweden)

    Anders E. Berglund

    2017-01-01

    Full Text Available Background. Many gene-expression signatures exist for describing the biological state of profiled tumors. Principal Component Analysis (PCA can be used to summarize a gene signature into a single score. Our hypothesis is that gene signatures can be validated when applied to new datasets, using inherent properties of PCA. Results. This validation is based on four key concepts. Coherence: elements of a gene signature should be correlated beyond chance. Uniqueness: the general direction of the data being examined can drive most of the observed signal. Robustness: if a gene signature is designed to measure a single biological effect, then this signal should be sufficiently strong and distinct compared to other signals within the signature. Transferability: the derived PCA gene signature score should describe the same biology in the target dataset as it does in the training dataset. Conclusions. The proposed validation procedure ensures that PCA-based gene signatures perform as expected when applied to datasets other than those that the signatures were trained upon. Complex signatures, describing multiple independent biological components, are also easily identified.

  14. Quantum blind dual-signature scheme without arbitrator

    International Nuclear Information System (INIS)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-01-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology. (paper)

  15. Quantum blind dual-signature scheme without arbitrator

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Huang, Dazu; Shi, Jinjing; Guo, Ying

    2016-03-01

    Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology.

  16. A Microbial Signature Approach to Identify Fecal Pollution in the Waters Off an Urbanized Coast of Lake Michigan

    Science.gov (United States)

    Newton, Ryan J.; Bootsma, Melinda J.; Morrison, Hilary G.; Sogin, Mitchell L.

    2014-01-01

    Urban coasts receive watershed drainage from ecosystems that include highly developed lands with sewer and stormwater infrastructure. In these complex ecosystems, coastal waters are often contaminated with fecal pollution, where multiple delivery mechanisms that often contain multiple fecal sources make it difficult to mitigate the pollution. Here, we exploit bacterial community sequencing of the V6 and V6V4 hypervariable regions of the bacterial 16S rRNA gene to identify bacterial distributions that signal the presence of sewer, fecal, and human fecal pollution. The sequences classified to three sewer infrastructure-associated bacterial genera, Acinetobacter, Arcobacter, and Trichococcus, and five fecal-associated bacterial families, Bacteroidaceae, Porphyromonadaceae, Clostridiaceae, Lachnospiraceae, and Ruminococcaceae, served as signatures of sewer and fecal contamination, respectively. The human fecal signature was determined with the Bayesian source estimation program SourceTracker, which we applied to a set of 40 sewage influent samples collected in Milwaukee, WI, USA to identify operational taxonomic units (≥97 % identity) that were most likely of human fecal origin. During periods of dry weather, the magnitudes of all three signatures were relatively low in Milwaukee's urban rivers and harbor and nearly zero in Lake Michigan. However, the relative contribution of the sewer and fecal signature frequently increased to >2 % of the measured surface water communities following sewer overflows. Also during combined sewer overflows, the ratio of the human fecal pollution signature to the fecal pollution signature in surface waters was generally close to that of sewage, but this ratio decreased dramatically during dry weather and rain events, suggesting that nonhuman fecal pollution was the dominant source during these weather-driven scenarios. The qPCR detection of two human fecal indicators, human Bacteroides and Lachno2, confirmed the urban fecal footprint in

  17. Infrared ship signature analysis and optimisation

    NARCIS (Netherlands)

    Neele, F.P.

    2005-01-01

    The last decade has seen an increase in the awareness of the infrared signature of naval ships. New ship designs show that infrared signature reduction measures are being incorporated, such as exhaust gas cooling systems, relocation of the exhausts and surface cooling systems. Hull and

  18. Fine-Grained Forward-Secure Signature Schemes without Random Oracles

    DEFF Research Database (Denmark)

    Camenisch, Jan; Koprowski, Maciej

    2006-01-01

    We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide nonrepudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the current time period...... remain valid when revoking the public key. This is an important advantage if the signer produces many signatures per time period as otherwise the signer would have to re-issue those signatures (and possibly re-negotiate the respective messages) with a new key.Apart from a formal model for fine......-grained forward-secure signature schemes, we present practical schemes and prove them secure under the strong RSA assumption only, i.e., we do not resort to the random oracle model to prove security. As a side-result, we provide an ordinary forward-secure scheme whose key-update time is significantly smaller than...

  19. A Signature Comparing Android Mobile Application Utilizing Feature Extracting Algorithms

    Directory of Open Access Journals (Sweden)

    Paul Grafilon

    2017-08-01

    Full Text Available The paper presented one of the application that can be done using smartphones camera. Nowadays forgery is one of the most undetected crimes. With the forensic technology used today it is still difficult for authorities to compare and define what a real signature is and what a forged signature is. A signature is a legal representation of a person. All transactions are based on a signature. Forgers may use a signature to sign illegal contracts and withdraw from bank accounts undetected. A signature can also be forged during election periods for repeated voting. Addressing the issues a signature should always be secure. Signature verification is a reduced problem that still poses a real challenge for researchers. The literature on signature verification is quite extensive and shows two main areas of research off-line and on-line systems. Off-line systems deal with a static image of the signature i.e. the result of the action of signing while on-line systems work on the dynamic process of generating the signature i.e. the action of signing itself. The researchers have found a way to resolve the concerns. A mobile application that integrates the camera to take a picture of a signature analyzes it and compares it to other signatures for verification. It will exist to help citizens to be more cautious and aware with issues regarding the signatures. This might also be relevant to help organizations and institutions such as banks and insurance companies in verifying signatures that may avoid unwanted transactions and identity theft. Furthermore this might help the authorities in the never ending battle against crime especially against forgers and thieves. The project aimed to design and develop a mobile application that integrates the smartphone camera for verifying and comparing signatures for security using the best algorithm possible. As the result of the development the said smartphone camera application is functional and reliable.

  20. 21 CFR 1309.32 - Application forms; contents; signature.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Application forms; contents; signature. 1309.32... Application forms; contents; signature. (a) Any person who is required to be registered pursuant to § 1309.21... this paragraph and shall contain the signature of the individual being authorized to sign the...

  1. 38 CFR 18b.21 - Signature of documents.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Signature of documents. 18b.21 Section 18b.21 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS... Documents § 18b.21 Signature of documents. The signature of a party, authorized officer, employee, or...

  2. Detection of chemical explosives using multiple photon signatures

    International Nuclear Information System (INIS)

    Loschke, K.W.; Dunn, W.L.

    2008-01-01

    Full text: A template-matching procedure to aid in rapid detection of improvised explosive devices (IEDs) is being investigated. Multiple photon-scattered and photon-induced positron annihilation radiation responses are being used as part of a photon-neutron signature-based radiation scanning (SBRS) approach (see companion reference for description of the neutron component), in an attempt to detect chemical explosives at safe standoff distances. Many past and present photon interrogation methods are based on imaging. Imaging techniques seek to determine at high special resolution the internal structure of a target of interest. Our technique simply seeks to determine if an unknown target contains a detectable amount of chemical explosives by comparing multiple responses (signatures) that depend on both density and composition of portions of a target. In the photon component, beams of photons are used to create back-streaming signatures, which are dependent on the density and composition of part of the target being interrogated. These signatures are compared to templates, which are collections of the same signatures if the interrogated volume contained a significant amount of explosives. The signature analysis produces a figure-of-merit and a standard deviation of the figure-of-merit. These two metrics are used to filter safe from dangerous targets. Experiments have been conducted that show that explosive surrogates (fertilizers) can be distinguished from several inert materials using these photon signatures, demonstrating that these signatures can be used effectively to help IEDs

  3. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  4. Importance of correlation between gene expression levels: application to the type I interferon signature in rheumatoid arthritis.

    Science.gov (United States)

    Reynier, Frédéric; Petit, Fabien; Paye, Malick; Turrel-Davin, Fanny; Imbert, Pierre-Emmanuel; Hot, Arnaud; Mougin, Bruno; Miossec, Pierre

    2011-01-01

    The analysis of gene expression data shows that many genes display similarity in their expression profiles suggesting some co-regulation. Here, we investigated the co-expression patterns in gene expression data and proposed a correlation-based research method to stratify individuals. Using blood from rheumatoid arthritis (RA) patients, we investigated the gene expression profiles from whole blood using Affymetrix microarray technology. Co-expressed genes were analyzed by a biclustering method, followed by gene ontology analysis of the relevant biclusters. Taking the type I interferon (IFN) pathway as an example, a classification algorithm was developed from the 102 RA patients and extended to 10 systemic lupus erythematosus (SLE) patients and 100 healthy volunteers to further characterize individuals. We developed a correlation-based algorithm referred to as Classification Algorithm Based on a Biological Signature (CABS), an alternative to other approaches focused specifically on the expression levels. This algorithm applied to the expression of 35 IFN-related genes showed that the IFN signature presented a heterogeneous expression between RA, SLE and healthy controls which could reflect the level of global IFN signature activation. Moreover, the monitoring of the IFN-related genes during the anti-TNF treatment identified changes in type I IFN gene activity induced in RA patients. In conclusion, we have proposed an original method to analyze genes sharing an expression pattern and a biological function showing that the activation levels of a biological signature could be characterized by its overall state of correlation.

  5. FIR signature verification system characterizing dynamics of handwriting features

    Science.gov (United States)

    Thumwarin, Pitak; Pernwong, Jitawat; Matsuura, Takenobu

    2013-12-01

    This paper proposes an online signature verification method based on the finite impulse response (FIR) system characterizing time-frequency characteristics of dynamic handwriting features. First, the barycenter determined from both the center point of signature and two adjacent pen-point positions in the signing process, instead of one pen-point position, is used to reduce the fluctuation of handwriting motion. In this paper, among the available dynamic handwriting features, motion pressure and area pressure are employed to investigate handwriting behavior. Thus, the stable dynamic handwriting features can be described by the relation of the time-frequency characteristics of the dynamic handwriting features. In this study, the aforesaid relation can be represented by the FIR system with the wavelet coefficients of the dynamic handwriting features as both input and output of the system. The impulse response of the FIR system is used as the individual feature for a particular signature. In short, the signature can be verified by evaluating the difference between the impulse responses of the FIR systems for a reference signature and the signature to be verified. The signature verification experiments in this paper were conducted using the SUBCORPUS MCYT-100 signature database consisting of 5,000 signatures from 100 signers. The proposed method yielded equal error rate (EER) of 3.21% on skilled forgeries.

  6. Quantum signature scheme based on a quantum search algorithm

    International Nuclear Information System (INIS)

    Yoon, Chun Seok; Kang, Min Sung; Lim, Jong In; Yang, Hyung Jin

    2015-01-01

    We present a quantum signature scheme based on a two-qubit quantum search algorithm. For secure transmission of signatures, we use a quantum search algorithm that has not been used in previous quantum signature schemes. A two-step protocol secures the quantum channel, and a trusted center guarantees non-repudiation that is similar to other quantum signature schemes. We discuss the security of our protocol. (paper)

  7. Molecular signatures of thyroid follicular neoplasia

    DEFF Research Database (Denmark)

    Borup, R.; Rossing, M.; Henao, Ricardo

    2010-01-01

    The molecular pathways leading to thyroid follicular neoplasia are incompletely understood, and the diagnosis of follicular tumors is a clinical challenge. To provide leads to the pathogenesis and diagnosis of the tumors, we examined the global transcriptome signatures of follicular thyroid...... a mechanism for cancer progression, which is why we exploited the results in order to generate a molecular classifier that could identify 95% of all carcinomas. Validation employing public domain and cross-platform data demonstrated that the signature was robust and could diagnose follicular nodules...... and robust genetic signature for the diagnosis of FA and FC. Endocrine-Related Cancer (2010) 17 691-708...

  8. Revising Lecture Notes: How Revision, Pauses, and Partners Affect Note Taking and Achievement

    Science.gov (United States)

    Luo, Linlin; Kiewra, Kenneth A.; Samuelson, Lydia

    2016-01-01

    Note taking has been categorized as a two-stage process: the recording of notes and the review of notes. We contend that note taking might best involve a three-stage process where the missing stage is revision. This study investigated the benefits of revising lecture notes and addressed two questions: First, is revision more effective than…

  9. Motif signatures of transcribed enhancers

    KAUST Repository

    Kleftogiannis, Dimitrios

    2017-09-14

    In mammalian cells, transcribed enhancers (TrEn) play important roles in the initiation of gene expression and maintenance of gene expression levels in spatiotemporal manner. One of the most challenging questions in biology today is how the genomic characteristics of enhancers relate to enhancer activities. This is particularly critical, as several recent studies have linked enhancer sequence motifs to specific functional roles. To date, only a limited number of enhancer sequence characteristics have been investigated, leaving space for exploring the enhancers genomic code in a more systematic way. To address this problem, we developed a novel computational method, TELS, aimed at identifying predictive cell type/tissue specific motif signatures. We used TELS to compile a comprehensive catalog of motif signatures for all known TrEn identified by the FANTOM5 consortium across 112 human primary cells and tissues. Our results confirm that distinct cell type/tissue specific motif signatures characterize TrEn. These signatures allow discriminating successfully a) TrEn from random controls, proxy of non-enhancer activity, and b) cell type/tissue specific TrEn from enhancers expressed and transcribed in different cell types/tissues. TELS codes and datasets are publicly available at http://www.cbrc.kaust.edu.sa/TELS.

  10. Extended molecular phylogenetics and revised systematics of Malagasy scincine lizards.

    Science.gov (United States)

    Erens, Jesse; Miralles, Aurélien; Glaw, Frank; Chatrou, Lars W; Vences, Miguel

    2017-02-01

    Among the endemic biota of Madagascar, skinks are a diverse radiation of lizards that exhibit a striking ecomorphological variation, and could provide an interesting system to study body-form evolution in squamate reptiles. We provide a new phylogenetic hypothesis for Malagasy skinks of the subfamily Scincinae based on an extended molecular dataset comprising 8060bp from three mitochondrial and nine nuclear loci. Our analysis also increases taxon sampling of the genus Amphiglossus by including 16 out of 25 nominal species. Additionally, we examined whether the molecular phylogenetic patterns coincide with morphological differentiation in the species currently assigned to this genus. Various methods of inference recover a mostly strongly supported phylogeny with three main clades of Amphiglossus. However, relationships among these three clades and the limb-reduced genera Grandidierina, Voeltzkowia and Pygomeles remain uncertain. Supported by a variety of morphological differences (predominantly related to the degree of body elongation), but considering the remaining phylogenetic uncertainty, we propose a redefinition of Amphiglossus into three different genera (Amphiglossus sensu stricto, Flexiseps new genus, and Brachyseps new genus) to remove the non-monophyly of Amphiglossus sensu lato and to facilitate future studies on this fascinating group of lizards. Copyright © 2016 Elsevier Inc. All rights reserved.

  11. Prediction of the prognosis of breast cancer in routine histologic specimens using a simplified, low-cost gene expression signature

    DEFF Research Database (Denmark)

    Marcell, S.A.; Balazs, A.; Emese, A.

    2013-01-01

    Prediction of the prognosis of breast cancer in routine histologic specimens using a simplified, low-cost gene expression signature Background: Grade 2 breast carcinomas do not form a uniform prognostic group. Aim: To extend the number of patients and the investigated genes of a previously...... grade 2 breast carcinomas into prognostic groups. Gene expression was investigated by polymerase chain reaction in 249 formalin-fixed, paraffin-embedded breast tumors. The results were correlated with relapse-free survival. Results: Histologically grade 2 carcinomas were split into good and a poor...... identified prognostic signature described by the authors that reflect chromosomal instability in order to refine characterization of grade 2 breast cancers and identify driver genes. Methods: Using publicly available databases, the authors selected 9 target and 3 housekeeping genes that are capable to divide...

  12. Utilization of genomic signatures to identify phenotype-specific drugs.

    Directory of Open Access Journals (Sweden)

    Seiichi Mori

    2009-08-01

    Full Text Available Genetic and genomic studies highlight the substantial complexity and heterogeneity of human cancers and emphasize the general lack of therapeutics that can match this complexity. With the goal of expanding opportunities for drug discovery, we describe an approach that makes use of a phenotype-based screen combined with the use of multiple cancer cell lines. In particular, we have used the NCI-60 cancer cell line panel that includes drug sensitivity measures for over 40,000 compounds assayed on 59 independent cells lines. Targets are cancer-relevant phenotypes represented as gene expression signatures that are used to identify cells within the NCI-60 panel reflecting the signature phenotype and then connect to compounds that are selectively active against those cells. As a proof-of-concept, we show that this strategy effectively identifies compounds with selectivity to the RAS or PI3K pathways. We have then extended this strategy to identify compounds that have activity towards cells exhibiting the basal phenotype of breast cancer, a clinically-important breast cancer characterized as ER-, PR-, and Her2- that lacks viable therapeutic options. One of these compounds, Simvastatin, has previously been shown to inhibit breast cancer cell growth in vitro and importantly, has been associated with a reduction in ER-, PR- breast cancer in a clinical study. We suggest that this approach provides a novel strategy towards identification of therapeutic agents based on clinically relevant phenotypes that can augment the conventional strategies of target-based screens.

  13. At-risk children's use of reflection and revision in hands-on experimental activities

    Science.gov (United States)

    Petrosino, Anthony J., Jr.

    The goal of this study was to investigate the effects of incorporating opportunities for reflection and revision in hands-on science instruction which emphasized experimentation using model rockets. The participants were low achieving sixth grade summer school students (n = 23) designated as at-risk for school failure by their district. The group was asked a series of interview questions based on work by Schauble et al. (1995) relating to experimentation. The interviews took place over three distinct time points corresponding to a "hands-on only" condition, a "hands-on with reflection and revision" condition and a "hands-on with repeated reflection and revision" condition. A Friedman's Two-Way Analysis of Variance by Ranks indicate students score low at first with traditional hands-on instruction but improve significantly with opportunities to reflect and revise their experiments. In addition, a sociocultural analysis was conducted during the summer school session to assess the model rocket activity as an apprenticeship, as guided participation and as participatory appropriation using a framework established by Rogoff (1994). Finally, a survey (the Classroom Environment Survey) was administered to the students measuring five constructs consistent with a constructivist classroom: participation, autonomy, relevance, commitment to learning and disruptions to learning. Analysis indicate students in the summer school model rocket intervention experienced a greater sense of constructivist principles during the activity than a similar comparison group utilizing reform minded instruction but not including opportunities for reflection and revision cycles. This research provides important evidence that, like scientists, students in school can learn effectively from extended practice in a varied context. Importantly, the data indicate that hands-on instruction is best utilized when opportunities for reflection and revision are made explicit. Implications are discussed related

  14. Revision history aware repositories of computational models of biological systems.

    Science.gov (United States)

    Miller, Andrew K; Yu, Tommy; Britten, Randall; Cooling, Mike T; Lawson, James; Cowan, Dougal; Garny, Alan; Halstead, Matt D B; Hunter, Peter J; Nickerson, David P; Nunns, Geo; Wimalaratne, Sarala M; Nielsen, Poul M F

    2011-01-14

    Building repositories of computational models of biological systems ensures that published models are available for both education and further research, and can provide a source of smaller, previously verified models to integrate into a larger model. One problem with earlier repositories has been the limitations in facilities to record the revision history of models. Often, these facilities are limited to a linear series of versions which were deposited in the repository. This is problematic for several reasons. Firstly, there are many instances in the history of biological systems modelling where an 'ancestral' model is modified by different groups to create many different models. With a linear series of versions, if the changes made to one model are merged into another model, the merge appears as a single item in the history. This hides useful revision history information, and also makes further merges much more difficult, as there is no record of which changes have or have not already been merged. In addition, a long series of individual changes made outside of the repository are also all merged into a single revision when they are put back into the repository, making it difficult to separate out individual changes. Furthermore, many earlier repositories only retain the revision history of individual files, rather than of a group of files. This is an important limitation to overcome, because some types of models, such as CellML 1.1 models, can be developed as a collection of modules, each in a separate file. The need for revision history is widely recognised for computer software, and a lot of work has gone into developing version control systems and distributed version control systems (DVCSs) for tracking the revision history. However, to date, there has been no published research on how DVCSs can be applied to repositories of computational models of biological systems. We have extended the Physiome Model Repository software to be fully revision history aware

  15. Revision history aware repositories of computational models of biological systems

    Directory of Open Access Journals (Sweden)

    Nickerson David P

    2011-01-01

    Full Text Available Abstract Background Building repositories of computational models of biological systems ensures that published models are available for both education and further research, and can provide a source of smaller, previously verified models to integrate into a larger model. One problem with earlier repositories has been the limitations in facilities to record the revision history of models. Often, these facilities are limited to a linear series of versions which were deposited in the repository. This is problematic for several reasons. Firstly, there are many instances in the history of biological systems modelling where an 'ancestral' model is modified by different groups to create many different models. With a linear series of versions, if the changes made to one model are merged into another model, the merge appears as a single item in the history. This hides useful revision history information, and also makes further merges much more difficult, as there is no record of which changes have or have not already been merged. In addition, a long series of individual changes made outside of the repository are also all merged into a single revision when they are put back into the repository, making it difficult to separate out individual changes. Furthermore, many earlier repositories only retain the revision history of individual files, rather than of a group of files. This is an important limitation to overcome, because some types of models, such as CellML 1.1 models, can be developed as a collection of modules, each in a separate file. The need for revision history is widely recognised for computer software, and a lot of work has gone into developing version control systems and distributed version control systems (DVCSs for tracking the revision history. However, to date, there has been no published research on how DVCSs can be applied to repositories of computational models of biological systems. Results We have extended the Physiome Model

  16. Horizontal information drives the behavioural signatures of face processing

    Directory of Open Access Journals (Sweden)

    Valerie Goffaux

    2010-09-01

    Full Text Available Recent psychophysical evidence indicates that the vertical arrangement of horizontal information is particularly important for encoding facial identity. In this paper we extend this notion to examine the role that information at different (particularly cardinal orientations might play in a number of established phenomena each a behavioural “signature” of face processing. In particular we consider (a the face inversion effect (FIE, (b the facial identity after-effect, (c face-matching across viewpoint, and (d interactive, so-called holistic, processing of face parts. We report that filtering faces to remove all but the horizontal information largely preserves these effects but conversely, retaining vertical information generally diminishes or abolishes them. We conclude that preferential processing of horizontal information is a central feature of human face processing that supports many of the behavioural signatures of this critical visual operation.

  17. Acetabular Cup Revision.

    Science.gov (United States)

    Kim, Young-Ho

    2017-09-01

    The use of acetabular cup revision arthroplasty is on the rise as demands for total hip arthroplasty, improved life expectancies, and the need for individual activity increase. For an acetabular cup revision to be successful, the cup should gain stable fixation within the remaining supportive bone of the acetabulum. Since the patient's remaining supportive acetabular bone stock plays an important role in the success of revision, accurate classification of the degree of acetabular bone defect is necessary. The Paprosky classification system is most commonly used when determining the location and degree of acetabular bone loss. Common treatment options include: acetabular liner exchange, high hip center, oblong cup, trabecular metal cup with augment, bipolar cup, bulk structural graft, cemented cup, uncemented cup including jumbo cup, acetabular reinforcement device (cage), trabecular metal cup cage. The optimal treatment option is dependent upon the degree of the discontinuity, the amount of available bone stock and the likelihood of achieving stable fixation upon supportive host bone. To achieve successful acetabular cup revision, accurate evaluation of bone defect preoperatively and intraoperatively, proper choice of method of acetabular revision according to the evaluation of acetabular bone deficiency, proper technique to get primary stability of implant such as precise grafting technique, and stable fixation of implant are mandatory.

  18. Failure of aseptic revision total knee arthroplasties.

    Science.gov (United States)

    Leta, Tesfaye H; Lygre, Stein Håkon L; Skredderstuen, Arne; Hallan, Geir; Furnes, Ove

    2015-02-01

    In Norway, the proportion of revision knee arthroplasties increased from 6.9% in 1994 to 8.5% in 2011. However, there is limited information on the epidemiology and causes of subsequent failure of revision knee arthroplasty. We therefore studied survival rate and determined the modes of failure of aseptic revision total knee arthroplasties. This study was based on 1,016 aseptic revision total knee arthroplasties reported to the Norwegian Arthroplasty Register between 1994 and 2011. Revisions done for infections were not included. Kaplan-Meier and Cox regression analyses were used to assess the survival rate and the relative risk of re-revision with all causes of re-revision as endpoint. 145 knees failed after revision total knee arthroplasty. Deep infection was the most frequent cause of re-revision (28%), followed by instability (26%), loose tibial component (17%), and pain (10%). The cumulative survival rate for revision total knee arthroplasties was 85% at 5 years, 78% at 10 years, and 71% at 15 years. Revision total knee arthroplasties with exchange of the femoral or tibial component exclusively had a higher risk of re-revision (RR = 1.7) than those with exchange of the whole prosthesis. The risk of re-revision was higher for men (RR = 2.0) and for patients aged less than 60 years (RR = 1.6). In terms of implant survival, revision of the whole implant was better than revision of 1 component only. Young age and male sex were risk factors for re-revision. Deep infection was the most frequent cause of failure of revision of aseptic total knee arthroplasties.

  19. 12 CFR 269b.731 - Signature.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CHARGES OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall be...

  20. Reduction of a Ship's Magnetic Field Signatures

    CERN Document Server

    Holmes, John

    2008-01-01

    Decreasing the magnetic field signature of a naval vessel will reduce its susceptibility to detonating naval influence mines and the probability of a submarine being detected by underwater barriers and maritime patrol aircraft. Both passive and active techniques for reducing the magnetic signatures produced by a vessel's ferromagnetism, roll-induced eddy currents, corrosion-related sources, and stray fields are presented. Mathematical models of simple hull shapes are used to predict the levels of signature reduction that might be achieved through the use of alternate construction materials. Al

  1. Comparative expression profiling in grape (Vitis vinifera berries derived from frequency analysis of ESTs and MPSS signatures

    Directory of Open Access Journals (Sweden)

    Cook Douglas R

    2008-05-01

    Full Text Available Abstract Background Vitis vinifera (V. vinifera is the primary grape species cultivated for wine production, with an industry valued annually in the billions of dollars worldwide. In order to sustain and increase grape production, it is necessary to understand the genetic makeup of grape species. Here we performed mRNA profiling using Massively Parallel Signature Sequencing (MPSS and combined it with available Expressed Sequence Tag (EST data. These tag-based technologies, which do not require a priori knowledge of genomic sequence, are well-suited for transcriptional profiling. The sequence depth of MPSS allowed us to capture and quantify almost all the transcripts at a specific stage in the development of the grape berry. Results The number and relative abundance of transcripts from stage II grape berries was defined using Massively Parallel Signature Sequencing (MPSS. A total of 2,635,293 17-base and 2,259,286 20-base signatures were obtained, representing at least 30,737 and 26,878 distinct sequences. The average normalized abundance per signature was ~49 TPM (Transcripts Per Million. Comparisons of the MPSS signatures with available Vitis species' ESTs and a unigene set demonstrated that 6,430 distinct contigs and 2,190 singletons have a perfect match to at least one MPSS signature. Among the matched sequences, ESTs were identified from tissues other than berries or from berries at different developmental stages. Additional MPSS signatures not matching to known grape ESTs can extend our knowledge of the V. vinifera transcriptome, particularly when these data are used to assist in annotation of whole genome sequences from Vitis vinifera. Conclusion The MPSS data presented here not only achieved a higher level of saturation than previous EST based analyses, but in doing so, expand the known set of transcripts of grape berries during the unique stage in development that immediately precedes the onset of ripening. The MPSS dataset also revealed

  2. Genome-wide scans between two honeybee populations reveal putative signatures of human-mediated selection.

    Science.gov (United States)

    Parejo, M; Wragg, D; Henriques, D; Vignal, A; Neuditschko, M

    2017-12-01

    Human-mediated selection has left signatures in the genomes of many domesticated animals, including the European dark honeybee, Apis mellifera mellifera, which has been selected by apiculturists for centuries. Using whole-genome sequence information, we investigated selection signatures in spatially separated honeybee subpopulations (Switzerland, n = 39 and France, n = 17). Three different test statistics were calculated in windows of 2 kb (fixation index, cross-population extended haplotype homozygosity and cross-population composite likelihood ratio) and combined into a recently developed composite selection score. Applying a stringent false discovery rate of 0.01, we identified six significant selective sweeps distributed across five chromosomes covering eight genes. These genes are associated with multiple molecular and biological functions, including regulation of transcription, receptor binding and signal transduction. Of particular interest is a selection signature on chromosome 1, which corresponds to the WNT4 gene, the family of which is conserved across the animal kingdom with a variety of functions. In Drosophila melanogaster, WNT4 alleles have been associated with differential wing, cross vein and abdominal phenotypes. Defining phenotypic characteristics of different Apis mellifera ssp., which are typically used as selection criteria, include colour and wing venation pattern. This signal is therefore likely to be a good candidate for human mediated-selection arising from different applied breeding practices in the two managed populations. © 2017 The Authors. Animal Genetics published by John Wiley & Sons Ltd on behalf of Stichting International Foundation for Animal Genetics.

  3. Does Twitter trigger bursts in signature collections?

    Science.gov (United States)

    Yamaguchi, Rui; Imoto, Seiya; Kami, Masahiro; Watanabe, Kenji; Miyano, Satoru; Yuji, Koichiro

    2013-01-01

    The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78%) of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26%) was smaller than the Forum effect (52%) in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore information hidden in social phenomena.

  4. Does Twitter trigger bursts in signature collections?

    Directory of Open Access Journals (Sweden)

    Rui Yamaguchi

    Full Text Available INTRODUCTION: The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, "Kampo," from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords "Signature" and "Kampo," increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. METHODS AND FINDINGS: In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78% of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26% was smaller than the Forum effect (52% in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. CONCLUSIONS: The quantification of social media impacts is beneficial to better understand people's tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore

  5. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  6. Extended Analysis of the Casimir Force

    Directory of Open Access Journals (Sweden)

    Lehnert B.

    2014-04-01

    Full Text Available There are several arguments for the conventional form of the Zero Point Energy fre- quency spectrum to be put in doubt. It has thus to be revised in to that of a self-consistent system in statistical equilibrium where the total energy de nsity and the equivalent pres- sure become finite. An extended form of the Casimir force is th ereby proposed to be used as a tool for determining the local magnitude of the same pressure. This can be done in terms of measurements on the force between a pair po lished plane plates consisting of different metals, the plates having very small or zero air gaps. T his corre- sponds to the largest possible Casimir force. Even then, the re may arise problems with other adhering forces, possibly to be clarified in further experiments.

  7. Blind Quantum Signature with Blind Quantum Computation

    Science.gov (United States)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2017-04-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  8. Modeling ground vehicle acoustic signatures for analysis and synthesis

    International Nuclear Information System (INIS)

    Haschke, G.; Stanfield, R.

    1995-01-01

    Security and weapon systems use acoustic sensor signals to classify and identify moving ground vehicles. Developing robust signal processing algorithms for this is expensive, particularly in presence of acoustic clutter or countermeasures. This paper proposes a parametric ground vehicle acoustic signature model to aid the system designer in understanding which signature features are important, developing corresponding feature extraction algorithms and generating low-cost, high-fidelity synthetic signatures for testing. The authors have proposed computer-generated acoustic signatures of armored, tracked ground vehicles to deceive acoustic-sensored smart munitions. They have developed quantitative measures of how accurately a synthetic acoustic signature matches those produced by actual vehicles. This paper describes parameters of the model used to generate these synthetic signatures and suggests methods for extracting these parameters from signatures of valid vehicle encounters. The model incorporates wide-bandwidth and narrow- bandwidth components that are modulated in a pseudo-random fashion to mimic the time dynamics of valid vehicle signatures. Narrow- bandwidth feature extraction techniques estimate frequency, amplitude and phase information contained in a single set of narrow frequency- band harmonics. Wide-bandwidth feature extraction techniques estimate parameters of a correlated-noise-floor model. Finally, the authors propose a method of modeling the time dynamics of the harmonic amplitudes as a means adding necessary time-varying features to the narrow-bandwidth signal components. The authors present results of applying this modeling technique to acoustic signatures recorded during encounters with one armored, tracked vehicle. Similar modeling techniques can be applied to security systems

  9. DIGITAL SIGNATURE IN THE WAY OF LAW

    OpenAIRE

    Ruya Samlı

    2013-01-01

    Signature can be defined as a person’s name or special signs that he/she writes when he/she wants to indicate he/she wrote or confirm that writing. A person signs many times in his/her life. A person’s signature that is used for thousands of times for many things from formal documents to exams has importance for that person. Especially, signing in legal operations is an operation that can build important results. If a person’s signature is imitated by another person, he/she can be...

  10. An Efficient Homomorphic Aggregate Signature Scheme Based on Lattice

    Directory of Open Access Journals (Sweden)

    Zhengjun Jing

    2014-01-01

    Full Text Available Homomorphic aggregate signature (HAS is a linearly homomorphic signature (LHS for multiple users, which can be applied for a variety of purposes, such as multi-source network coding and sensor data aggregation. In order to design an efficient postquantum secure HAS scheme, we borrow the idea of the lattice-based LHS scheme over binary field in the single-user case, and develop it into a new lattice-based HAS scheme in this paper. The security of the proposed scheme is proved by showing a reduction to the single-user case and the signature length remains invariant. Compared with the existing lattice-based homomorphic aggregate signature scheme, our new scheme enjoys shorter signature length and high efficiency.

