WorldWideScience

Sample records for spontaneous anonymous threshold

  1. Privacy preserving data anonymization of spontaneous ADE reporting system dataset.

    Science.gov (United States)

    Lin, Wen-Yang; Yang, Duen-Chuan; Wang, Jie-Teng

    2016-07-18

    To facilitate long-term safety surveillance of marketing drugs, many spontaneously reporting systems (SRSs) of ADR events have been established world-wide. Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing (PPDP), that is, how to sanitize (anonymize) raw data before publishing. Although much work has been done on PPDP, very few studies have focused on protecting privacy of SRS data and none of the anonymization methods is favorable for SRS datasets, due to which contain some characteristics such as rare events, multiple individual records, and multi-valued sensitive attributes. We propose a new privacy model called MS(k, θ (*) )-bounding for protecting published spontaneous ADE reporting data from privacy attacks. Our model has the flexibility of varying privacy thresholds, i.e., θ (*) , for different sensitive values and takes the characteristics of SRS data into consideration. We also propose an anonymization algorithm for sanitizing the raw data to meet the requirements specified through the proposed model. Our algorithm adopts a greedy-based clustering strategy to group the records into clusters, conforming to an innovative anonymization metric aiming to minimize the privacy risk as well as maintain the data utility for ADR detection. Empirical study was conducted using FAERS dataset from 2004Q1 to 2011Q4. We compared our model with four prevailing methods, including k-anonymity, (X, Y)-anonymity, Multi-sensitive l-diversity, and (α, k)-anonymity, evaluated via two measures, Danger Ratio (DR) and Information Loss (IL), and considered three different scenarios of threshold setting for θ (*) , including uniform setting, level-wise setting and frequency-based setting. We also conducted experiments to inspect the impact of anonymized data on the strengths of discovered ADR signals. With all three

  2. Solid state solvation effect and reduced amplified spontaneous emission threshold value of glass forming DCM derivative in PMMA films

    Energy Technology Data Exchange (ETDEWEB)

    Vembris, Aivars, E-mail: aivars.vembris@cfi.lu.lv [Institute of Solid State Physics, University of Latvia, 8 Kengaraga Street, Riga LV 1063 (Latvia); Zarins, Elmars; Kokars, Valdis [Institute of Applied Chemistry, Riga Technical University, 14/24 Azenes Street, Riga LV 1048 (Latvia)

    2015-02-15

    Molecule crystallization is one of the limitations for obtaining high-gain organic laser systems. One of the examples is well known red laser dye 4-(dicyanomethylene)-2-methyl-6-(p-dimethylaminostyryl)-4H-pyran (DCM). The lowest threshold value of amplified spontaneous emission was achieved by doping 2 wt% of DCM molecule in tris-(8-hydroxy quinoline) aluminum (Alq{sub 3}) matrix. Further increase of the DCM dye concentration makes the system less efficient as its threshold value increases. It is due to large intermolecular interaction, which induces photoluminescence quenching. Compounds with reduced intermolecular interaction could be prospective in organic laser systems due to higher possible doping. In this work photoluminescence and amplified spontaneous emission properties of modified DCM molecule in poly(methyl methacrylate) (PMMA) matrix were investigated. Bulky trityloxyethyl groups were attached to the donor part of DCM. These groups increase intermolecular distance wherewith reduce photoluminescence quenching. More than one order of magnitude lower excitation threshold energy of the amplified spontaneous emission was achieved in doped polymer films with investigated compound in comparison to doped polymer with DCM. It means that the investigated compound is more perspective as a laser material compared to the previously studied. In addition, amplified spontaneous emission maximum could be tuned within 15 nm by changing concentration from 0.1 wt% to 10 wt% DWK-1 in PMMA matrix due to solid state solvation effect. - Highlights: • Bulky groups attached to DCM dye reduce photoluminescence quenching. • Amplified spontaneous emission is in red spectral region. • Amplified spontaneous emission spectra were tuned by 15 nm. • Amplified spontaneous emission threshold value was reduced by one order of magnitude.

  3. Spontaneous otoacoustic emissions, threshold microstructure, and psychophysical tuning over a wide frequency range in humansa

    Science.gov (United States)

    Baiduc, Rachael R.; Lee, Jungmee; Dhar, Sumitrajit

    2014-01-01

    Hearing thresholds have been shown to exhibit periodic minima and maxima, a pattern known as threshold microstructure. Microstructure has previously been linked to spontaneous otoacoustic emissions (SOAEs) and normal cochlear function. However, SOAEs at high frequencies (>4 kHz) have been associated with hearing loss or cochlear pathology in some reports. Microstructure would not be expected near these high-frequency SOAEs. Psychophysical tuning curves (PTCs), the expression of frequency selectivity, may also be altered by SOAEs. Prior comparisons of tuning between ears with and without SOAEs demonstrated sharper tuning in ears with emissions. Here, threshold microstructure and PTCs were compared at SOAE frequencies ranging between 1.2 and 13.9 kHz using subjects without SOAEs as controls. Results indicate: (1) Threshold microstructure is observable in the vicinity of SOAEs of all frequencies; (2) PTCs are influenced by SOAEs, resulting in shifted tuning curve tips, multiple tips, or inversion. High frequency SOAEs show a greater effect on PTC morphology. The influence of most SOAEs at high frequencies on threshold microstructure and PTCs is consistent with those at lower frequencies, suggesting that high-frequency SOAEs reflect the same cochlear processes that lead to SOAEs at lower frequencies. PMID:24437770

  4. Comparison of the Personality Profiles of Inmate Anonymous and Non-Anonymous Male Addicts

    Directory of Open Access Journals (Sweden)

    Nasrolah Erfani

    2013-05-01

    Full Text Available Aim: This study compared the personality profiles of inmate anonymous and non-anonymous male addicts. Method: The participants of study were anonymous and non-anonymous male addicts of the prisons of the Hamadan province in 1391. The population was 3130 addicts, including 627 anonymous and 2503 non-anonymous addicts. The 310 addicts were selected by stratified random sampling the sample size was determined by Cochran formula.The short-form NEO Five Factor personality questionnaire administered among selected sample. Data analyzed by descriptive statistic as frequency and percentage, also, inferential statistic as multivariate analysis of variance was run. Results: The results showed that personality profiles of anonymous and non-anonymous addicts were significantly different. That is, mean score of neuroticism in anonymous addicts was less than non anonymous. Also, mean score of extraversion was higher in anonymous addicts. Conclusion: It can be concluded that the anonymous male addicts are differ with non-anonymous male addicts in personality traits.

  5. An overview of anonymity and anonymous communication

    NARCIS (Netherlands)

    Koot, M.

    2008-01-01

    Privacy is becoming an increasingly important aspect in distributed systems. In anonymous communication, privacy is provided to communicating parties by hiding their identities from each other and/or from others. This paper discusses the problem of anonymous communication and clarifies the notion of

  6. Comments on ``Anonymous Reviews'' An Editor's View of Anonymous Reviews

    Science.gov (United States)

    Goff, John A.

    I have read with great interest the recent Forum commentaries in Eos by Myrl Beck, Charles Robinove, Robert Criss, and Anne Hofmeister regarding anonymous reviews. I heartily support their position that anonymous reviews should be avoided. I have not written an anonymous review in ages (and regret the few that I did), and have always appreciated and respected greatly anyone who signs a critical review of one of my own papers. However, I would like to add some perspective from the editorial standpoint. I have served as JGR associate editor for 3 years (never anonymously!), and as Eos editor for seismology and tectonophysics for 4. Over the years, I have rejected a fair number of papers, most of those based on anonymous reviews (fortunately, none of the above commentators was one of them). The vast majority of anonymous reviews I received were well considered. While I would wish that all reviews were signed, I don't think we can summarily dismiss the fear that many would have of enmity and reprisal over a critical review. Some of these fears are likely justified. On more than one occasion, have I witnessed overly aggressive responses on the part of authors to anonymous reviews that I considered to be entirely fair and constructive in their criticisms. I do think we need to do all we can to discourage anonymous reviews, but it will be difficult to completely remove that choice from the process.