  11. Fast Physically Accurate Rendering of Multimodal Signatures of Distributed Fracture in Heterogeneous Materials.

    Science.gov (United States)

    Visell, Yon

    2015-04-01

    This paper proposes a fast, physically accurate method for synthesizing multimodal, acoustic and haptic, signatures of distributed fracture in quasi-brittle heterogeneous materials, such as wood, granular media, or other fiber composites. Fracture processes in these materials are challenging to simulate with existing methods, due to the prevalence of large numbers of disordered, quasi-random spatial degrees of freedom, representing the complex physical state of a sample over the geometric volume of interest. Here, I develop an algorithm for simulating such processes, building on a class of statistical lattice models of fracture that have been widely investigated in the physics literature. This algorithm is enabled through a recently published mathematical construction based on the inverse transform method of random number sampling. It yields a purely time domain stochastic jump process representing stress fluctuations in the medium. The latter can be readily extended by a mean field approximation that captures the averaged constitutive (stress-strain) behavior of the material. Numerical simulations and interactive examples demonstrate the ability of these algorithms to generate physically plausible acoustic and haptic signatures of fracture in complex, natural materials interactively at audio sampling rates.

  12. Far-IR transparency and dynamic infrared signature control with novel conducting polymer systems

    Science.gov (United States)

    Chandrasekhar, Prasanna; Dooley, T. J.

    1995-09-01

    Materials which possess transparency, coupled with active controllability of this transparency in the infrared (IR), are today an increasingly important requirement, for varied applications. These applications include windows for IR sensors, IR-region flat panel displays used in camouflage as well as in communication and sight through night-vision goggles, coatings with dynamically controllable IR-emissivity, and thermal conservation coatings. Among stringent requirements for these applications are large dynamic ranges (color contrast), 'multi-color' or broad-band characteristics, extended cyclability, long memory retention, matrix addressability, small area fabricability, low power consumption, and environmental stability. Among materials possessing the requirements for variation of IR signature, conducting polymers (CPs) appear to be the only materials with dynamic, actively controllable signature and acceptable dynamic range. Conventional CPs such as poly(alkyl thiophene), poly(pyrrole) or poly(aniline) show very limited dynamic range, especially in the far-IR, while also showing poor transparency. We have developed a number of novel CP systems ('system' implying the CP, the selected dopant, the synthesis method, and the electrolyte) with very wide dynamic range (up to 90% in both important IR regions, 3 - 5 (mu) and 8 - 12 (mu) ), high cyclability (to 105 cycles with less than 10% optical degradation), nearly indefinite optical memory retention, matrix addressability of multi-pixel displays, very wide operating temperature and excellent environmental stability, low charge capacity, and processability into areas from less than 1 mm2 to more than 100 cm2. The criteria used to design and arrive at these CP systems, together with representative IR signature data, are presented in this paper.

  13. Terahertz spectral signatures :measurement and detection LDRD project 86361 final report.

    Energy Technology Data Exchange (ETDEWEB)

    Wanke, Michael Clement; Brener, Igal; Lee, Mark

    2005-11-01

    LDRD Project 86361 provided support to upgrade the chemical and material spectral signature measurement and detection capabilities of Sandia National Laboratories using the terahertz (THz) portion of the electromagnetic spectrum, which includes frequencies between 0.1 to 10 THz. Under this project, a THz time-domain spectrometer was completed. This instrument measures sample absorption spectra coherently, obtaining both magnitude and phase of the absorption signal, and has shown an operating signal-to-noise ratio of 10{sub 4}. Additionally, various gas cells and a reflectometer were added to an existing high-resolution THz Fourier transform spectrometer, which greatly extend the functionality of this spectrometer. Finally, preliminary efforts to design an integrated THz transceiver based on a quantum cascade laser were begun.

  14. Signature detection and matching for document image retrieval.

    Science.gov (United States)

    Zhu, Guangyu; Zheng, Yefeng; Doermann, David; Jaeger, Stefan

    2009-11-01

    As one of the most pervasive methods of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effective document image processing and retrieval in a broad range of applications. However, detection and segmentation of free-form objects such as signatures from clustered background is currently an open document analysis problem. In this paper, we focus on two fundamental problems in signature-based document image retrieval. First, we propose a novel multiscale approach to jointly detecting and segmenting signatures from document images. Rather than focusing on local features that typically have large variations, our approach captures the structural saliency using a signature production model and computes the dynamic curvature of 2D contour fragments over multiple scales. This detection framework is general and computationally tractable. Second, we treat the problem of signature retrieval in the unconstrained setting of translation, scale, and rotation invariant nonrigid shape matching. We propose two novel measures of shape dissimilarity based on anisotropic scaling and registration residual error and present a supervised learning framework for combining complementary shape information from different dissimilarity metrics using LDA. We quantitatively study state-of-the-art shape representations, shape matching algorithms, measures of dissimilarity, and the use of multiple instances as query in document image retrieval. We further demonstrate our matching techniques in offline signature verification. Extensive experiments using large real-world collections of English and Arabic machine-printed and handwritten documents demonstrate the excellent performance of our approaches.

  15. Server-Aided Verification Signature with Privacy for Mobile Computing

    Directory of Open Access Journals (Sweden)

    Lingling Xu

    2015-01-01

    Full Text Available With the development of wireless technology, much data communication and processing has been conducted in mobile devices with wireless connection. As we know that the mobile devices will always be resource-poor relative to static ones though they will improve in absolute ability, therefore, they cannot process some expensive computational tasks due to the constrained computational resources. According to this problem, server-aided computing has been studied in which the power-constrained mobile devices can outsource some expensive computation to a server with powerful resources in order to reduce their computational load. However, in existing server-aided verification signature schemes, the server can learn some information about the message-signature pair to be verified, which is undesirable especially when the message includes some secret information. In this paper, we mainly study the server-aided verification signatures with privacy in which the message-signature pair to be verified can be protected from the server. Two definitions of privacy for server-aided verification signatures are presented under collusion attacks between the server and the signer. Then based on existing signatures, two concrete server-aided verification signature schemes with privacy are proposed which are both proved secure.

  16. High-spin structure of 121Xe: triaxiality, band termination and signature inversion

    International Nuclear Information System (INIS)

    Timar, J.; Paul, E.S.; Beausang, C.W.; Joyce, M.J.; Sharpey-Schafer, J.F.

    1995-01-01

    High-spin states of the odd-neutron 121 Xe nucleus have been studied with Eurogam using the 96 Zr( 30 Si, 5n) 121 Xe fusion-evaporation reaction. The level scheme has been extended up to a tentative spin of 67/2h at an excitation energy of ∼ 14 MeV. Several new rotational bands have been observed and the previously known bands extended. Two of them lose their regular character at high spins, which may be interpreted as transition from collective behaviour to a regime of noncollective oblate states. The deduced high-spin structure is compared to Woods-Saxon TRS cranking and CSM calculations. Configurations of the bands have been suggested. The νh 1 1/2 band is interpreted as having a triaxial shape. Signature inversion and an unexpectedly large staggering of the B(M1)/B(E2) ratios has been found for one of the bands. Enhanced E1 transitions have been observed between the νd 5/2 and the νh 1 1/2 bands. (orig.)

  17. Extended system of space-time coordinates and generalized translation group of transformations

    International Nuclear Information System (INIS)

    Yamaleev, R.M.

    1980-01-01

    A method of extending space-time is considered. In the nonrelativistic case extending goes by joining a scalar to the 3-dimensional radius-vector, completing this to a quaternion. The interpretation of scalar obtained as a parameter of scale transfornation of the generalized translation of group of transformations is given. Some basic expressions of nonrelativistic classical mechanics in the quaternion representation are given. In the relativistic case space-time is constructed from two quaternions: the first one consists of a pair scalar-3-dimensional radius-vector; the second one, of a pair-time-scalar-3-dimensional time-vector. Time and space coordinates, enter into the expression with the opposite signature. The introduction of a time-vector as well as of a new scalar is stipulated by the requirement of the principle of conforming quantum mechanics of the 1/2 spin to classical mechanics [ru

  18. Bibliocable. Revised Edition.

    Science.gov (United States)

    Cable Television Information Center, Washington, DC.

    This selective, annotated bibliography is a revision of the original published in 1972 (ED 071 402). Some 104 books, articles, and reports included here deal with access, applications, franchising, regulation, technology, and other aspects of cable television. The listings are of two types in each category. First are revisions of the original…

  19. 48 CFR 4.101 - Contracting officer's signature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contracting officer's signature. 4.101 Section 4.101 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.101 Contracting officer's signature. Only contracting officers shall...

  20. 37 CFR 2.74 - Form and signature of amendment.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Form and signature of... signature of amendment. (a) Form of Amendment. Amendments should be set forth clearly and completely... record. (b) Signature. A request for amendment of an application must be signed by the applicant, someone...

  1. 21 CFR 11.200 - Electronic signature components and controls.

    Science.gov (United States)

    2010-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1) Employ at least two distinct identification components such as an identification code and password. (i... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than...

  2. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input......-theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  3. Contemporary internal auditing practices : (new) roles and influencing variables. Evidence from extended case studies

    OpenAIRE

    G. SARENS; I. DE BEELDE

    2004-01-01

    Following the recommendation made by Rittenberg (1999), this study encompasses the broader nature of internal auditing that is evolving in practice and confirmed by the revised definition of internal auditing and the new Professional Practices Framework, both issued by the IIA in 1999. This study, based on six extended case studies, attempts to contribute to the literature by studying contemporary internal auditing practices in Belgium (assurance and / or consulting oriented), refining the in...

  4. Overloaded CDMA Systems with Displaced Binary Signatures

    Directory of Open Access Journals (Sweden)

    Vanhaverbeke Frederik

    2004-01-01

    Full Text Available We extend three types of overloaded CDMA systems, by displacing in time the binary signature sequences of these systems: (1 random spreading (PN, (2 multiple-OCDMA (MO, and (3 PN/OCDMA (PN/O. For each of these systems, we determine the time shifts that minimize the overall multiuser interference power. The achievable channel load with coded and uncoded data is evaluated for the conventional (without displacement and improved (with displacement systems, as well as for systems based on quasi-Welch-bound-equality (QWBE sequences, by means of several types of turbo detectors. For each system, the best performing turbo detector is selected in order to compare the performance of these systems. It is found that the improved systems substantially outperform their original counterparts. With uncoded data, (improved PN/O yields the highest acceptable channel load. For coded data, MO allows for the highest acceptable channel load over all considered systems, both for the conventional and the improved systems. In the latter case, channel loads of about 280% are achievable with a low degradation as compared to a single user system.

  5. THE ELECTRONIC SIGNATURE

    Directory of Open Access Journals (Sweden)

    Voiculescu Madalina Irena

    2009-05-01

    Full Text Available Article refers to significance and the digital signature in electronic commerce. Internet and electronic commerce open up many new opportunities for the consumer, yet, the security (or perceived lack of security of exchanging personal and financial data

  6. Staggering in signature partners of A∼190 mass region of superdeformed rotational bands

    International Nuclear Information System (INIS)

    Uma, V.S.; Goel, Alpana; Yadav, Archana

    2014-01-01

    This paper discuss about ΔI=1 signature splitting in signature partner pairs of A∼190 mass region. Around twenty signature partner pairs (usually called as two bands, each with a fixed signature) have been reported in this mass region. For these signature pairs, band head moment of inertia (J 0 ) and intrinsic structure of each pair of signature partners have been found as almost identical. Also, these signature partner pairs showed large amplitude signature splitting. As each of the two signature partner forms a regular spin sequence and signature bands are not equivalent in terms of energies. This difference in energies results in signature splitting

  7. Dynamic Gesture Recognition with a Terahertz Radar Based on Range Profile Sequences and Doppler Signatures.

    Science.gov (United States)

    Zhou, Zhi; Cao, Zongjie; Pi, Yiming

    2017-12-21

    The frequency of terahertz radar ranges from 0.1 THz to 10 THz, which is higher than that of microwaves. Multi-modal signals, including high-resolution range profile (HRRP) and Doppler signatures, can be acquired by the terahertz radar system. These two kinds of information are commonly used in automatic target recognition; however, dynamic gesture recognition is rarely discussed in the terahertz regime. In this paper, a dynamic gesture recognition system using a terahertz radar is proposed, based on multi-modal signals. The HRRP sequences and Doppler signatures were first achieved from the radar echoes. Considering the electromagnetic scattering characteristics, a feature extraction model is designed using location parameter estimation of scattering centers. Dynamic Time Warping (DTW) extended to multi-modal signals is used to accomplish the classifications. Ten types of gesture signals, collected from a terahertz radar, are applied to validate the analysis and the recognition system. The results of the experiment indicate that the recognition rate reaches more than 91%. This research verifies the potential applications of dynamic gesture recognition using a terahertz radar.

  8. 22 CFR 92.28 - Signature of affiant on affidavit.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Signature of affiant on affidavit. 92.28 Section 92.28 Foreign Relations DEPARTMENT OF STATE LEGAL AND RELATED SERVICES NOTARIAL AND RELATED SERVICES Specific Notarial Acts § 92.28 Signature of affiant on affidavit. The signature of the affiant is...

  9. Induced Temporal Signatures for Point-Source Detection

    International Nuclear Information System (INIS)

    Stephens, Daniel L.; Runkle, Robert C.; Carlson, Deborah K.; Peurrung, Anthony J.; Seifert, Allen; Wyatt, Cory R.

    2005-01-01

    Detection of radioactive point-sized sources is inherently divided into two regimes encompassing stationary and moving detectors. The two cases differ in their treatment of background radiation and its influence on detection sensitivity. In the stationary detector case the statistical fluctuation of the background determines the minimum detectable quantity. In the moving detector case the detector may be subjected to widely and irregularly varying background radiation, as a result of geographical and environmental variation. This significant systematic variation, in conjunction with the statistical variation of the background, requires a conservative threshold to be selected to yield the same false-positive rate as the stationary detection case. This results in lost detection sensitivity for real sources. This work focuses on a simple and practical modification of the detector geometry that increase point-source recognition via a distinctive temporal signature. A key part of this effort is the integrated development of both detector geometries that induce a highly distinctive signature for point sources and the development of statistical algorithms able to optimize detection of this signature amidst varying background. The identification of temporal signatures for point sources has been demonstrated and compared with the canonical method showing good results. This work demonstrates that temporal signatures are efficient at increasing point-source discrimination in a moving detector system

  10. Optical/Infrared Signatures for Space-Based Remote Sensing

    National Research Council Canada - National Science Library

    Picard, R. H; Dewan, E. M; Winick, J. R; O'Neil, R. R

    2007-01-01

    This report describes work carried out under the Air Force Research Laboratory's basic research task in optical remote-sensing signatures, entitled Optical / Infrared Signatures for Space-Based Remote Sensing...

  11. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  12. Analysis of signature wrapping attacks and countermeasures

    DEFF Research Database (Denmark)

    Gajek, Sebastian; Jensen, Meiko; Liao, Lijun

    2009-01-01

    In recent research it turned out that Boolean verification, of digital signatures in the context of WSSecurity, is likely to fail: If parts of a SOAP message, are signed and the signature verification applied to, the whole document returns true, then nevertheless the, document may have been...

  13. Molecular Signature in HCV-Positive Lymphomas

    Directory of Open Access Journals (Sweden)

    Valli De Re

    2012-01-01

    Full Text Available Hepatitis C virus (HCV is a positive, single-stranded RNA virus, which has been associated to different subtypes of B-cell non-Hodgkin lymphoma (B-NHL. Cumulative evidence suggests an HCV-related antigen driven process in the B-NHL development. The underlying molecular signature associated to HCV-related B-NHL has to date remained obscure. In this review, we discuss the recent developments in this field with a special mention to different sets of genes whose expression is associated with BCR coupled to Blys signaling which in turn was found to be linked to B-cell maturation stages and NF-κb transcription factor. Even if recent progress on HCV-B-NHL signature has been made, the precise relationship between HCV and lymphoma development and phenotype signature remain to be clarified.

  14. 32 CFR 842.6 - Signature on the claim form.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Signature on the claim form. 842.6 Section 842.6... ADMINISTRATIVE CLAIMS General Information § 842.6 Signature on the claim form. The claimant or authorized agent... authorized agent signing for a claimant shows, after the signature, the title or capacity and attaches...

  15. Thermal signature measurements for ammonium nitrate/fuel mixtures by laser heating

    International Nuclear Information System (INIS)

    Nazarian, Ashot; Presser, Cary

    2016-01-01

    Highlights: • LDTR is a useful diagnostic for characterizing AN/fuel mixture thermochemical behavior. • Each AN/fuel mixture thermal signature was different. • AN/fuel mixture signature features were defined by the individual constituents. • Baseline signatures changed after an experiment. - Abstract: Measurements were carried out to obtain thermal signatures of several ammonium nitrate/fuel (ANF) mixtures, using a laser-heating technique referred to as the laser-driven thermal reactor (LDTR). The mixtures were ammonium nitrate (AN)/kerosene, AN/ethylene glycol, AN/paraffin wax, AN/petroleum jelly, AN/confectioner's sugar, AN/cellulose (tissue paper), nitromethane/cellulose, nitrobenzene/cellulose, AN/cellulose/nitromethane, AN/cellulose/nitrobenzene. These mixtures were also compared with AN/nitromethane and AN/diesel fuel oil, obtained from an earlier investigation. Thermograms for the mixtures, as well as individual constituents, were compared to better understand how sample thermal signature changes with mixture composition. This is the first step in development of a thermal-signature database, to be used along with other signature databases, to improve identification of energetic substances of unknown composition. The results indicated that each individual thermal signature was associated unambiguously with a particular mixture composition. The signature features of a particular mixture were shaped by the individual constituent signatures. It was also uncovered that the baseline signature was modified after an experiment due to coating of unreacted residue on the substrate surface and a change in the reactor sphere oxide layer. Thus, care was required to pre-oxidize the sphere prior to an experiment. A minimum sample mass (which was dependent on composition) was required to detect the signature characteristics. Increased laser power served to magnify signal strength while preserving the signature features. For the mixtures examined, the thermal

  16. Cubic Bezier Curve Approach for Automated Offline Signature Verification with Intrusion Identification

    Directory of Open Access Journals (Sweden)

    Arun Vijayaragavan

    2014-01-01

    Full Text Available Authentication is a process of identifying person’s rights over a system. Many authentication types are used in various systems, wherein biometrics authentication systems are of a special concern. Signature verification is a basic biometric authentication technique used widely. The signature matching algorithm uses image correlation and graph matching technique which provides false rejection or acceptance. We proposed a model to compare knowledge from signature. Intrusion in the signature repository system results in copy of the signature that leads to false acceptance. Our approach uses a Bezier curve algorithm to identify the curve points and uses the behaviors of the signature for verification. An analyzing mobile agent is used to identify the input signature parameters and compare them with reference signature repository. It identifies duplication of signature over intrusion and rejects it. Experiments are conducted on a database with thousands of signature images from various sources and the results are favorable.

  17. 27 CFR 70.52 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Signature presumed authentic. 70.52 Section 70.52 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE... Collection of Excise and Special (Occupational) Tax Collection-General Provisions § 70.52 Signature presumed...

  18. 13 CFR 134.209 - Requirement of signature.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Requirement of signature. 134.209 Section 134.209 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION RULES OF PROCEDURE GOVERNING... of signature. Every written submission to OHA, other than evidence, must be signed by the party...

  19. Electronic Signature (eSig)

    Data.gov (United States)

    Department of Veterans Affairs — Beginning with the Government Paperwork Elimination Act of 1998 (GPEA), the Federal government has encouraged the use of electronic / digital signatures to enable...

  20. The Extended Relativity Theory in Clifford Spaces

    CERN Document Server

    Castro, C

    2004-01-01

    A brief review of some of the most important features of the Extended Relativity theory in Clifford-spaces ( $C$-spaces) is presented whose " point" coordinates are noncommuting Clifford-valued quantities and which incoporate the lines, areas, volumes, .... degrees of freedom associated with the collective particle, string, membrane, ... dynamics of the $p$-loop histories (closed p-branes) living in target $D$-dimensional spacetime backgrounds. $C$-space Relativity naturally incoporates the ideas of an invariant length (Planck scale), maximal acceleration, noncommuting coordinates, supersymmetry, holography, superluminal propagation, higher derivative gravity with torsion and variable dimensions/signatures that allows to study the dynamics of all (closed ) p-branes, for all values of $ p $, in a unified footing. It resolves the ordering ambiguities in QFT and the problem of time in Cosmology. A discussion of the maximal-acceleration Relativity principle in phase-spaces follows along with the study of the inva...

  1. Uncertainty in hydrological signatures for gauged and ungauged catchments

    Science.gov (United States)

    Westerberg, Ida K.; Wagener, Thorsten; Coxon, Gemma; McMillan, Hilary K.; Castellarin, Attilio; Montanari, Alberto; Freer, Jim

    2016-03-01

    Reliable information about hydrological behavior is needed for water-resource management and scientific investigations. Hydrological signatures quantify catchment behavior as index values, and can be predicted for ungauged catchments using a regionalization procedure. The prediction reliability is affected by data uncertainties for the gauged catchments used in prediction and by uncertainties in the regionalization procedure. We quantified signature uncertainty stemming from discharge data uncertainty for 43 UK catchments and propagated these uncertainties in signature regionalization, while accounting for regionalization uncertainty with a weighted-pooling-group approach. Discharge uncertainty was estimated using Monte Carlo sampling of multiple feasible rating curves. For each sampled rating curve, a discharge time series was calculated and used in deriving the gauged signature uncertainty distribution. We found that the gauged uncertainty varied with signature type, local measurement conditions and catchment behavior, with the highest uncertainties (median relative uncertainty ±30-40% across all catchments) for signatures measuring high- and low-flow magnitude and dynamics. Our regionalization method allowed assessing the role and relative magnitudes of the gauged and regionalized uncertainty sources in shaping the signature uncertainty distributions predicted for catchments treated as ungauged. We found that (1) if the gauged uncertainties were neglected there was a clear risk of overconditioning the regionalization inference, e.g., by attributing catchment differences resulting from gauged uncertainty to differences in catchment behavior, and (2) uncertainty in the regionalization results was lower for signatures measuring flow distribution (e.g., mean flow) than flow dynamics (e.g., autocorrelation), and for average flows (and then high flows) compared to low flows.

  2. ADAGE signature analysis: differential expression analysis with data-defined gene sets.

    Science.gov (United States)

    Tan, Jie; Huyck, Matthew; Hu, Dongbo; Zelaya, René A; Hogan, Deborah A; Greene, Casey S

    2017-11-22

    Gene set enrichment analysis and overrepresentation analyses are commonly used methods to determine the biological processes affected by a differential expression experiment. This approach requires biologically relevant gene sets, which are currently curated manually, limiting their availability and accuracy in many organisms without extensively curated resources. New feature learning approaches can now be paired with existing data collections to directly extract functional gene sets from big data. Here we introduce a method to identify perturbed processes. In contrast with methods that use curated gene sets, this approach uses signatures extracted from public expression data. We first extract expression signatures from public data using ADAGE, a neural network-based feature extraction approach. We next identify signatures that are differentially active under a given treatment. Our results demonstrate that these signatures represent biological processes that are perturbed by the experiment. Because these signatures are directly learned from data without supervision, they can identify uncurated or novel biological processes. We implemented ADAGE signature analysis for the bacterial pathogen Pseudomonas aeruginosa. For the convenience of different user groups, we implemented both an R package (ADAGEpath) and a web server ( http://adage.greenelab.com ) to run these analyses. Both are open-source to allow easy expansion to other organisms or signature generation methods. We applied ADAGE signature analysis to an example dataset in which wild-type and ∆anr mutant cells were grown as biofilms on the Cystic Fibrosis genotype bronchial epithelial cells. We mapped active signatures in the dataset to KEGG pathways and compared with pathways identified using GSEA. The two approaches generally return consistent results; however, ADAGE signature analysis also identified a signature that revealed the molecularly supported link between the MexT regulon and Anr. We designed

  3. Guidance document for revision of DOE Order 5820.2A, Radioactive Waste Technical Support Program. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Kudera, D.E.; McMurtrey, C.D.; Meagher, B.G.

    1993-04-01

    This document provides guidance for the revision of DOE Order 5820.2A, ``Radioactive Waste Management.`` Technical Working Groups have been established and are responsible for writing the revised order. The Technical Working Groups will use this document as a reference for polices and procedures that have been established for the revision process. The overall intent of this guidance is to outline how the order will be revised and how the revision process will be managed. In addition, this document outlines technical issues considered for inclusion by a Department of Energy Steering Committee.

  4. Advanced Missile Signature Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...

  5. A genome-wide signature of positive selection in ancient and recent invasive expansions of the honey bee Apis mellifera

    OpenAIRE

    Zayed, Amro; Whitfield, Charles W.

    2008-01-01

    Apis mellifera originated in Africa and extended its range into Eurasia in two or more ancient expansions. In 1956, honey bees of African origin were introduced into South America, their descendents admixing with previously introduced European bees, giving rise to the highly invasive and economically devastating “Africanized” honey bee. Here we ask whether the honey bee's out-of-Africa expansions, both ancient and recent (invasive), were associated with a genome-wide signature of positive sel...

  6. 25 CFR 117.33 - Signature of illiterates.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Signature of illiterates. 117.33 Section 117.33 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR FINANCIAL ACTIVITIES DEPOSIT AND EXPENDITURE OF... Signature of illiterates. An Indian who cannot write shall be required to endorse checks payable to his...

  7. 12 CFR 350.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Signature and attestation. 350.6 Section 350.6 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY FDIC-INSURED STATE NONMEMBER BANKS § 350.6 Signature and...

  8. Quantum dual signature scheme based on coherent states with entanglement swapping

    International Nuclear Information System (INIS)

    Liu Jia-Li; Shi Rong-Hua; Shi Jin-Jing; Lv Ge-Li; Guo Ying

    2016-01-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. (paper)

  9. Real-Time Capable Micro-Doppler Signature Decomposition of Walking Human Limbs

    OpenAIRE

    Abdulatif, Sherif; Aziz, Fady; Kleiner, Bernhard; Schneider, Urs

    2017-01-01

    Unique micro-Doppler signature ($\\boldsymbol{\\mu}$-D) of a human body motion can be analyzed as the superposition of different body parts $\\boldsymbol{\\mu}$-D signatures. Extraction of human limbs $\\boldsymbol{\\mu}$-D signatures in real-time can be used to detect, classify and track human motion especially for safety application. In this paper, two methods are combined to simulate $\\boldsymbol{\\mu}$-D signatures of a walking human. Furthermore, a novel limbs $\\mu$-D signature time independent...

  10. Research on Signature Verification Method Based on Discrete Fréchet Distance

    Science.gov (United States)

    Fang, J. L.; Wu, W.

    2018-05-01

    This paper proposes a multi-feature signature template based on discrete Fréchet distance, which breaks through the limitation of traditional signature authentication using a single signature feature. It solves the online handwritten signature authentication signature global feature template extraction calculation workload, signature feature selection unreasonable problem. In this experiment, the false recognition rate (FAR) and false rejection rate (FRR) of the statistical signature are calculated and the average equal error rate (AEER) is calculated. The feasibility of the combined template scheme is verified by comparing the average equal error rate of the combination template and the original template.

  11. 17 CFR 201.153 - Filing of papers: Signature requirement and effect.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Filing of papers: Signature... COMMISSION RULES OF PRACTICE Rules of Practice General Rules § 201.153 Filing of papers: Signature... telephone number on every filing. (b) Effect of signature. (1) The signature of a counsel or party shall...

  12. A Secure and Efficient Certificateless Short Signature Scheme

    Directory of Open Access Journals (Sweden)

    Lin Cheng

    2013-07-01

    Full Text Available Certificateless public key cryptography combines advantage of traditional public key cryptography and identity-based public key cryptography as it avoids usage of certificates and resolves the key escrow problem. In 2007, Huang et al. classified adversaries against certificateless signatures according to their attack power into normal, strong and super adversaries (ordered by their attack power. In this paper, we propose a new certificateless short signature scheme and prove that it is secure against both of the super type I and the super type II adversaries. Our new scheme not only achieves the strongest security level but also has the shortest signature length (one group element. Compared with the other short certificateless signature schemes which have a similar security level, our new scheme has less operation cost.

  13. Extensively coated revision stems in proximally deficient femur: Early results in 15 patients

    Directory of Open Access Journals (Sweden)

    Marya SKS

    2008-01-01

    Full Text Available Background: Hip replacement following failed internal fixation (dynamic hip screw for intertrochanteric fractures or previous hip arthroplasty presents a major surgical challenge. Proximal fitting revision stems do not achieve adequate fixation. Distal fixation with long-stemmed extensively coated cementless implants (like the Solution™ system affords a suitable solution. We present our early results of 15 patients treated with extensively coated cementless revision stems. Materials and Methods: Fifteen patients with severely compromised proximal femora following either failed hip arthroplasty or failed internal fixation (dynamic hip screw fixation for intertrochanteric fractures were operated by the senior author over a two-year period. Eight patients had aseptic loosening of their femoral stems following cemented hip replacements, with severe thinning of their proximal cortices and impending stress fractures. Seven had secondary hip arthritis following failure of long implants for comminuted intertrochanteric or subtrochanteric femoral fractures. All patients were treated by removal of implant (cemented stems/DHS implants and insertion of long-stemmed extensively coated cementless revision (′ Solution™; DePuy, Warsaw (IN, US′ stems along with press-fit acetabular component (Duraloc Cup, DePuy, Warsaw (IN, US. All eight hip revisions needed extended trochanteric osteotomies. Results: All patients were primarily kept in bed on physiotherapy for six weeks and then gradually progressed to weight-bearing walking over the next six to eight weeks. The Harris Hip Scores and patient satisfaction were used for final evaluation. We achieved good results in the short term studied. In our first three patients (all following failed cemented total hip replacements, we resorted to cerclage wiring to hold osteotomised segments (done to facilitate stem removal. The subsequent 12 proceeded without the need for cerclage wiring. One patient had a

  14. ANALYSIS OF DIGITAL SIGNATURE RULE IN THE ELECTRONIC COMMERCE LAW OF INDONESIA

    Directory of Open Access Journals (Sweden)

    Irna Nurhayati

    2015-02-01

    Full Text Available The Indonesian legislature has enacted the Information and Electronic Transaction Bill (the Bill in 2003, in which digital signature as a technology specific electronic (e commerce has been promoted. The promotion of digital signature is still problematic, since there is an uncertainty whether Indonesia can develop well a required viable technology of digital signature. Moreover, there is a gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will discuss the reason of the Indonesian legislature promotes digital signature. It will then analyse the gap between the actual use of digital signature and the projections of future utilization of digital signature by interested parties on e-commerce. This paper will finally argue whether the promotion of digital signature of the Bill is useful for the growth of e-commerce in Indonesia.

  15. 12 CFR 18.6 - Signature and attestation.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Signature and attestation. 18.6 Section 18.6 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY DISCLOSURE OF FINANCIAL AND OTHER INFORMATION BY NATIONAL BANKS § 18.6 Signature and attestation. A duly authorized officer of the...

  16. Does Social Work Have a Signature Pedagogy?

    Science.gov (United States)

    Earls Larrison, Tara; Korr, Wynne S.

    2013-01-01

    This article contributes to discourse on signature pedagogy by reconceptualizing how our pedagogies are understood and defined for social work education. We critique the view that field education is social work's signature pedagogy and consider what pedagogies are distinct about the teaching and learning of social work. Using Shulman's…

  17. Monitoring well inspection and maintenance plan Y-12 Plant, Oak Ridge, Tennessee (revised)

    International Nuclear Information System (INIS)

    1996-09-01

    Inspection and maintenance of groundwater monitoring wells is a primary element of the Oak Ridge Y-12 Plant Groundwater Protection Program (GWPP). This document is the revised groundwater monitoring well inspection and maintenance plan for the U.S. Department of Energy (DOE) Y-12 Plant in Oak Ridge, Tennessee. The plan provides a systematic program for: (1) inspecting the physical condition of monitoring wells at the Y-12 Plant and (2) identifying maintenance needs that will extend the life of each well and ensure that representative groundwater quality samples and hydrologic data are collected from the wells. Original documentation for the Y-12 Plant GWPP monitoring well inspection and maintenance program was provided in HSW, Inc. 1991a. The original revision of the plan specified that only a Monitoring Well Inspection/Maintenance Summary need be updated and reissued each year. Rapid growth of the monitoring well network and changing regulatory requirements have resulted in constant changes to the status of wells (active or inactive) listed on the Monitoring Well Inspection/Maintenance Summary. As a result, a new mechanism to track the status of monitoring wells has been developed and the plan revised to formalize the new business practices. These changes are detailed in Sections 2.4 and 2.5

  18. Improvement of a Quantum Proxy Blind Signature Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  19. The Pedagogic Signature of the Teaching Profession

    Science.gov (United States)

    Kiel, Ewald; Lerche, Thomas; Kollmannsberger, Markus; Oubaid, Viktor; Weiss, Sabine

    2016-01-01

    Lee S. Shulman deplores that the field of education as a profession does not have a pedagogic signature, which he characterizes as a synthesis of cognitive, practical and moral apprenticeship. In this context, the following study has three goals: 1) In the first theoretical part, the basic problems of constructing a pedagogic signature are…

  20. Efficient Fair Exchange from Identity-Based Signature

    Science.gov (United States)

    Yum, Dae Hyun; Lee, Pil Joong

    A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services without allowing either party to gain advantages by quitting prematurely or otherwise misbehaving. To this end, modern cryptographic solutions use a semi-trusted arbitrator who involves only in cases where one party attempts to cheat or simply crashes. We call such a fair exchange scheme optimistic. When no registration is required between the signer and the arbitrator, we say that the fair exchange scheme is setup free. To date, the setup-free optimist fair exchange scheme under the standard RSA assumption was only possible from the generic construction of [12], which uses ring signatures. In this paper, we introduce a new setup-free optimistic fair exchange scheme under the standard RSA assumption. Our scheme uses the GQ identity-based signature and is more efficient than [12]. The construction can also be generalized by using various identity-based signature schemes. Our main technique is to allow each user to choose his (or her) own “random” public key in the identitybased signature scheme.