  7. The selective adaptation of the alcoholics anonymous program by Gamblers Anonymous.

    Science.gov (United States)

    Browne, B R

    1991-09-01

    This paper is largely based on a year long observation study of Gamblers Anonymous and Alcoholics Anonymous meetings in northern California. The paper argues, contrary to popular assumption, that Gamblers Anonymous is significantly different from Alcoholics Anonymous. Differences, in members' consciousness for example, are discussed. The paper contends that although there is some12 step consciousness in G.A., the dominant consciousness ispage 17 consciousness. The significant differences are attributed to the selective adaptation of the Alcoholics Anonymous program. Several consequences of these differences, such as the central role of a language of the self in A.A. and not in G.A., are highlighted.

  8. Anonymous steps: gender and Gamblers Anonymous

    OpenAIRE

    Rogers, Jim

    2015-01-01

    The biggest source of help for problem gamblers remains gamblers anonymous (GA) in terms of accessibility and availability. GA has traditionally been very much a male preserve. This paper reports on a literature review of Gamblers Anonymous together with data from observations of a contemporary open GA meeting over a one year period. Whilst some studies from North America suggest a changing culture and gender balance within GA programmes observations from the North of England, supported b...

  9. Pattern-Guided k-Anonymity

    Directory of Open Access Journals (Sweden)

    Rolf Niedermeier

    2013-10-01

    Full Text Available We suggest a user-oriented approach to combinatorial data anonymization. A data matrix is called k-anonymous if every row appears at least k times—the goal of the NP-hard k-ANONYMITY problem then is to make a given matrix k-anonymous by suppressing (blanking out as few entries as possible. Building on previous work and coping with corresponding deficiencies, we describe an enhanced k-anonymization problem called PATTERN-GUIDED k-ANONYMITY, where the users specify in which combinations suppressions may occur. In this way, the user of the anonymized data can express the differing importance of various data features. We show that PATTERN-GUIDED k-ANONYMITY is NP-hard. We complement this by a fixed-parameter tractability result based on a “data-driven parameterization” and, based on this, develop an exact integer linear program (ILP-based solution method, as well as a simple, but very effective, greedy heuristic. Experiments on several real-world datasets show that our heuristic easily matches up to the established “Mondrian” algorithm for k-ANONYMITY in terms of the quality of the anonymization and outperforms it in terms of running time.

  10. Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

    DEFF Research Database (Denmark)

    Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni

    2010-01-01

    To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user...... to access anonymously services such as whistle blowing and net-counselling. Our approach: (1) allows a mobile user, remembering a short password, to anonymously and securely retrieve the credentials necessary for his anonymous communication without assuming a pre-established anonymous channel...

  11. Data anonymization patent landscape

    Directory of Open Access Journals (Sweden)

    Mirjana Pejić Bach

    2017-01-01

    Full Text Available The omnipresent, unstoppable increase in digital data has led to a greater understanding of the importance of data privacy. Different approaches are used to implement data privacy. The goal of this paper is to develop a data anonymization patent landscape, by determining the following: (i the trend in data anonymization patenting, (ii the type of technical content protected in data anonymization, (iii the organizations and countries most active in patenting data anonymization know-how; and (iv the topics emerging most often in patent titles. Patents from the PatSeer database relating to data anonymization from 2001 to 2015 were analyzed. We used the longitudinal approach in combination with text mining techniques to develop a data anonymization patent landscape. The results indicated the following. The number of single patent families is growing with a high increase after 2010, thus indicating a positive trend in the area of patenting data anonymization solutions. The majority of patenting activities relate to the G Physics section. Organizations from the USA and Japan assigned the majority of patents related to data anonymization. The results of text mining indicate that the most often used word in titles of data anonymization patents are “anonym*, “method”, “data” and “system”. Several additional words that indicated the most frequent topics related to data anonymization were: “equipment”, “software”, “protection”, “identification”, or “encryption”, and specific topics such as “community”, “medical”, or “service”.

  12. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  13. Quantum anonymous voting with anonymity check

    International Nuclear Information System (INIS)

    Horoshko, Dmitri; Kilin, Sergei

    2011-01-01

    We propose a new protocol for quantum anonymous voting having serious advantages over the existing protocols: it protects both the voters from a curious tallyman and all the participants from a dishonest voter in unconditional way. The central idea of the protocol is that the ballots are given back to the voters after the voting process, which gives a possibility for two voters to check the anonymity of the vote counting process by preparing a special entangled state of two ballots. Any attempt of cheating from the side of the tallyman results in destroying the entanglement, which can be detected by the voters.

  14. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... anonymous steganography, { A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), { A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  15. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... defining anonymous steganography, - A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), - A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  16. Self-tallying quantum anonymous voting

    Science.gov (United States)

    Wang, Qingle; Yu, Chaohua; Gao, Fei; Qi, Haoyu; Wen, Qiaoyan

    2016-08-01

    Anonymous voting is a voting method of hiding the link between a vote and a voter, the context of which ranges from governmental elections to decision making in small groups like councils and companies. In this paper, we propose a quantum anonymous voting protocol assisted by two kinds of entangled quantum states. Particularly, we provide a mechanism of opening and permuting the ordered votes of all the voters in an anonymous manner; any party who is interested in the voting results can acquire a permutation copy and then obtains the voting result through a simple calculation. Unlike all previous quantum works on anonymous voting, our quantum anonymous protocol possesses the properties of privacy, self-tallying, nonreusability, verifiability, and fairness at the same time. In addition, we demonstrate that the entanglement of the quantum states used in our protocol makes an attack from an outside eavesdropper and inside dishonest voters impossible. We also generalize our protocol to execute the task of anonymous multiparty computation, such as anonymous broadcast and anonymous ranking.

  17. Threshold reduction through photon recycling in semiconductor lasers

    Energy Technology Data Exchange (ETDEWEB)

    Gigase, Y.B.; Harder, C.S.; Kesler, M.P.; Meier, H.P. (IBM Research Division, Zurich Research Laboratory, CH-8803 Rueschlikon (Switzerland)); Van Zeghbroeck, B. (University of Colorado, Boulder, CO (USA))

    1990-09-24

    The threshold pump power of an AlGaAs-GaAs ridge quantum well laser diode has been reduced by 42% by recycling the spontaneous emission. An integrated photodiode absorbs the spontaneous radiation emitted by the laser diode and converts it back into electrical power. The recycling of this power results in a reduction of the electrical power required to reach the lasing threshold.

  18. The Second Spiking Threshold: Dynamics of Laminar Network Spiking in the Visual Cortex

    DEFF Research Database (Denmark)

    Forsberg, Lars E.; Bonde, Lars H.; Harvey, Michael A.

    2016-01-01

    and moving visual stimuli from the spontaneous ongoing spiking state, in all layers and zones of areas 17 and 18 indicating that the second threshold is a property of the network. Spontaneous and evoked spiking, thus can easily be distinguished. In addition, the trajectories of spontaneous ongoing states......Most neurons have a threshold separating the silent non-spiking state and the state of producing temporal sequences of spikes. But neurons in vivo also have a second threshold, found recently in granular layer neurons of the primary visual cortex, separating spontaneous ongoing spiking from...... visually evoked spiking driven by sharp transients. Here we examine whether this second threshold exists outside the granular layer and examine details of transitions between spiking states in ferrets exposed to moving objects. We found the second threshold, separating spiking states evoked by stationary...

  19. Continuous-wave infrared optical gain and amplified spontaneous emission at ultralow threshold by colloidal HgTe quantum dots.

    Science.gov (United States)

    Geiregat, Pieter; Houtepen, Arjan J; Sagar, Laxmi Kishore; Infante, Ivan; Zapata, Felipe; Grigel, Valeriia; Allan, Guy; Delerue, Christophe; Van Thourhout, Dries; Hens, Zeger

    2018-01-01

    Colloidal quantum dots (QDs) raise more and more interest as solution-processable and tunable optical gain materials. However, especially for infrared active QDs, optical gain remains inefficient. Since stimulated emission involves multifold degenerate band-edge states, population inversion can be attained only at high pump power and must compete with efficient multi-exciton recombination. Here, we show that mercury telluride (HgTe) QDs exhibit size-tunable stimulated emission throughout the near-infrared telecom window at thresholds unmatched by any QD studied before. We attribute this unique behaviour to surface-localized states in the bandgap that turn HgTe QDs into 4-level systems. The resulting long-lived population inversion induces amplified spontaneous emission under continuous-wave optical pumping at power levels compatible with solar irradiation and direct current electrical pumping. These results introduce an alternative approach for low-threshold QD-based gain media based on intentional trap states that paves the way for solution-processed infrared QD lasers and amplifiers.