  1. Analysis of Non-contact Acousto Thermal Signature Data (Postprint)

    Science.gov (United States)

    2016-02-01

    AFRL-RX-WP-JA-2016-0321 ANALYSIS OF NON-CONTACT ACOUSTO-THERMAL SIGNATURE DATA (POSTPRINT) Amanda K. Criner AFRL/RX...October 2014 – 16 September 2015 4. TITLE AND SUBTITLE ANALYSIS OF NON-CONTACT ACOUSTO-THERMAL SIGNATURE DATA (POSTPRINT) 5a. CONTRACT NUMBER...words) The non-contact acousto-thermal signature (NCATS) is a nondestructive evaluation technique with potential to detect fatigue in materials such as

  2. Automated defect spatial signature analysis for semiconductor manufacturing process

    Science.gov (United States)

    Tobin, Jr., Kenneth W.; Gleason, Shaun S.; Karnowski, Thomas P.; Sari-Sarraf, Hamed

    1999-01-01

    An apparatus and method for performing automated defect spatial signature alysis on a data set representing defect coordinates and wafer processing information includes categorizing data from the data set into a plurality of high level categories, classifying the categorized data contained in each high level category into user-labeled signature events, and correlating the categorized, classified signature events to a present or incipient anomalous process condition.

  3. 37 CFR 1.4 - Nature of correspondence and signature requirements.

    Science.gov (United States)

    2010-07-01

    ... signature requirements. 1.4 Section 1.4 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND... General Information and Correspondence § 1.4 Nature of correspondence and signature requirements. (a...) Handwritten signature. Each piece of correspondence, except as provided in paragraphs (d)(2), (d)(3), (e) and...

  4. Search for signatures with top, bottom, tau and exotics

    CERN Document Server

    Andrea Favareto; Luigi Longo

    2016-01-01

    The Standard Model (SM) of particle physics is a sensational success, especially since the discov- ery of the 125 GeV Higgs boson. However, there are still several open questions that the Standard Model doesnâ??t address, like the nature of dark matter and dark energy, the matter-antimatter asym- metry, the neutrino oscillations, the inconsistency with the general relativity and the hierarchy problem. Theories Beyond the Standard Model (BSM), such as Supersymmetry, Little and Com- posite Higgs, Extra-Dimensions, Extended Gauge models, Technicolor, Left-Right symmetric models, and many other BSM scenarios are trying to answer these questions. In these proceed- ings we present the most recent results for searches Beyond the Standard Model at the LHC by the ATLAS and CMS experiments, focusing on signatures with top, bottom, tau and exotics. The data are found to be consistent with the Standard Model. The non-observation of a signal permits to set limits at the 95pct confidence level on the production cross sect...

  5. Searches with long-lived or unusual signatures

    CERN Document Server

    Haug, S; The ATLAS collaboration

    2013-01-01

    We present recent ATLAS and CMS results from searches with long-lived and unusual signatures. They are based on analysis of LHC proton-proton collisions at center of mass energies at 7 and 8 TeV. Long-lived and heavy particles may cause peculiar signatures in the detectors, but are in several Standard Model extensions well motivated.

  6. A Methodology for Calculating Radiation Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Klasky, Marc Louis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wilcox, Trevor [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bathke, Charles G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); James, Michael R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-05-01

    A rigorous formalism is presented for calculating radiation signatures from both Special Nuclear Material (SNM) as well as radiological sources. The use of MCNP6 in conjunction with CINDER/ORIGEN is described to allow for the determination of both neutron and photon leakages from objects of interest. In addition, a description of the use of MCNP6 to properly model the background neutron and photon sources is also presented. Examinations of the physics issues encountered in the modeling are investigated so as to allow for guidance in the user discerning the relevant physics to incorporate into general radiation signature calculations. Furthermore, examples are provided to assist in delineating the pertinent physics that must be accounted for. Finally, examples of detector modeling utilizing MCNP are provided along with a discussion on the generation of Receiver Operating Curves, which are the suggested means by which to determine detectability radiation signatures emanating from objects.

  7. Selection signatures in worldwide sheep populations.

    Science.gov (United States)

    Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; San Cristobal, Magali; Boitard, Simon

    2014-01-01

    The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep populations, (ii) make use of linkage disequilibrium information and (iii) focus specifically on either recent or older selection signatures. We show that this allows pinpointing several new selection signatures in the sheep genome and distinguishing those related to modern breeding objectives and to earlier post-domestication constraints. The newly identified regions, together with the ones previously identified, reveal the extensive genome response to selection on morphology, color and adaptation to new environments.

  8. Treatment-independent miRNA signature in blood of wilms tumor patients

    Directory of Open Access Journals (Sweden)

    Schmitt Jana

    2012-08-01

    Full Text Available Abstract Background Blood-born miRNA signatures have recently been reported for various tumor diseases. Here, we compared the miRNA signature in Wilms tumor patients prior and after preoperative chemotherapy according to SIOP protocol 2001. Results We did not find a significant difference between miRNA signature of both groups. However both, Wilms tumor patients prior and after chemotherapy showed a miRNA signature different from healthy controls. The signature of Wilms tumor patients prior to chemotherapy showed an accuracy of 97.5% and of patients after chemotherapy an accuracy of 97.0%, each as compared to healthy controls. Conclusion Our results provide evidence for a blood-born Wilms tumor miRNA signature largely independent of four weeks preoperative chemotherapy treatment.

  9. Calculated NWIS signatures for enriched uranium metal

    International Nuclear Information System (INIS)

    Valentine, T.E.; Mihalczo, J.T.; Koehler, P.E.

    1995-01-01

    Nuclear Weapons Identification System (NWIS) signatures have been calculated using a Monte Carlo transport code for measurement configurations of a 252 Cf source, detectors, and a uranium metal casting. NWIS signatures consist of a wide variety of time-and frequency-analysis signatures such as the time distribution of neutrons after californium fission, the time distribution of counts in a detector after a previous count, the number of times n pulses occur in a time interval, and various frequency-analysis signatures, such as auto-power and cross-power spectral densities, coherences, and a ratio of spectral densities. This ratio is independent of detection efficiency. The analysis presented here, using the MCNP-DSP code, evaluates the applicability of this method for measurement of the 235 U content of 19-kg castings of depleted uranium and uranium with enrichments of 20, 40, 60, 80, 90, and 93.2 wt % 235 U. The dependence of the wide variety of NWIS signatures on 235 U content and possible configurations of a measurement system are presented. These preliminary calculations indicate short measurement times. Additional calculations are being performed to optimize the source-detector-moderator-casting configuration for the shortest measurement time. Although the NWIS method was developed for nuclear weapons identification, the development of a small processor now allows it to be also applied in a practical way to subcriticality measurements, nuclear fuel process monitoring and qualitative nondestructive assay of special nuclear material

  10. 46 CFR 2.01-30 - Delegation of OCMI signature authority.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Delegation of OCMI signature authority. 2.01-30 Section... VESSEL INSPECTIONS Inspecting and Certificating of Vessels § 2.01-30 Delegation of OCMI signature authority. The Officer in Charge, Marine Inspection, may redelegate signature authority for documents issued...

  11. 48 CFR 15.307 - Proposal revisions.

    Science.gov (United States)

    2010-10-01

    ... AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Source Selection 15.307 Proposal revisions. (a) If an... allow proposal revisions to clarify and document understandings reached during negotiations. At the... submit a final proposal revision. The contracting officer is required to establish a common cut-off date...

  12. 7 CFR 1956.68 - Compromise or adjustment without debtor's signature.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Compromise or adjustment without debtor's signature... Loan Programs and Multi-Family Housing § 1956.68 Compromise or adjustment without debtor's signature... made to obtain the debtor's signature and the date(s) of such effort. (c) The specific reasons why it...

  13. Quantum dual signature scheme based on coherent states with entanglement swapping

    Science.gov (United States)

    Liu, Jia-Li; Shi, Rong-Hua; Shi, Jin-Jing; Lv, Ge-Li; Guo, Ying

    2016-08-01

    A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519) and the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012).

  14. 7 CFR 3015.115 - Budget revisions.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Budget revisions. 3015.115 Section 3015.115..., DEPARTMENT OF AGRICULTURE UNIFORM FEDERAL ASSISTANCE REGULATIONS Programmatic Changes and Budget Revisions § 3015.115 Budget revisions. (a) Nonconstruction projects. (1) Except as provided in paragraph (a)(2) of...

  15. Methyl-CpG island-associated genome signature tags

    Science.gov (United States)

    Dunn, John J

    2014-05-20

    Disclosed is a method for analyzing the organismic complexity of a sample through analysis of the nucleic acid in the sample. In the disclosed method, through a series of steps, including digestion with a type II restriction enzyme, ligation of capture adapters and linkers and digestion with a type IIS restriction enzyme, genome signature tags are produced. The sequences of a statistically significant number of the signature tags are determined and the sequences are used to identify and quantify the organisms in the sample. Various embodiments of the invention described herein include methods for using single point genome signature tags to analyze the related families present in a sample, methods for analyzing sequences associated with hyper- and hypo-methylated CpG islands, methods for visualizing organismic complexity change in a sampling location over time and methods for generating the genome signature tag profile of a sample of fragmented DNA.

  16. Analysis of the revision of the nuclear cooperation agreement between the USA and Switzerland

    International Nuclear Information System (INIS)

    Lee, K. S.; Lee, B. W.

    1999-01-01

    The US and Switzerland enforced a new nuclear cooperation agreement in June 1998. After extended negotiation for the new nuclear cooperation agreement, Switzerland accomplished to get the advance, long-term consent approach, not to allow the US's prior consent right on the spent fuel used in the US-origin reactors, and to specify conditions for the suspension of advance, long-term consent. This paper analyzes the contents and implications of the revision of the nuclear cooperation agreement between the two countries

  17. Extending Impact Analysis in Government Social Media Research

    DEFF Research Database (Denmark)

    Medaglia, Rony; Zheng, Lei

    2017-01-01

    of this phenomenon, and falls short of investigating the impacts that these dimensions have on each other. Drawing on a revised framework for classifying existing social media research foci in the categories of management, context, user behavior, user characteristics, platform properties, and effects, we present......The use of social media by governments is a complex phenomenon that touches upon multiple dimensions, and that involves a wide array of relationships between these dimensions. Existing empirical research on government social media, however, is still mostly focusing on describing isolated aspects...... five empirical cases to illustrate impacts between dimensions of government social media. The empirical findings from the cases extend impact analysis beyond the existing foci, and enable us to propose a research agenda for future research on impacts in government social media....

  18. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  19. A study on scar revision

    Directory of Open Access Journals (Sweden)

    Ashutosh Talwar

    2016-04-01

    Full Text Available Introduction: Scars are psychologically distressing for the patients and have an impact on the quality of life and self esteem of the patients. Scar revision is an aesthetic skill which is mastered by plastic surgeons and encroached now by dermatosurgeons. Scars on the face are aesthetically unacceptable and various techniques have been improvised for making a scar aesthetically acceptable. Various types of techniques are used for scar revision like W plasty, Z plasty and VY plasty. Aims: To see the efficacy of various scar revision techniques including Z plasty, VY plasty and W plasty in 30 patients with disfiguring scars. Methods: We selected twenty patients of disfiguring scars for the study. The scars from various causes including trauma and burns were included in our study. Various techniques of scar revision include Z plasty, W plasty and VY plasty were performed according to the type and site of scar. Results: Male: female was 1.5: 1. The scar revision surgery yielded excellent results with minimal complications including haematoma formation, secondary infection and delayed healing seen in 5% patients each. Regarding the efficacy of scar revision, excellent improvement was seen in 60% patients, moderate improvement was seen in 30% patients and mild improvement was seen in 10% patients. Conclusions: Dermatologists can employ a number of surgical scar revision techniques. While some are better suited to treat specific types of scars, they can be used in combination with each other or with adjunctive therapies to achieve optimal results.

  20. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  1. Biomarker Gene Signature Discovery Integrating Network Knowledge

    Directory of Open Access Journals (Sweden)

    Holger Fröhlich

    2012-02-01

    Full Text Available Discovery of prognostic and diagnostic biomarker gene signatures for diseases, such as cancer, is seen as a major step towards a better personalized medicine. During the last decade various methods, mainly coming from the machine learning or statistical domain, have been proposed for that purpose. However, one important obstacle for making gene signatures a standard tool in clinical diagnosis is the typical low reproducibility of these signatures combined with the difficulty to achieve a clear biological interpretation. For that purpose in the last years there has been a growing interest in approaches that try to integrate information from molecular interaction networks. Here we review the current state of research in this field by giving an overview about so-far proposed approaches.

  2. Forged Signature Distinction Using Convolutional Neural Network for Feature Extraction

    Directory of Open Access Journals (Sweden)

    Seungsoo Nam

    2018-01-01

    Full Text Available This paper proposes a dynamic verification scheme for finger-drawn signatures in smartphones. As a dynamic feature, the movement of a smartphone is recorded with accelerometer sensors in the smartphone, in addition to the moving coordinates of the signature. To extract high-level longitudinal and topological features, the proposed scheme uses a convolution neural network (CNN for feature extraction, and not as a conventional classifier. We assume that a CNN trained with forged signatures can extract effective features (called S-vector, which are common in forging activities such as hesitation and delay before drawing the complicated part. The proposed scheme also exploits an autoencoder (AE as a classifier, and the S-vector is used as the input vector to the AE. An AE has high accuracy for the one-class distinction problem such as signature verification, and is also greatly dependent on the accuracy of input data. S-vector is valuable as the input of AE, and, consequently, could lead to improved verification accuracy especially for distinguishing forged signatures. Compared to the previous work, i.e., the MLP-based finger-drawn signature verification scheme, the proposed scheme decreases the equal error rate by 13.7%, specifically, from 18.1% to 4.4%, for discriminating forged signatures.

  3. Signature Pedagogies for E-Learning in Higher Education and Beyond

    Science.gov (United States)

    Eaton, Sarah Elaine; Brown, Barbara; Schroeder, Meadow; Lock, Jennifer; Jacobsen, Michele

    2017-01-01

    Purpose: This report explores the notion of signature pedagogies within the field of e-learning for higher education. Methodology: We build on previous work that examined signature pedagogies in education, linking the concepts of signature pedagogies, the profession of education and e-learning as a means to help educators develop their practice…

  4. Provably Secure and Subliminal-Free Variant of Schnorr Signature

    OpenAIRE

    Zhang , Yinghui; Li , Hui; Li , Xiaoqing; Zhu , Hui

    2013-01-01

    Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES); International audience; Subliminal channels present a severe challenge to information security. Currently, subliminal channels still exist in Schnorr signature. In this paper, we propose a subliminal-free variant of Schnorr signature. In the proposed scheme, an honest-but-curious warden is introduced to help the signer to generate a signature on a given message, but it is disallowed to sign messages independently. ...

  5. Secure Mobile Agent from Leakage-Resilient Proxy Signatures

    Directory of Open Access Journals (Sweden)

    Fei Tang

    2015-01-01

    Full Text Available A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator to delegate its signing right to another entity (proxy to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.

  6. Digital signature feasibility study

    Science.gov (United States)

    2008-06-01

    The purpose of this study was to assess the advantages and disadvantages of using digital signatures to assist the Arizona Department of Transportation in conducting business. The Department is evaluating the potential of performing more electronic t...

  7. Tumor Microenvironment Gene Signature as a Prognostic Classifier and Therapeutic Target

    Science.gov (United States)

    2016-06-01

    AWARD NUMBER: W81XWH-14-1-0107 TITLE: Tumor Microenvironment Gene Signature as a Prognostic Classifier and Therapeutic Target PRINCIPAL...AND SUBTITLE Tumor Microenvironment Gene Signature as a 5a. CONTRACT NUMBER W81XWH-14-1-0107 Prognostic Classifier and Therapeutic Target 5b...gene signature that correlates with poor survival in ovarian cancer patients. We are refining this gene signature to develop biomarkers for the

  8. Methods and apparatus for multi-parameter acoustic signature inspection

    Energy Technology Data Exchange (ETDEWEB)

    Diaz, Aaron A [Richland, WA; Samuel, Todd J [Pasco, WA; Valencia, Juan D [Kennewick, WA; Gervais, Kevin L [Richland, WA; Tucker, Brian J [Pasco, WA; Kirihara, Leslie J [Richland, WA; Skorpik, James R [Kennewick, WA; Reid, Larry D [Benton City, WA; Munley, John T [Benton City, WA; Pappas, Richard A [Richland, WA; Wright, Bob W [West Richland, WA; Panetta, Paul D [Richland, WA; Thompson, Jason S [Richland, WA

    2007-07-24

    A multiparameter acoustic signature inspection device and method are described for non-invasive inspection of containers. Dual acoustic signatures discriminate between various fluids and materials for identification of the same.

  9. Revision of the SNPforID 34-plex forensic ancestry test: Assay enhancements, standard reference sample genotypes and extended population studies.

    Science.gov (United States)

    Fondevila, M; Phillips, C; Santos, C; Freire Aradas, A; Vallone, P M; Butler, J M; Lareu, M V; Carracedo, A

    2013-01-01

    A revision of an established 34 SNP forensic ancestry test has been made by swapping the under-performing rs727811 component SNP with the highly informative rs3827760 that shows a near-fixed East Asian specific allele. We collated SNP variability data for the revised SNP set in 66 reference populations from 1000 Genomes and HGDP-CEPH panels and used this as reference data to analyse four U.S. populations showing a range of admixture patterns. The U.S. Hispanics sample in particular displayed heterogeneous values of co-ancestry between European, Native American and African contributors, likely to reflect in part, the way this disparate group is defined using cultural as well as population genetic parameters. The genotyping of over 700 U.S. population samples also provided the opportunity to thoroughly gauge peak mobility variation and peak height ratios observed from routine use of the single base extension chemistry of the 34-plex test. Finally, the genotyping of the widely used DNA profiling Standard Reference Material samples plus other control DNAs completes the audit of the 34-plex assay to allow forensic practitioners to apply this test more readily in their own laboratories. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  10. Removal of well-fixed components in femoral revision arthroplasty with controlled segmentation of the proximal femur.

    Science.gov (United States)

    Megas, Panagiotis; Georgiou, Christos S; Panagopoulos, Andreas; Kouzelis, Antonis

    2014-12-31

    The transfemoral and the extended trochanteric osteotomies are the most common osteotomies used in femoral revision, both when proximal or diaphyseal fixation of the new component has been decided. We present an alternative approach to the trochanteric osteotomies, most frequently used with distally fixated stems, to overcome their shortcomings of osteotomy migration and nonunion, but, most of all, the uncontrollable fragmentation of the femur. The procedure includes a complete circular femoral osteotomy just below the stem tip to prevent distal fracture propagation and a subsequent preplanned segmentation of the proximal femur for better exposure and fast removal of the old prosthesis. The bone fragments are reattached with cerclage wires to the revision prosthesis, which is safely anchored distally. A modified posterolateral approach is used, as the preservation of the continuity of the abductors, the greater trochanter, and the vastus lateralis is a prerequisite. Between 2006 and 2012, 47 stems (33 women, 14 men, mean age 68 years, range 39-88 years) were revised using this technique. They were 12 (26%) stable and 35 (74%) loose prostheses and were all revised to tapered, fluted, grit-blasted stems. No fracture of the trochanters or the distal femur occurred intraoperatively. Mean follow-up was 28 months (range 6-70 months). No case of trochanteric migration or nonunion of the osteotomies was recorded. Restoration of the preexisting bone defects occurred in 83% of the patients. Three patients required repeat revision due to dislocation and one due to a postoperative periprosthetic fracture. None of the failures was attributed to the procedure itself. This new osteotomy technique may seem aggressive at first, but, at least in our hands, has effectively increased the speed of the femoral revision, particularly for the most difficult well-fixed components, but not at the expense of safety.

  11. Thermal Signature Measurements for Ammonium Nitrate/Fuel Mixtures by Laser Heating.

    Science.gov (United States)

    Nazarian, Ashot; Presser, Cary

    2016-01-10

    Measurements were carried out to obtain thermal signatures of several ammonium nitrate/fuel (ANF) mixtures, using a laser-heating technique referred to as the laser-driven thermal reactor (LDTR). The mixtures were ammonium nitrate (AN)/kerosene, AN/ethylene glycol, AN/paraffin wax, AN/petroleum jelly, AN/confectioner's sugar, AN/cellulose (tissue paper), nitromethane/cellulose, nitrobenzene/cellulose, AN/cellulose/nitromethane, AN/cellulose/nitrobenzene. These mixtures were also compared with AN/nitromethane and AN/diesel fuel oil, obtained from an earlier investigation. Thermograms for the mixtures, as well as individual constituents, were compared to better understand how the sample thermal signature changes with mixture composition. This is the first step in development of a thermal-signature database, to be used along with other signature databases, to improve identification of energetic substances of unknown composition. The results indicated that each individual thermal signature was associated unambiguously with a particular mixture composition. The signature features of a particular mixture were shaped by the individual constituent signatures. It was also uncovered that the baseline signature was modified after an experiment due to coating of unreacted residue on the substrate surface and a change in the reactor sphere oxide layer. Thus, care was required to pre-oxidize the sphere prior to an experiment. A minimum sample mass (which was dependent on composition) was required to detect the signature characteristics. Increased laser power served to magnify signal strength while preserving the signature features. For the mixtures examined, the thermal response of each ANF mixture was found to be different, which was based on the mixture composition and the thermal behavior of each mixture constituent.

  12. 26 CFR 301.6064-1 - Signature presumed authentic.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Signature presumed authentic. 301.6064-1 Section 301.6064-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED....6064-1 Signature presumed authentic. An individual's name signed to a return, statement, or other...

  13. Ventriculoperitoneal shunt complications needing shunt revision in children: A review of 5 years of experience with 48 revisions

    Directory of Open Access Journals (Sweden)

    Rajendra K Ghritlaharey

    2012-01-01

    Full Text Available Background: The aim of this study was to review the management of ventriculoperitoneal (VP shunt complications in children. Patients and Methods: During the last 5 years (January 1, 2006 to December 31, 2010, 236 VP shunt operations were performed in children under 12 years of age; of these, 40 (16.94% developed shunt complications and those who underwent VP shunt revisions were studied. Results: This prospective study included 40 (28 boys and 12 girls children and required 48 shunt revisions. Complications following VP shunts that required shunt revisions were peritoneal catheter/peritoneal end malfunction (18, shunt/shunt tract infections (7, extrusion of peritoneal catheter through anus (5, ventricular catheter malfunction (4, cerebrospinal fluid (CSF leak from abdominal wound (4, shunt system failure (2, ventricular end/shunt displacement (2, CSF pseudocysts peritoneal cavity (2, extrusion of peritoneal catheter from neck, chest, abdominal scar and through umbilicus, one each. Four-fifth of these shunt complications occurred within 6 months of previous surgery. Surgical procedures done during shunt revisions in order of frequency were revision of peritoneal part of shunt (27, 56.25%, revision of entire shunt system (6, 12.5%, extra ventricular drainage and delayed re-shunt (5, 10.41%, shunt removal and delayed re-shunt (5, 10.41%, opposite side shunting (2, 4.16%, cysts excision and revision of peritoneal catheter (2, 4.16% and revision of ventricular catheter (1, 2.08%. The mortalities following VP shunt operations were 44 (18.64% and following shunt revisions were 4 (10%. Conclusions: VP shunt done for hydrocephalus in children is not only prone for complications and need for revision surgery but also associated with considerable mortality.

  14. Molecular signatures for the Crenarchaeota and the Thaumarchaeota.

    Science.gov (United States)

    Gupta, Radhey S; Shami, Ali

    2011-02-01

    Crenarchaeotes found in mesophilic marine environments were recently placed into a new phylum of Archaea called the Thaumarchaeota. However, very few molecular characteristics of this new phylum are currently known which can be used to distinguish them from the Crenarchaeota. In addition, their relationships to deep-branching archaeal lineages are unclear. We report here detailed analyses of protein sequences from Crenarchaeota and Thaumarchaeota that have identified many conserved signature indels (CSIs) and signature proteins (SPs) (i.e., proteins for which all significant blast hits are from these groups) that are specific for these archaeal groups. Of the identified signatures 6 CSIs and 13 SPs are specific for the Crenarchaeota phylum; 6 CSIs and >250 SPs are uniquely found in various Thaumarchaeota (viz. Cenarchaeum symbiosum, Nitrosopumilus maritimus and a number of uncultured marine crenarchaeotes) and 3 CSIs and ~10 SPs are found in both Thaumarchaeota and Crenarchaeota species. Some of the molecular signatures are also present in Korarchaeum cryptofilum, which forms the independent phylum Korarchaeota. Although some of these molecular signatures suggest a distant shared ancestry between Thaumarchaeota and Crenarchaeota, our identification of large numbers of Thaumarchaeota-specific proteins and their deep branching between the Crenarchaeota and Euryarchaeota phyla in phylogenetic trees shows that they are distinct from both Crenarchaeota and Euryarchaeota in both genetic and phylogenetic terms. These observations support the placement of marine mesophilic archaea into the separate phylum Thaumarchaeota. Additionally, many CSIs and SPs have been found that are specific for different orders within Crenarchaeota (viz. Sulfolobales-3 CSIs and 169 SPs, Thermoproteales-5 CSIs and 25 SPs, Desulfurococcales-4 SPs, and Sulfolobales and Desulfurococcales-2 CSIs and 18 SPs). The signatures described here provide novel means for distinguishing the Crenarchaeota and

  15. Early signatures of regime shifts in gene expression dynamics

    Science.gov (United States)

    Pal, Mainak; Pal, Amit Kumar; Ghosh, Sayantari; Bose, Indrani

    2013-06-01

    Recently, a large number of studies have been carried out on the early signatures of sudden regime shifts in systems as diverse as ecosystems, financial markets, population biology and complex diseases. The signatures of regime shifts in gene expression dynamics are less systematically investigated. In this paper, we consider sudden regime shifts in the gene expression dynamics described by a fold-bifurcation model involving bistability and hysteresis. We consider two alternative models, models 1 and 2, of competence development in the bacterial population B. subtilis and determine some early signatures of the regime shifts between competence and noncompetence. We use both deterministic and stochastic formalisms for the purpose of our study. The early signatures studied include the critical slowing down as a transition point is approached, rising variance and the lag-1 autocorrelation function, skewness and a ratio of two mean first passage times. Some of the signatures could provide the experimental basis for distinguishing between bistability and excitability as the correct mechanism for the development of competence.

  16. Spatially Resolved Isotopic Source Signatures of Wetland Methane Emissions

    Science.gov (United States)

    Ganesan, A. L.; Stell, A. C.; Gedney, N.; Comyn-Platt, E.; Hayman, G.; Rigby, M.; Poulter, B.; Hornibrook, E. R. C.

    2018-04-01

    We present the first spatially resolved wetland δ13C(CH4) source signature map based on data characterizing wetland ecosystems and demonstrate good agreement with wetland signatures derived from atmospheric observations. The source signature map resolves a latitudinal difference of 10‰ between northern high-latitude (mean -67.8‰) and tropical (mean -56.7‰) wetlands and shows significant regional variations on top of the latitudinal gradient. We assess the errors in inverse modeling studies aiming to separate CH4 sources and sinks by comparing atmospheric δ13C(CH4) derived using our spatially resolved map against the common assumption of globally uniform wetland δ13C(CH4) signature. We find a larger interhemispheric gradient, a larger high-latitude seasonal cycle, and smaller trend over the period 2000-2012. The implication is that erroneous CH4 fluxes would be derived to compensate for the biases imposed by not utilizing spatially resolved signatures for the largest source of CH4 emissions. These biases are significant when compared to the size of observed signals.

  17. Early signatures of regime shifts in gene expression dynamics

    International Nuclear Information System (INIS)

    Pal, Mainak; Pal, Amit Kumar; Ghosh, Sayantari; Bose, Indrani

    2013-01-01

    Recently, a large number of studies have been carried out on the early signatures of sudden regime shifts in systems as diverse as ecosystems, financial markets, population biology and complex diseases. The signatures of regime shifts in gene expression dynamics are less systematically investigated. In this paper, we consider sudden regime shifts in the gene expression dynamics described by a fold-bifurcation model involving bistability and hysteresis. We consider two alternative models, models 1 and 2, of competence development in the bacterial population B. subtilis and determine some early signatures of the regime shifts between competence and noncompetence. We use both deterministic and stochastic formalisms for the purpose of our study. The early signatures studied include the critical slowing down as a transition point is approached, rising variance and the lag-1 autocorrelation function, skewness and a ratio of two mean first passage times. Some of the signatures could provide the experimental basis for distinguishing between bistability and excitability as the correct mechanism for the development of competence. (paper)

  18. Signature scheme for the microscopic description of nuclear collective excitations

    International Nuclear Information System (INIS)

    Ogawa, K.

    1980-04-01

    The symmetries between the proton and neutron systems in a nucleus are described in terms of the signatures. Three kinds of signatures (i.e. the pn-, p anti n- and p anti p- (or n anti n-) signatures) are introduced and they are related to the appearance of various collective motions such as rotations or vibrations. It is shown that the pn-signature scheme provides a band-like structure of deformed nuclei, while the features associated with the quadrupole vibration are obtained in the p anti n- and p anti p-signature scheme. From the detail investigation of the p anti n-symmetric wave functions, it is concluded that the reguralities provided by the present shell model are more analogous to those of the γ-unstable surface vibration model (Wilets-Jean model) than to those of harmonic phonon model. (author)

  19. Cochlear implant revision surgeries in children.

    Science.gov (United States)

    Amaral, Maria Stella Arantes do; Reis, Ana Cláudia Mirândola B; Massuda, Eduardo T; Hyppolito, Miguel Angelo

    2018-02-16

    The surgery during which the cochlear implant internal device is implanted is not entirely free of risks and may produce problems that will require revision surgeries. To verify the indications for cochlear implantation revision surgery for the cochlear implant internal device, its effectiveness and its correlation with certain variables related to language and hearing. A retrospective study of patients under 18 years submitted to cochlear implant Surgery from 2004 to 2015 in a public hospital in Brazil. Data collected were: age at the time of implantation, gender, etiology of the hearing loss, audiological and oral language characteristics of each patient before and after Cochlear Implant surgery and any need for surgical revision and the reason for it. Two hundred and sixty-five surgeries were performed in 236 patients. Eight patients received a bilateral cochlear implant and 10 patients required revision surgery. Thirty-two surgeries were necessary for these 10 children (1 bilateral cochlear implant), of which 21 were revision surgeries. In 2 children, cochlear implant removal was necessary, without reimplantation, one with cochlear malformation due to incomplete partition type I and another due to trauma. With respect to the cause for revision surgery, of the 8 children who were successfully reimplanted, four had cochlear calcification following meningitis, one followed trauma, one exhibited a facial nerve malformation, one experienced a failure of the cochlear implant internal device and one revision surgery was necessary because the electrode was twisted. The incidence of the cochlear implant revision surgery was 4.23%. The period following the revision surgeries revealed an improvement in the subject's hearing and language performance, indicating that these surgeries are valid in most cases. Copyright © 2018 Associação Brasileira de Otorrinolaringologia e Cirurgia Cérvico-Facial. Published by Elsevier Editora Ltda. All rights reserved.

  20. Learning with multiple representations: an example of a revision lesson in mechanics

    Science.gov (United States)

    Wong, Darren; Poo, Sng Peng; Eng Hock, Ng; Loo Kang, Wee

    2011-03-01

    We describe an example of learning with multiple representations in an A-level revision lesson on mechanics. The context of the problem involved the motion of a ball thrown vertically upwards in air and studying how the associated physical quantities changed during its flight. Different groups of students were assigned to look at the ball's motion using various representations: motion diagrams, vector diagrams, free-body diagrams, verbal description, equations and graphs, drawn against time as well as against displacement. Overall, feedback from students about the lesson was positive. We further discuss the benefits of using computer simulation to support and extend student learning.

  1. Invariance Signatures: Characterizing contours by their departures from invariance

    OpenAIRE

    Squire, David; Caelli, Terry M.

    1997-01-01

    In this paper, a new invariant feature of two-dimensional contours is reported: the Invariance Signature. The Invariance Signature is a measure of the degree to which a contour is invariant under a variety of transformations, derived from the theory of Lie transformation groups. It is shown that the Invariance Signature is itself invariant under shift, rotation and scaling of the contour. Since it is derived from local properties of the contour, it is well-suited to a neural network implement...

  2. An ID-based Blind Signature Scheme from Bilinear Pairings

    OpenAIRE

    B.Umaprasada Rao; K.A.Ajmath

    2010-01-01

    Blind signatures, introduced by Chaum, allow a user to obtain a signature on a message without revealing any thing about the message to the signer. Blind signatures play on important role in plenty of applications such as e-voting, e-cash system where anonymity is of great concern. Identity based(ID-based) public key cryptography can be a good alternative for certified based public key setting, especially when efficient key management and moderate security are required. In this paper, we prop...

  3. Influence of triaxiality on the signature inversion in odd-odd nuclei

    International Nuclear Information System (INIS)

    Zheng, R.R.; Luo, X.D.; Timar, J.; Sohler, S.; Nyako, B.M.; Zolnai, L.; Paul, E.S.

    2004-01-01

    Complete text of publication follows. Signature inversion in the A ∼ 100 region has been reported earlier only in the case of the odd-odd 98 Rh nucleus. Our studies on the 100-103 Rh isotopes and a close inspection of the known πg 9/2 νh 11/ 2 bands of the Rh (Z = 45) and Ag (Z = 47) isotopes revealed that the signature splitting effects, earlier considered as quenchings of signature splitting, are not only quenchings but signature inversions. Indeed, the energetically favored signature at low spins in these πg 9/2 νh 11/2 bands is the α = 1 branch (odd spins) instead of the expected α = 0 branch (even spins). The systematic occurrence of signature inversion in this mass region is discussed in Refs. together with attempts to understand its behavior qualitatively. Among many attempts for interpreting the mechanism of signature inversion in odd-odd nuclei, a model using an axially symmetric rotor plus two quasi-particles has already been successfully applied to describe the observed signature inversions in the A ∼ 80 and A ∼ 160 mass regions. According to this model the signature inversion is caused by the competition between the Coriolis and the proton-neutron residual interactions in low K space. Such calculations have been also successfully applied to the π g9/2 νh 11/2 bands in the odd-odd 98 Rh and 102 Rh nuclei. Recent observations of chiral band structures in the nearby Rh nuclei suggest a possibility of triaxiality in these nuclei, too. In the present work we examined the possible influence of triaxiality on the signature inversion using a triaxial rotor plus two-quasiparticle model and compared the results with the experimental data of 98 Rh and 102 Rh. The calculations provided a better agreement with the experiment than the axially symmetric calculations. Compared to the axially symmetric case, the triaxiality applied in the Hamiltonian enlarges the amplitudes of high-spin signature zigzags at small triaxial deformation and might push the

  4. Comparison of transcriptomic signature of post-Chernobyl and postradiotherapy thyroid tumors.

    Science.gov (United States)

    Ory, Catherine; Ugolin, Nicolas; Hofman, Paul; Schlumberger, Martin; Likhtarev, Illya A; Chevillard, Sylvie

    2013-11-01

    We previously identified two highly discriminating and predictive radiation-induced transcriptomic signatures by comparing series of sporadic and postradiotherapy thyroid tumors (322-gene signature), and by reanalyzing a previously published data set of sporadic and post-Chernobyl thyroid tumors (106-gene signature). The aim of the present work was (i) to compare the two signatures in terms of gene expression deregulations and molecular features/pathways, and (ii) to test the capacity of the postradiotherapy signature in classifying the post-Chernobyl series of tumors and reciprocally of the post-Chernobyl signature in classifying the postradiotherapy-induced tumors. We now explored if postradiotherapy and post-Chernobyl papillary thyroid carcinomas (PTC) display common molecular features by comparing molecular pathways deregulated in the two tumor series, and tested the potential of gene subsets of the postradiotherapy signature to classify the post-Chernobyl series (14 sporadic and 12 post-Chernobyl PTC), and reciprocally of gene subsets of the post-Chernobyl signature to classify the postradiotherapy series (15 sporadic and 12 postradiotherapy PTC), by using conventional principal component analysis. We found that the five genes common to the two signatures classified the learning/training tumors (used to search these signatures) of both the postradiotherapy (seven PTC) and the post-Chernobyl (six PTC) thyroid tumor series as compared with the sporadic tumors (seven sporadic PTC in each series). Importantly, these five genes were also effective for classifying independent series of postradiotherapy (five PTC) and post-Chernobyl (six PTC) tumors compared to independent series of sporadic tumors (eight PTC and six PTC respectively; testing tumors). Moreover, part of each postradiotherapy (32 genes) and post-Chernobyl signature (16 genes) cross-classified the respective series of thyroid tumors. Finally, several molecular pathways deregulated in post

  5. 24 CFR 968.225 - Budget revisions.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Budget revisions. 968.225 Section... Fewer Than 250 Units) § 968.225 Budget revisions. (a) A PHA shall not incur any modernization cost in excess of the total HUD-approved CIAP budget. A PHA shall submit a budget revision, in a form prescribed...

  6. Spinors, superalgebras and the signature of space-time

    CERN Document Server

    Ferrara, S.

    2001-01-01

    Superconformal algebras embedding space-time in any dimension and signature are considered. Different real forms of the $R$-symmetries arise both for usual space-time signature (one time) and for Euclidean or exotic signatures (more than one times). Application of these superalgebras are found in the context of supergravities with 32 supersymmetries, in any dimension $D \\leq 11$. These theories are related to $D = 11, M, M^*$ and $M^\\prime$ theories or $D = 10$, IIB, IIB$^*$ theories when compactified on Lorentzian tori. All dimensionally reduced theories fall in three distinct phases specified by the number of (128 bosonic) positive and negative norm states: $(n^+,n^-) = (128,0), (64,64), (72,56)$.

  7. A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.

    Science.gov (United States)

    Shen, Limin; Ma, Jianfeng; Liu, Ximeng; Miao, Meixia

    2016-11-01

    Wireless sensor networks (WSNs) are being used in a wide range of applications for healthcare monitoring, like heart rate monitors and blood pressure monitors, which can minimize the need for healthcare professionals. In medical system, sensors on or in patients produce medical data which can be easily compromised by a vast of attacks. Although signature schemes can protect data authenticity and data integrity, when the number of users involved in the medical system becomes huge, the bandwidth and storage cost will rise sharply so that existing signature schemes are inapplicability for WSNs. In this paper, we propose an efficient aggregate signature scheme for healthcare WSNs according to an improved security model, which can combine multiple signatures into a single aggregate signature. The length of such an aggregate signature may be as long as that of an individual one, which can greatly decrease the bandwidth and storage cost for networks.

  8. Observation of a 27-day solar signature in noctilucent cloud altitude

    Science.gov (United States)

    Köhnke, Merlin C.; von Savigny, Christian; Robert, Charles E.

    2018-05-01

    Previous studies have identified solar 27-day signatures in several parameters in the Mesosphere/Lower thermosphere region, including temperature and Noctilucent cloud (NLC) occurrence frequency. In this study we report on a solar 27-day signature in NLC altitude with peak-to-peak variations of about 400 m. We use SCIAMACHY limb-scatter observations from 2002 to 2012 to detect NLCs. The superposed epoch analysis method is applied to extract solar 27-day signatures. A 27-day signature in NLC altitude can be identified in both hemispheres in the SCIAMACHY dataset, but the signature is more pronounced in the northern hemisphere. The solar signature in NLC altitude is found to be in phase with solar activity and temperature for latitudes ≳ 70 ° N. We provide a qualitative explanation for the positive correlation between solar activity and NLC altitude based on published model simulations.

  9. A Quantum Multi-Proxy Weak Blind Signature Scheme Based on Entanglement Swapping

    Science.gov (United States)

    Yan, LiLi; Chang, Yan; Zhang, ShiBin; Han, GuiHua; Sheng, ZhiWei

    2017-02-01

    In this paper, we present a multi-proxy weak blind signature scheme based on quantum entanglement swapping of Bell states. In the scheme, proxy signers can finish the signature instead of original singer with his/her authority. It can be applied to the electronic voting system, electronic paying system, etc. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. It could guarantee not only the unconditionally security but also the anonymity of the message owner. The security analysis shows the scheme satisfies the security features of multi-proxy weak signature, singers cannot disavowal his/her signature while the signature cannot be forged by others, and the message owner can be traced.

  10. Fading AGN Candidates: AGN Histories and Outflow Signatures

    International Nuclear Information System (INIS)

    Keel, William C.; Maksym, W. Peter; Lintott, Chris J.; Bennert, Vardha N.; Scott, Bryan; Showley, Charles; Flatland, Kelsi; Chojnowski, S. Drew; Moiseev, Alexei; Smirnova, Aleksandrina; Schawinski, Kevin; Sartori, Lia F.; Urry, C. Megan; Pancoast, Anna; Schirmer, Mischa

    2017-01-01

    , morphologically suggestive of outflow, are common, their kinematic structure shows some to be in regular rotation. UGC 7342 exhibits local signatures of outflows <300 km s −1 , largely associated with very diffuse emission, and possibly entraining gas in one of the clouds seen in Hubble Space Telescope images. Only in the Teacup AGN do we see outflow signatures of the order of 1000 km s −1 . In contrast to the extended emission regions around many radio-loud AGNs, the clouds around these fading AGNs consist largely of tidal debris being externally illuminated but not displaced by AGN outflows.

  11. Fading AGN Candidates: AGN Histories and Outflow Signatures

    Energy Technology Data Exchange (ETDEWEB)

    Keel, William C.; Maksym, W. Peter [Department of Physics and Astronomy, University of Alabama, Box 870324, Tuscaloosa, AL 35487 (United States); Lintott, Chris J. [Astrophysics, Oxford University and Adler Planetarium, 1300 S. Lakeshore Drive, Chicago, IL 60605 (United States); Bennert, Vardha N.; Scott, Bryan; Showley, Charles; Flatland, Kelsi [Physics Department, California Polytechnic State University, San Luis Obispo, CA 93407 (United States); Chojnowski, S. Drew [Department of Astronomy, New Mexico State University, P.O. Box 30001, MSC 4500, Las Cruces, NM 88003-8001 (United States); Moiseev, Alexei; Smirnova, Aleksandrina [Special Astrophysical Observatory, Russian Academy of Sciences, Nizhny Arkhyz, 369167 (Russian Federation); Schawinski, Kevin; Sartori, Lia F. [Institute for Astronomy, ETH Zürich, Wolfgang-Pauli-Straße 27, CH-8093 Zurich (Switzerland); Urry, C. Megan [Department of Physics, Yale University, P.O. Box 208120, New Haven, CT 06520-8120 (United States); Pancoast, Anna [Center for Astrophysics, 60 Garden St., Cambridge, MA 02138 (United States); Schirmer, Mischa, E-mail: wkeel@ua.edu [Gemini Observatory, La Serena (Chile)

    2017-02-01

    loops of emission, morphologically suggestive of outflow, are common, their kinematic structure shows some to be in regular rotation. UGC 7342 exhibits local signatures of outflows <300 km s{sup −1}, largely associated with very diffuse emission, and possibly entraining gas in one of the clouds seen in Hubble Space Telescope images. Only in the Teacup AGN do we see outflow signatures of the order of 1000 km s{sup −1}. In contrast to the extended emission regions around many radio-loud AGNs, the clouds around these fading AGNs consist largely of tidal debris being externally illuminated but not displaced by AGN outflows.

  12. Influence of triaxiality on the signature inversion in odd-odd nuclei

    International Nuclear Information System (INIS)

    Zheng Renrong; Zhu Shunquan; Luo Xiangdong; Gizon, A.; Gizon, J.; Paul, E.S.

    2004-01-01

    The nature of signature inversion in the πg 9/2 νh 11/2 bands of odd-odd 98,102 Rh nuclei is studied. Calculations are performed by using a triaxial rotor plus two-quasiparticle model and are compared with the experimentally observed signature inversions. The calculations reproduce well the observations and suggest that, in these bands, the signature inversion can be interpreted mainly as a competition between the Coriolis and the proton-neutron residual interactions in low K space. The triaxiality applied in the Hamiltonian enlarges the amplitudes of high spin signature zigzags at small triaxial deformation and might push the signature inversion point to higher spin at large triaxial deformation

  13. L1000FWD: Fireworks visualization of drug-induced transcriptomic signatures.

    Science.gov (United States)

    Wang, Zichen; Lachmann, Alexander; Keenan, Alexandra B; Ma'ayan, Avi

    2018-02-06

    As part of the NIH Library of Integrated Network-based Cellular Signatures (LINCS) program, hundreds of thousands of transcriptomic signatures were generated with the L1000 technology, profiling the response of human cell lines to over 20,000 small molecule compounds. This effort is a promising approach toward revealing the mechanisms-of-action (MOA) for marketed drugs and other less studied potential therapeutic compounds. L1000 fireworks display (L1000FWD) is a web application that provides interactive visualization of over 16,000 drug and small-molecule induced gene expression signatures. L1000FWD enables coloring of signatures by different attributes such as cell type, time point, concentration, as well as drug attributes such as MOA and clinical phase. Signature similarity search is implemented to enable the search for mimicking or opposing signatures given as input of up and down gene sets. Each point on the L1000FWD interactive map is linked to a signature landing page, which provides multifaceted knowledge from various sources about the signature and the drug. Notably such information includes most frequent diagnoses, co-prescribed drugs and age distribution of prescriptions as extracted from the Mount Sinai Health System electronic medical records (EMR). Overall, L1000FWD serves as a platform for identifying functions for novel small molecules using unsupervised clustering, as well as for exploring drug MOA. L1000FWD is freely accessible at: http://amp.pharm.mssm.edu/L1000FWD. avi.maayan@mssm.edu. Supplementary data are available at Bioinformatics online. © The Author (2018). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  14. Effect of External Vibration on PZT Impedance Signature

    Directory of Open Access Journals (Sweden)

    Yaowen Yang

    2008-11-01

    Full Text Available Piezoelectric ceramic Lead Zirconate Titanate (PZT transducers, working on the principle of electromechanical impedance (EMI, are increasingly applied for structural health monitoring (SHM in aerospace, civil and mechanical engineering. The PZT transducers are usually surface bonded to or embedded in a structure and subjected to actuation so as to interrogate the structure at the desired frequency range. The interrogation results in the electromechanical admittance (inverse of EMI signatures which can be used to estimate the structural health or integrity according to the changes of the signatures. In the existing EMI method, the monitored structure is only excited by the PZT transducers for the interrogating of EMI signature, while the vibration of the structure caused by the external excitations other than the PZT actuation is not considered. However, many structures work under vibrations in practice. To monitor such structures, issues related to the effects of vibration on the EMI signature need to be addressed because these effects may lead to misinterpretation of the structural health. This paper develops an EMI model for beam structures, which takes into account the effect of beam vibration caused by the external excitations. An experimental study is carried out to verify the theoretical model. A lab size specimen with different external excitations is tested and the effect of vibration on EMI signature is discussed.

  15. Effect of External Vibration on PZT Impedance Signature.

    Science.gov (United States)

    Yang, Yaowen; Miao, Aiwei

    2008-11-01

    Piezoelectric ceramic Lead Zirconate Titanate (PZT) transducers, working on the principle of electromechanical impedance (EMI), are increasingly applied for structural health monitoring (SHM) in aerospace, civil and mechanical engineering. The PZT transducers are usually surface bonded to or embedded in a structure and subjected to actuation so as to interrogate the structure at the desired frequency range. The interrogation results in the electromechanical admittance (inverse of EMI) signatures which can be used to estimate the structural health or integrity according to the changes of the signatures. In the existing EMI method, the monitored structure is only excited by the PZT transducers for the interrogating of EMI signature, while the vibration of the structure caused by the external excitations other than the PZT actuation is not considered. However, many structures work under vibrations in practice. To monitor such structures, issues related to the effects of vibration on the EMI signature need to be addressed because these effects may lead to misinterpretation of the structural health. This paper develops an EMI model for beam structures, which takes into account the effect of beam vibration caused by the external excitations. An experimental study is carried out to verify the theoretical model. A lab size specimen with different external excitations is tested and the effect of vibration on EMI signature is discussed.

  16. 17 CFR 201.140 - Commission orders and decisions: Signature and availability.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Commission orders and decisions: Signature and availability. 201.140 Section 201.140 Commodity and Securities Exchanges SECURITIES... and decisions: Signature and availability. (a) Signature required. All orders and decisions of the...

  17. The spectrum of genomic signatures: from dinucleotides to chaos game representation.

    Science.gov (United States)

    Wang, Yingwei; Hill, Kathleen; Singh, Shiva; Kari, Lila

    2005-02-14

    In the post genomic era, access to complete genome sequence data for numerous diverse species has opened multiple avenues for examining and comparing primary DNA sequence organization of entire genomes. Previously, the concept of a genomic signature was introduced with the observation of species-type specific Dinucleotide Relative Abundance Profiles (DRAPs); dinucleotides were identified as the subsequences with the greatest bias in representation in a majority of genomes. Herein, we demonstrate that DRAP is one particular genomic signature contained within a broader spectrum of signatures. Within this spectrum, an alternative genomic signature, Chaos Game Representation (CGR), provides a unique visualization of patterns in sequence organization. A genomic signature is associated with a particular integer order or subsequence length that represents a measure of the resolution or granularity in the analysis of primary DNA sequence organization. We quantitatively explore the organizational information provided by genomic signatures of different orders through different distance measures, including a novel Image Distance. The Image Distance and other existing distance measures are evaluated by comparing the phylogenetic trees they generate for 26 complete mitochondrial genomes from a diversity of species. The phylogenetic tree generated by the Image Distance is compatible with the known relatedness of species. Quantitative evaluation of the spectrum of genomic signatures may be used to ultimately gain insight into the determinants and biological relevance of the genome signatures.

  18. Nonlinear analysis of dynamic signature

    Science.gov (United States)

    Rashidi, S.; Fallah, A.; Towhidkhah, F.

    2013-12-01

    Signature is a long trained motor skill resulting in well combination of segments like strokes and loops. It is a physical manifestation of complex motor processes. The problem, generally stated, is that how relative simplicity in behavior emerges from considerable complexity of perception-action system that produces behavior within an infinitely variable biomechanical and environmental context. To solve this problem, we present evidences which indicate that motor control dynamic in signing process is a chaotic process. This chaotic dynamic may explain a richer array of time series behavior in motor skill of signature. Nonlinear analysis is a powerful approach and suitable tool which seeks for characterizing dynamical systems through concepts such as fractal dimension and Lyapunov exponent. As a result, they can be analyzed in both horizontal and vertical for time series of position and velocity. We observed from the results that noninteger values for the correlation dimension indicates low dimensional deterministic dynamics. This result could be confirmed by using surrogate data tests. We have also used time series to calculate the largest Lyapunov exponent and obtain a positive value. These results constitute significant evidence that signature data are outcome of chaos in a nonlinear dynamical system of motor control.

  19. Epigenetic aging signatures in mice livers are slowed by dwarfism, calorie restriction and rapamycin treatment.

    Science.gov (United States)

    Wang, Tina; Tsui, Brian; Kreisberg, Jason F; Robertson, Neil A; Gross, Andrew M; Yu, Michael Ku; Carter, Hannah; Brown-Borg, Holly M; Adams, Peter D; Ideker, Trey

    2017-03-28

    Global but predictable changes impact the DNA methylome as we age, acting as a type of molecular clock. This clock can be hastened by conditions that decrease lifespan, raising the question of whether it can also be slowed, for example, by conditions that increase lifespan. Mice are particularly appealing organisms for studies of mammalian aging; however, epigenetic clocks have thus far been formulated only in humans. We first examined whether mice and humans experience similar patterns of change in the methylome with age. We found moderate conservation of CpG sites for which methylation is altered with age, with both species showing an increase in methylome disorder during aging. Based on this analysis, we formulated an epigenetic-aging model in mice using the liver methylomes of 107 mice from 0.2 to 26.0 months old. To examine whether epigenetic aging signatures are slowed by longevity-promoting interventions, we analyzed 28 additional methylomes from mice subjected to lifespan-extending conditions, including Prop1 df/df dwarfism, calorie restriction or dietary rapamycin. We found that mice treated with these lifespan-extending interventions were significantly younger in epigenetic age than their untreated, wild-type age-matched controls. This study shows that lifespan-extending conditions can slow molecular changes associated with an epigenetic clock in mice livers.

  20. Passive Infrared Signature Augmentation of Full-Scale Plastic Targets

    National Research Council Canada - National Science Library

    Gebus, Lisa M; Sanders, Jeffrey S

    2002-01-01

    ... (IR), and radar signatures of threat systems. To address this need, a program was initiated by TMO to augment an existing full-scale, vacuum-formed plastic target with sufficient signature fidelity to adequately stress U.S...

  1. A signature correlation study of ground target VHF/UHF ISAR imagery

    Science.gov (United States)

    Gatesman, Andrew J.; Beaudoin, Christopher J.; Giles, Robert H.; Kersey, William T.; Waldman, Jerry; Carter, Steve; Nixon, William E.

    2003-09-01

    VV and HH-polarized radar signatures of several ground targets were acquired in the VHF/UHF band (171-342 MHz) by using 1/35th scale models and an indoor radar range operating from 6 to 12 GHz. Data were processed into medianized radar cross sections as well as focused, ISAR imagery. Measurement validation was confirmed by comparing the radar cross section of a test object with a method of moments radar cross section prediction code. The signatures of several vehicles from three vehicle classes (tanks, trunks, and TELs) were measured and a signature cross-correlation study was performed. The VHF/UHF band is currently being exploited for its foliage penetration ability, however, the coarse image resolution which results from the relatively long radar wavelengths suggests a more challenging target recognition problem. One of the study's goals was to determine the amount of unique signature content in VHF/UHF ISAR imagery of military ground vehicles. Open-field signatures are compared with each other as well as with simplified shapes of similar size. Signatures were also acquired on one vehicle in a variety of configurations to determine the impact of monitor target variations on the signature content at these frequencies.

  2. Secure Certificateless Signature with Revocation in the Standard Model

    Directory of Open Access Journals (Sweden)

    Tung-Tso Tsai

    2014-01-01

    previously proposed certificateless signature schemes were insecure under a considerably strong security model in the sense that they suffered from outsiders’ key replacement attacks or the attacks from the key generation center (KGC. In this paper, we propose a certificateless signature scheme without random oracles. Moreover, our scheme is secure under the strong security model and provides a public revocation mechanism, called revocable certificateless signature (RCLS. Under the standard computational Diffie-Hellman assumption, we formally demonstrate that our scheme possesses existential unforgeability against adaptive chosen-message attacks.

  3. Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-03-01

    Full Text Available This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were investigated. Different methods of generation and verification of threshold signatures were explored, e.g. used in a mobile agents, Internet banking and e-currency. The significance of the work is determined by the reduction of the level of counterfeit electronic documents, signed by certain group of users.

  4. Arbitrated quantum signature scheme based on χ-type entangled states

    International Nuclear Information System (INIS)

    Zuo, Huijuan; Huang, Wei; Qin, Sujuan

    2013-01-01

    An arbitrated quantum signature scheme, which is mainly applied in electronic-payment systems, is proposed and investigated. The χ-type entangled states are used for quantum key distribution and quantum signature in this protocol. Compared with previous quantum signature schemes which also utilize χ-type entangled states, the proposed scheme provides higher efficiency. Finally, we also analyze its security under various kinds of attacks. (paper)

  5. SIGNATURES OF LONG-LIVED SPIRAL PATTERNS

    International Nuclear Information System (INIS)

    Martínez-García, Eric E.; González-Lópezlira, Rosa A.

    2013-01-01

    Azimuthal age/color gradients across spiral arms are a signature of long-lived spirals. From a sample of 19 normal (or weakly barred) spirals where we have previously found azimuthal age/color gradient candidates, 13 objects were further selected if a two-armed grand-design pattern survived in a surface density stellar mass map. Mass maps were obtained from optical and near-infrared imaging, by comparison with a Monte Carlo library of stellar population synthesis models that allowed us to obtain the mass-to-light ratio in the J band, (M/L) J , as a function of (g – i) versus (i – J) color. The selected spirals were analyzed with Fourier methods in search of other signatures of long-lived modes related to the gradients, such as the gradient divergence toward corotation, and the behavior of the phase angle of the two-armed spiral in different wavebands, as expected from theory. The results show additional signatures of long-lived spirals in at least 50% of the objects.

  6. 24 CFR 1710.117 - Cost sheet, signature of Senior Executive Officer.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Cost sheet, signature of Senior... REGISTRATION Reporting Requirements § 1710.117 Cost sheet, signature of Senior Executive Officer. (a) Cost... description of our subdivision and development plans. Signature of Senior Executive Officer (2) Cost sheet...

  7. Signature splitting in nuclear rotational bands: Neutron i13/2 systematics

    International Nuclear Information System (INIS)

    Mueller, W.F.; Jensen, H.J.; Reviol, W.; Riedinger, L.L.; Yu, C.; Zhang, J.; Nazarewicz, W.; Wyss, R.

    1994-01-01

    Experimental values of signature splitting in νi 13/2 rotational bands in odd-N even-Z nuclei in the Z=62--78 region are collected and presented. A procedure is introduced to calculate signature splitting within the cranked deformed Woods-Saxon model. In the theoretical treatment, deformation parameters are obtained by minimizing the total Routhians of individual νi 13/2 bands, and the procedure accounts for the possibility that the two signatures have different deformations and pairing gaps. Experimental signature splitting data for νi 13/2 bands in Dy, Er, Yb, Hf, W, and Os nuclei are compared with calculated values. The sensitivity of calculated signature splitting to changes in deformation, pairing, and other model parameters is presented

  8. Revised National Pressure Ulcer Advisory Panel Pressure Injury Staging System: Revised Pressure Injury Staging System.

    Science.gov (United States)

    Edsberg, Laura E; Black, Joyce M; Goldberg, Margaret; McNichol, Laurie; Moore, Lynn; Sieggreen, Mary

    Our understanding of pressure injury etiology and development has grown in recent years through research, clinical expertise, and global interdisciplinary expert collaboration. Therefore, the National Pressure Ulcer Advisory Panel (NPUAP) has revised the definition and stages of pressure injury. The revision was undertaken to incorporate the current understanding of the etiology of pressure injuries, as well as to clarify the anatomical features present or absent in each stage of injury. An NPUAP-appointed Task Force reviewed the literature and created drafts of definitions, which were then reviewed by stakeholders and the public, including clinicians, educators, and researchers around the world. Using a consensus-building methodology, these revised definitions were the focus of a multidisciplinary consensus conference held in April 2016. As a result of stakeholder and public input, along with the consensus conference, important changes were made and incorporated into the new staging definitions. The revised staging system uses the term injury instead of ulcer and denotes stages using Arabic numerals rather than Roman numerals. The revised definition of a pressure injury now describes the injuries as usually occurring over a bony prominence or under a medical or other device. The revised definition of a Stage 2 pressure injury seeks to clarify the difference between moisture-associated skin damage and injury caused by pressure and/or shear. The term suspected has been removed from the Deep Tissue Pressure Injury diagnostic label. Each definition now describes the extent of tissue loss present and the anatomical features that may or may not be present in the stage of injury. These important revisions reflect the methodical and collaborative approach used to examine the available evidence and incorporate current interdisciplinary clinical expertise into better defining the important phenomenon of pressure injury etiology and development.

  9. Signatures of lower-scale gauge coupling unification in the standard model due to extended Higgs sector

    International Nuclear Information System (INIS)

    Chizhov, M. V.; Bednyakov, V. A.

    2016-01-01

    The gauge coupling unification can be achieved at a unification scale around 5×10"1"3 GeV if the Standard Model scalar sector is extended with extra Higgs-like doublets. The relevant new scalar degrees of freedom in the form of chiral Z* and W* vector bosons might “be visible” already at about 700 GeV. Their eventual preferred coupling to the heavy quarks explains the non observation of these bosons in the first LHC run and provides promising expectation for the second LHC run.

  10. Microcomputers and the Improvement of Revision Skills.

    Science.gov (United States)

    Balajthy, Ernest; And Others

    1987-01-01

    Discusses use of word processing software as an effective tool in writing and revision instruction, and describes the role of the teacher. Examples of exercises that encourage revision and of software designed to teach effective revision skills are reviewed. (MBR)

  11. Individual questions of financial control and revision

    Directory of Open Access Journals (Sweden)

    В. М. Глібко

    2015-05-01

    Full Text Available Problem setting. In modern conditions at investigation and gathering of proofs in criminal proceedings according to item 93 CPC of Ukraine collecting of proofs which is carried out by the criminal proceedings parties, victim is important, the representative of the legal person, in which relation carries out manufacture, including a way истребования and receptions from public authorities, local governments, the enterprises, establishments and organisations, official and physical persons of things, documents, data, conclusions of experts, conclusions of revisions and certificates of checks. Recent research and publications analisis. In scientific sources questions of carrying out of revisions S. B.Zhivko, V.V.Akimov, G.Demjanchuk, J.Buzdugan is considered. Paper objective. Article purpose is studying and definition of a place of revision among forms of inspection of the state control and use of results of revision in criminal proceedings. Paper main body. Off-schedule exit revision that is revision which is not provided in plans of work of body of the state financial control is considered and is spent at presence at least one of the circumstances listed in item 11 of the Law of Ukraine «About main principles of realisation of the state financial control in Ukraine». If revision is carried out on request of investigating bodies it is spent on the basis of the petition of the inspector and accepted by the results of consideration of this petition of the decision of the investigatory judge. The primary goal of revision on request of investigating bodies or on the basis of court definition is reception of proofs on business. Therefore the revision certificate admits the written proof as on the basis of its conclusion of the inspector, the public prosecutor receives the information on a perfect crime, abusing, and also on the persons who have committed a crime, on the period of commission of crime and an amount of damage. In criminal

  12. Search for non-standard SUSY signatures in CMS

    International Nuclear Information System (INIS)

    Teyssier, Daniel

    2008-01-01

    New studies of the CMS collaboration are presented on the sensitivity to searches for non-standard signatures of particular SUSY scenarios. These signatures include non-pointing photons as well as pairs of prompt photons as expected GMSB SUSY models, as well as heavy stable charged particles produced in split supersymmetry models, long lived staus from GMSB SUSY and long lived stops in other SUSY scenarios. Detailed detector simulation is used for the study, and all relevant Standard Model background and detector effects that can mimic these special signatures are included. It is shown that with already with less than 100 pb -1 the CMS sensitivity will probe an interesting as yet by data unexplored parameter range of these models.

  13. Security of the arbitrated quantum signature protocols revisited

    International Nuclear Information System (INIS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided. (paper)

  14. The Source Signature Estimator - System Improvements and Applications

    Energy Technology Data Exchange (ETDEWEB)

    Sabel, Per; Brink, Mundy; Eidsvig, Seija; Jensen, Lars

    1998-12-31

    This presentation relates briefly to the first part of the joint project on post-survey analysis of shot-by-shot based source signature estimation. The improvements of a Source Signature Estimator system are analysed. The notional source method can give suboptimal results when not inputting the real array geometry, i.e. actual separations between the sub-arrays of an air gun array, to the notional source algorithm. This constraint has been addressed herein and was implemented for the first time in the field in summer 1997. The second part of this study will show the potential advantages for interpretation when the signature estimates are then to be applied in the data processing. 5 refs., 1 fig.

  15. A sessional blind signature based on quantum cryptography

    Science.gov (United States)

    Khodambashi, Siavash; Zakerolhosseini, Ali

    2014-01-01

    In this paper, we present a sessional blind signature protocol whose security is guaranteed by fundamental principles of quantum physics. It allows a message owner to get his message signed by an authorized signatory. However, the signatory is not capable of reading the message contents and everyone can verify authenticity of the message. For this purpose, we took advantage of a sessional signature as well as quantum entangled pairs which are generated with respect to it in our proposed protocol. We describe our proposed blind signature through an example and briefly discuss about its unconditional security. Due to the feasibility of the protocol, it can be widely employed for e-payment, e-government, e-business and etc.

  16. Nuclear safety guide TID-7016 Revision 2

    International Nuclear Information System (INIS)

    Thomas, J.T.

    1980-01-01

    The present revision of TID-7016 Nuclear Safety Guide is discussed. This Guide differs significantly from its predecessor in that the latter was intentionally conservative in its recommendations. Firmly based on experimental evidence of criticality, the original Guide and the first revision were considered to be of most value to organizations whose activities with fissionable materials were not extensive and, secondarily, that it would serve as a point of departure for members of established nuclear safety teams, experienced in the field. The reader will find a significant change in the character of information presented in this version. Nuclear Criticality Safety has matured in the past twelve years. The advance of calculational capability has permitted validated calculations to extend and substitute for experimental data. The broadened data base has enabled better interpolation, extension, and understanding of available, information, especially in areas previously addressed by undefined but adequate factors of safety. The content has been thereby enriched in qualitative guidance. The information inherently contains, and the user can recapture, the quantitative guidance characteristic of the former Guides by employing appropriate safety factors. In fact, it becomes incumbent on the Criticality Safety Specialist to necessarily impose safety factors consistent with the possible normal and abnormal credible contingencies of an operation as revealed by his evaluation. In its present form the Guide easily becomes a suitable module in any compendium or handbook tailored for internal use by organizations. It is hoped the Guide will continue to serve immediate needs and will encourage continuing and more comprehensive efforts toward organizing nuclear criticality safety information

  17. Outcome, revision rate and indication for revision following resurfacing hemiarthroplasty for osteoarthritis of the shoulder

    DEFF Research Database (Denmark)

    Rasmussen, J V; Polk, A; Sorensen, A K

    2014-01-01

    In this study, we evaluated patient-reported outcomes, the rate of revision and the indications for revision following resurfacing hemiarthroplasty of the shoulder in patients with osteoarthritis. All patients with osteoarthritis who underwent primary resurfacing hemiarthroplasty and reported...... to the Danish Shoulder Arthroplasty Registry (DSR), between January 2006 and December 2010 were included. There were 772 patients (837 arthroplasties) in the study. The Western Ontario Osteoarthritis of the Shoulder (WOOS) index was used to evaluate patient-reported outcome 12 months (10 to 14) post......-operatively. The rates of revision were calculated from the revisions reported to the DSR up to December 2011 and by checking deaths with the Danish National Register of Persons. A complete questionnaire was returned by 688 patients (82.2%). The mean WOOS was 67 (0 to 100). A total of 63 hemiarthroplasties (7...

  18. Expedited technology demonstration project (Revised mixed waste management facility project) Project baseline revision 4.0 and FY98 plan

    International Nuclear Information System (INIS)

    Adamson, M. G.