  20. Continuous-wave infrared optical gain and amplified spontaneous emission at ultralow threshold by colloidal HgTe quantum dots

    Science.gov (United States)

    Geiregat, Pieter; Houtepen, Arjan J.; Sagar, Laxmi Kishore; Infante, Ivan; Zapata, Felipe; Grigel, Valeriia; Allan, Guy; Delerue, Christophe; van Thourhout, Dries; Hens, Zeger

    2018-01-01

    Colloidal quantum dots (QDs) raise more and more interest as solution-processable and tunable optical gain materials. However, especially for infrared active QDs, optical gain remains inefficient. Since stimulated emission involves multifold degenerate band-edge states, population inversion can be attained only at high pump power and must compete with efficient multi-exciton recombination. Here, we show that mercury telluride (HgTe) QDs exhibit size-tunable stimulated emission throughout the near-infrared telecom window at thresholds unmatched by any QD studied before. We attribute this unique behaviour to surface-localized states in the bandgap that turn HgTe QDs into 4-level systems. The resulting long-lived population inversion induces amplified spontaneous emission under continuous-wave optical pumping at power levels compatible with solar irradiation and direct current electrical pumping. These results introduce an alternative approach for low-threshold QD-based gain media based on intentional trap states that paves the way for solution-processed infrared QD lasers and amplifiers.

  1. Research on Anonymization and De-anonymization in the Bitcoin System

    OpenAIRE

    ShenTu, QingChun; Yu, JianPing

    2015-01-01

    The Bitcoin system is an anonymous, decentralized crypto-currency. There are some deanonymizating techniques to cluster Bitcoin addresses and to map them to users' identifications in the two research directions of Analysis of Transaction Chain (ATC) and Analysis of Bitcoin Protocol and Network (ABPN). Nowadays, there are also some anonymization methods such as coin-mixing and transaction remote release (TRR) to cover the relationship between Bitcoin address and the user. This paper studies an...

  2. Digital anonymity on the internet : new rules for anonymous electronic transactions? an exploration of the private law implications of digital anonymity

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.; Prins, C.

    2001-01-01

    This article sets out the most important conclusions of the first stage of a study into the dimensions of digital anonymity. It is intended to set out the problem, make people aware of the intricacies of the problem and thus stimulate the debate on useful legal structures for anonymity. The

  3. Utility-preserving anonymization for health data publishing.

    Science.gov (United States)

    Lee, Hyukki; Kim, Soohyung; Kim, Jong Wook; Chung, Yon Dohn

    2017-07-11

    Publishing raw electronic health records (EHRs) may be considered as a breach of the privacy of individuals because they usually contain sensitive information. A common practice for the privacy-preserving data publishing is to anonymize the data before publishing, and thus satisfy privacy models such as k-anonymity. Among various anonymization techniques, generalization is the most commonly used in medical/health data processing. Generalization inevitably causes information loss, and thus, various methods have been proposed to reduce information loss. However, existing generalization-based data anonymization methods cannot avoid excessive information loss and preserve data utility. We propose a utility-preserving anonymization for privacy preserving data publishing (PPDP). To preserve data utility, the proposed method comprises three parts: (1) utility-preserving model, (2) counterfeit record insertion, (3) catalog of the counterfeit records. We also propose an anonymization algorithm using the proposed method. Our anonymization algorithm applies full-domain generalization algorithm. We evaluate our method in comparison with existence method on two aspects, information loss measured through various quality metrics and error rate of analysis result. With all different types of quality metrics, our proposed method show the lower information loss than the existing method. In the real-world EHRs analysis, analysis results show small portion of error between the anonymized data through the proposed method and original data. We propose a new utility-preserving anonymization method and an anonymization algorithm using the proposed method. Through experiments on various datasets, we show that the utility of EHRs anonymized by the proposed method is significantly better than those anonymized by previous approaches.

  4. Anonymous Connections and Onion Routing

    National Research Council Canada - National Science Library

    Syverson, Paul F; Goldschlag, David M; Reed, Michael G

    1997-01-01

    .... Unmodified Internet applications can use these anonymous connections by means of proxies. The proxies may also make communication anonymous by removing identifying information from the data stream...

  5. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted

  6. Trust in Anonymity Networks

    Science.gov (United States)

    Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.

  7. An Extensive Study on Data Anonymization Algorithms Based on K-Anonymity

    Science.gov (United States)

    Simi, Ms. M. S.; Sankara Nayaki, Mrs. K.; Sudheep Elayidom, M., Dr.

    2017-08-01

    For business and research oriented works engaging Data Analysis and Cloud services needing qualitative data, many organizations release huge microdata. It excludes an individual’s explicit identity marks like name, address and comprises of specific information like DOB, Pin-code, sex, marital status, which can be combined with other public data to recognize a person. This implication attack can be manipulated to acquire any sensitive information from social network platform, thereby putting the privacy of a person in grave danger. To prevent such attacks by modifying microdata, K-anonymization is used. With potentially increasing data, the effective method to anonymize it stands challenging. After series of trails and systematic comparison, in this paper, we propose three best algorithms along with its efficiency and effectiveness. Studies help researchers to identify the relationship between the values of k, degree of anonymization, choosing a quasi-identifier and focus on execution time.

  8. Revocable Anonymous Access to the Internet?

    Science.gov (United States)

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  9. The Second Spiking Threshold: Dynamics of Laminar Network Spiking in the Visual Cortex

    Science.gov (United States)

    Forsberg, Lars E.; Bonde, Lars H.; Harvey, Michael A.; Roland, Per E.

    2016-01-01

    Most neurons have a threshold separating the silent non-spiking state and the state of producing temporal sequences of spikes. But neurons in vivo also have a second threshold, found recently in granular layer neurons of the primary visual cortex, separating spontaneous ongoing spiking from visually evoked spiking driven by sharp transients. Here we examine whether this second threshold exists outside the granular layer and examine details of transitions between spiking states in ferrets exposed to moving objects. We found the second threshold, separating spiking states evoked by stationary and moving visual stimuli from the spontaneous ongoing spiking state, in all layers and zones of areas 17 and 18 indicating that the second threshold is a property of the network. Spontaneous and evoked spiking, thus can easily be distinguished. In addition, the trajectories of spontaneous ongoing states were slow, frequently changing direction. In single trials, sharp as well as smooth and slow transients transform the trajectories to be outward directed, fast and crossing the threshold to become evoked. Although the speeds of the evolution of the evoked states differ, the same domain of the state space is explored indicating uniformity of the evoked states. All evoked states return to the spontaneous evoked spiking state as in a typical mono-stable dynamical system. In single trials, neither the original spiking rates, nor the temporal evolution in state space could distinguish simple visual scenes. PMID:27582693

  10. Anonymous Transactions in Computer Networks

    Science.gov (United States)

    Dolev, Shlomi; Kopeetsky, Marina

    We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

  11. Anon-Pass: Practical Anonymous Subscriptions.

    Science.gov (United States)

    Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2013-12-31

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch . Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user.

  12. Visually Evoked Spiking Evolves While Spontaneous Ongoing Dynamics Persist

    DEFF Research Database (Denmark)

    Huys, Raoul; Jirsa, Viktor K; Darokhan, Ziauddin

    2016-01-01

    attractor. Its existence guarantees that evoked spiking return to the spontaneous state. However, the spontaneous ongoing spiking state and the visual evoked spiking states are qualitatively different and are separated by a threshold (separatrix). The functional advantage of this organization...

  13. [Anonymous birth and neonaticide in Tyrol].

    Science.gov (United States)

    Danner, C; Pacher, M; Ambach, E; Brezinka, C

    2005-10-01

    In 2001 the Austrian government provided the legal means that formally enabled "anonymous birth": a woman can now give birth in any hospital in Austria without giving her name or insurance number, the baby is taken into care by social services and placed with adoptive parents. The cost of the hospital stay is covered from public funds. These measures were put into effect after some highly publicized cases of infant abandonment and neonaticide in Austria. In the mostly rural and small-town province of Tyrol province in western Austria (687,000 inhabitants, 7000 births per year) four cases of neonaticide were discovered in the years from 1996 to 2004. One child was abandoned inside a hospital. Since 2001 two women have made use of the "anonymous birth" option. Neither had had any pregnancy controls, both showed up at or near term with contractions. They delivered healthy infants that were then taken into care by local adoption services. Both women were extensively counselled by psychologists, social workers, medical and midwifery staff and both insisted on their original decision to remain anonymous. A few weeks later one of the women found herself at the centre of a criminal investigation for infanticide after anonymous letters were sent to family members insinuating she had done away with the child. Police stopped that investigation when hospital staff confirmed that the woman had had an "anonymous" delivery. Despite the option of legal "anonymous" birth free of charge in modern hospitals there are still cases of infant abandonment and neonaticide in Austria. It is proposed that the women who opt for anonymous birth may not be the women who would otherwise kill their babies. Instead, it appears that the women opted for anonymity to escape the probably well-intentioned but overbearing attention of their families and of social services. It is doubtful that the option of anonymous birth will lead to a complete disappearance of infanticide and infant abandonment in

  14. Rethinking spontaneous giving: Extreme time pressure and ego-depletion favor self-regarding reactions.

    Science.gov (United States)

    Capraro, Valerio; Cococcioni, Giorgia

    2016-06-02

    Previous experimental studies suggest that cooperation in one-shot anonymous interactions is, on average, spontaneous, rather than calculative. To explain this finding, it has been proposed that people internalize cooperative heuristics in their everyday life and bring them as intuitive strategies in new and atypical situations. Yet, these studies have important limitations, as they promote intuitive responses using weak time pressure or conceptual priming of intuition. Since these manipulations do not deplete participants' ability to reason completely, it remains unclear whether cooperative heuristics are really automatic or they emerge after a small, but positive, amount of deliberation. Consistent with the latter hypothesis, we report two experiments demonstrating that spontaneous reactions in one-shot anonymous interactions tend to be egoistic. In doing so, our findings shed further light on the cognitive underpinnings of cooperation, as they suggest that cooperation in one-shot interactions is not automatic, but appears only at later stages of reasoning.

  15. Rethinking spontaneous giving: Extreme time pressure and ego-depletion favor self-regarding reactions

    Science.gov (United States)

    Capraro, Valerio; Cococcioni, Giorgia

    2016-01-01

    Previous experimental studies suggest that cooperation in one-shot anonymous interactions is, on average, spontaneous, rather than calculative. To explain this finding, it has been proposed that people internalize cooperative heuristics in their everyday life and bring them as intuitive strategies in new and atypical situations. Yet, these studies have important limitations, as they promote intuitive responses using weak time pressure or conceptual priming of intuition. Since these manipulations do not deplete participants’ ability to reason completely, it remains unclear whether cooperative heuristics are really automatic or they emerge after a small, but positive, amount of deliberation. Consistent with the latter hypothesis, we report two experiments demonstrating that spontaneous reactions in one-shot anonymous interactions tend to be egoistic. In doing so, our findings shed further light on the cognitive underpinnings of cooperation, as they suggest that cooperation in one-shot interactions is not automatic, but appears only at later stages of reasoning. PMID:27251762

  16. Anonymous Boh avatud kunsti maastikul / Raivo Kelomees

    Index Scriptorium Estoniae

    Kelomees, Raivo, 1960-

    2010-01-01

    Anonymous Bohi näitus Tartu Kunstimajas, avatud 30. juulini 2010. Anonymous Boh on koos Non Grataga läbi viinud performance´id Euroopas, Ameerikas ja Aasias. Anonymous Bohi vastused oma näituse ja loominguga seotud küsimustele

  17. “We are Anonymous.” Anonymity in the Public Sphere – Challenges of Free and Open Communication

    Directory of Open Access Journals (Sweden)

    Saskia Sell

    2013-05-01

    Full Text Available Anonymity, the stealth mode of public communication, challenges different actors who deal with freedom of communication issues in their day to day life – be it professional journalists, information and communication scientists, technicians or political activists. This article aims to deliver theoretical background on the concept of anonymity on the macro-level, as well as to shed light on how different communicators deal with anonymity on the micro-level. Based on the example of the Anonymous movement, communicative actions are put in relation to media technological artifacts and their surrounding media environment with a focus on journalistic practice and public response to the phenomenon. The analysis concludes with the need for a preservation of options for anonymous public communication as a dimension of freedom of communication after carefully considering both the advantages and the potential risks connected to that mode of private-public communication.

  18. Anonymous communication networks protecting privacy on the web

    CERN Document Server

    Peng, Kun

    2014-01-01

    In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with

  19. Practical anonymity hiding in plain sight online

    CERN Document Server

    Loshin, Peter

    2013-01-01

    For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l

  20. Are anonymous evaluations a better assessment of faculty teaching performance? A comparative analysis of open and anonymous evaluation processes.

    Science.gov (United States)

    Afonso, Nelia M; Cardozo, Lavoisier J; Mascarenhas, Oswald A J; Aranha, Anil N F; Shah, Chirag

    2005-01-01

    We compared teaching performance of medical school faculty using anonymous evaluations and open evaluations (in which the evaluator was not anonymous) and examined barriers to open evaluation. Residents and medical students evaluated faculty using an open evaluation instrument in which their identity was indicated in the evaluation. Following this, they completed anonymous evaluation on the same faculty members. Aggregate outcomes using the two evaluation systems were compared. Outcomes by group of evaluators (residents and students) were analyzed. Trainees were also asked to rate the barriers to the open evaluation process. A statistically significant difference between the open and anonymous evaluations was noted across all items, with faculty receiving lower scores on the anonymous evaluations. The mean score for all the items on the open evaluations was 4.45 +/- 0.65, compared to mean score of 4.07 +/- 0.80 on the anonymous evaluations. There was also a statistically significant difference between open and anonymous evaluations in five clinical teaching domains that were evaluated individually. Residents perceived that the three most common barriers to optimal evaluation were an apprehension of possible encounters with the same attending physician in the future, destruction of working relationships with the attending, and a feeling of frustration with the evaluation system. The evaluation of faculty teaching performance is complex. Most academic medical centers use the open evaluation format. This study supports the case for the use of the anonymous evaluation method as a more accurate reflection of teaching performance.

  1. Anonymous quantum communications using the quantum one-time pad

    International Nuclear Information System (INIS)

    Wang, Qing-Le; Gao, Fei-; Liu, Bin; Song, Ting-Ting; Wen, Qiao-Yan

    2015-01-01

    We present the first quantum secure communication protocol for an anonymous receiver without the assistance of anonymous entanglement. In previous works, if a public sender wants to send quantum messages to a chosen receiver while protecting the identity of the receiver from others, all participants should cooperate first to construct the entanglement between the sender and the anonymous receiver. This is the most important process in anonymous quantum communications. With anonymous entanglement, the sender can communicate quantum messages to the anonymous receiver by applying teleportation protocols. In contrast, our protocol is novel and achieves communication of quantum messages directly from the public sender to the anonymous receiver based on the quantum one-time pad and current achievements. Notably, the anonymity of the receiver, as well as the privacy of the quantum messages, is perfectly protected with the exception of an exponentially small probability in our protocol. (paper)

  2. Anonymization of Court Orders

    DEFF Research Database (Denmark)

    Povlsen, Claus; Jongejan, Bart; Hansen, Dorte Haltrup

    We describe an anonymization tool that was commissioned by and specified together with Schultz, a publishing company specialized in Danish law related publications. Unavailability of training data and the need to guarantee compliance with pre-existing anonymization guidelines forced us to implement...... a tool using manually crafted rules. We used Bracmat, a programming language that is specialized in transforming tree data structures, to meet the requirement to pass the XML structure of the input document unscathed through the whole workflow. The tool attains a reassuringly good recall, makes almost...

  3. Anonymous women? Gamblers Anonymous and gender

    OpenAIRE

    Rogers, Jim

    2016-01-01

    One of the rapidly changing elements in gambling environments is the increasing participation of women in many forms of gambling, and the growing proportions of problem gamblers who are female. It is known that women who develop gambling problems differ from men in a range of ways:for example they are more likely to have co-morbidities such as anxiety and depression, and to gamble as an 'escape' from such co-occuring problems. Gamblers Anonymous (GA) has a number of meetings across New Zeala...