    1997-01-01

    The re-baseline of the Expedited Technology Demonstration Project (Revised Mixed Waste Facility Project) is designated as Project Baseline Revision 4.0. The last approved baseline was identified as Project Baseline Revision 3.0 and was issued in October 1996. Project Baseline Revision 4.0 does not depart from the formal DOE guidance followed by, and contained in, Revision 3.0. This revised baseline document describes the MSO and Final Forms testing activities that will occur during FY98, the final year of the ETD Project. The cost estimate for work during FY98 continues to be $2.OM as published in Revision 3.0. However, the funds will be all CENRTC rather than the OPEX/CENTRC split previously anticipated. LLNL has waived overhead charges on ETD Project CENRTC funds since the beginning of project activities. By requesting the $2.OM as all CENTRC a more aggressive approach to staffing and testing can be taken. Due to a cost under- run condition during FY97 procurements were made and work was accomplished, with the knowledge of DOE, in the Feed Preparation and Final Forms areas that were not in the scope of Revision 3.0. Feed preparation activities for FY98 have been expanded to include the drum opening station/enclosure previously deleted

  19. Comparing performance of standard and iterative linear unmixing methods for hyperspectral signatures

    Science.gov (United States)

    Gault, Travis R.; Jansen, Melissa E.; DeCoster, Mallory E.; Jansing, E. David; Rodriguez, Benjamin M.

    2016-05-01

    Linear unmixing is a method of decomposing a mixed signature to determine the component materials that are present in sensor's field of view, along with the abundances at which they occur. Linear unmixing assumes that energy from the materials in the field of view is mixed in a linear fashion across the spectrum of interest. Traditional unmixing methods can take advantage of adjacent pixels in the decomposition algorithm, but is not the case for point sensors. This paper explores several iterative and non-iterative methods for linear unmixing, and examines their effectiveness at identifying the individual signatures that make up simulated single pixel mixed signatures, along with their corresponding abundances. The major hurdle addressed in the proposed method is that no neighboring pixel information is available for the spectral signature of interest. Testing is performed using two collections of spectral signatures from the Johns Hopkins University Applied Physics Laboratory's Signatures Database software (SigDB): a hand-selected small dataset of 25 distinct signatures from a larger dataset of approximately 1600 pure visible/near-infrared/short-wave-infrared (VIS/NIR/SWIR) spectra. Simulated spectra are created with three and four material mixtures randomly drawn from a dataset originating from SigDB, where the abundance of one material is swept in 10% increments from 10% to 90%with the abundances of the other materials equally divided amongst the remainder. For the smaller dataset of 25 signatures, all combinations of three or four materials are used to create simulated spectra, from which the accuracy of materials returned, as well as the correctness of the abundances, is compared to the inputs. The experiment is expanded to include the signatures from the larger dataset of almost 1600 signatures evaluated using a Monte Carlo scheme with 5000 draws of three or four materials to create the simulated mixed signatures. The spectral similarity of the inputs to the

  20. Salt-Marsh Landscapes and the Signatures of Biogeomorphic Feedbacks

    Science.gov (United States)

    D'Alpaos, A.; Marani, M.

    2014-12-01

    Salt marshes are coastal ecosystems which play a large role in the bio-geomorphological evolution of intertidal areas. The dense stands of halophytic plants which populate salt-marsh systems largely contribute to govern their dynamics, influencing marsh hydrodynamics and sediment transport through enhanced flow resistance and settling, and direct particle capture by plant stems. In addition, plants are known to increase vertical accretion through direct organic accretion. Looking across the salt-marsh landscape can one see the signatures of feedbacks between landscape and biota? Field evidence and the results of biomorphodynamic models indeed show that the interplay between physical and biological processes generates some striking biological and morphological patterns at different scales. One such pattern, vegetation zonation, consists in a mosaic of vegetation patches, of approximately uniform composition, displaying sharp transitions in the presence of extremely small topographic gradients. Here we extend the model proposed by Marani et al. (2013) to a two-dimensional framework, furthermore including the effect of direct capture of sediment particles by plant stems. This allows us to account for the effect of the drainage density of tidal networks on the observed biogeomorphic patterns and to model the coupled evolution of marsh platforms and channel networks cutting through them. A number of different scenarios have been modelled to analyze the changes induced in bio-geomorphic patterns by plants with different characteristics, within marshes characterized by different drainage densities, or subjected to changing environmental forcing such as rates of relative sea level rise and sediment supply. Model results emphasize that zonation patterns are a signature of bio-geomorphic feedbacks with vegetation acting as a landscape constructor which feeds back on, directly alters, and contributes to shape tidal environments. In addition, model results show that

  1. The curse of namespaces in the domain of XML signature

    DEFF Research Database (Denmark)

    Jensen, Meiko; Liao, Lijun; Schwenk, Jörg

    2009-01-01

    The XML signature wrapping attack is one of the most discussed security issues of the Web Services security community during the last years. Until now, the issue has not been solved, and all countermeasure approaches proposed so far were shown to be insufficient. In this paper, we present yet...... another way to perform signature wrapping attacks by using the XML namespace injection technique. We show that the interplay of XML Signature, XPath, and the XML namespace concept has severe flaws that can be exploited for an attack, and that XML namespaces in general pose real troubles to digital...... signatures in the XML domain. Additionally, we present and discuss some new approaches in countering the proposed attack vector....

  2. Circumcision revision in male children

    Directory of Open Access Journals (Sweden)

    Mohammed A. Al-Ghazo

    2006-08-01

    Full Text Available OBJECTIVE: To determine indications for circumcision revision and to identify the specialty of the person who performed unsatisfactory primary circumcision. MATERIALS AND METHODS: The authors reviewed medical records of 52 cases that underwent circumcision revision over a 6-year period (1998 to 2004. Sleeve surgical technique was used for revision in patients with redundant foreskin or concealed penis, penoplasty for partial or complete degloving of the penis and meatotomy for external meatal stenosis. The mean age of children was 32 months (range 6 months to 9 years. RESULTS: Most of unsatisfactory primary circumcisions (86.7% were performed by laymen. All patients who underwent circumcision revision had good to excellent cosmetic results. CONCLUSION: Primary circumcision performed by laymen carry a high complication rate and serious complications may occur. A period of training and direct supervision by physicians is required before allowing laymen to perform circumcision independently.

  3. UNUSUAL TRENDS IN SOLAR P-MODE FREQUENCIES DURING THE CURRENT EXTENDED MINIMUM

    International Nuclear Information System (INIS)

    Tripathy, S. C.; Jain, K.; Hill, F.; Leibacher, J. W.

    2010-01-01

    We investigate the behavior of the intermediate-degree mode frequencies of the Sun during the current extended minimum phase to explore the time-varying conditions in the solar interior. Using contemporaneous helioseismic data from the Global Oscillation Network Group (GONG) and the Michelson Doppler Imager (MDI), we find that the changes in resonant mode frequencies during the activity minimum period are significantly greater than the changes in solar activity as measured by different proxies. We detect a seismic minimum in MDI p-mode frequency shifts during 2008 July-August but no such signature is seen in mean shifts computed from GONG frequencies. We also analyze the frequencies of individual oscillation modes from GONG data as a function of latitude and observe a signature of the onset of the solar cycle 24 in early 2009. Thus, the intermediate-degree modes do not confirm the onset of the cycle 24 during late 2007 as reported from the analysis of the low-degree Global Oscillations at Low Frequency frequencies. Further, both the GONG and MDI frequencies show a surprising anti-correlation between frequencies and activity proxies during the current minimum, in contrast to the behavior during the minimum between cycles 22 and 23.

  4. The economic impact of revision otologic surgery.

    Science.gov (United States)

    Nadimi, Sahar; Leonetti, John P; Pontikis, George

    2016-03-01

    Revision otologic surgery places a significant economic burden on patients and the healthcare system. We conducted a retrospective chart analysis to estimate the economic impact of revision canal-wall-down (CWD) mastoidectomy. We reviewed the medical records of all 189 adults who had undergone CWD mastoidectomy performed by the senior author between June 2006 and August 2011 at Loyola University Medical Center in Maywood, Ill. Institutional charges and collections for all patients were extrapolated to estimate the overall healthcare cost of revision surgery in Illinois and at the national level. Of the 189 CWD mastoidectomies, 89 were primary and 100 were revision procedures. The total charge for the revision cases was $2,783,700, and the net reimbursement (collections) was $846,289 (30.4%). Using Illinois Hospital Association data, we estimated that reimbursement for 387 revision CWD mastoidectomies that had been performed in fiscal year 2011 was nearly $3.3 million. By extrapolating our data to the national level, we estimated that 9,214 patients underwent revision CWD mastoidectomy in the United States during 2011, which cost the national healthcare system roughly $76 million, not including lost wages and productivity. Known causes of failed CWD mastoidectomies that often result in revision surgery include an inadequate meatoplasty, a facial ridge that is too high, residual diseased air cells, and recurrent cholesteatoma. A better understanding of these factors can reduce the need for revision surgery, which could have a positive impact on the economic strain related to this procedure at the local, state, and national levels.

  5. Circulating neutrophil transcriptome may reveal intracranial aneurysm signature.

    Directory of Open Access Journals (Sweden)

    Vincent M Tutino

    Full Text Available Unruptured intracranial aneurysms (IAs are typically asymptomatic and undetected except for incidental discovery on imaging. Blood-based diagnostic biomarkers could lead to improvements in IA management. This exploratory study examined circulating neutrophils to determine whether they carry RNA expression signatures of IAs.Blood samples were collected from patients receiving cerebral angiography. Eleven samples were collected from patients with IAs and 11 from patients without IAs as controls. Samples from the two groups were paired based on demographics and comorbidities. RNA was extracted from isolated neutrophils and subjected to next-generation RNA sequencing to obtain differential expressions for identification of an IA-associated signature. Bioinformatics analyses, including gene set enrichment analysis and Ingenuity Pathway Analysis, were used to investigate the biological function of all differentially expressed transcripts.Transcriptome profiling identified 258 differentially expressed transcripts in patients with and without IAs. Expression differences were consistent with peripheral neutrophil activation. An IA-associated RNA expression signature was identified in 82 transcripts (p<0.05, fold-change ≥2. This signature was able to separate patients with and without IAs on hierarchical clustering. Furthermore, in an independent, unpaired, replication cohort of patients with IAs (n = 5 and controls (n = 5, the 82 transcripts separated 9 of 10 patients into their respective groups.Preliminary findings show that RNA expression from circulating neutrophils carries an IA-associated signature. These findings highlight a potential to use predictive biomarkers from peripheral blood samples to identify patients with IAs.

  6. Signature for the shape of the universe

    International Nuclear Information System (INIS)

    Gomero, G.I.; Reboucas, M.J.; Teixeira, A.F.F.

    2001-03-01

    If the universe has a nontrival shape (topology) the sky may show multiple correlated images of cosmic objects. These correlations can be counched in terms of distance correlations. We propose a statistical quantity which can be used to reveal the topological signature of any Roberston-Walker (RW) spacetime with nontrivial topology. We also show through computer-aided simulations how one can extract the topological signatures of flat elliptic and hyperbolic RW universes with nontrivial topology. (author)

  7. 76 FR 75461 - Express Mail Domestic Postage Refund Policy and Waiver of Signature

    Science.gov (United States)

    2011-12-02

    ... POSTAL SERVICE 39 CFR Part 111 Express Mail Domestic Postage Refund Policy and Waiver of Signature... to 30 days after the date of mailing, and to change the Express Mail ``waiver of signature'' standard for domestic items by obtaining an addressee's signature only when the mailer selects the ``signature...

  8. Estimating physiological skin parameters from hyperspectral signatures

    Science.gov (United States)

    Vyas, Saurabh; Banerjee, Amit; Burlina, Philippe

    2013-05-01

    We describe an approach for estimating human skin parameters, such as melanosome concentration, collagen concentration, oxygen saturation, and blood volume, using hyperspectral radiometric measurements (signatures) obtained from in vivo skin. We use a computational model based on Kubelka-Munk theory and the Fresnel equations. This model forward maps the skin parameters to a corresponding multiband reflectance spectra. Machine-learning-based regression is used to generate the inverse map, and hence estimate skin parameters from hyperspectral signatures. We test our methods using synthetic and in vivo skin signatures obtained in the visible through the short wave infrared domains from 24 patients of both genders and Caucasian, Asian, and African American ethnicities. Performance validation shows promising results: good agreement with the ground truth and well-established physiological precepts. These methods have potential use in the characterization of skin abnormalities and in minimally-invasive prescreening of malignant skin cancers.

  9. Air-gun signature modelling considering the influence of mechanical structure factors

    International Nuclear Information System (INIS)

    Li, Guofa; Liu, Zhao; Wang, Jianhua; Cao, Mingqiang

    2014-01-01

    In marine seismic prospecting, as the air-gun array is usually composed of different types of air-guns, the signature modelling of different air-guns is particularly important to the array design. Different types of air-guns have different mechanical structures, which directly or indirectly affect the signatures. In order to simulate the influence of the mechanical structure, five parameters—the throttling constant, throttling power law exponent, mass release efficiency, fluid viscosity and heat transfer coefficient—are used in signature modelling. Through minimizing the energy relative error between the simulated and the measured signatures by the simulated annealing method, the five optimal parameters can be estimated. The method is tested in a field experiment, and the consistency between the simulated and the measured signatures is improved with the optimal parameters. (paper)

  10. Neurogenomic signatures of spatiotemporal memories in time-trained forager honey bees

    Science.gov (United States)

    Naeger, Nicholas L.; Van Nest, Byron N.; Johnson, Jennifer N.; Boyd, Sam D.; Southey, Bruce R.; Rodriguez-Zas, Sandra L.; Moore, Darrell; Robinson, Gene E.

    2011-01-01

    Honey bees can form distinct spatiotemporal memories that allow them to return repeatedly to different food sources at different times of day. Although it is becoming increasingly clear that different behavioral states are associated with different profiles of brain gene expression, it is not known whether this relationship extends to states that are as dynamic and specific as those associated with foraging-related spatiotemporal memories. We tested this hypothesis by training different groups of foragers from the same colony to collect sucrose solution from one of two artificial feeders; each feeder was in a different location and had sucrose available at a different time, either in the morning or afternoon. Bees from both training groups were collected at both the morning and afternoon training times to result in one set of bees that was undergoing stereotypical food anticipatory behavior and another that was inactive for each time of day. Between the two groups with the different spatiotemporal memories, microarray analysis revealed that 1329 genes were differentially expressed in the brains of honey bees. Many of these genes also varied with time of day, time of training or state of food anticipation. Some of these genes are known to be involved in a variety of biological processes, including metabolism and behavior. These results indicate that distinct spatiotemporal foraging memories in honey bees are associated with distinct neurogenomic signatures, and the decomposition of these signatures into sets of genes that are also influenced by time or activity state hints at the modular composition of this complex neurogenomic phenotype. PMID:21346126

  11. Autoantibody signature differentiates Wilms tumor patients from neuroblastoma patients.

    Directory of Open Access Journals (Sweden)

    Jana Schmitt

    Full Text Available Several studies report autoantibody signatures in cancer. The majority of these studies analyzed adult tumors and compared the seroreactivity pattern of tumor patients with the pattern in healthy controls. Here, we compared the autoimmune response in patients with neuroblastoma and patients with Wilms tumor representing two different childhood tumors. We were able to differentiate untreated neuroblastoma patients from untreated Wilms tumor patients with an accuracy of 86.8%, a sensitivity of 87.0% and a specificity of 86.7%. The separation of treated neuroblastoma patients from treated Wilms tumor patients' yielded comparable results with an accuracy of 83.8%. We furthermore identified the antigens that contribute most to the differentiation between both tumor types. The analysis of these antigens revealed that neuroblastoma was considerably more immunogenic than Wilms tumor. The reported antigens have not been found to be relevant for comparative analyses between other tumors and controls. In summary, neuroblastoma appears as a highly immunogenic tumor as demonstrated by the extended number of antigens that separate this tumor from Wilms tumor.

  12. Quantum spin liquid signatures in Kitaev-like frustrated magnets

    Science.gov (United States)

    Gohlke, Matthias; Wachtel, Gideon; Yamaji, Youhei; Pollmann, Frank; Kim, Yong Baek

    2018-02-01

    Motivated by recent experiments on α -RuCl3 , we investigate a possible quantum spin liquid ground state of the honeycomb-lattice spin model with bond-dependent interactions. We consider the K -Γ model, where K and Γ represent the Kitaev and symmetric-anisotropic interactions between spin-1/2 moments on the honeycomb lattice. Using the infinite density matrix renormalization group, we provide compelling evidence for the existence of quantum spin liquid phases in an extended region of the phase diagram. In particular, we use transfer-matrix spectra to show the evolution of two-particle excitations with well-defined two-dimensional dispersion, which is a strong signature of a quantum spin liquid. These results are compared with predictions from Majorana mean-field theory and used to infer the quasiparticle excitation spectra. Further, we compute the dynamical structure factor using finite-size cluster computations and show that the results resemble the scattering continuum seen in neutron-scattering experiments on α -RuCl3 . We discuss these results in light of recent and future experiments.

  13. How to Revise, and Revise Really Well, for Premier Academic Journals

    DEFF Research Database (Denmark)

    LaPlaca, Peter J.; Lindgreen, Adam; Vanhamme, Joelle

    2018-01-01

    Most of the premier academic journals in all fields routinely have rejection rates of 80%, 95%, or higher. All journals prefer articles that make significant contributions to the field. Revising a manuscript and responding properly to the comments of reviewers and editors often is challenging....... This article discusses how to revise effectively a manuscript according to the (minor or major) comments of reviewers and editors for premier academic journals. We provide a series of tips for helping the authors in their endeavor, making the process less arduous and improving the possibility of a positive...

  14. 7 CFR Appendix B to Subpart E of... - Certificate of Incumbency and Signature

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Certificate of Incumbency and Signature B Appendix B... Signature U.S. Department of Agriculture—Farmers Home Administration or its successor agency under Public... successor agency under Public Law 103-354 and that the signature appearing below and that the signatures...

  15. A taxonomic revision of the genus Podocarpus

    NARCIS (Netherlands)

    Laubenfels, de D.J.

    1985-01-01

    In connection with the forthcoming revision of the Coniferae for the Flora Malesiana, the author thought it necessary to revise the genus Podocarpus. Although this genus has a substantial representation in Malesia (30 species), the revision is too involved to be appropriate with the Flora Malesiana

  16. Nevada Test Site Radiological Control Manual. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2010-02-09

    This document supersedes DOE/NV/25946--801, “Nevada Test Site Radiological Control Manual,” Revision 0 issued in October 2009. Brief Description of Revision: A minor revision to correct oversights made during revision to incorporate the 10 CFR 835 Update; and for use as a reference document for Tenant Organization Radiological Protection Programs.

  17. Distinct mutational signatures characterize concurrent loss of polymerase proofreading and mismatch repair.

    Science.gov (United States)

    Haradhvala, N J; Kim, J; Maruvka, Y E; Polak, P; Rosebrock, D; Livitz, D; Hess, J M; Leshchiner, I; Kamburov, A; Mouw, K W; Lawrence, M S; Getz, G

    2018-05-01

    Fidelity of DNA replication is maintained using polymerase proofreading and the mismatch repair pathway. Tumors with loss of function of either mechanism have elevated mutation rates with characteristic mutational signatures. Here we report that tumors with concurrent loss of both polymerase proofreading and mismatch repair function have mutational patterns that are not a simple sum of the signatures of the individual alterations, but correspond to distinct, previously unexplained signatures: COSMIC database signatures 14 and 20. We then demonstrate that in all five cases in which the chronological order of events could be determined, polymerase epsilon proofreading alterations precede the defect in mismatch repair. Overall, we illustrate that multiple distinct mutational signatures can result from different combinations of a smaller number of mutational processes (of either damage or repair), which can influence the interpretation and discovery of mutational signatures.

  18. Restrictive partially blind signature for resource-constrained information systems

    NARCIS (Netherlands)

    Qiu, Weidong; Gong, Zheng; Liu, Bozhong; Long, Yu; Chen, Kefei

    2010-01-01

    Restrictive partially blind signature, which is designed for privacy oriented information systems, allows a user to obtain a blind signature from a signer whilst the blind message must obey some certain rules. In order to reduce storage and communication costs, several public-key cryptosystems are

  19. Searchable Signatures: Context and the Struggle for Recognition

    Directory of Open Access Journals (Sweden)

    Gina Schlesselman-Tarango

    2013-09-01

    Full Text Available Social networking sites made possible through Web 2.0 allow for unique user-generated tags called “searchable signatures.”  These tags move beyond the descriptive and act as means for users to assert online individual and group identities.  A study of searchable signatures on the Instagram application demonstrates that these types of tags are valuable not only because they allow for both individuals and groups to engage in what social theorist Axel Honneth calls the struggle for recognition, but also because they provide contextual use data and sociohistorical information so important to the understanding of digital objects.  This article explores how searchable signatures might be used by both patrons and staff in library environments.

  20. The 82-plex plasma protein signature that predicts increasing inflammation

    DEFF Research Database (Denmark)

    Tepel, Martin; Beck, Hans C; Tan, Qihua

    2015-01-01

    The objective of the study was to define the specific plasma protein signature that predicts the increase of the inflammation marker C-reactive protein from index day to next-day using proteome analysis and novel bioinformatics tools. We performed a prospective study of 91 incident kidney....... The prediction model selected and validated 82 plasma proteins which determined increased next-day C-reactive protein (area under receiver-operator-characteristics curve, 0.772; 95% confidence interval, 0.669 to 0.876; P signature (P ....001) was associated with observed increased next-day C-reactive protein. The 82-plex protein signature outperformed routine clinical procedures. The category-free net reclassification index improved with 82-plex plasma protein signature (total net reclassification index, 88.3%). Using the 82-plex plasma protein...

  1. A novel quantum group signature scheme without using entangled states

    Science.gov (United States)

    Xu, Guang-Bao; Zhang, Ke-Jia

    2015-07-01

    In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

  2. Nonlinear control of magnetic signatures

    Science.gov (United States)

    Niemoczynski, Bogdan

    Magnetic properties of ferrite structures are known to cause fluctuations in Earth's magnetic field around the object. These fluctuations are known as the object's magnetic signature and are unique based on the object's geometry and material. It is a common practice to neutralize magnetic signatures periodically after certain time intervals, however there is a growing interest to develop real time degaussing systems for various applications. Development of real time degaussing system is a challenging problem because of magnetic hysteresis and difficulties in measurement or estimation of near-field flux data. The goal of this research is to develop a real time feedback control system that can be used to minimize magnetic signatures for ferrite structures. Experimental work on controlling the magnetic signature of a cylindrical steel shell structure with a magnetic disturbance provided evidence that the control process substantially increased the interior magnetic flux. This means near field estimation using interior sensor data is likely to be inaccurate. Follow up numerical work for rectangular and cylindrical cross sections investigated variations in shell wall flux density under a variety of ambient excitation and applied disturbances. Results showed magnetic disturbances could corrupt interior sensor data and magnetic shielding due to the shell walls makes the interior very sensitive to noise. The magnetic flux inside the shell wall showed little variation due to inner disturbances and its high base value makes it less susceptible to noise. This research proceeds to describe a nonlinear controller to use the shell wall data as an input. A nonlinear plant model of magnetics is developed using a constant tau to represent domain rotation lag and a gain function k to describe the magnetic hysteresis curve for the shell wall. The model is justified by producing hysteresis curves for multiple materials, matching experimental data using a particle swarm algorithm, and

  3. Scalable Arbitrated Quantum Signature of Classical Messages with Multi-Signers

    International Nuclear Information System (INIS)

    Yang Yuguang; Wang Yuan; Teng Yiwei; Chai Haiping; Wen Qiaoyan

    2010-01-01

    Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collaboratively send a message to the verifier and convince the verifier that the message is actually transmitted by them. In this paper, we give a scalable arbitrated signature protocol of classical messages with multi-signers. Its security is analyzed and proved to be secure even with a compromised arbitrator. (general)

  4. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  5. Optical Variability Signatures from Massive Black Hole Binaries

    Science.gov (United States)

    Kasliwal, Vishal P.; Frank, Koby Alexander; Lidz, Adam

    2017-01-01

    The hierarchical merging of dark matter halos and their associated galaxies should lead to a population of supermassive black hole binaries (MBHBs). We consider plausible optical variability signatures from MBHBs at sub-parsec separations and search for these using data from the Catalina Real-Time Transient Survey (CRTS). Specifically, we model the impact of relativistic Doppler beaming on the accretion disk emission from the less massive, secondary black hole. We explore whether this Doppler modulation may be separated from other sources of stochastic variability in the accretion flow around the MBHBs, which we describe as a damped random walk (DRW). In the simple case of a circular orbit, relativistic beaming leads to a series of broad peaks — located at multiples of the orbital frequency — in the fluctuation power spectrum. We extend our analysis to the case of elliptical orbits and discuss the effect of beaming on the flux power spectrum and auto-correlation function using simulations. We present a code to model an observed light curve as a stochastic DRW-type time series modulated by relativistic beaming and apply the code to CRTS data.

  6. The Lyman-alpha signature of the first galaxies

    Science.gov (United States)

    Smith, Aaron

    2018-01-01

    Radiation from the first stars and galaxies initiated the dramatic phase transition marking an end to the cosmic dark ages. The emission and absorption signatures from the Lyman-alpha (Lyα) transition of neutral hydrogen have been indispensable in extending the observational frontier for high-redshift galaxies into the epoch of reionization. Lyα radiative transfer provides clues about the processes leading to Lyα escape from individual galaxies and the subsequent transmission through the intergalactic medium. Cosmological simulations incorporating Lyα radiative transfer enhance our understanding of fundamental physics by supplying the inferred spectra and feedback on the gas. In this talk, I will discuss the dynamical impact of Lyα radiation pressure on galaxy formation throughout cosmic reionization with the first fully coupled Lyα radiation-hydrodynamics simulations. Based on a suite of spherically symmetric models and high-resolution ab initio cosmological simulations we find that Lyα radiation pressure is dynamically important during the assembly of direct collapse black holes (DCBHs), which may be the seeds of the first supermassive black holes in the universe. Finally, I will discuss recent advances in Lyα modeling based on current state-of-the-art simulations and observational insights.

  7. Comparison of transcriptomic signature of post-Chernobyl and post radiotherapy thyroid tumors

    International Nuclear Information System (INIS)

    Ory, Catherine; Ugolin, Nicolas; Chevillard, Sylvie; Hofman, Paul; Schlumberger, Martin; Likhtarev, Illya A.

    2013-01-01

    We previously identified two highly discriminating and predictive radiation-induced transcriptomic signatures by comparing series of sporadic and post radiotherapy thyroid tumors (322-gene signature), and by reanalyzing a previously published data set of sporadic and post-Chernobyl thyroid tumors (106-gene signature). The aim of the present work was (i) to compare the two signatures in terms of gene expression de-regulations and molecular features/pathways, and (ii) to test the capacity of the post radiotherapy signature in classifying the post-Chernobyl series of tumors and reciprocally of the post-Chernobyl signature in classifying the post radiotherapy-induced tumors. We now explored if post radiotherapy and post-Chernobyl papillary thyroid carcinomas (PTC) display common molecular features by comparing molecular pathways deregulated in the two tumor series, and tested the potential of gene subsets of the post radiotherapy signature to classify the post-Chernobyl series (14 sporadic and 12 post-Chernobyl PTC), and reciprocally of gene subsets of the post-Chernobyl signature to classify the post radiotherapy series (15 sporadic and 12 post radiotherapy PTC), by using conventional principal component analysis. We found that the five genes common to the two signatures classified the learning/training tumors (used to search these signatures) of both the post radiotherapy (seven PTC) and the post-Chernobyl (six PTC) thyroid tumor series as compared with the sporadic tumors (seven sporadic PTC in each series). Importantly, these five genes were also effective for classifying independent series of post radiotherapy (five PTC) and post-Chernobyl (six PTC) tumors compared to independent series of sporadic tumors (eight PTC and six PTC respectively; testing tumors). Moreover, part of each post radiotherapy (32 genes) and post-Chernobyl signature (16 genes) cross-classified the respective series of thyroid tumors. Finally, several molecular pathways deregulated in post

  8. SOIL RESPIRED D13C SIGNATURES REFLECT ROOT EXUDATE OR ROOT TURNOVER SIGNATURES IN AN ELEVATED CO2 AND OZONE MESOCOSM EXPERIMENT

    Science.gov (United States)

    Bulk tissue and root and soil respired d13C signatures were measured throughout the soil profile in a Ponderosa Pine mesocosm experiment exposed to ambient and elevated CO2 concentrations. For the ambient treatment, root (0-1mm, 1-2mm, and >2mm) and soil d13C signatures were ?24...

  9. Distinct microbiological signatures associated with triple negative breast cancer.

    Science.gov (United States)

    Banerjee, Sagarika; Wei, Zhi; Tan, Fei; Peck, Kristen N; Shih, Natalie; Feldman, Michael; Rebbeck, Timothy R; Alwine, James C; Robertson, Erle S

    2015-10-15

    Infectious agents are the third highest human cancer risk factor and may have a greater role in the origin and/or progression of cancers, and related pathogenesis. Thus, knowing the specific viruses and microbial agents associated with a cancer type may provide insights into cause, diagnosis and treatment. We utilized a pan-pathogen array technology to identify the microbial signatures associated with triple negative breast cancer (TNBC). This technology detects low copy number and fragmented genomes extracted from formalin-fixed paraffin embedded archival tissues. The results, validated by PCR and sequencing, define a microbial signature present in TNBC tissue which was underrepresented in normal tissue. Hierarchical clustering analysis displayed two broad microbial signatures, one prevalent in bacteria and parasites and one prevalent in viruses. These signatures demonstrate a new paradigm in our understanding of the link between microorganisms and cancer, as causative or commensal in the tumor microenvironment and provide new diagnostic potential.

  10. Signatures of topological superconductivity

    Energy Technology Data Exchange (ETDEWEB)

    Peng, Yang

    2017-07-19

    The prediction and experimental discovery of topological insulators brought the importance of topology in condensed matter physics into the limelight. Topology hence acts as a new dimension along which more and more new states of matter start to emerge. One of these topological states of matter, namely topological superconductors, comes into the focus because of their gapless excitations. These gapless excitations, especially in one dimensional topological superconductors, are Majorana zero modes localized at the ends of the superconductor and exhibit exotic nonabelian statistics, which can be potentially applied to fault-tolerant quantum computation. Given their highly interesting physical properties and potential applications to quantum computation, both theorists and experimentalists spend great efforts to realize topological supercondoctors and to detect Majoranas. In two projects within this thesis, we investigate the properties of Majorana zero modes in realistic materials which are absent in simple theoretical models. We find that the superconducting proximity effect, an essential ingredient in all existing platforms for topological superconductors, plays a significant role in determining the localization property of the Majoranas. Strong proximity coupling between the normal system and the superconducting substrate can lead to strongly localized Majoranas, which can explain the observation in a recent experiment. Motivated by experiments in Molenkamp's group, we also look at realistic quantum spin Hall Josephson junctions, in which charge puddles acting as magnetic impurities are coupled to the helical edge states. We find that with this setup, the junction generically realizes an exotic 8π periodic Josephson effect, which is absent in a pristine Josephson junction. In another two projects, we propose more pronounced signatures of Majoranas that are accessible with current experimental techniques. The first one is a transport measurement, which uses

  11. On psychoanalytic supervision as signature pedagogy.

    Science.gov (United States)

    Watkins, C Edward

    2014-04-01

    What is signature pedagogy in psychoanalytic education? This paper examines that question, considering why psychoanalytic supervision best deserves that designation. In focusing on supervision as signature pedagogy, I accentuate its role in building psychoanalytic habits of mind, habits of hand, and habits of heart, and transforming theory and self-knowledge into practical product. Other facets of supervision as signature pedagogy addressed in this paper include its features of engagement, uncertainty, formation, and pervasiveness, as well as levels of surface, deep, and implicit structure. Epistemological, ontological, and axiological in nature, psychoanalytic supervision engages trainees in learning to do, think, and value what psychoanalytic practitioners in the field do, think, and value: It is, most fundamentally, professional preparation for competent, "good work." In this paper, effort is made to shine a light on and celebrate the pivotal role of supervision in "making" or developing budding psychoanalysts and psychoanalytic psychotherapists. Now over a century old, psychoanalytic supervision remains unparalleled in (1) connecting and integrating conceptualization and practice, (2) transforming psychoanalytic theory and self-knowledge into an informed analyzing instrument, and (3) teaching, transmitting, and perpetuating the traditions, practice, and culture of psychoanalytic treatment.

  12. L1000CDS2: LINCS L1000 characteristic direction signatures search engine.

    Science.gov (United States)

    Duan, Qiaonan; Reid, St Patrick; Clark, Neil R; Wang, Zichen; Fernandez, Nicolas F; Rouillard, Andrew D; Readhead, Ben; Tritsch, Sarah R; Hodos, Rachel; Hafner, Marc; Niepel, Mario; Sorger, Peter K; Dudley, Joel T; Bavari, Sina; Panchal, Rekha G; Ma'ayan, Avi

    2016-01-01

    The library of integrated network-based cellular signatures (LINCS) L1000 data set currently comprises of over a million gene expression profiles of chemically perturbed human cell lines. Through unique several intrinsic and extrinsic benchmarking schemes, we demonstrate that processing the L1000 data with the characteristic direction (CD) method significantly improves signal to noise compared with the MODZ method currently used to compute L1000 signatures. The CD processed L1000 signatures are served through a state-of-the-art web-based search engine application called L1000CDS 2 . The L1000CDS 2 search engine provides prioritization of thousands of small-molecule signatures, and their pairwise combinations, predicted to either mimic or reverse an input gene expression signature using two methods. The L1000CDS 2 search engine also predicts drug targets for all the small molecules profiled by the L1000 assay that we processed. Targets are predicted by computing the cosine similarity between the L1000 small-molecule signatures and a large collection of signatures extracted from the gene expression omnibus (GEO) for single-gene perturbations in mammalian cells. We applied L1000CDS 2 to prioritize small molecules that are predicted to reverse expression in 670 disease signatures also extracted from GEO, and prioritized small molecules that can mimic expression of 22 endogenous ligand signatures profiled by the L1000 assay. As a case study, to further demonstrate the utility of L1000CDS 2 , we collected expression signatures from human cells infected with Ebola virus at 30, 60 and 120 min. Querying these signatures with L1000CDS 2 we identified kenpaullone, a GSK3B/CDK2 inhibitor that we show, in subsequent experiments, has a dose-dependent efficacy in inhibiting Ebola infection in vitro without causing cellular toxicity in human cell lines. In summary, the L1000CDS 2 tool can be applied in many biological and biomedical settings, while improving the extraction of

  13. Trace element ink spiking for signature authentication

    International Nuclear Information System (INIS)

    Hatzistavros, V.S.; Kallithrakas-Kontos, N.G.