  4. Anonymity in P2P Systems

    Science.gov (United States)

    Manzanares-Lopez, Pilar; Muñoz-Gea, Juan Pedro; Malgosa-Sanahuja, Josemaria; Sanchez-Aarnoutse, Juan Carlos

    In the last years, the use of peer-to-peer (P2P) applications to share and exchange knowledge among people around the world has experienced an exponential growth. Therefore, it is understandable that, like in any successful communication mechanism used by a lot of humans being, the anonymity can be a desirable characteristic in this scenario. Anonymity in P2P networks can be obtained by means of different methods, although the most significant ones are broadcast protocols, dining-cryptographer (DC) nets and multiple-hop paths. Each of these methods can be tunable in order to build a real anonymity P2P application. In addition, there is a mathematical tool called entropy that can be used in some scenarios to quantify anonymity in communication networks. In some cases, it can be calculated analytically but in others it is necessary to use simulation to obtain the network entropy.

  5. Assessing Anonymous Communication on the Internet: Policy Deliberations.

    Science.gov (United States)

    Kling, Rob; Lee, Yaching; Frankel, Mark S.; Teich, Al

    1999-01-01

    Examines the social character of anonymous online communication and the ways that anonymous communication has played important roles for professionals such as journalists and the police. Explains some of the new technological supports for anonymous communication on the Internet. Discusses some of the nuances behind the controversies and policy…

  6. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  7. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    Full Text Available A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000 model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks.

  8. Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols

    DEFF Research Database (Denmark)

    Mikkelsen, Gert Læssøe; Keller, Marcel; Rupp, Andy

    2012-01-01

    , such as identification schemes, electronic cash (e-cash), and anonymous credentials. We present a security model for threshold proofs of knowledge and develop threshold versions of well-known primitives such as range proofs, zero-knowledge proofs for preimages of homomorphisms (which generalizes PoKs of discrete...... efficient (when compared to a general MPC approach). In comparison to the original protocols only the prover’s (or user’s) side is modified while the other side stays untouched. In particular, it is oblivious to the other party whether it interacts with a distributed prover (or user) or one as defined...

  9. Protecting genomic sequence anonymity with generalization lattices.

    Science.gov (United States)

    Malin, B A

    2005-01-01

    Current genomic privacy technologies assume the identity of genomic sequence data is protected if personal information, such as demographics, are obscured, removed, or encrypted. While demographic features can directly compromise an individual's identity, recent research demonstrates such protections are insufficient because sequence data itself is susceptible to re-identification. To counteract this problem, we introduce an algorithm for anonymizing a collection of person-specific DNA sequences. The technique is termed DNA lattice anonymization (DNALA), and is based upon the formal privacy protection schema of k -anonymity. Under this model, it is impossible to observe or learn features that distinguish one genetic sequence from k-1 other entries in a collection. To maximize information retained in protected sequences, we incorporate a concept generalization lattice to learn the distance between two residues in a single nucleotide region. The lattice provides the most similar generalized concept for two residues (e.g. adenine and guanine are both purines). The method is tested and evaluated with several publicly available human population datasets ranging in size from 30 to 400 sequences. Our findings imply the anonymization schema is feasible for the protection of sequences privacy. The DNALA method is the first computational disclosure control technique for general DNA sequences. Given the computational nature of the method, guarantees of anonymity can be formally proven. There is room for improvement and validation, though this research provides the groundwork from which future researchers can construct genomics anonymization schemas tailored to specific datasharing scenarios.

  10. A framework for automatically checking anonymity with μ CRL

    OpenAIRE

    Chothia, T.; Orzan, S.M.; Pang, J.; Torabi Dashti, M.; Montanari, U.; Sannella, D.; Bruni, R.

    2007-01-01

    We present a powerful and flexible method for automatically checking anonymity in a possibilistic general-purpose process algebraic verification toolset. We propose new definitions of a choice anonymity degree and a player anonymity degree, to quantify the precision with which an intruder is able to single out the true originator of a given event or to associate the right event to a given protocol participant. We show how these measures of anonymity can be automatically calculated from a prot...

  11. k-Times Anonymous Authentication

    Science.gov (United States)

    Teranishi, Isamu; Furukawa, Jun; Sako, Kazue

    We propose an authentication scheme in which users can be authenticated anonymously so long as times that they are authenticated is within an allowable number. The proposed scheme has two features: 1) no one, not even an authority, can identify users who have been authenticated within the allowable number, 2) anyone can trace, without help from the authority, dishonest users who have been authenticated beyond the allowable number by using the records of these authentications. Our scheme can be applied to e-voting, e-cash, electronic coupons, and trial browsing of content. In these applications, our scheme, unlike the previous one, conceals users' participation from protocols and guarantees that they will remain anonymous to everyone.

  12. Proxies for Anonymous Routing

    National Research Council Canada - National Science Library

    Reed, Michael G; Syverson, Paul F; Goldschlag, David M

    1996-01-01

    ...), and file transfers (FTP) have been implemented. Onion routing provides application independent, real-time, and bi-directional anonymous connections that are resistant to both eavesdropping and traffic analysis...

  13. Is it OK to be an Anonymous?

    NARCIS (Netherlands)

    Serracino Inglott, P.

    2013-01-01

    Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as

  14. Visually Evoked Spiking Evolves While Spontaneous Ongoing Dynamics Persist

    Science.gov (United States)

    Huys, Raoul; Jirsa, Viktor K.; Darokhan, Ziauddin; Valentiniene, Sonata; Roland, Per E.

    2016-01-01

    Neurons in the primary visual cortex spontaneously spike even when there are no visual stimuli. It is unknown whether the spiking evoked by visual stimuli is just a modification of the spontaneous ongoing cortical spiking dynamics or whether the spontaneous spiking state disappears and is replaced by evoked spiking. This study of laminar recordings of spontaneous spiking and visually evoked spiking of neurons in the ferret primary visual cortex shows that the spiking dynamics does not change: the spontaneous spiking as well as evoked spiking is controlled by a stable and persisting fixed point attractor. Its existence guarantees that evoked spiking return to the spontaneous state. However, the spontaneous ongoing spiking state and the visual evoked spiking states are qualitatively different and are separated by a threshold (separatrix). The functional advantage of this organization is that it avoids the need for a system reorganization following visual stimulation, and impedes the transition of spontaneous spiking to evoked spiking and the propagation of spontaneous spiking from layer 4 to layers 2–3. PMID:26778982

  15. The Effects of Perceived Anonymity on Altruistic Punishment

    Directory of Open Access Journals (Sweden)

    Jared Piazza

    2008-07-01

    Full Text Available Previous studies investigating altruistic punishment have confounded the effects of two independent variables: information transmission (or breach of privacy and personal identification (or breach of anonymity. Here we report findings from a brief study in which participants were asked to respond to a social norm violation (i.e., an anonymous actor had behaved selfishly in an economic game by deciding whether to sacrifice their own endowment to punish this person. A third of the participants were told that their economic decisions would be made known to another player but could not be identified (privacy breach condition, whereas another third were informed that their decision as well as their names would be made known (anonymity breach condition. (The decisions of control participants were completely anonymous and private. Participants also justified their economic decisions and reported their emotional experiences. The results were participants punished most in the privacy and anonymity breach conditions and least in the control condition. These findings have implications for existing evolutionary accounts of altruistic punishment.

  16. A Mechanism for Anonymous Credit Card Systems

    Science.gov (United States)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  17. An Applet-based Anonymous Distributed Computing System.