    2008-01-01

    Signature authentication is a critical question in forensic document examination. Last years the evolution of personal computers made signature copying a quite easy task, so the development of new ways for signature authentication is crucial. In the present work a commercial ink was spiked with many trace elements in various concentrations. Inorganic and organometallic ink soluble compounds were used as spiking agents, whilst ink retained its initial properties. The spiked inks were used for paper writing and the documents were analyzed by a non destructive method, the energy dispersive X-ray fluorescence. The thin target model was proved right for quantitative analysis and a very good linear relationship of the intensity (X-ray signal) against concentration was estimated for all used elements. Intensity ratios between different elements in the same ink gave very stable results, independent on the writing alterations. The impact of time both to written document and prepared inks was also investigated. (author)

  14. A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model

    Directory of Open Access Journals (Sweden)

    Lili Zhang

    2014-01-01

    Full Text Available A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. Up to date, most proxy blind signature schemes rely on hard number theory problems, discrete logarithm, and bilinear pairings. Unfortunately, the above underlying number theory problems will be solvable in the postquantum era. Lattice-based cryptography is enjoying great interest these days, due to implementation simplicity and provable security reductions. Moreover, lattice-based cryptography is believed to be hard even for quantum computers. In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles. The new scheme is proven to be strongly unforgeable under the standard hardness assumption of the short integer solution problem (SIS and the inhomogeneous small integer solution problem (ISIS. Furthermore, the secret key size and the signature length of our scheme are invariant and much shorter than those of the previous lattice-based proxy blind signature schemes. To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model.

  15. Signatures of the Invisible

    CERN Multimedia

    Strom, D

    2003-01-01

    On the Net it is possible to take a look at art from afar via Virtual Museums. One such exhibition was recently in the New York Museum of Modern Art's branch, PS1. Entitled 'Signatures of the Invisible' it was a collaborative effort between artists and physicists (1/2 page).

  16. Magnetic Signature Analysis & Validation System

    National Research Council Canada - National Science Library

    Vliet, Scott

    2001-01-01

    The Magnetic Signature Analysis and Validation (MAGSAV) System is a mobile platform that is used to measure, record, and analyze the perturbations to the earth's ambient magnetic field caused by object such as armored vehicles...

  17. [An overview on the collation and revision of medical books by the Bureau for Revising Medical Books in the Northern Song Dynasty].

    Science.gov (United States)

    Meng, Yongliang; Liang, Yongxuan

    2014-07-01

    The Bureau for Revising Medical Books was a temporary agency established by the government of the Northern Song Dynasty in 1057, the 2nd year of Jiayou of Emperor Renzong, exclusively for the edition, revision and publishing of ancient medical books. 11 medical books were revised and edited by 13 Bureau members in a period of 12 years until 1069, the 2nd year of Xining of Emperor ShenZong, which eventually became the final versions until today. 8 medical books were initially planned for the revision, but 11 were actually completed in the end. The time for completing a revision varied from over 10 years at most to less than 1 year at least. Instead of working in the office, the officers of the Bureau for Revising Medical Books did their works at home. The members of the said Bureau came from the Tiju officer of the Bureau for Revising Medical Books and the officials of revising medical books, consisting of both Confucian ministers and medical officers. Confucian ministers played an important role in revising medical books. The Bureau had a strict workflow in electing revising officials, making the project, and the determination of the principles and arrangements of the tasks of editing and proofreading.

  18. Photonic quantum digital signatures operating over kilometer ranges in installed optical fiber

    Science.gov (United States)

    Collins, Robert J.; Fujiwara, Mikio; Amiri, Ryan; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Andersson, Erika; Buller, Gerald S.; Sasaki, Masahide

    2016-10-01

    The security of electronic communications is a topic that has gained noteworthy public interest in recent years. As a result, there is an increasing public recognition of the existence and importance of mathematically based approaches to digital security. Many of these implement digital signatures to ensure that a malicious party has not tampered with the message in transit, that a legitimate receiver can validate the identity of the signer and that messages are transferable. The security of most digital signature schemes relies on the assumed computational difficulty of solving certain mathematical problems. However, reports in the media have shown that certain implementations of such signature schemes are vulnerable to algorithmic breakthroughs and emerging quantum processing technologies. Indeed, even without quantum processors, the possibility remains that classical algorithmic breakthroughs will render these schemes insecure. There is ongoing research into information-theoretically secure signature schemes, where the security is guaranteed against an attacker with arbitrary computational resources. One such approach is quantum digital signatures. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics while comparable classical protocols require additional resources such as anonymous broadcast and/or a trusted authority. Previously, most early demonstrations of quantum digital signatures required dedicated single-purpose hardware and operated over restricted ranges in a laboratory environment. Here, for the first time, we present a demonstration of quantum digital signatures conducted over several kilometers of installed optical fiber. The system reported here operates at a higher signature generation rate than previous fiber systems.

  19. Emotion Processes in Knowledge Revision

    Science.gov (United States)

    Trevors, Gregory J.; Kendeou, Panayiota; Butterfuss, Reese

    2017-01-01

    In recent years, a number of insights have been gained into the cognitive processes that explain how individuals overcome misconceptions and revise their previously acquired incorrect knowledge. The current study complements this line of research by investigating the moment-by-moment emotion processes that occur during knowledge revision using a…

  20. 75 FR 57597 - Revised Proposal for Revisions to the Schedules of Civil Penalties for a Violation of a Federal...

    Science.gov (United States)

    2010-09-21

    ... Revisions to the Schedules of Civil Penalties for a Violation of a Federal Railroad Safety Law or Federal... railroad safety laws and regulations are necessary because many of FRA's civil penalties have not been..., et al. Revised Proposal for Revisions to the Schedules of Civil Penalties for a Violation of a...

  1. XMSS : a practical forward secure signature scheme based on minimal security assumptions

    NARCIS (Netherlands)

    Buchmann, Johannes; Dahmen, Erik; Hülsing, Andreas; Yang, B.-Y.

    2011-01-01

    We present the hash-based signature scheme XMSS. It is the first provably (forward) secure and practical signature scheme with minimal security requirements: a pseudorandom and a second preimage resistant (hash) function family. Its signature size is reduced to less than 25% compared to the best

  2. A Prototype of Mathematical Treatment of Pen Pressure Data for Signature Verification.

    Science.gov (United States)

    Li, Chi-Keung; Wong, Siu-Kay; Chim, Lai-Chu Joyce

    2018-01-01

    A prototype using simple mathematical treatment of the pen pressure data recorded by a digital pen movement recording device was derived. In this study, a total of 48 sets of signature and initial specimens were collected. Pearson's correlation coefficient was used to compare the data of the pen pressure patterns. From the 820 pair comparisons of the 48 sets of genuine signatures, a high degree of matching was found in which 95.4% (782 pairs) and 80% (656 pairs) had rPA > 0.7 and rPA > 0.8, respectively. In the comparison of the 23 forged signatures with their corresponding control signatures, 20 of them (89.2% of pairs) had rPA values prototype could be used as a complementary technique to improve the objectivity of signature examination and also has a good potential to be developed as a tool for automated signature identification. © 2017 American Academy of Forensic Sciences.

  3. Image Processing Based Signature Verification Technique to Reduce Fraud in Financial Institutions

    Directory of Open Access Journals (Sweden)

    Hussein Walid

    2016-01-01

    Full Text Available Handwritten signature is broadly utilized as personal verification in financial institutions ensures the necessity for a robust automatic signature verification tool. This tool aims to reduce fraud in all related financial transactions’ sectors. This paper proposes an online, robust, and automatic signature verification technique using the recent advances in image processing and machine learning. Once the image of a handwritten signature for a customer is captured, several pre-processing steps are performed on it including filtration and detection of the signature edges. Afterwards, a feature extraction process is applied on the image to extract Speeded up Robust Features (SURF and Scale-Invariant Feature Transform (SIFT features. Finally, a verification process is developed and applied to compare the extracted image features with those stored in the database for the specified customer. Results indicate high accuracy, simplicity, and rapidity of the developed technique, which are the main criteria to judge a signature verification tool in banking and other financial institutions.

  4. Patients with proximal junctional kyphosis requiring revision surgery have higher postoperative lumbar lordosis and larger sagittal balance corrections.

    Science.gov (United States)

    Kim, Han Jo; Bridwell, Keith H; Lenke, Lawrence G; Park, Moon Soo; Song, Kwang Sup; Piyaskulkaew, Chaiwat; Chuntarapas, Tapanut

    2014-04-20

    Case control study. To evaluate risk factors in patients in 3 groups: those without proximal junctional kyphosis (PJK) (N), with PJK but not requiring revision (P), and then those with PJK requiring revision surgery (S). It is becoming clear that some patients maintain stable PJK angles, whereas others progress and develop severe PJK necessitating revision surgery. A total of 206 patients at a single institution from 2002 to 2007 with adult scoliosis with 2-year minimum follow-up (average 3.5 yr) were analyzed. Inclusion criteria were age more than 18 years and primary fusions greater than 5 levels from any thoracic upper instrumented vertebra to any lower instrumented vertebrae. Revisions were excluded. Radiographical assessment included Cobb measurements in the coronal/sagittal plane and measurements of the PJK angle at postoperative time points: 1 to 2 months, 2 years, and final follow-up. PJK was defined as an angle greater than 10°. The prevalence of PJK was 34%. The average age in N was 49.9 vs. 51.3 years in P and 60.1 years in S. Sex, body mass index, and smoking status were not significantly different between groups. Fusions extending to the pelvis were 74%, 85%, and 91% of the cases in groups N, P, and S. Instrumentation type was significantly different between groups N and S, with a higher number of upper instrumented vertebra hooks in group N. Radiographical parameters demonstrated a higher postoperative lumbar lordosis and a larger sagittal balance change, with surgery in those with PJK requiring revision surgery. Scoliosis Research Society postoperative pain scores were inferior in group N vs. P and S, and Oswestry Disability Index scores were similar between all groups. Patients with PJK requiring revision were older, had higher postoperative lumbar lordosis, and larger sagittal balance corrections than patients without PJK. Based on these data, it seems as though older patients with large corrections in their lumbar lordosis and sagittal balance

  5. Student-initiated revision in child health.

    Science.gov (United States)

    Alfaham, M; Gray, O P; Davies, D P

    1994-03-01

    Most teaching of child health in Cardiff takes place in block attachments of 8 weeks. There is an introductory seminar of 2 days followed by a 6-week clinical attachment in a district general hospital in Wales, and then a revision period of one week designed to help students formalize and structure their basic knowledge and to clarify aspects of child health which they may have had difficulty in understanding. The revision programme has to take into account: the short time available, the small number of teaching staff, the most relevant basic knowledge and active participation by the student. This paper describes how this week has been improved through the use of student-initiated revision (SIR). The students' appraisal of this revision and in particular SIR is presented.

  6. Neural Signatures of Trust During Human-Automation Interactions

    Science.gov (United States)

    2016-04-01

    also automated devices such as a Global Positioning System. For instance, to provide advanced safety measures, the Transportation Safety...AFRL-AFOSR-VA-TR-2016-0160 Neural Signatures of Trust during Human- Automation Interactions Frank Krueger GEORGE MASON UNIVERSITY Final Report 04/01...SUBTITLE Neural Signatures of Trust during Human- Automation Interactions 5a. CONTRACT NUMBER FA9550-13-1-0017 5b. GRANT NUMBER 5c. PROGRAM ELEMENT

  7. arXiv Gravitational Wave Signatures of Highly Compact Boson Star Binaries

    CERN Document Server

    Palenzuela, Carlos; Bezares, Miguel; Cardoso, Vitor; Lehner, Luis; Liebling, Steven

    2017-11-30

    Solitonic boson stars are stable objects made of a complex scalar field with a compactness that can reach values comparable to that of neutron stars. A recent study of the collision of identical boson stars produced only nonrotating boson stars or black holes, suggesting that rotating boson stars may not form from binary mergers. Here we extend this study to include an analysis of the gravitational waves radiated during the coalescence of such a binary, which is crucial to distinguish these events from other binaries with LIGO and Virgo observations. Our studies reveal that the remnant’s gravitational wave signature is mainly governed by its fundamental frequency as it settles down to a nonrotating boson star, emitting significant gravitational radiation during this post-merger state. We calculate how the waveforms and their post-merger frequencies depend on the compactness of the initial boson stars and estimate analytically the amount of energy radiated after the merger.

  8. KEA-71 Smart Current Signature Sensor (SCSS)

    Science.gov (United States)

    Perotti, Jose M.

    2010-01-01

    This slide presentation reviews the development and uses of the Smart Current Signature Sensor (SCSS), also known as the Valve Health Monitor (VHM) system. SCSS provides a way to not only monitor real-time the valve's operation in a non invasive manner, but also to monitor its health (Fault Detection and Isolation) and identify potential faults and/or degradation in the near future (Prediction/Prognosis). This technology approach is not only applicable for solenoid valves, and it could be extrapolated to other electrical components with repeatable electrical current signatures such as motors.

  9. Quark-Gluon Plasma Signatures

    CERN Document Server

    Vogt, Ramona

    1998-01-01

    Aspects of quark-gluon plasma signatures that can be measured by CMS are discussed. First the initial conditions of the system from minijet production are introduced, including shadowing effects. Color screening of the Upsilon family is then presented, followed by energy loss effects on charm and bottom hadrons, high Pt jets and global observables.

  10. Revised licensee event report system

    International Nuclear Information System (INIS)

    Mays, G.T.; Poore, W.P.

    1985-01-01

    Licensee Event Reports (LERs) provide the basis for evaluating and assessing operating experience information from nuclear power plants. The reporting requirements for submitting LERs to the Nuclear Regulatory Commission have been revised. Effective Jan. 1, 1984, all events were to be submitted in accordance with 10 CFR 50.73 of the Code of Federal Regulations. Report NUREG-1022, Licensee Event Report System-Description of System and Guidelines for Reporting, describes the guidelines on reportability of events. This article summarizes the reporting requirements as presented in NUREG-1022, high-lights differences in data reported between the revised and previous LER systems, and presents results from a preliminary assessment of LERs submitted under the revised LER reporting system

  11. ARMed SPHINCS computing a 41KB signature in 16KB of RAM

    NARCIS (Netherlands)

    Hülsing, A.T.; Rijneveld, J.; Schwabe, P.; Cheng, C.-M.; Chung, K.-M.; Persiano, G.; Yang, B.-Y.

    2016-01-01

    This paper shows that it is feasible to implement the stateless hash-based signature scheme SPHINCS-256 on an embedded microprocessor with memory even smaller than a signature and limited computing power. We demonstrate that it is possible to generate and verify the 41KB signature on an ARM Cortex

  12. Clinical and Economic Burden of Revision Knee Arthroplasty

    Directory of Open Access Journals (Sweden)

    Mohit Bhandari

    2012-01-01

    Full Text Available Surgery is indicated for symptomatic knee osteoarthritis (OA when conservative measures are unsuccessful. High tibial osteotomy (HTO, unicompartmental knee arthroplasty (UKA, and total knee arthroplasty (TKA are surgical options intended to relieve knee OA pain and dysfunction. The choice of surgical intervention is dependent on several factors such as disease location, patient age, comorbidities, and activity levels. Regardless of surgical treatment, complications such as infection, loosening or lysis, periprosthetic fracture, and postoperative pain are known risks and are indications for revision surgery. The clinical and economic implications for revision surgery are underappreciated. Over 55,000 revision surgeries were performed in 2010 in the US, with 48% of these revisions in patients under 65 years. Total costs associated with each revision TKA surgery have been estimated to be in excess of $49,000. The current annual economic burden of revision knee OA surgery is $2.7 billion for hospital charges alone. By 2030, assuming a 5-fold increase in the number of revision procedures, this economic burden will exceed $13 billion annually. It is appealing to envision a therapy that could delay or obviate the need for arthroplasty. From an actuarial standpoint, this would have the theoretical downstream effect of substantially reducing the number of revision procedures. Although no known therapies currently meet these criteria, such a breakthrough would have a tremendous impact in lessening the clinical and economic burden of knee OA revision surgery.

  13. Humeral windows in revision total elbow arthroplasty.

    Science.gov (United States)

    Peach, Chris A; Salama, Amir; Stanley, David

    2016-04-01

    The use of cortical windows for revision elbow arthroplasty has not previously been widely reported. Their use aids safe revision of a well fixed humeral prosthesis and can be used in the setting of dislocation, periprosthetic fracture or aseptic loosening of the ulnar component. We describe our technique and results of cortical windows in the distal humerus for revision elbow arthroplasty surgery.

  14. Diet History Questionnaire: Database Revision History

    Science.gov (United States)

    The following details all additions and revisions made to the DHQ nutrient and food database. This revision history is provided as a reference for investigators who may have performed analyses with a previous release of the database.

  15. Privacy in wireless sensor networks using ring signature

    Directory of Open Access Journals (Sweden)

    Ashmita Debnath

    2014-07-01

    Full Text Available The veracity of a message from a sensor node must be verified in order to avoid a false reaction by the sink. This verification requires the authentication of the source node. The authentication process must also preserve the privacy such that the node and the sensed object are not endangered. In this work, a ring signature was proposed to authenticate the source node while preserving its spatial privacy. However, other nodes as signers and their numbers must be chosen to preclude the possibility of a traffic analysis attack by an adversary. The spatial uncertainty increases with the number of signers but requires larger memory size and communication overhead. This requirement can breach the privacy of the sensed object. To determine the effectiveness of the proposed scheme, the location estimate of a sensor node by an adversary and enhancement in the location uncertainty with a ring signature was evaluated. Using simulation studies, the ring signature was estimated to require approximately four members from the same neighbor region of the source node to sustain the privacy of the node. Furthermore, the ring signature was also determined to have a small overhead and not to adversely affect the performance of the sensor network.

  16. ARMed SPHINCS : computing a 41KB signature in 16KB of RAM

    NARCIS (Netherlands)

    Hülsing, A.T.; Rijneveld, J.; Schwabe, P.

    2015-01-01

    This paper shows that it is feasible to implement the stateless hash-based signature scheme SPHINCS-256 on a "very small device" with memory even smaller than a signature and limited computing power. We demonstrate that it is possible to generate and verify the 41\\,KB signature on an ARM Cortex M3

  17. Spatial Signature Estimation with an Uncalibrated Uniform Linear Array

    Directory of Open Access Journals (Sweden)

    Xiang Cao

    2015-06-01

    Full Text Available In this paper, the problem of spatial signature estimation using a uniform linear array (ULA with unknown sensor gain and phase errors is considered. As is well known, the directions-of-arrival (DOAs can only be determined within an unknown rotational angle in this array model. However, the phase ambiguity has no impact on the identification of the spatial signature. Two auto-calibration methods are presented for spatial signature estimation. In our methods, the rotational DOAs and model error parameters are firstly obtained, and the spatial signature is subsequently calculated. The first method extracts two subarrays from the ULA to construct an estimator, and the elements of the array can be used several times in one subarray. The other fully exploits multiple invariances in the interior of the sensor array, and a multidimensional nonlinear problem is formulated. A Gauss–Newton iterative algorithm is applied for solving it. The first method can provide excellent initial inputs for the second one. The effectiveness of the proposed algorithms is demonstrated by several simulation results.

  18. Revision surgery for failed thermal capsulorrhaphy.

    Science.gov (United States)

    Park, Hyung Bin; Yokota, Atsushi; Gill, Harpreet S; El Rassi, George; McFarland, Edward G

    2005-09-01

    With the failure of thermal capsulorrhaphy for shoulder instability, there have been concerns with capsular thinning and capsular necrosis affecting revision surgery. To report the findings at revision surgery for failed thermal capsulorrhaphy and to evaluate the technical effects on subsequent revision capsular plication. Case series; Level of evidence, 4. Fourteen patients underwent arthroscopic evaluation and open reconstruction for a failed thermal capsulorrhaphy. The cause of the failure, the quality of the capsule, and the ability to suture the capsule were recorded. The patients were evaluated at follow-up for failure, which was defined as recurrent subluxations or dislocations. The origin of the instability was traumatic (n = 6) or atraumatic (n = 8). At revision surgery in the traumatic group, 4 patients sustained failure of the Bankart repair with capsular laxity, and the others experienced capsular laxity alone. In the atraumatic group, all patients experienced capsular laxity as the cause of failure. Of the 14 patients, the capsule quality was judged to be thin in 5 patients and ablated in 1 patient. A glenoid-based capsular shift could be accomplished in all 14 patients. At follow-up (mean, 35.4 months; range, 22 to 48 months), 1 patient underwent revision surgery and 1 patient had a subluxation, resulting in a failure rate of 14%. Recurrent capsular laxity after failed thermal capsular shrinkage is common and frequently associated with capsular thinning. In most instances, the capsule quality does not appear to technically affect the revision procedure.

  19. Special Nuclear Material Gamma-Ray Signatures for Reachback Analysts

    Energy Technology Data Exchange (ETDEWEB)

    Karpius, Peter Joseph [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Myers, Steven Charles [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-08-29

    These are slides on special nuclear material gamma-ray signatures for reachback analysts for an LSS Spectroscopy course. The closing thoughts for this presentation are the following: SNM materials have definite spectral signatures that should be readily recognizable to analysts in both bare and shielded configurations. One can estimate burnup of plutonium using certain pairs of peaks that are a few keV apart. In most cases, one cannot reliably estimate uranium enrichment in an analogous way to the estimation of plutonium burnup. The origin of the most intense peaks from some SNM items may be indirect and from ‘associated nuclides.' Indirect SNM signatures sometimes have commonalities with the natural gamma-ray background.

  20. Mirage: a visible signature evaluation tool

    Science.gov (United States)

    Culpepper, Joanne B.; Meehan, Alaster J.; Shao, Q. T.; Richards, Noel

    2017-10-01

    This paper presents the Mirage visible signature evaluation tool, designed to provide a visible signature evaluation capability that will appropriately reflect the effect of scene content on the detectability of targets, providing a capability to assess visible signatures in the context of the environment. Mirage is based on a parametric evaluation of input images, assessing the value of a range of image metrics and combining them using the boosted decision tree machine learning method to produce target detectability estimates. It has been developed using experimental data from photosimulation experiments, where human observers search for vehicle targets in a variety of digital images. The images used for tool development are synthetic (computer generated) images, showing vehicles in many different scenes and exhibiting a wide variation in scene content. A preliminary validation has been performed using k-fold cross validation, where 90% of the image data set was used for training and 10% of the image data set was used for testing. The results of the k-fold validation from 200 independent tests show a prediction accuracy between Mirage predictions of detection probability and observed probability of detection of r(262) = 0:63, p Pearson correlation) and a MAE = 0:21 (mean absolute error).

  1. Measurement-device-independent quantum digital signatures

    Science.gov (United States)

    Puthoor, Ittoop Vergheese; Amiri, Ryan; Wallden, Petros; Curty, Marcos; Andersson, Erika

    2016-08-01

    Digital signatures play an important role in software distribution, modern communication, and financial transactions, where it is important to detect forgery and tampering. Signatures are a cryptographic technique for validating the authenticity and integrity of messages, software, or digital documents. The security of currently used classical schemes relies on computational assumptions. Quantum digital signatures (QDS), on the other hand, provide information-theoretic security based on the laws of quantum physics. Recent work on QDS Amiri et al., Phys. Rev. A 93, 032325 (2016);, 10.1103/PhysRevA.93.032325 Yin, Fu, and Zeng-Bing, Phys. Rev. A 93, 032316 (2016), 10.1103/PhysRevA.93.032316 shows that such schemes do not require trusted quantum channels and are unconditionally secure against general coherent attacks. However, in practical QDS, just as in quantum key distribution (QKD), the detectors can be subjected to side-channel attacks, which can make the actual implementations insecure. Motivated by the idea of measurement-device-independent quantum key distribution (MDI-QKD), we present a measurement-device-independent QDS (MDI-QDS) scheme, which is secure against all detector side-channel attacks. Based on the rapid development of practical MDI-QKD, our MDI-QDS protocol could also be experimentally implemented, since it requires a similar experimental setup.

  2. Assessing the robustness of quantitative fatty acid signature analysis to assumption violations

    Science.gov (United States)

    Bromaghin, Jeffrey F.; Budge, Suzanne M.; Thiemann, Gregory W.; Rode, Karyn D.

    2016-01-01

      Knowledge of animal diets can provide important insights into life history and ecology, relationships among species in a community and potential response to ecosystem change or perturbation. Quantitative fatty acid signature analysis (QFASA) is a method of estimating diets from data on the composition, or signature, of fatty acids stored in adipose tissue. Given data on signatures of potential prey, a predator diet is estimated by minimizing the distance between its signature and a mixture of prey signatures. Calibration coefficients, constants derived from feeding trials, are used to account for differential metabolism of individual fatty acids. QFASA has been widely applied since its introduction and several variants of the original estimator have appeared in the literature. However, work to compare the statistical properties of QFASA estimators has been limited.

  3. International spinal cord injury endocrine and metabolic extended data set

    DEFF Research Database (Denmark)

    Bauman, W A; Wecht, J M; Biering-Sørensen, F

    2017-01-01

    findings in the SCI population. SETTING: This study was conducted in an international setting. METHODS: The ISCIEMEDS was developed by a working group. The initial ISCIEMEDS was revised based on suggestions from members of the International SCI Data Sets Committee, the International Spinal Cord Society......OBJECTIVE: The objective of this study was to develop the International Spinal Cord Injury (SCI) Endocrine and Metabolic Extended Data Set (ISCIEMEDS) within the framework of the International SCI Data Sets that would facilitate consistent collection and reporting of endocrine and metabolic...... (ISCoS) Executive and Scientific Committees, American Spinal Injury Association (ASIA) Board, other interested organizations, societies and individual reviewers. The data set was posted for two months on ISCoS and ASIA websites for comments. Variable names were standardized, and a suggested database...

  4. Introductory Business Textbook Revision Cycles: Are They Getting Shorter?

    Science.gov (United States)

    Zinser, Brian; Brunswick, Gary

    2010-01-01

    The rate of textbook revision cycles is examined in light of the recent trend towards more rapid revisions (and adoptions of textbooks). The authors conduct background research to better understand the context for textbook revision cycles and the environmental forces that have been influencing what appears to be more rapid textbook revisions. A…

  5. An algorithm to discover gene signatures with predictive potential

    Directory of Open Access Journals (Sweden)

    Hallett Robin M

    2010-09-01

    Full Text Available Abstract Background The advent of global gene expression profiling has generated unprecedented insight into our molecular understanding of cancer, including breast cancer. For example, human breast cancer patients display significant diversity in terms of their survival, recurrence, metastasis as well as response to treatment. These patient outcomes can be predicted by the transcriptional programs of their individual breast tumors. Predictive gene signatures allow us to correctly classify human breast tumors into various risk groups as well as to more accurately target therapy to ensure more durable cancer treatment. Results Here we present a novel algorithm to generate gene signatures with predictive potential. The method first classifies the expression intensity for each gene as determined by global gene expression profiling as low, average or high. The matrix containing the classified data for each gene is then used to score the expression of each gene based its individual ability to predict the patient characteristic of interest. Finally, all examined genes are ranked based on their predictive ability and the most highly ranked genes are included in the master gene signature, which is then ready for use as a predictor. This method was used to accurately predict the survival outcomes in a cohort of human breast cancer patients. Conclusions We confirmed the capacity of our algorithm to generate gene signatures with bona fide predictive ability. The simplicity of our algorithm will enable biological researchers to quickly generate valuable gene signatures without specialized software or extensive bioinformatics training.

  6. Revised Rules for Concrete Bridges

    DEFF Research Database (Denmark)

    Thoft-Christensen, Palle; Jensen, F. M.; Middleton, C.

    This paper is based on research performed for the Highway Agency, London, UK under the project DPU/9/44 "Revision of Bridge Assessment Rules Based on Whole Life Performance: Concrete Bridges" It contains details of a methodology which can be used to generate Whole Life (WL) reliability profiles....... These WL reliability profiles may be used to establish revised rules for Concrete Bridges....

  7. 15 CFR 80.4 - Signature of persons unable to sign their name.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Signature of persons unable to sign... POPULATION SCHEDULES § 80.4 Signature of persons unable to sign their name. A person requesting Census information who is unable to sign his or her name shall make an “X” mark where signature is required, and the...

  8. Inferential revision in narrative texts: An ERP study.

    Science.gov (United States)

    Pérez, Ana; Cain, Kate; Castellanos, María C; Bajo, Teresa

    2015-11-01

    We evaluated the process of inferential revision during text comprehension in adults. Participants with high or low working memory read short texts, in which the introduction supported two plausible concepts (e.g., 'guitar/violin'), although one was more probable ('guitar'). There were three possible continuations: a neutral sentence, which did not refer back to either concept; a no-revise sentence, which referred to a general property consistent with either concept (e.g., '…beautiful curved body'); and a revise sentence, which referred to a property that was consistent with only the less likely concept (e.g., '…matching bow'). Readers took longer to read the sentence in the revise condition, indicating that they were able to evaluate their comprehension and detect a mismatch. In a final sentence, a target noun referred to the alternative concept supported in the revise condition (e.g., 'violin'). ERPs indicated that both working memory groups were able to evaluate their comprehension of the text (P3a), but only high working memory readers were able to revise their initial incorrect interpretation (P3b) and integrate the new information (N400) when reading the revise sentence. Low working memory readers had difficulties inhibiting the no-longer-relevant interpretation and thus failed to revise their situation model, and they experienced problems integrating semantically related information into an accurate memory representation.

  9. Programme for the Environmental Control at the Swedish Nuclear Facilities, Revision; Omgivningskontrollprogram foer de kaerntekniska anlaeggningarna, revision

    Energy Technology Data Exchange (ETDEWEB)

    Linden, Ann-Marie

    2004-12-01

    This report contains a revised version of the Environmental Monitoring Programme for the Swedish Nuclear Facilities. The revision is based on earlier experiences and evaluations. Some samples have been excluded. Some have been added, for example spruce cone and the food products apple and currant. The sediment samples of 2 cm length have been completed with samples of 10 cm length every fourth year to follow the migration of radio nuclides down the sediment layers over time. The revised Environmental Monitoring Programme is valid from the 1st of January 2005.

  10. Design of Genomic Signatures of Pathogen Identification & Characterization

    Energy Technology Data Exchange (ETDEWEB)

    Slezak, T; Gardner, S; Allen, J; Vitalis, E; Jaing, C

    2010-02-09

    This chapter will address some of the many issues associated with the identification of signatures based on genomic DNA/RNA, which can be used to identify and characterize pathogens for biodefense and microbial forensic goals. For the purposes of this chapter, we define a signature as one or more strings of contiguous genomic DNA or RNA bases that are sufficient to identify a pathogenic target of interest at the desired resolution and which could be instantiated with particular detection chemistry on a particular platform. The target may be a whole organism, an individual functional mechanism (e.g., a toxin gene), or simply a nucleic acid indicative of the organism. The desired resolution will vary with each program's goals but could easily range from family to genus to species to strain to isolate. The resolution may not be taxonomically based but rather pan-mechanistic in nature: detecting virulence or antibiotic-resistance genes shared by multiple microbes. Entire industries exist around different detection chemistries and instrument platforms for identification of pathogens, and we will only briefly mention a few of the techniques that we have used at Lawrence Livermore National Laboratory (LLNL) to support our biosecurity-related work since 2000. Most nucleic acid based detection chemistries involve the ability to isolate and amplify the signature target region(s), combined with a technique to detect the amplification. Genomic signature based identification techniques have the advantage of being precise, highly sensitive and relatively fast in comparison to biochemical typing methods and protein signatures. Classical biochemical typing methods were developed long before knowledge of DNA and resulted in dozens of tests (Gram's stain, differential growth characteristics media, etc.) that could be used to roughly characterize the major known pathogens (of course some are uncultivable). These tests could take many days to complete and precise resolution

  11. Revising Nabokov Revising”

    Directory of Open Access Journals (Sweden)

    Marie Bouchet

    2010-10-01

    Full Text Available Nabokov revised his works as he translated them and, on another plane, canon revisionism has been having its backlash and provoked other refracting waves. The purpose of the conference was to advance Nabokov studies through the discussion of how our view of Nabokov’s standing and his works today should be revised, especially after the publication of The Original of Laura. However the conference was not confined to just this theme, since “revising” is a word rich with implications. To borrow s...

  12. Influence of prosthesis design and implantation technique on implant stresses after cementless revision THR

    Directory of Open Access Journals (Sweden)

    Duda Georg N

    2011-05-01

    Full Text Available Abstract Background Femoral offset influences the forces at the hip and the implant stresses after revision THR. For extended bone defects, these forces may cause considerable bending moments within the implant, possibly leading to implant failure. This study investigates the influences of femoral anteversion and offset on stresses in the Wagner SL revision stem implant under varying extents of bone defect conditions. Methods Wagner SL revision stems with standard (34 mm and increased offset (44 mm were virtually implanted in a model femur with bone defects of variable extent (Paprosky I to IIIb. Variations in surgical technique were simulated by implanting the stems each at 4° or 14° of anteversion. Muscle and joint contact forces were applied to the reconstruction and implant stresses were determined using finite element analyses. Results Whilst increasing the implant's offset by 10 mm led to increased implant stresses (16.7% in peak tensile stresses, altering anteversion played a lesser role (5%. Generally, larger stresses were observed with reduced bone support: implant stresses increased by as much as 59% for a type IIIb defect. With increased offset, the maximum tensile stress was 225 MPa. Conclusion Although increased stresses were observed within the stem with larger offset and increased anteversion, these findings indicate that restoration of offset, key to restoring joint function, is unlikely to result in excessive implant stresses under routine activities if appropriate fixation can be achieved.

  13. Anogenital distance as a phenotypic signature through infancy

    DEFF Research Database (Denmark)

    Priskorn, Lærke; Petersen, Jørgen H; Jørgensen, Niels

    2018-01-01

    BACKGROUND: Anogenital distance (AGD) has been suggested to represent a phenotypic signature reflecting in utero androgen action. However, it is not known whether an individual's AGD at birth correlates to AGD later in life. We investigate correlations of AGD between 3 and 18 months and asses rep......-up through childhood and puberty will reveal whether AGD represents a phenotypic signature throughout life.Pediatric Research accepted article preview online, 20 November 2017. doi:10.1038/pr.2017.287....

  14. Upward revision of global fossil fuel methane emissions based on isotope database.

    Science.gov (United States)

    Schwietzke, Stefan; Sherwood, Owen A; Bruhwiler, Lori M P; Miller, John B; Etiope, Giuseppe; Dlugokencky, Edward J; Michel, Sylvia Englund; Arling, Victoria A; Vaughn, Bruce H; White, James W C; Tans, Pieter P

    2016-10-06

    Methane has the second-largest global radiative forcing impact of anthropogenic greenhouse gases after carbon dioxide, but our understanding of the global atmospheric methane budget is incomplete. The global fossil fuel industry (production and usage of natural gas, oil and coal) is thought to contribute 15 to 22 per cent of methane emissions to the total atmospheric methane budget. However, questions remain regarding methane emission trends as a result of fossil fuel industrial activity and the contribution to total methane emissions of sources from the fossil fuel industry and from natural geological seepage, which are often co-located. Here we re-evaluate the global methane budget and the contribution of the fossil fuel industry to methane emissions based on long-term global methane and methane carbon isotope records. We compile the largest isotopic methane source signature database so far, including fossil fuel, microbial and biomass-burning methane emission sources. We find that total fossil fuel methane emissions (fossil fuel industry plus natural geological seepage) are not increasing over time, but are 60 to 110 per cent greater than current estimates owing to large revisions in isotope source signatures. We show that this is consistent with the observed global latitudinal methane gradient. After accounting for natural geological methane seepage, we find that methane emissions from natural gas, oil and coal production and their usage are 20 to 60 per cent greater than inventories. Our findings imply a greater potential for the fossil fuel industry to mitigate anthropogenic climate forcing, but we also find that methane emissions from natural gas as a fraction of production have declined from approximately 8 per cent to approximately 2 per cent over the past three decades.

  15. Plasma Signatures of Radial Field Power Dropouts

    International Nuclear Information System (INIS)

    Lucek, E.A.; Horbury, T.S.; Balogh, A.; McComas, D.J.

    1998-01-01

    A class of small scale structures, with a near-radial magnetic field and a drop in magnetic field fluctuation power, have recently been identified in the polar solar wind. An earlier study of 24 events, each lasting for 6 hours or more, identified no clear plasma signature. In an extension of that work, radial intervals lasting for 4 hours or more (89 in total), have been used to search for a statistically significant plasma signature. It was found that, despite considerable variations between intervals, there was a small but significant drop, on average, in plasma temperature, density and β during these events

  16. Security problem on arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-01-01

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  17. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  18. Revision of failed shoulder hemiarthroplasty to reverse total arthroplasty: analysis of 157 revision implants.

    Science.gov (United States)

    Merolla, Giovanni; Wagner, Eric; Sperling, John W; Paladini, Paolo; Fabbri, Elisabetta; Porcellini, Giuseppe

    2018-01-01

    There remains a paucity of studies examining the conversion of failed hemiarthroplasty (HA) to reverse total shoulder arthroplasty (RTSA). Therefore, the purpose of this study was to examine a large series of revision HA to RTSA. A population of 157 patients who underwent conversion of a failed HA to a revision RTSA from 2006 through 2014 were included. The mean follow-up was 49 months (range, 24-121 months). The indications for revision surgery included instability with rotator cuff insufficiency (n = 127) and glenoid wear (n = 30); instability and glenoid wear were associated in 38 cases. Eight patients with infection underwent 2-stage reimplantation. Patients experienced significant improvements in their preoperative to postoperative pain and shoulder range of motion (P surgeries, secondary to glenoid component loosening (n = 3), instability (n = 3), humeral component disassembly (n = 2), humeral stem loosening (n = 1), and infection (n = 2). Implant survivorship was 95.5% at 2 years and 93.3% at 5 years. There were 4 reoperations including axillary nerve neurolysis (n = 2), heterotopic ossification removal (n = 1), and hardware removal for rupture of the metal cerclage for an acromial fracture (n = 1). At final follow-up, there were 5 "at-risk" glenoid components. Patients experience satisfactory pain relief and recovery of reasonable shoulder function after revision RTSA from a failed HA. There was a relatively low revision rate, with glenoid loosening and instability being the most common causes. Copyright © 2017 Journal of Shoulder and Elbow Surgery Board of Trustees. Published by Elsevier Inc. All rights reserved.

  19. Spectral decomposition of MR spectroscopy signatures with use of eigenanalysis

    International Nuclear Information System (INIS)

    Hearshen, D.O.; Windham, J.P.; Roebuck, J.R.; Helpern, J.A.

    1989-01-01

    Partial-volume contamination and overlapping resonances are common problems in whole-body MR spectroscopy and can affect absolute or relative intensity and chemical-shift measurements. One technique, based on solution of constrained eigenvalue problems, treats spectra as N-dimensional signatures and minimizes contributions of undesired signatures while maximizing contributions of desired signatures in compromised spectra. Computer simulations and both high-resolution (400-MHz) and whole-body (63.8-MHz) phantom studies tested accuracy and reproducibility of spectral decomposition. Results demonstrated excellent decomposition and good reproducibility within certain constraints. The authors conclude that eigenanalysis may improve quantitation of spectra without introducing operator bias

  20. The effects of different representations on static structure analysis of computer malware signatures.

    Science.gov (United States)

    Narayanan, Ajit; Chen, Yi; Pang, Shaoning; Tao, Ban

    2013-01-01

    The continuous growth of malware presents a problem for internet computing due to increasingly sophisticated techniques for disguising malicious code through mutation and the time required to identify signatures for use by antiviral software systems (AVS). Malware modelling has focused primarily on semantics due to the intended actions and behaviours of viral and worm code. The aim of this paper is to evaluate a static structure approach to malware modelling using the growing malware signature databases now available. We show that, if malware signatures are represented as artificial protein sequences, it is possible to apply standard sequence alignment techniques in bioinformatics to improve accuracy of distinguishing between worm and virus signatures. Moreover, aligned signature sequences can be mined through traditional data mining techniques to extract metasignatures that help to distinguish between viral and worm signatures. All bioinformatics and data mining analysis were performed on publicly available tools and Weka.

  1. Observational Signatures Of Agn Feedback Across Cosmic Time

    Science.gov (United States)

    Wylezalek, Dominika

    2017-06-01

    While many compelling models of AGN feedback exist, there is no clear data-driven picture of how winds are launched, how they propagate through the galaxy and what impact they have on the galactic gas. Recent work suggests that AGN luminosity plays an important role. The following described projects focus on understanding the power, reach and impact of feedback processes exerted by AGN of different power. I first describe recent efforts in our group of relating feedback signatures in powerful quasars to the specific star formation rate in their host galaxies, where our results are consistent with the AGN having a `negative' impact through feedback on the galaxies' star formation history. Feedback signatures seem to be best observable in gas-rich galaxies where the coupling of the AGN-driven wind to the gas is strongest, in agreement with recent simulations. But how and where does this quenching happen? Is it accomplished through the mechanical action of jets or through nuclear winds driven by radiation pressure? Finally, I show that AGN signatures and AGN-driven winds can be easily hidden and not be apparent in the integrated spectrum of a galaxy hosting a low/intermediate-luminosity AGN. Using data from the new SDSS-IV MaNGA survey, we have developed a new AGN selection algorithm tailored to IFU data and we are uncovering a much more nuanced picture of AGN activity allowing us to discover AGN signatures at large distances from the galaxy center. This implies that large IFU surveys, such as the SDSS-IV MaNGA survey, might uncover many previously unknown AGN and feedback signatures related to them. Outflows and feedback from low- and intermediate-luminosity AGN might have been underestimated in the past but can potentially significantly contribute to the AGN/host-galaxy self-regulation.

  2. Light water reactor fuel analysis code FEMAXI-7. Model and structure [Revised edition

    International Nuclear Information System (INIS)

    Suzuki, Motoe; Udagawa, Yutaka; Amaya, Masaki; Saitou, Hiroaki

    2014-03-01

    A light water reactor fuel analysis code FEMAXI-7 has been developed for the purpose of analyzing the fuel behavior in both normal conditions and anticipated transient conditions. This code is an advanced version which has been produced by incorporating the former version FEMAXI-6 with numerous functional improvements and extensions. In FEMAXI-7, many new models have been added and parameters have been clearly arranged. Also, to facilitate effective maintenance and accessibility of the code, modularization of subroutines and functions have been attained, and quality comment descriptions of variables or physical quantities have been incorporated in the source code. With these advancements, the FEMAXI-7 code has been upgraded to a versatile analytical tool for high burnup fuel behavior analyses. This report is the revised edition of the first one which describes in detail the design, basic theory and structure, models and numerical method, and improvements and extensions. The first edition, JAEA-Data/Code 2010-035, was published in 2010. The first edition was extended by orderly addition and disposition of explanations of models and organized as the revised edition after three years interval. (author)

  3. Magnetic Signature of Brushless Electric Motors

    National Research Council Canada - National Science Library

    Clarke, David

    2006-01-01

    Brushless electric motors are used in a number of underwater vehicles. When these underwater vehicles are used for mine clearance operations the magnetic signature of the brushless motors is important...

  4. Galaxy interactions : The HI signature

    NARCIS (Netherlands)

    Sancisi, R; Barnes, JE; Sanders, DB

    1999-01-01

    HI observations are an excellent tool for investigating tidal interactions. Ongoing major and minor interactions which can lead to traumatic mergers or to accretion and the triggering of star formation, show distinct HI signatures. Interactions and mergers in the recent past can also be recognized

  5. Modem Signature Analysis.

    Science.gov (United States)

    1982-10-01

    AD-A127 993 MODEM SIGNATURE ANALISIS (U) PAR TECHNOLOGY CORP NEW / HARTFORD NY V EDWARDS ET AL. OCT 82 RADC-TR-82-269 F30602-80-C-0264 NCLASSIFIED F/G...as an indication of the class clustering and separation between different classes in the modem data base. It is apparent from the projection that the...that as the clusters disperse, the likelihood of a sample crossing the boundary into an adjacent region and causing a symbol decision error increases. As

  6. Revision of the DELFIC Particle Activity Module

    Energy Technology Data Exchange (ETDEWEB)

    Hooper, David A [ORNL; Jodoin, Vincent J [ORNL

    2010-09-01

    The Defense Land Fallout Interpretive Code (DELFIC) was originally released in 1968 as a tool for modeling fallout patterns and for predicting exposure rates. Despite the continual advancement of knowledge of fission yields, decay behavior of fission products, and biological dosimetry, the decay data and logic of DELFIC have remained mostly unchanged since inception. Additionally, previous code revisions caused a loss of conservation of radioactive nuclides. In this report, a new revision of the decay database and the Particle Activity Module is introduced and explained. The database upgrades discussed are replacement of the fission yields with ENDF/B-VII data as formatted in the Oak Ridge Isotope Generation (ORIGEN) code, revised decay constants, revised exposure rate multipliers, revised decay modes and branching ratios, and revised boiling point data. Included decay logic upgrades represent a correction of a flaw in the treatment of the fission yields, extension of the logic to include more complex decay modes, conservation of nuclides (including stable nuclides) at all times, and conversion of key variables to double precision for nuclide conservation. Finally, recommended future work is discussed with an emphasis on completion of the overall radiation physics upgrade, particularly for dosimetry, induced activity, decay of the actinides, and fractionation.

  7. 48 CFR 2917.504-70 - Signature authority and internal procedures.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Signature authority and internal procedures. 2917.504-70 Section 2917.504-70 Federal Acquisition Regulations System DEPARTMENT OF... The Economy Act 2917.504-70 Signature authority and internal procedures. (a) A DOL contracting officer...

  8. Circulating neutrophil transcriptome may reveal intracranial aneurysm signature

    Science.gov (United States)

    Tutino, Vincent M.; Poppenberg, Kerry E.; Jiang, Kaiyu; Jarvis, James N.; Sun, Yijun; Sonig, Ashish; Siddiqui, Adnan H.; Snyder, Kenneth V.; Levy, Elad I.; Kolega, John

    2018-01-01

    Background Unruptured intracranial aneurysms (IAs) are typically asymptomatic and undetected except for incidental discovery on imaging. Blood-based diagnostic biomarkers could lead to improvements in IA management. This exploratory study examined circulating neutrophils to determine whether they carry RNA expression signatures of IAs. Methods Blood samples were collected from patients receiving cerebral angiography. Eleven samples were collected from patients with IAs and 11 from patients without IAs as controls. Samples from the two groups were paired based on demographics and comorbidities. RNA was extracted from isolated neutrophils and subjected to next-generation RNA sequencing to obtain differential expressions for identification of an IA-associated signature. Bioinformatics analyses, including gene set enrichment analysis and Ingenuity Pathway Analysis, were used to investigate the biological function of all differentially expressed transcripts. Results Transcriptome profiling identified 258 differentially expressed transcripts in patients with and without IAs. Expression differences were consistent with peripheral neutrophil activation. An IA-associated RNA expression signature was identified in 82 transcripts (pIAs on hierarchical clustering. Furthermore, in an independent, unpaired, replication cohort of patients with IAs (n = 5) and controls (n = 5), the 82 transcripts separated 9 of 10 patients into their respective groups. Conclusion Preliminary findings show that RNA expression from circulating neutrophils carries an IA-associated signature. These findings highlight a potential to use predictive biomarkers from peripheral blood samples to identify patients with IAs. PMID:29342213

  9. Algorithms for Hyperspectral Endmember Extraction and Signature Classification with Morphological Dendritic Networks

    Science.gov (United States)

    Schmalz, M.; Ritter, G.

    Accurate multispectral or hyperspectral signature classification is key to the nonimaging detection and recognition of space objects. Additionally, signature classification accuracy depends on accurate spectral endmember determination [1]. Previous approaches to endmember computation and signature classification were based on linear operators or neural networks (NNs) expressed in terms of the algebra (R, +, x) [1,2]. Unfortunately, class separation in these methods tends to be suboptimal, and the number of signatures that can be accurately classified often depends linearly on the number of NN inputs. This can lead to poor endmember distinction, as well as potentially significant classification errors in the presence of noise or densely interleaved signatures. In contrast to traditional CNNs, autoassociative morphological memories (AMM) are a construct similar to Hopfield autoassociatived memories defined on the (R, +, ?,?) lattice algebra [3]. Unlimited storage and perfect recall of noiseless real valued patterns has been proven for AMMs [4]. However, AMMs suffer from sensitivity to specific noise models, that can be characterized as erosive and dilative noise. On the other hand, the prior definition of a set of endmembers corresponds to material spectra lying on vertices of the minimum convex region covering the image data. These vertices can be characterized as morphologically independent patterns. It has further been shown that AMMs can be based on dendritic computation [3,6]. These techniques yield improved accuracy and class segmentation/separation ability in the presence of highly interleaved signature data. In this paper, we present a procedure for endmember determination based on AMM noise sensitivity, which employs morphological dendritic computation. We show that detected endmembers can be exploited by AMM based classification techniques, to achieve accurate signature classification in the presence of noise, closely spaced or interleaved signatures, and

  10. Integrating Relational Reasoning and Knowledge Revision during Reading

    Science.gov (United States)

    Kendeou, Panayiota; Butterfuss, Reese; Van Boekel, Martin; O'Brien, Edward J.

    2017-01-01

    Our goal in this theoretical contribution is to connect research on knowledge revision and relational reasoning. To achieve this goal, first, we review the "knowledge revision components framework" (KReC) that provides an account of knowledge revision processes, specifically as they unfold during reading of texts. Second, we review a…

  11. Infrared signature modelling of a rocket jet plume - comparison with flight measurements

    International Nuclear Information System (INIS)

    Rialland, V; Perez, P; Roblin, A; Guy, A; Gueyffier, D; Smithson, T

    2016-01-01

    The infrared signature modelling of rocket plumes is a challenging problem involving rocket geometry, propellant composition, combustion modelling, trajectory calculations, fluid mechanics, atmosphere modelling, calculation of gas and particles radiative properties and of radiative transfer through the atmosphere. This paper presents ONERA simulation tools chained together to achieve infrared signature prediction, and the comparison of the estimated and measured signatures of an in-flight rocket plume. We consider the case of a solid rocket motor with aluminized propellant, the Black Brant sounding rocket. The calculation case reproduces the conditions of an experimental rocket launch, performed at White Sands in 1997, for which we obtained high quality infrared signature data sets from DRDC Valcartier. The jet plume is calculated using an in-house CFD software called CEDRE. The plume infrared signature is then computed on the spectral interval 1900-5000 cm -1 with a step of 5 cm -1 . The models and their hypotheses are presented and discussed. Then the resulting plume properties, radiance and spectra are detailed. Finally, the estimated infrared signature is compared with the spectral imaging measurements. The discrepancies are analyzed and discussed. (paper)

  12. Twisted Bilayer Graphene. Interlayer configuration and magnetotransport signatures

    Energy Technology Data Exchange (ETDEWEB)

    Rode, Johannes C.; Smirnov, Dmitri; Belke, Christopher; Schmidt, Hennrik; Haug, Rolf J. [Institut fuer Festkoerperphysik, Hannover (Germany)

    2017-11-15

    Twisted Bilayer Graphene may be viewed as very first representative of the now booming class of artificially layered 2D materials. Consisting of two sheets from the same structure and atomic composition, its decisive degree of freedom lies in the rotation between crystallographic axes in the individual graphene monolayers. Geometrical consideration finds angle-dependent Moire patterns as well as commensurate superlattices of opposite sublattice exchange symmetry. Beyond the approach of rigidly interposed lattices, this review takes focus on the evolving topic of lattice corrugation and distortion in response to spatially varying lattice registry. The experimental approach to twisted bilayers requires a basic control over preparation techniques; important methods are summarized and extended on in the case of bilayers folded from monolayer graphene via AFM nanomachining. Central morphological parameters to the twisted bilayer, rotational mismatch and interlayer separation are studied in a broader base of samples. Finally, experimental evidence for a number of theoretically predicted, controversial electronic scenarios are reviewed; magnetotransport signatures are discussed in terms of Fermi velocity, van Hove singularities and Berry phase and assessed with respect to the underlying experimental conditions, thereby referring back to the initially considered variations in relaxed lattice structure. (copyright 2017 by WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  13. A Rational Threshold Signature Model and Protocol Based on Different Permissions

    Directory of Open Access Journals (Sweden)

    Bojun Wang

    2014-01-01

    Full Text Available This paper develops a novel model and protocol used in some specific scenarios, in which the participants of multiple groups with different permissions can finish the signature together. We apply the secret sharing scheme based on difference equation to the private key distribution phase and secret reconstruction phrase of our threshold signature scheme. In addition, our scheme can achieve the signature success because of the punishment strategy of the repeated rational secret sharing. Besides, the bit commitment and verification method used to detect players’ cheating behavior acts as a contributing factor to prevent the internal fraud. Using bit commitments, verifiable parameters, and time sequences, this paper constructs a dynamic game model, which has the features of threshold signature management with different permissions, cheat proof, and forward security.

  14. Field Education as the Signature Pedagogy of Social Work Education

    Science.gov (United States)

    Wayne, Julianne; Bogo, Marion; Raskin, Miriam

    2010-01-01

    In its EPAS, CSWE (2008) identifies field education as the signature pedagogy (Shulman, 2005b) of social work education. This article analyzes the field education-signature pedagogy fit. It finds congruence in selected organizational arrangements that are pervasive and routine, and disparities with respect to expectations about public student…

  15. New particles and their experimental signatures

    International Nuclear Information System (INIS)

    Ellis, J.; Gelmini, G.; Kowalski, H.

    1984-08-01

    This report summarizes work done by our theoretical working group on exotic particles before, during and since the Lausanne meeting. We discuss the motivations, rates and experimental signatures for new physics and new particles in the 1 TeV mass range. Section 2 reviews some of the motivations for expecting new physics in this range. Of particular interest is the physics of gauge symmetry breaking. In section 3 we discuss the rates and experimental signatures of new particles predicted by theoretical models of gauge symmetry breaking, notably the Higgs boson supersymmetry and technicolour. Among the signatures we discuss are multiple Wsup(+-) and/or Z 0 events (for the Higgs), missing transverse energy (for supersymmetry) and multiple anti tt events (for the Higgs and technicolour). We provide many examples of final state differential distributions in rapidity and Psub(T), particularly for Higgses and for supersymmetry. We also analyse some physics backgrounds to the new particle production processes which interest us. Examples include W + W - , Z 0 Z 0 , W(anti tt) and (anti tt) production as backgrounds to Higgs production. However, we do not consider in detail non-physics backgrounds such as the jet fluctuation background to missing energy signals for supersymmetry production. Section 4 summarizes our preliminary conclusions on the observability at a high energy hadron collider of the new particles studied in this report. (orig./HSI)

  16. EPRI BWR Water Chemistry Guidelines Revision

    International Nuclear Information System (INIS)

    Garcia, Susan E.; Giannelli, Joseph F.

    2014-01-01

    BWRVIP-190: BWR Water Chemistry Guidelines – 2008 Revision has been revised. The revision committee consisted of U.S. and non-U.S. utilities (members of the BWR Vessel and Internals Protection (BWRVIP) Mitigation Committee), reactor system manufacturers, fuel suppliers, and EPRI and industry experts. The revised document, BWRVIP-190 Revision 1, was completely reformatted into two volumes, with a simplified presentation of water chemistry control, diagnostic and good practice parameters in Volume 1 and the technical bases in Volume 2, to facilitate use. The revision was developed in parallel and in coordination with preparation of the Fuel Reliability Guidelines Revision 1: BWR Fuel Cladding Crud and Corrosion. Guidance is included for plants operating under normal water chemistry (NWC), moderate hydrogen water chemistry (HWC-M), and noble metal application (GE-Hitachi NobleChem™) plus hydrogen injection. Volume 1 includes significant changes to BWR feedwater and reactor water chemistry control parameters to provide increased assurance of intergranular stress corrosion cracking (IGSCC) mitigation of reactor materials and fuel reliability during all plant conditions, including cold shutdown (≤200°F (93°C)), startup/hot standby (>200°F (93°C) and ≤ 10%) and power operation (>10% power). Action Level values for chloride and sulfate have been tightened to minimize environmentally assisted cracking (EAC) of all wetted surfaces, including those not protected by hydrogen injection, with or without noble metals. Chemistry control guidance has been enhanced to minimize shutdown radiation fields by clarifying targets for depleted zinc oxide (DZO) injection while meeting requirements for fuel reliability. Improved tabular presentations of parameter values explicitly indicate levels at which actions are to be taken and required sampling frequencies. Volume 2 provides the technical bases for BWR water chemistry control for control of EAC, flow accelerated corrosion

  17. A prospective blood RNA signature for tuberculosis disease risk

    Science.gov (United States)

    Zak, Daniel E.; Penn-Nicholson, Adam; Scriba, Thomas J.; Thompson, Ethan; Suliman, Sara; Amon, Lynn M.; Mahomed, Hassan; Erasmus, Mzwandile; Whatney, Wendy; Hussey, Gregory D.; Abrahams, Deborah; Kafaar, Fazlin; Hawkridge, Tony; Verver, Suzanne; Hughes, E. Jane; Ota, Martin; Sutherland, Jayne; Howe, Rawleigh; Dockrell, Hazel M.; Boom, W. Henry; Thiel, Bonnie; Ottenhoff, Tom H.M.; Mayanja-Kizza, Harriet; Crampin, Amelia C; Downing, Katrina; Hatherill, Mark; Valvo, Joe; Shankar, Smitha; Parida, Shreemanta K; Kaufmann, Stefan H.E.; Walzl, Gerhard; Aderem, Alan; Hanekom, Willem A.

    2016-01-01

    Background Identification of blood biomarkers that prospectively predict progression of Mycobacterium tuberculosis infection to tuberculosis disease may lead to interventions that impact the epidemic. Methods Healthy, M. tuberculosis infected South African adolescents were followed for 2 years; blood was collected every 6 months. A prospective signature of risk was derived from whole blood RNA-Sequencing data by comparing participants who ultimately developed active tuberculosis disease (progressors) with those who remained healthy (matched controls). After adaptation to multiplex qRT-PCR, the signature was used to predict tuberculosis disease in untouched adolescent samples and in samples from independent cohorts of South African and Gambian adult progressors and controls. The latter participants were household contacts of adults with active pulmonary tuberculosis disease. Findings Of 6,363 adolescents screened, 46 progressors and 107 matched controls were identified. A 16 gene signature of risk was identified. The signature predicted tuberculosis progression with a sensitivity of 66·1% (95% confidence interval, 63·2–68·9) and a specificity of 80·6% (79·2–82·0) in the 12 months preceding tuberculosis diagnosis. The risk signature was validated in an untouched group of adolescents (p=0·018 for RNA-Seq and p=0·0095 for qRT-PCR) and in the independent South African and Gambian cohorts (p values Bill and Melinda Gates Foundation, the National Institutes of Health, Aeras, the European Union and the South African Medical Research Council (detail at end of text). PMID:27017310

  18. 40 CFR 60.4124 - Hg budget permit revisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 6 2010-07-01 2010-07-01 false Hg budget permit revisions. 60.4124... Coal-Fired Electric Steam Generating Units Permits § 60.4124 Hg budget permit revisions. Except as provided in § 60.4123(b), the permitting authority will revise the Hg Budget permit, as necessary, in...

  19. Thermal imaging comparison of Signature, Infiniti, and Stellaris phacoemulsification systems.

    Science.gov (United States)

    Ryoo, Na Kyung; Kwon, Ji-Won; Wee, Won Ryang; Miller, Kevin M; Han, Young Keun

    2013-10-12

    To compare the heat production of 3 different phacoemulsification machines under strict laboratory test conditions. More specifically, the thermal behavior was analyzed between the torsional modality of the Infiniti system and longitudinal modalities of the Abbot WhiteStar Signature Phacoemulsification system and Bausch and Lomb Stellaris system. Experiments were performed under in-vitro conditions in this study.Three phacoemulsification handpieces (Infiniti, Signature, and Stellaris) were inserted into balanced salt solution-filled silicone test chambers and were imaged side-by-side by using a thermal camera. Incision compression was simulated by suspending 30.66-gram weights from the silicone chambers. The irrigation flow rate was set at 0, 1, 2, 3, 4, and 5 cc/min and the phacoemulsification power on the instrument consoles was set at 40, 60, 80, and 100%. The highest temperatures generated from each handpiece around the point of compression were measured at 0, 10, 30, and 60 seconds. Under the same displayed phacoemulsification power settings, the peak temperatures measured when using the Infiniti were lower than when using the other two machines, and the Signature was cooler than the Stellaris. At 10 seconds, torsional phacoemulsification with Infiniti at 100% power showed data comparable to that of the Signature at 80% and the Stellaris at 60%. At 30 seconds, the temperature from the Infiniti at 100% power was lower than the Signature at 60% and the Stellaris at 40%. Torsional phacoemulsification with the Infiniti generates less heat than longitudinal phacoemulsification with the Signature and the Stellaris. Lower operating temperatures indicate lower heat generation within the same fluid volume, which may provide additional thermal protection during cataract surgery.

  20. The dependence of cusp ion signatures on the reconnection rate

    Directory of Open Access Journals (Sweden)

    S. K. Morley

    2003-04-01

    Full Text Available The interpretation of structure in cusp ion dispersions is important for helping to understand the temporal and spatial structure of magnetopause reconnection. "Stepped" and "sawtooth" signatures have been shown to be caused by temporal variations in the reconnection rate under the same physical conditions for different satellite trajectories. The present paper shows that even for a single satellite path, a change in the amplitude of any reconnection pulses can alter the observed signature and even turn sawtooth into stepped forms and vice versa. On 20 August 1998, the Defense Meteorological Satellite Program (DMSP craft F-14 crossed the cusp just to the south of Longyearbyen, returning on the following orbit. The two passes by the DMSP F-14 satellites have very similar trajectories and the open-closed field line boundary (OCB crossings, as estimated from the SSJ/4 precipitating particle data and Polar UVI images, imply a similarly-shaped polar cap, yet the cusp ion dispersion signatures differ substantially. The cusp crossing at 08:54 UT displays a stepped ion dispersion previously considered to be typical of a meridional pass, whereas the crossing at 10:38 UT is a sawtooth form ion dispersion, previously considered typical of a satellite travelling longitudinally with respect to the OCB. It is shown that this change in dispersed ion signature is likely to be due to a change in the amplitude of the pulses in the reconnection rate, causing the stepped signature. Modelling of the low-energy ion cutoff under different conditions has reproduced the forms of signature observed.Key words. Ionosphere (particle precipitation Magnetospheric physics (energetic particles, precipitating, magnetopause, cusp and boundary layers

  1. Quark-gluon plasma: experimental signatures

    International Nuclear Information System (INIS)

    Drapier, O.

    1995-01-01

    The existence of a deconfining phase transition of nuclear matter is a clear prediction of lattice quantum chromodynamics calculations. The signatures of this quark-gluon plasma (QGP) have been searched for, since the first high energy ion beams became available at BNL and CERN in 1986, and gold and lead beams are now accelerated at 11 and 160 GeV per nucleon by the AGS and SPS. An overview of the main signatures expected in case of QGP formation is presented here. Although some recent results have been found in agreement with the predictions of the QGP scenario, no clear evidence for its formation has been observed at present. Nevertheless, new high statistics results are expected from CERN lead beams. In addition, future experiments are being prepared at RHIC and LHCC, providing an increase by two orders of magnitude of the c.m.s. energy within a few years. (author). 66 refs., 28 figs

  2. 76 FR 62000 - Express Mail Domestic Postage Refund Policy and Waiver of Signature

    Science.gov (United States)

    2011-10-06

    ... POSTAL SERVICE 39 CFR Part 111 Express Mail Domestic Postage Refund Policy and Waiver of Signature... days to 30 days after the date of mailing, and to change the Express Mail ``waiver of signature'' standard for domestic items by obtaining an addressee's signature only when the mailer selects the...

  3. Characterizing Resident Space Object Earthshine Signature Variability

    Science.gov (United States)

    Van Cor, Jared D.

    There are three major sources of illumination on objects in the near Earth space environment: Sunshine, Moonshine, and Earthshine. For objects in this environment (satellites, orbital debris, etc.) known as Resident Space Objects (RSOs), the sun and the moon have consistently small illuminating solid angles and can be treated as point sources; this makes their incident illumination easily modeled. The Earth on the other hand has a large illuminating solid angle, is heterogeneous, and is in a constant state of change. The objective of this thesis was to characterize the impact and variability of observed RSO Earthshine on apparent magnitude signatures in the visible optical spectral region. A key component of this research was creating Earth object models incorporating the reflectance properties of the Earth. Two Earth objects were created: a homogeneous diffuse Earth object and a time sensitive heterogeneous Earth object. The homogeneous diffuse Earth object has a reflectance equal to the average global albedo, a standard model used when modeling Earthshine. The time sensitive heterogeneous Earth object was created with two material maps representative of the dynamic reflectance of the surface of the earth, and a shell representative of the atmosphere. NASA's Moderate-resolution Imaging Spectroradiometer (MODIS) Earth observing satellite product libraries, MCD43C1 global surface BRDF map and MOD06 global fractional cloud map, were utilized to create the material maps, and a hybridized version of the Empirical Line Method (ELM) was used to create the atmosphere. This dynamic Earth object was validated by comparing simulated color imagery of the Earth to that taken by: NASAs Earth Polychromatic Imaging Camera (EPIC) located on the Deep Space Climate Observatory (DSCOVR), and by MODIS located on the Terra satellite. The time sensitive heterogeneous Earth object deviated from MODIS imagery by a spectral radiance root mean square error (RMSE) of +/-14.86 [watts/m. 2sr

  4. A Weak Quantum Blind Signature with Entanglement Permutation

    Science.gov (United States)

    Lou, Xiaoping; Chen, Zhigang; Guo, Ying

    2015-09-01

    Motivated by the permutation encryption algorithm, a weak quantum blind signature (QBS) scheme is proposed. It involves three participants, including the sender Alice, the signatory Bob and the trusted entity Charlie, in four phases, i.e., initializing phase, blinding phase, signing phase and verifying phase. In a small-scale quantum computation network, Alice blinds the message based on a quantum entanglement permutation encryption algorithm that embraces the chaotic position string. Bob signs the blinded message with private parameters shared beforehand while Charlie verifies the signature's validity and recovers the original message. Analysis shows that the proposed scheme achieves the secure blindness for the signer and traceability for the message owner with the aid of the authentic arbitrator who plays a crucial role when a dispute arises. In addition, the signature can neither be forged nor disavowed by the malicious attackers. It has a wide application to E-voting and E-payment system, etc.