    Science.gov (United States)

    Finkel, David; Wills, Craig E.; Ciaraldi, Michael J.; Amorin, Kevin; Covati, Adam; Lee, Michael

    2001-01-01

    Defines anonymous distributed computing systems and focuses on the specifics of a Java, applet-based approach for large-scale, anonymous, distributed computing on the Internet. Explains the possibility of a large number of computers participating in a single computation and describes a test of the functionality of the system. (Author/LRW)

  18. Data Retention and Anonymity Services

    Science.gov (United States)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  19. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  20. Security Analysis of Accountable Anonymous Group Communication in Dissent

    Science.gov (United States)

    2013-01-31

    instance, group discussion forums or instant messaging. Misbehaving users may abuse this anonymity to disrupt communication, however, and existing...Abstract Users often wish to communicate anonymously on the Internet using, for instance, group discussion forums or instant messaging. Misbehaving users may...personal reprisal (Stein 2003). Yet anonymity makes it difficult to trace or exclude misbehaving participants (Davenport 2002). Online proto- cols

  1. Detection thresholds of macaque otolith afferents.

    Science.gov (United States)

    Yu, Xiong-Jie; Dickman, J David; Angelaki, Dora E

    2012-06-13

    The vestibular system is our sixth sense and is important for spatial perception functions, yet the sensory detection and discrimination properties of vestibular neurons remain relatively unexplored. Here we have used signal detection theory to measure detection thresholds of otolith afferents using 1 Hz linear accelerations delivered along three cardinal axes. Direction detection thresholds were measured by comparing mean firing rates centered on response peak and trough (full-cycle thresholds) or by comparing peak/trough firing rates with spontaneous activity (half-cycle thresholds). Thresholds were similar for utricular and saccular afferents, as well as for lateral, fore/aft, and vertical motion directions. When computed along the preferred direction, full-cycle direction detection thresholds were 7.54 and 3.01 cm/s(2) for regular and irregular firing otolith afferents, respectively. Half-cycle thresholds were approximately double, with excitatory thresholds being half as large as inhibitory thresholds. The variability in threshold among afferents was directly related to neuronal gain and did not depend on spike count variance. The exact threshold values depended on both the time window used for spike count analysis and the filtering method used to calculate mean firing rate, although differences between regular and irregular afferent thresholds were independent of analysis parameters. The fact that minimum thresholds measured in macaque otolith afferents are of the same order of magnitude as human behavioral thresholds suggests that the vestibular periphery might determine the limit on our ability to detect or discriminate small differences in head movement, with little noise added during downstream processing.

  2. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel; Kalnis, Panos; Tao, Yufei

    2011-01-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  3. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel

    2011-02-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  4. Ultracompact low-threshold organic laser.

    Science.gov (United States)

    Deotare, Parag B; Mahony, Thomas S; Bulović, Vladimir

    2014-11-25

    We report an ultracompact low-threshold laser with an Alq3:DCM host:guest molecular organic thin film gain layer. The device uses a photonic crystal nanobeam cavity which provides a high quality factor to mode volume (Q/V) ratio and increased spontaneous emission factor along with a small footprint. Lasing is observed with a threshold of 4.2 μJ/cm(2) when pumped by femtosecond pulses of λ = 400 nm wavelength light. We also model the dynamics of the laser and show good agreement with the experimental data. The inherent waveguide geometry of the structure enables easy on-chip integration with potential applications in biochemical sensing, inertial sensors, and data communication.

  5. System for Anonymous Data Collection Based on Group Signature Scheme

    Directory of Open Access Journals (Sweden)

    David Troják

    2016-01-01

    Full Text Available This paper deals with an anonymous data collection in the Internet of Things (IoT. the privacy and anonymity of the data source is important for many IoT applications, such as in agriculture, health, and automotive. the proposed data‑collection system provides anonymity for the data sources by applying a cooperation group scheme. the group scheme also provides a low power consumption. the system is built upon the Tor (The Onion Router anonymous network, which is a part of the Internet darknet. the proposed system was designed for the Android devices on the client side and for Java environment on the server side. We evaluated the anonymous data collection in a real‑use scenario that covers selected data acquisition (e.g. signal strength from smartphones triggered by their geographical location change. the results show that the proposed system provides the sufficient data source anonymity, an effective revocation, a low computational cost and a low overhead.

  6. Anonymous Authorship Control for User-Generated Content

    Directory of Open Access Journals (Sweden)

    Suk-Bong LEE

    2007-12-01

    Full Text Available User-Generated Content (UGC is opening up new large market in content services, and more and more people are visiting web sites to share and enjoy UGCs. These trends make many authors to move into online. Authors want to conserve their authorship and expect to publish their UGC anonymously in cases. To meet the requirements, we propose a new authorship control model based on watermarking and metadata. Authors can embed their authorship into their UGC with identities or with anonym. Even though an author publishes his UGC anonymously, he can prove his authorship without unveiling his identity via 5 methods utilizing the proposed authorship model. The proposed model and methods need no TTP and are robust even based on fragile underlying watermarking scheme.

  7. Amplified spontaneous emission in solar-pumped iodine laser

    Science.gov (United States)

    Cho, Yong S.; Hwang, In H.; Han, Kwang S.; Lee, Ja H.

    1992-01-01

    The amplified spontaneous emission (ASE) from a long pulse, solar-simulating radiation pumped iodine laser amplifier is studied. The ASE threshold pump intensity is almost proportional to the inverse of the laser gain length when the gas pressure is constant in the laser tube.

  8. Role of spontaneous and stimulated emission in photon correlations

    International Nuclear Information System (INIS)

    Chopra, S.; Bohidar, H.; Harwalkar, V.

    1984-01-01

    Photon correlations have been alternately attributed to either spontaneous or stimulated emission by various authors. In this paper, the authors interpret, on the basis of available experimental data, the contribution of each emission form to the evolution of photon statistics. The laser is used as an example of a source which exhibits different statistical characteristics depending on the level of excitation, which is governed by the pump parameter a. From the data, it is evident that the transition from below to above threshold is accompanied by a significant drop in the magnitude of correlation and an increase in decay time. It may be noted that this transition causes a substantial increase in the coherent output which emphasizes the predominance of stimulated emission. In the case of a laser below threshold, however, photon correlations arise due to superposition of the more dominant spontaneously emitted wavetrains. Exact solutions of quantized systems do not exist in the presence of saturation effects. This implies that factorization and identification of terms with spontaneous or stimulated emission has not yet been done. This does not preculde a physical and intuitive interpretation of photon statistics within the framework of a standard model, and it is therefore argued that spontaneous emission is responsible for photon correlations while stimulated emission shows up in the dynamics as the coherence time

  9. Vote to link: Recovering from misbehaving anonymous users

    NARCIS (Netherlands)

    Lueks, W.; Everts, M.H.; Hoepman, J.H.

    2016-01-01

    Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the time the user is blocked or has lost reputation,

  10. Anonymous Agencies, Backstreet Businesses and Covert Collectives

    DEFF Research Database (Denmark)

    Krause Hansen, Hans; Schoeneborn, Dennis

    2015-01-01

    Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381......Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381...

  11. Property-Based Anonymous Attestation in Trusted Cloud Computing

    Directory of Open Access Journals (Sweden)

    Zhen-Hu Ning

    2014-01-01

    Full Text Available In the remote attestation on Trusted Computer (TC computing mode TCCP, the trusted computer TC has an excessive burden, and anonymity and platform configuration information security of computing nodes cannot be guaranteed. To overcome these defects, based on the research on and analysis of current schemes, we propose an anonymous proof protocol based on property certificate. The platform configuration information is converted by the matrix algorithm into the property certificate, and the remote attestation is implemented by trusted ring signature scheme based on Strong RSA Assumption. By the trusted ring signature scheme based on property certificate, we achieve the anonymity of computing nodes and prevent the leakage of platform configuration information. By simulation, we obtain the computational efficiency of the scheme. We also expand the protocol and obtain the anonymous attestation based on ECC. By scenario comparison, we obtain the trusted ring signature scheme based on RSA, which has advantages with the growth of the ring numbers.

  12. A hidden service model based on HS-HS anonymous network

    Science.gov (United States)

    Meng, Yitong; Zhao, Xing; Fei, Jinlong; Zhu, Yuefei

    2017-10-01

    The Hidden Service provided by Tor anonymous network can effectively protect the anonymity and security of the Hidden server, this article through the analysis of the data packet structure of Tor, three jump transmission mechanism and link establishment protocol and Hidden Service communication process, in view of the Hidden node number too much, link building Service for too long and too redundant link problem. An improved hidden service model HS-HS is proposed that incorporating multiple transmission link and reuse, and at the same time will be important transit point for reuse protection link anonymity, through the ExperimenTor simulation environment test, verify the improved model of HS-HS can be more effective in guarantee anonymity and security, improve the overall efficiency of data transmission, to meet the needs of today's anonymous service.

  13. Auditory brainstem response latency in forward masking, a marker of sensory deficits in listeners with normal hearing thresholds

    DEFF Research Database (Denmark)

    Mehraei, Golbarg; Paredes Gallardo, Andreu; Shinn-Cunningham, Barbara G.