  5. Oxygen isotopic signature of CO2 from combustion processes

    Directory of Open Access Journals (Sweden)

    W. A. Brand

    2011-02-01

    Full Text Available For a comprehensive understanding of the global carbon cycle precise knowledge of all processes is necessary. Stable isotope (13C and 18O abundances provide information for the qualification and the quantification of the diverse source and sink processes. This study focuses on the δ18O signature of CO2 from combustion processes, which are widely present both naturally (wild fires, and human induced (fossil fuel combustion, biomass burning in the carbon cycle. All these combustion processes use atmospheric oxygen, of which the isotopic signature is assumed to be constant with time throughout the whole atmosphere. The combustion is generally presumed to take place at high temperatures, thus minimizing isotopic fractionation. Therefore it is generally supposed that the 18O signature of the produced CO2 is equal to that of the atmospheric oxygen. This study, however, reveals that the situation is much more complicated and that important fractionation effects do occur. From laboratory studies fractionation effects on the order of up to 26%permil; became obvious in the derived CO2 from combustion of different kinds of material, a clear differentiation of about 7‰ was also found in car exhausts which were sampled directly under ambient atmospheric conditions. We investigated a wide range of materials (both different raw materials and similar materials with different inherent 18O signature, sample geometries (e.g. texture and surface-volume ratios and combustion circumstances. We found that the main factor influencing the specific isotopic signatures of the combustion-derived CO2 and of the concomitantly released oxygen-containing side products, is the case-specific rate of combustion. This points firmly into the direction of (diffusive transport of oxygen to the reaction zone as the cause of the isotope fractionation. The original total 18O signature of the material appeared to have little influence, however, a contribution of specific bio

  6. Electronic signatures and their specificity in national and European regulations

    Directory of Open Access Journals (Sweden)

    R. MATEFI

    2017-07-01

    Full Text Available The paper aims to emphasize the particularities of the electronic signature by reference to the national as well as to the European legislation, trying to point out its utility in the business environment as well as the controversies in this matter. The starting point of this analysis was the Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures, which establishes the legal framework for electronic signatures and the recognition of certification-service providers. Its main aim was to ease its use and help it become legally recognized within all EU countries.

  7. A secure quantum group signature scheme based on Bell states

    International Nuclear Information System (INIS)

    Zhang Kejia; Song Tingting; Zuo Huijuan; Zhang Weiwei

    2013-01-01

    In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared with the recent quantum group signature protocols, our scheme is focused on the most general situation in practice, i.e. only the arbitrator is trusted and no intermediate information needs to be stored in the signing phase to ensure the security. Furthermore, our scheme has achieved all the characteristics of group signature—anonymity, verifiability, traceability, unforgetability and undeniability, by using some current developed quantum and classical technologies. Finally, a feasible security analysis model for quantum group signature is presented. (paper)

  8. Solar wind ion trends and signatures: STEREO PLASTIC observations approaching solar minimum

    Directory of Open Access Journals (Sweden)

    A. B. Galvin

    2009-10-01

    Full Text Available STEREO has now completed the first two years of its mission, moving from close proximity to Earth in 2006/2007 to more than 50 degrees longitudinal separation from Earth in 2009. During this time, several large-scale structures have been observed in situ. Given the prevailing solar minimum conditions, these structures have been predominantly coronal hole-associated solar wind, slow solar wind, their interfaces, and the occasional transient event. In this paper, we extend earlier solar wind composition studies into the current solar minimum using high-resolution (1-h sampling times for the charge state analysis. We examine 2-year trends for iron charge states and solar wind proton speeds, and present a case study of Carrington Rotation 2064 (December 2007 which includes minor ion (He, Fe, O kinetic and Fe composition parameters in comparison with proton and magnetic field signatures at large-scale structures observed during this interval.

  9. Enhanced vibration diagnostics using vibration signature analysis

    International Nuclear Information System (INIS)

    Ahmed, S.; Shehzad, K.; Zahoor, Y.; Mahmood, A.; Bibi, A.

    2001-01-01

    Symptoms will appear in equipment, as well as in human beings. when 'suffering from sickness. Symptoms of abnormality in equipment are vibration, noise, deformation, temperature, pressure, electric current, crack, wearing, leakage etc. these are called modes of failure. If the mode of failure is vibration then the vibration signature analysis can be effectively used in order to diagnose the machinery problems. Much valuable information is contained within these vibration 'Spectra' or 'Signatures' but is only of use if the analyst can unlock its 'Secrets'. This paper documents a vibration problem in the motor of a centrifugal pump (Type ETA). It focuses mainly on the roll of modern vibration monitoring system in problem analysis. The problem experienced was the motor unstability and noise due to high vibration. Using enhanced vibration signature data, the problem was analyzed. which suggested that the rotor eccentricity was the cause of excessive noise and vibration in the motor. In conclusion, advanced electronic monitoring and diagnostic systems provide powerful information for machine's condition assessment and problem analysis. Appropriate interpretation and use of this information is important for accurate and effective vibration analysis. (author)

  10. Subsurface signatures and timing of extreme wave events along the ...

    Indian Academy of Sciences (India)

    The diagnostic event signatures include the extent and elevation of the deposits, as well as morphologic similarity ... Historical archives of the origin, timing, and impact of tsunamis, storms, and floods along the mar- gins of ... High-resolution GPR studies (by the IIT Madras group) of erosional signatures from the beach ridge.

  11. Doppler Velocity Signatures of Idealized Elliptical Vortices

    Directory of Open Access Journals (Sweden)

    Wen-Chau Lee

    2006-01-01

    Full Text Available Doppler radar observations have revealed a class of atmospheric vortices (tropical cyclones, tornadoes, dust devils that possess elliptical radar reflectivity signatures. One famous example is Typhoon Herb (1996 that maintained its elliptical reflectivity structure over a 40-hour period. Theoretical work and dual-Doppler analyses of observed tropical cyclones have suggested two physical mechanisms that can explain the formation of two types of elliptical vortices observed in nature, namely, the combination of a circular vortex with either a wavenumber two vortex Rossby wave or a deformation field. The characteristics of these two types of elliptical vortices and their corresponding Doppler velocity signatures have not been previously examined.

  12. Transient thermal camouflage and heat signature control

    Science.gov (United States)

    Yang, Tian-Zhi; Su, Yishu; Xu, Weikai; Yang, Xiao-Dong

    2016-09-01

    Thermal metamaterials have been proposed to manipulate heat flux as a new way to cloak or camouflage objects in the infrared world. To date, however, thermal metamaterials only operate in the steady-state and exhibit detectable, transient heat signatures. In this letter, the theoretical basis for a thermal camouflaging technique with controlled transient diffusion is presented. This technique renders an object invisible in real time. More importantly, the thermal camouflaging device instantaneously generates a pre-designed heat signature and behaves as a perfect thermal illusion device. A metamaterial coating with homogeneous and isotropic thermal conductivity, density, and volumetric heat capacity was fabricated and very good camouflaging performance was achieved.

  13. Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems

    Directory of Open Access Journals (Sweden)

    George S. Eskander Ekladious

    2017-11-01

    Full Text Available Biometric traits, such as fingerprints, faces and signatures have been employed in bio-cryptosystems to secure cryptographic keys within digital security schemes. Reliable implementations of these systems employ error correction codes formulated as simple distance thresholds, although they may not effectively model the complex variability of behavioral biometrics like signatures. In this paper, a Global-Local Distance Metric (GLDM framework is proposed to learn cost-effective distance metrics, which reduce within-class variability and augment between-class variability, so that simple error correction thresholds of bio-cryptosystems provide high classification accuracy. First, a large number of samples from a development dataset are used to train a global distance metric that differentiates within-class from between-class samples of the population. Then, once user-specific samples are available for enrollment, the global metric is tuned to a local user-specific one. Proof-of-concept experiments on two reference offline signature databases confirm the viability of the proposed approach. Distance metrics are produced based on concise signature representations consisting of about 20 features and a single prototype. A signature-based bio-cryptosystem is designed using the produced metrics and has shown average classification error rates of about 7% and 17% for the PUCPR and the GPDS-300 databases, respectively. This level of performance is comparable to that obtained with complex state-of-the-art classifiers.

  14. A high-throughput pipeline for the design of real-time PCR signatures

    Directory of Open Access Journals (Sweden)

    Reifman Jaques

    2010-06-01

    Full Text Available Abstract Background Pathogen diagnostic assays based on polymerase chain reaction (PCR technology provide high sensitivity and specificity. However, the design of these diagnostic assays is computationally intensive, requiring high-throughput methods to identify unique PCR signatures in the presence of an ever increasing availability of sequenced genomes. Results We present the Tool for PCR Signature Identification (TOPSI, a high-performance computing pipeline for the design of PCR-based pathogen diagnostic assays. The TOPSI pipeline efficiently designs PCR signatures common to multiple bacterial genomes by obtaining the shared regions through pairwise alignments between the input genomes. TOPSI successfully designed PCR signatures common to 18 Staphylococcus aureus genomes in less than 14 hours using 98 cores on a high-performance computing system. Conclusions TOPSI is a computationally efficient, fully integrated tool for high-throughput design of PCR signatures common to multiple bacterial genomes. TOPSI is freely available for download at http://www.bhsai.org/downloads/topsi.tar.gz.

  15. Supernova signatures of neutrino mass ordering

    Science.gov (United States)

    Scholberg, Kate

    2018-01-01

    A suite of detectors around the world is poised to measure the flavor-energy-time evolution of the ten-second burst of neutrinos from a core-collapse supernova occurring in the Milky Way or nearby. Next-generation detectors to be built in the next decade will have enhanced flavor sensitivity and statistics. Not only will the observation of this burst allow us to peer inside the dense matter of the extreme event and learn about the collapse processes and the birth of the remnant, but the neutrinos will bring information about neutrino properties themselves. This review surveys some of the physical signatures that the currently-unknown neutrino mass pattern will imprint on the observed neutrino events at Earth, emphasizing the most robust and least model-dependent signatures of mass ordering.

  16. Online Signature Verification using Recurrent Neural Network and Length-normalized Path Signature

    OpenAIRE

    Lai, Songxuan; Jin, Lianwen; Yang, Weixin

    2017-01-01

    Inspired by the great success of recurrent neural networks (RNNs) in sequential modeling, we introduce a novel RNN system to improve the performance of online signature verification. The training objective is to directly minimize intra-class variations and to push the distances between skilled forgeries and genuine samples above a given threshold. By back-propagating the training signals, our RNN network produced discriminative features with desired metrics. Additionally, we propose a novel d...

  17. Quantum Digital Signatures for Unconditional Safe Authenticity Protection of Medical Documentation

    Directory of Open Access Journals (Sweden)

    Arkadiusz Liber

    2015-12-01

    Full Text Available Modern medical documentation appears most often in an online form which requires some digital methods to ensure its confidentiality, integrity and authenticity. The document authenticity may be secured with the use of a signature. A classical handwritten signature is directly related to its owner by his/her psychomotor character traits. Such a signature is also connected with the material it is written on, and a writing tool. Because of these properties, a handwritten signature reflects certain close material bonds between the owner and the document. In case of modern digital signatures, the document authentication has a mathematical nature. The verification of the authenticity becomes the verification of a key instead of a human. Since 1994 it has been known that classical digital signature algorithms may not be safe because of the Shor’s factorization algorithm. To implement the modern authenticity protection of medical data, some new types of algorithms should be used. One of the groups of such algorithms is based on the quantum computations. In this paper, the analysis of the current knowledge status of Quantum Digital Signature protocols, with its basic principles, phases and common elements such as transmission, comparison and encryption, was outlined. Some of the most promising protocols for signing digital medical documentation, that fulfill the requirements for QDS, were also briefly described. We showed that, a QDS protocol with QKD components requires the equipment similar to the equipment used for a QKD, for its implementation, which is already commercially available. If it is properly implemented, it provides the shortest lifetime of qubits in comparison to other protocols. It can be used not only to sign classical messages but probably it could be well adopted to implement unconditionally safe protection of medical documentation in the nearest future, as well.

  18. Infrared signatures for remote sensing

    International Nuclear Information System (INIS)

    McDowell, R.S.; Sharpe, S.W.; Kelly, J.F.

    1994-04-01

    PNL's capabilities for infrared and near-infrared spectroscopy include tunable-diode-laser (TDL) systems covering 300--3,000 cm -1 at 2 laser. PNL also has a beam expansion source with a 12-cm slit, which provides a 3-m effective path for gases at ∼10 K, giving a Doppler width of typically 10 MHz; and long-path static gas cells (to 100 m). In applying this equipment to signatures work, the authors emphasize the importance of high spectral resolution for detecting and identifying atmospheric interferences; for identifying the optimum analytical frequencies; for deriving, by spectroscopic analysis, the molecular parameters needed for modeling; and for obtaining data on species and/or bands that are not in existing databases. As an example of such spectroscopy, the authors have assigned and analyzed the C-Cl stretching region of CCl 4 at 770--800 cm -1 . This is an important potential signature species whose IR absorption has remained puzzling because of the natural isotopic mix, extensive hot-band structure, and a Fermi resonance involving a nearby combination band. Instrument development projects include the IR sniffer, a small high-sensitivity, high-discrimination (Doppler-limited) device for fence-line or downwind monitoring that is effective even in regions of atmospheric absorption; preliminary work has achieved sensitivities at the low-ppb level. Other work covers trace species detection with TDLs, and FM-modulated CO 2 laser LIDAR. The authors are planning a field experiment to interrogate the Hanford tank farm for signature species from Rattlesnake Mountain, a standoff of ca. 15 km, to be accompanied by simultaneous ground-truthing at the tanks

  19. Should fatty acid signature proportions sum to 1 for diet estimation?

    Science.gov (United States)

    Bromaghin, Jeffrey F.; Budge, Suzanne M.; Thiemann, Gregory W.

    2016-01-01

    Knowledge of predator diets, including how diets might change through time or differ among predators, provides essential insights into their ecology. Diet estimation therefore remains an active area of research within quantitative ecology. Quantitative fatty acid signature analysis (QFASA) is an increasingly common method of diet estimation. QFASA is based on a data library of prey signatures, which are vectors of proportions summarizing the fatty acid composition of lipids, and diet is estimated as the mixture of prey signatures that most closely approximates a predator’s signature. Diets are typically estimated using proportions from a subset of all fatty acids that are known to be solely or largely influenced by diet. Given the subset of fatty acids selected, the current practice is to scale their proportions to sum to 1.0. However, scaling signature proportions has the potential to distort the structural relationships within a prey library and between predators and prey. To investigate that possibility, we compared the practice of scaling proportions with two alternatives and found that the traditional scaling can meaningfully bias diet estimators under some conditions. Two aspects of the prey types that contributed to a predator’s diet influenced the magnitude of the bias: the degree to which the sums of unscaled proportions differed among prey types and the identifiability of prey types within the prey library. We caution investigators against the routine scaling of signature proportions in QFASA.

  20. 31 CFR 370.38 - What is the legal effect of an electronic signature?

    Science.gov (United States)

    2010-07-01

    ... electronic signature? 370.38 Section 370.38 Money and Finance: Treasury Regulations Relating to Money and... Requests Through the Bureau of the Public Debt § 370.38 What is the legal effect of an electronic signature? An electronic signature and any electronic message to which it is affixed or attached may not be...

  1. Electronic Signatures in Global and National Commerce Act. Public Law.

    Science.gov (United States)

    Congress of the U.S., Washington, DC.

    This document presents the text of Public Law 106-229, the "Electronic Signatures in Global and National Commerce Act." The act states that, with respect to any transaction in or affecting interstate or foreign commerce: a signature, contract, or other record relating to such transaction may not be denied legal effect, validity, or…

  2. Space Object Radiometric Modeling for Hardbody Optical Signature Database Generation

    Science.gov (United States)

    2009-09-01

    Introduction This presentation summarizes recent activity in monitoring spacecraft health status using passive remote optical nonimaging ...Approved for public release; distribution is unlimited. Space Object Radiometric Modeling for Hardbody Optical Signature Database Generation...It is beneficial to the observer/analyst to understand the fundamental optical signature variability associated with these detection and

  3. A taxonomic revision of the genus Podocarpus

    OpenAIRE

    Laubenfels, de, D.J.

    1985-01-01

    In connection with the forthcoming revision of the Coniferae for the Flora Malesiana, the author thought it necessary to revise the genus Podocarpus. Although this genus has a substantial representation in Malesia (30 species), the revision is too involved to be appropriate with the Flora Malesiana per se. One new subgenus and 17 new sections are described, and 94 species are enumerated, of which 11 species and 1 variety are described as new, and 3 varieties have been raised to specific rank....

  4. Source signature estimation from multimode surface waves via mode-separated virtual real source method

    Science.gov (United States)

    Gao, Lingli; Pan, Yudi

    2018-05-01

    The correct estimation of the seismic source signature is crucial to exploration geophysics. Based on seismic interferometry, the virtual real source (VRS) method provides a model-independent way for source signature estimation. However, when encountering multimode surface waves, which are commonly seen in the shallow seismic survey, strong spurious events appear in seismic interferometric results. These spurious events introduce errors in the virtual-source recordings and reduce the accuracy of the source signature estimated by the VRS method. In order to estimate a correct source signature from multimode surface waves, we propose a mode-separated VRS method. In this method, multimode surface waves are mode separated before seismic interferometry. Virtual-source recordings are then obtained by applying seismic interferometry to each mode individually. Therefore, artefacts caused by cross-mode correlation are excluded in the virtual-source recordings and the estimated source signatures. A synthetic example showed that a correct source signature can be estimated with the proposed method, while strong spurious oscillation occurs in the estimated source signature if we do not apply mode separation first. We also applied the proposed method to a field example, which verified its validity and effectiveness in estimating seismic source signature from shallow seismic shot gathers containing multimode surface waves.

  5. Numerical Predictions of Sonic Boom Signatures for a Straight Line Segmented Leading Edge Model

    Science.gov (United States)

    Elmiligui, Alaa A.; Wilcox, Floyd J.; Cliff, Susan; Thomas, Scott

    2012-01-01

    A sonic boom wind tunnel test was conducted on a straight-line segmented leading edge (SLSLE) model in the NASA Langley 4- by 4- Foot Unitary Plan Wind Tunnel (UPWT). The purpose of the test was to determine whether accurate sonic boom measurements could be obtained while continuously moving the SLSLE model past a conical pressure probe. Sonic boom signatures were also obtained using the conventional move-pause data acquisition method for comparison. The continuous data acquisition approach allows for accurate signatures approximately 15 times faster than a move-pause technique. These successful results provide an incentive for future testing with greatly increased efficiency using the continuous model translation technique with the single probe to measure sonic boom signatures. Two widely used NASA codes, USM3D (Navier-Stokes) and CART3D-AERO (Euler, adjoint-based adaptive mesh), were used to compute off-body sonic boom pressure signatures of the SLSLE model at several different altitudes below the model at Mach 2.0. The computed pressure signatures compared well with wind tunnel data. The effect of the different altitude for signature extraction was evaluated by extrapolating the near field signatures to the ground and comparing pressure signatures and sonic boom loudness levels.

  6. SiDIVS: Simple Detection of Inductive Vehicle Signatures with a Multiplex Resonant Sensor

    Directory of Open Access Journals (Sweden)

    José J. Lamas-Seco

    2016-08-01

    Full Text Available This work provides a system capable of obtaining simultaneous inductive signatures of vehicles traveling on a roadway with minimal cost. Based on Time-Division Multiplexing (TDM with multiple oscillators, one for each inductive loop, the proposed system detects the presence of vehicles by means of a shift in the oscillation period of the selected loop and registers the signature of the detected vehicles by measuring the duration of a fixed number of oscillator pulses. In order to test the system in an actual environment, we implement a prototype that we denote as SiDIVS (Simple Detection of Inductive Vehicle Signatures and acquire different vehicle inductive signatures under real scenarios. We also test the robustness of the detector by simulating the effect of noise on the signature acquisition.

  7. Revised Human Health Risk Assessment on Chlorpyrifos

    Science.gov (United States)

    We have revised our human health risk assessment and drinking water exposure assessment for chlorpyrifos that supported our October 2015 proposal to revoke all food residue tolerances for chlorpyrifos. Learn about the revised analysis.

  8. REVISION PERMISSIABILITY IN CIVIL PROCEDURE IN REPUBLIC OF MACEDONIA

    Directory of Open Access Journals (Sweden)

    Marina Gligorova

    2015-04-01

    Full Text Available The revision as an extraordinary legal remedy is one more legal instrument for litigant in the effort to achieve protection of the rights or to defend against ungrounded claims of the other party. Litigants may declare revision of the litigation process due to substantive violations of the provisions of Civil Procedure and incorrect application of substantive law. Declaring revision because of a substantive violation of the provisions of Civil Procedure is limited. The purpose of this research paper is to investigate the most common reasons for filing revision of the litigation process in the period from June 2011 to June in 2012. The research includes what kind of reasons are often repeated, and the volume, or the number of reviews submitted to the Supreme Court of the Republic of Macedonia. As general hypothesis is that most of the adopted revisions are due to substantial violations of the provisions of civil procedure. Two-thirds of the stated revisions in front of the Supreme Court of Republic of Macedonia were rejected as unfounded and only one third of the submitted revisions from June 2011 to June 2012 were grounded. Since accepted revisions 59% due to incorrect application of substantive law, and 41% due to substantial violations of the provisions of Civil Procedure.

  9. Acoustic signature recognition technique for Human-Object Interactions (HOI) in persistent surveillance systems

    Science.gov (United States)

    Alkilani, Amjad; Shirkhodaie, Amir

    2013-05-01

    Handling, manipulation, and placement of objects, hereon called Human-Object Interaction (HOI), in the environment generate sounds. Such sounds are readily identifiable by the human hearing. However, in the presence of background environment noises, recognition of minute HOI sounds is challenging, though vital for improvement of multi-modality sensor data fusion in Persistent Surveillance Systems (PSS). Identification of HOI sound signatures can be used as precursors to detection of pertinent threats that otherwise other sensor modalities may miss to detect. In this paper, we present a robust method for detection and classification of HOI events via clustering of extracted features from training of HOI acoustic sound waves. In this approach, salient sound events are preliminary identified and segmented from background via a sound energy tracking method. Upon this segmentation, frequency spectral pattern of each sound event is modeled and its features are extracted to form a feature vector for training. To reduce dimensionality of training feature space, a Principal Component Analysis (PCA) technique is employed to expedite fast classification of test feature vectors, a kd-tree and Random Forest classifiers are trained for rapid classification of training sound waves. Each classifiers employs different similarity distance matching technique for classification. Performance evaluations of classifiers are compared for classification of a batch of training HOI acoustic signatures. Furthermore, to facilitate semantic annotation of acoustic sound events, a scheme based on Transducer Mockup Language (TML) is proposed. The results demonstrate the proposed approach is both reliable and effective, and can be extended to future PSS applications.

  10. "With Grace under Pressure": How Critique as Signature Pedagogy Fosters Effective Music Performance

    Science.gov (United States)

    Hastings, David M.

    2017-01-01

    Inspired by seminal writings on Critique as Signature Pedagogy in the Arts and performance as Signature Pedagogy in Music, this article unifies these two concepts into a study of how critique as signature pedagogy in music-performance promotes student learning. This essay seeks to first define the notion of different mindsets as musicians perform…

  11. CRC-113 gene expression signature for predicting prognosis in patients with colorectal cancer.

    Science.gov (United States)

    Nguyen, Minh Nam; Choi, Tae Gyu; Nguyen, Dinh Truong; Kim, Jin-Hwan; Jo, Yong Hwa; Shahid, Muhammad; Akter, Salima; Aryal, Saurav Nath; Yoo, Ji Youn; Ahn, Yong-Joo; Cho, Kyoung Min; Lee, Ju-Seog; Choe, Wonchae; Kang, Insug; Ha, Joohun; Kim, Sung Soo

    2015-10-13

    Colorectal cancer (CRC) is the third leading cause of global cancer mortality. Recent studies have proposed several gene signatures to predict CRC prognosis, but none of those have proven reliable for predicting prognosis in clinical practice yet due to poor reproducibility and molecular heterogeneity. Here, we have established a prognostic signature of 113 probe sets (CRC-113) that include potential biomarkers and reflect the biological and clinical characteristics. Robustness and accuracy were significantly validated in external data sets from 19 centers in five countries. In multivariate analysis, CRC-113 gene signature showed a stronger prognostic value for survival and disease recurrence in CRC patients than current clinicopathological risk factors and molecular alterations. We also demonstrated that the CRC-113 gene signature reflected both genetic and epigenetic molecular heterogeneity in CRC patients. Furthermore, incorporation of the CRC-113 gene signature into a clinical context and molecular markers further refined the selection of the CRC patients who might benefit from postoperative chemotherapy. Conclusively, CRC-113 gene signature provides new possibilities for improving prognostic models and personalized therapeutic strategies.

  12. Test-Retest Reliability of the Parent Behavior Importance Questionnaire-Revised and the Parent Behavior Frequency Questionnaire-Revised

    Science.gov (United States)

    Mowder, Barbara A.; Shamah, Renee

    2011-01-01

    This study evaluated the test-retest reliability of two parenting measures: the Parent Behavior Importance Questionnaire-Revised (PBIQ-R) and Parent Behavior Frequency Questionnaire-Revised (PBFQ-R). These self-report parenting behavior assessment measures may be utilized as pre- and post-parent education program measures, with parents as well as…

  13. Electronic signature for medical documents--integration and evaluation of a public key infrastructure in hospitals.

    Science.gov (United States)

    Brandner, R; van der Haak, M; Hartmann, M; Haux, R; Schmücker, P

    2002-01-01

    Our objectives were to determine the user-oriented and legal requirements for a Public Key Infrastructure (PKI) for electronic signatures for medical documents, and to translate these requirements into a general model for a signature system. A prototype of this model was then implemented and evaluated in clinical routine use. Analyses of documents, processes, interviews, observations, and of the available literature supplied the foundations for the development of the signature system model. Eight participants of the Department of Dermatology of the Heidelberg University Medical Center evaluated the implemented prototype from December 2000 to January 2001, during the course of an intervention study. By means of questionnaires, interviews, observations and database analyses, the usefulness and user acceptance of the electronic signature and its integration into electronic discharge letters were established. Since the major part of medical documents generated in a hospital are signature-relevant, they will require electronic signatures in the future. A PKI must meet the multitude of responsibilities and security needs required in a hospital. Also, the signature functionality must be integrated directly into the workflow surrounding document creation. A developed signature model, fulfilling user-oriented and legal requirements, was implemented using hard and software components that conform to the German Signature Law. It was integrated into the existing hospital information system of the Heidelberg University Medical Center. At the end of the intervention study, the average acceptance scores achieved were mean = 3.90; SD = 0.42 on a scale of 1 (very negative attitude) to 5 (very positive attitude) for the electronic signature procedure. Acceptance of the integration into computer-supported discharge letter writing reached mean = 3.91; SD = 0.47. On average, the discharge letters were completed 7.18 days earlier. The electronic signature is indispensable for the

  14. Cosmological transitions with changes in the signature of the metric

    International Nuclear Information System (INIS)

    Sakharov, A.D.

    1984-01-01

    It is conjectured that there exist states of the physical continuum which include regions with different signatures of the metric and that the observed Universe and an infinite number of other Universes arose as a result of quantum transitions with a change in the signature of the metric. The Lagrangian in such a theory must satisfy conditions of non-negativity in the regions with even signature. Signature here means the number of time coordinates. The induced gravitational Lagrangian in a conformally invariant theory of Kaluza-Klein type evidently satisfies this requirement and leads to effective equations of the gravitational theory of macroscopic space identical to the equations of the general theory of relativity. It is suggested that in our Universe there exist in addition to the observable (macroscopic) time dimension two or some other even number of compactified time dimensions. It is suggested that the formation of a Euclidean region in the center of a black hole or in the cosmological contraction of the Universe (if it is predetermined by the dynamics) is a possible outcome of gravitational collapse

  15. Xenon adsorption on geological media and implications for radionuclide signatures.

    Science.gov (United States)

    Paul, M J; Biegalski, S R; Haas, D A; Jiang, H; Daigle, H; Lowrey, J D

    2018-07-01

    The detection of radioactive noble gases is a primary technology for verifying compliance with the pending Comprehensive Nuclear-Test-Ban Treaty. A fundamental challenge in applying this technology for detecting underground nuclear explosions is estimating the timing and magnitude of the radionuclide signatures. While the primary mechanism for transport is advective transport, either through barometric pumping or thermally driven advection, diffusive transport in the surrounding matrix also plays a secondary role. From the study of primordial noble gas signatures, it is known that xenon has a strong physical adsorption affinity in shale formations. Given the unselective nature of physical adsorption, isotherm measurements reported here show that non-trivial amounts of xenon adsorb on a variety of media, in addition to shale. A dual-porosity model is then discussed demonstrating that sorption amplifies the diffusive uptake of an adsorbing matrix from a fracture. This effect may reduce the radioxenon signature down to approximately one-tenth, similar to primordial xenon isotopic signatures. Copyright © 2018 Elsevier Ltd. All rights reserved.

  16. Simple model of variation of the signature of a space-time metric

    International Nuclear Information System (INIS)

    Konstantinov, M.Yu.

    2004-01-01

    The problem on the changes in the space-time signature metrics is discussed. The simple model, wherein the space-time metrics signature is determined by the nonlinear scalar field, is proposed. It is shown that both classical and quantum description of changes in the metrics signature is possible within the frames of the considered model; the most characteristic peculiarities and variations of the classical and quantum descriptions are also briefly noted [ru

  17. Comparison of Fingerprint and Iris Biometric Authentication for Control of Digital Signatures

    OpenAIRE

    Zuckerman, Alan E.; Moon, Kenneth A.; Eaddy, Kenneth

    2002-01-01

    Biometric authentication systems can be used to control digital signature of medical documents. This pilot study evaluated the use of two different fingerprint technologies and one iris technology to control creation of digital signatures on a central server using public private key pairs stored on the server. Documents and signatures were stored in XML for portability. Key pairs and authentication certificates were generated during biometric enrollment. Usability and user acceptance were gua...

  18. Full control and manipulation of heat signatures: cloaking, camouflage and thermal metamaterials.

    Science.gov (United States)

    Han, Tiancheng; Bai, Xue; Thong, John T L; Li, Baowen; Qiu, Cheng-Wei

    2014-03-19

    Thermal camouflage and cloaking can transform an actual heat signature into a pre-controlled one. A viable recipe for controlling and manipulating heat signatures using thermal metamaterials to empower cloaking and camouflage in heat conduction is demonstrated. The thermal signature of the object is thus metamorphosed and perceived as multiple targets with different geometries and compositions, with the original object cloaked. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. Molecular signatures from omics data: from chaos to consensus.

    Science.gov (United States)

    Sung, Jaeyun; Wang, Yuliang; Chandrasekaran, Sriram; Witten, Daniela M; Price, Nathan D

    2012-08-01

    In the past 15 years, new "omics" technologies have made it possible to obtain high-resolution molecular snapshots of organisms, tissues, and even individual cells at various disease states and experimental conditions. It is hoped that these developments will usher in a new era of personalized medicine in which an individual's molecular measurements are used to diagnose disease, guide therapy, and perform other tasks more accurately and effectively than is possible using standard approaches. There now exists a vast literature of reported "molecular signatures". However, despite some notable exceptions, many of these signatures have suffered from limited reproducibility in independent datasets, insufficient sensitivity or specificity to meet clinical needs, or other challenges. In this paper, we discuss the process of molecular signature discovery on the basis of omics data. In particular, we highlight potential pitfalls in the discovery process, as well as strategies that can be used to increase the odds of successful discovery. Despite the difficulties that have plagued the field of molecular signature discovery, we remain optimistic about the potential to harness the vast amounts of available omics data in order to substantially impact clinical practice. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  20. Gene Expression Signature in Endemic Osteoarthritis by Microarray Analysis

    Directory of Open Access Journals (Sweden)

    Xi Wang

    2015-05-01

    Full Text Available Kashin-Beck Disease (KBD is an endemic osteochondropathy with an unknown pathogenesis. Diagnosis of KBD is effective only in advanced cases, which eliminates the possibility of early treatment and leads to an inevitable exacerbation of symptoms. Therefore, we aim to identify an accurate blood-based gene signature for the detection of KBD. Previously published gene expression profile data on cartilage and peripheral blood mononuclear cells (PBMCs from adults with KBD were compared to select potential target genes. Microarray analysis was conducted to evaluate the expression of the target genes in a cohort of 100 KBD patients and 100 healthy controls. A gene expression signature was identified using a training set, which was subsequently validated using an independent test set with a minimum redundancy maximum relevance (mRMR algorithm and support vector machine (SVM algorithm. Fifty unique genes were differentially expressed between KBD patients and healthy controls. A 20-gene signature was identified that distinguished between KBD patients and controls with 90% accuracy, 85% sensitivity, and 95% specificity. This study identified a 20-gene signature that accurately distinguishes between patients with KBD and controls using peripheral blood samples. These results promote the further development of blood-based genetic biomarkers for detection of KBD.