    2017-01-01

    In rodent models, acoustic exposure too modest to elevate hearing thresholds can nonetheless cause auditory nerve fiber deafferentation, interfering with the coding of supra-threshold sound. Low-spontaneous rate nerve fibers, important for encoding acoustic information at supra-threshold levels...... and in noise, are more susceptible to degeneration than high-spontaneous rate fibers. The change in auditory brainstem response (ABR) wave-V latency with noise level has been shown to be associated with auditory nerve deafferentation. Here, we measured ABR in a forward masking paradigm and evaluated wave......-V latency changes with increasing masker-to-probe intervals. In the same listeners, behavioral forward masking detection thresholds were measured. We hypothesized that 1) auditory nerve fiber deafferentation increases forward masking thresholds and increases wave-V latency and 2) a preferential loss of low...

  14. Really not god: Secularization and pragmatism in Gamblers Anonymous.

    Science.gov (United States)

    Browne, B R

    1994-09-01

    The paper argues that despite maintaining the image of a twelve-step organization, the central theme of the history of Gamblers Anonymous (GA) in the United States is the increasing secularization of the program of the recovery. The paper documents the increasing secularization and pragmatism of Gamblers Anonymous, as reflected in key documents, despite the spiritual vision of its founding member. The author speculates on why Gamblers Anonymous took a secularized development path. Further research is called for.

  15. The influence of spontaneous activity on stimulus processing in primary visual cortex.

    Science.gov (United States)

    Schölvinck, M L; Friston, K J; Rees, G

    2012-02-01

    Spontaneous activity in the resting human brain has been studied extensively; however, how such activity affects the local processing of a sensory stimulus is relatively unknown. Here, we examined the impact of spontaneous activity in primary visual cortex on neuronal and behavioural responses to a simple visual stimulus, using functional MRI. Stimulus-evoked responses remained essentially unchanged by spontaneous fluctuations, combining with them in a largely linear fashion (i.e., with little evidence for an interaction). However, interactions between spontaneous fluctuations and stimulus-evoked responses were evident behaviourally; high levels of spontaneous activity tended to be associated with increased stimulus detection at perceptual threshold. Our results extend those found in studies of spontaneous fluctuations in motor cortex and higher order visual areas, and suggest a fundamental role for spontaneous activity in stimulus processing. Copyright © 2011. Published by Elsevier Inc.

  16. Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation

    Directory of Open Access Journals (Sweden)

    Jia Yaoqi

    2016-10-01

    Full Text Available The peer-assisted CDN is a new content distribution paradigm supported by CDNs (e.g., Akamai, which enables clients to cache and distribute web content on behalf of a website. Peer-assisted CDNs bring significant bandwidth savings to website operators and reduce network latency for users. In this work, we show that the current designs of peer-assisted CDNs expose clients to privacy-invasive attacks, enabling one client to infer the set of browsed resources of another client. To alleviate this, we propose an anonymous peer-assisted CDN (APAC, which employs content delivery while providing initiator anonymity (i.e., hiding who sends the resource request and responder anonymity (i.e., hiding who responds to the request for peers. APAC can be a web service, compatible with current browsers and requiring no client-side changes. Our anonymity analysis shows that our APAC design can preserve a higher level of anonymity than state-of-the-art peer-assisted CDNs. In addition, our evaluation demonstrates that APAC can achieve desired performance gains.

  17. Anonymity and Openness in Donor Conception: the New Danish Model

    DEFF Research Database (Denmark)

    Herrmann, Janne Rothmar

    2013-01-01

    model in donor conception which offers women/couples a choice of anonymity or openness in donation.This paper is based on my talk on June 20, 2013 at London School of Economics at the conference “New Families and Genetic Identities: Developments in law, policy and research” organised by the Morgan...... bank is based in Denmark and consequently anonymous sperm is also exported abroad, even into jurisdictions where anonymity is banned illegal. This commentary traces the raison d’être of anonymity in Danish law, accounts for the legal framework for the internet sale of sperm and examines the new Danish...

  18. Securing the anonymity of content providers in the World Wide Web

    Science.gov (United States)

    Demuth, Thomas; Rieke, Andreas

    1999-04-01

    Nowadays the World Wide Web (WWW) is an established service used by people all over the world. Most of them do not recognize the fact that they reveal plenty of information about themselves or their affiliation and computer equipment to the providers of web pages they connect to. As a result, a lot of services offer users to access web pages unrecognized or without risk of being backtracked, respectively. This kind of anonymity is called user or client anonymity. But on the other hand, an equivalent protection for content providers does not exist, although this feature is desirable for many situations in which the identity of a publisher or content provider shall be hidden. We call this property server anonymity. We will introduce the first system with the primary target to offer anonymity for providers of information in the WWW. Beside this property, it provides also client anonymity. Based on David Chaum's idea of mixes and in relation to the context of the WWW, we explain the term 'server anonymity' motivating the system JANUS which offers both client and server anonymity.

  19. Anonymous birth law saves babies--optimization, sustainability and public awareness.

    Science.gov (United States)

    Grylli, Chryssa; Brockington, Ian; Fiala, Christian; Huscsava, Mercedes; Waldhoer, Thomas; Klier, Claudia M

    2016-04-01

    The aims of this study are to assess the impact of Austria's anonymous birth law from the time relevant statistical records are available and to evaluate the use of hatches versus anonymous hospital delivery. This study is a complete census of police-reported neonaticides (1975-2012) as well as anonymous births including baby hatches in Austria during 2002-2012. The time trends of neonaticide rates, anonymous births and baby hatches were analysed by means of Poisson and logistic regression model. Predicted and observed rates were derived and compared using a Bayesian Poisson regression model. Predicted numbers of neonaticides for the period of the active awareness campaign, 2002-2004, were more than three times larger than the observed number (p = 0.0067). Of the 365 women who benefitted from this legislation, only 11.5% chose to put their babies in a baby hatch. Since the law was introduced, a significant decreasing tendency of numbers of anonymous births (p = 047) was observed, while there was significant increase of neonaticide rates (p = 0.0001). The implementation of the anonymous delivery law is associated with a decrease in the number of police-reported neonaticides. The subsequent significantly decreasing numbers of anonymous births with an accompanying increase of neonaticides represents additional evidence for the effectiveness of the measure.

  20. Authentic Attributes with Fine-Grained Anonymity Protection

    Science.gov (United States)

    2000-01-01

    registrations and ecommerce trans- Preprint - 2 Stuart G. Stubblebine, and Paul F. Syverson. Authentic Attributes with Fine-Grained Anonymity Protection...driver’s license and birth certi cate. When the registration process is complete, certi cates could be on a smart card that the customer is carrying. The...proof. At least initially, it might not be electronic, e.g., possession of a passport, of a driver’s license and birth certi cate, etc. Anonymous

  1. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    Science.gov (United States)

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace.

  2. What Does Anonymization Mean? DataSHIELD and the Need for Consensus on Anonymization Terminology.

    Science.gov (United States)

    Wallace, Susan E

    2016-06-01

    Anonymization is a recognized process by which identifiers can be removed from identifiable data to protect an individual's confidentiality and is used as a standard practice when sharing data in biomedical research. However, a plethora of terms, such as coding, pseudonymization, unlinked, and deidentified, have been and continue to be used, leading to confusion and uncertainty. This article shows that this is a historic problem and argues that such continuing uncertainty regarding the levels of protection given to data risks damaging initiatives designed to assist researchers conducting cross-national studies and sharing data internationally. DataSHIELD and the creation of a legal template are used as examples of initiatives that rely on anonymization, but where the inconsistency in terminology could hinder progress. More broadly, this article argues that there is a real possibility that there could be possible damage to the public's trust in research and the institutions that carry it out by relying on vague notions of the anonymization process. Research participants whose lack of clear understanding of the research process is compensated for by trusting those carrying out the research may have that trust damaged if the level of protection given to their data does not match their expectations. One step toward ensuring understanding between parties would be consistent use of clearly defined terminology used internationally, so that all those involved are clear on the level of identifiability of any particular set of data and, therefore, how that data can be accessed and shared.

  3. Is it OK to be an Anonymous?

    Directory of Open Access Journals (Sweden)

    Philip Serracino-Inglott

    2013-12-01

    Full Text Available Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterious as popularly portrayed. Under a definition of vigilantism that includes reprobative punishment rather than violence as a key element, Anonymous are vigilantes. Many of its Ops can be justified in view of the mismatch between formal norm enforcement practice and Internet natives’ experience of it. Anons are more like eco-warriors than terrorists. While their actions are contentious, their force is framed in a vision of common good that is not unreasonable. Engaging with online deviants is shown to be a productive way of identifying the weaknesses in concepts underpinning moral evaluation of Internet-enabled phenomena.

  4. Spontaneous swallowing frequency has potential to identify dysphagia in acute stroke.

    Science.gov (United States)

    Crary, Michael A; Carnaby, Giselle D; Sia, Isaac; Khanna, Anna; Waters, Michael F

    2013-12-01

    Spontaneous swallowing frequency has been described as an index of dysphagia in various health conditions. This study evaluated the potential of spontaneous swallow frequency analysis as a screening protocol for dysphagia in acute stroke. In a cohort of 63 acute stroke cases, swallow frequency rates (swallows per minute [SPM]) were compared with stroke and swallow severity indices, age, time from stroke to assessment, and consciousness level. Mean differences in SPM were compared between patients with versus without clinically significant dysphagia. Receiver operating characteristic curve analysis was used to identify the optimal threshold in SPM, which was compared with a validated clinical dysphagia examination for identification of dysphagia cases. Time series analysis was used to identify the minimally adequate time period to complete spontaneous swallow frequency analysis. SPM correlated significantly with stroke and swallow severity indices but not with age, time from stroke onset, or consciousness level. Patients with dysphagia demonstrated significantly lower SPM rates. SPM differed by dysphagia severity. Receiver operating characteristic curve analysis yielded a threshold of SPM≤0.40 that identified dysphagia (per the criterion referent) with 0.96 sensitivity, 0.68 specificity, and 0.96 negative predictive value. Time series analysis indicated that a 5- to 10-minute sampling window was sufficient to calculate spontaneous swallow frequency to identify dysphagia cases in acute stroke. Spontaneous swallowing frequency presents high potential to screen for dysphagia in acute stroke without the need for trained, available personnel.

  5. Spontaneous Swallowing Frequency [Has Potential to] Identify Dysphagia in Acute Stroke

    Science.gov (United States)

    Carnaby, Giselle D; Sia, Isaac; Khanna, Anna; Waters, Michael

    2014-01-01

    Background and Purpose Spontaneous swallowing frequency has been described as an index of dysphagia in various health conditions. This study evaluated the potential of spontaneous swallow frequency analysis as a screening protocol for dysphagia in acute stroke. Methods In a cohort of 63 acute stroke cases swallow frequency rates (swallows per minute: SPM) were compared to stroke and swallow severity indices, age, time from stroke to assessment, and consciousness level. Mean differences in SPM were compared between patients with vs. without clinically significant dysphagia. ROC analysis was used to identify the optimal threshold in SPM which was compared to a validated clinical dysphagia examination for identification of dysphagia cases. Time series analysis was employed to identify the minimally adequate time period to complete spontaneous swallow frequency analysis. Results SPM correlated significantly with stroke and swallow severity indices but not with age, time from stroke onset, or consciousness level. Patients with dysphagia demonstrated significantly lower SPM rates. SPM differed by dysphagia severity. ROC analysis yielded a threshold of SPM ≤ 0.40 which identified dysphagia (per the criterion referent) with 0.96 sensitivity, 0.68 specificity, and 0.96 negative predictive value. Time series analysis indicated that a 5 to 10 minute sampling window was sufficient to calculate spontaneous swallow frequency to identify dysphagia cases in acute stroke. Conclusions Spontaneous swallowing frequency presents high potential to screen for dysphagia in acute stroke without the need for trained, available personnel. PMID:24149008

  6. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel; Zhao, Keliang; Papadias, Dimitris; Kalnis, Panos

    2010-01-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  7. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel

    2010-05-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  8. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    Science.gov (United States)

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

  9. Multiscalar production amplitudes beyond threshold

    CERN Document Server

    Argyres, E N; Kleiss, R H

    1993-01-01

    We present exact tree-order amplitudes for $H^* \\to n~H$, for final states containing one or two particles with non-zero three-momentum, for various interaction potentials. We show that there are potentials leading to tree amplitudes that satisfy unitarity, not only at threshold but also in the above kinematical configurations and probably beyond. As a by-product, we also calculate $2\\to n$ tree amplitudes at threshold and show that for the unbroken $\\phi^4$ theory they vanish for $n>4~$, for the Standard Model Higgs they vanish for $n\\ge 3~$ and for a model potential, respecting tree-order unitarity, for $n$ even and $n>4~$. Finally, we calculate the imaginary part of the one-loop $1\\to n$ amplitude in both symmetric and spontaneously broken $\\phi^4$ theory.

  10. Traveling the Silk Road: A Measurement of a Large Anonymous Online Marketplace

    Science.gov (United States)

    2012-11-28

    Silk Road, an anonymous, international online marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We gather...analysis of Silk Road, an anonymous, international on- line marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We...anonymity, Silk Road needs to also preserve payment anonymity. To that effect, Silk Road only supports Bitcoin (BTC, [30]) as a trading currency

  11. A survey of anonymous peer-to-peer file-sharing

    NARCIS (Netherlands)

    Chothia, T.; Chatzikokolakis, K.; Enokido, T.; Yan, L.; Xiao, B.; Kim, D.; Dai, Y.S.; Yang, L.T.

    2005-01-01

    This paper provides a survey of searchable, peer-to-peer file-sharing systems that offer the user some form of anonymity. We start this survey by giving a brief description of the most popular methods of providing anonymous communication. These include the Ants protocol, Onion routing, Multicasting,

  12. Persona: Network Layer Anonymity and Accountability for Next Generation Internet

    Science.gov (United States)

    Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina

    Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.

  13. Build up of off-diagonal long-range order in microcavity exciton-polaritons across the parametric threshold

    DEFF Research Database (Denmark)

    Spano, R.; Cuadra, J.; Lingg, C.

    2013-01-01

    We report an experimental study of the spontaneous spatial and temporal coherence of polariton condensates generated in the optical parametric oscillator configuration, below and at the parametric threshold, and as a function of condensate area. Above the threshold we obtain very long coherence t...

  14. Academic freedom, public reactions, and anonymity.

    Science.gov (United States)

    Häyry, Matti

    2014-05-01

    Academic freedom can be defined as immunity against adverse reactions from the general public, designed to keep scholars unintimidated and productive even after they have published controversial ideas. Francesca Minerva claims that this notion of strict instrumental academic freedom is supported by Ronald Dworkin, and that anonymity would effectively defend the sphere of immunity implied by it. Against this, I argue that the idea defended by Minerva finds no support in the work by Dworkin referred to; that anonymity would not in most cases effectively protect the kind of immunity sought after; and that in some cases it would not even be desirable to protect scholars from public reactions to their controversial claims. © 2014 John Wiley & Sons Ltd.

  15. Perturbation analysis of spontaneous action potential initiation by stochastic ion channels

    KAUST Repository

    Keener, James P.

    2011-07-01

    A stochastic interpretation of spontaneous action potential initiation is developed for the Morris-Lecar equations. Initiation of a spontaneous action potential can be interpreted as the escape from one of the wells of a double well potential, and we develop an asymptotic approximation of the mean exit time using a recently developed quasistationary perturbation method. Using the fact that the activating ionic channel\\'s random openings and closings are fast relative to other processes, we derive an accurate estimate for the mean time to fire an action potential (MFT), which is valid for a below-threshold applied current. Previous studies have found that for above-threshold applied current, where there is only a single stable fixed point, a diffusion approximation can be used. We also explore why different diffusion approximation techniques fail to estimate the MFT. © 2011 American Physical Society.

  16. Our Anonymous Online Research Participants Are Not Always Anonymous: Is This a Problem?

    Science.gov (United States)

    Dawson, Phillip

    2014-01-01

    When educational research is conducted online, we sometimes promise our participants that they will be anonymous--but do we deliver on this promise? We have been warned since 1996 to be careful when using direct quotes in Internet research, as full-text web search engines make it easy to find chunks of text online. This paper details an empirical…

  17. Structure and Anonymity of the Bitcoin Transaction Graph

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    2013-05-01

    Full Text Available The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network structure, network dynamics, and the implied anonymity challenges, as well as guidance on the future evolution of complex payment systems. We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months. We discuss the implications.

  18. Effectiveness of Anonymization Methods in Preserving Patients' Privacy: A Systematic Literature Review.

    Science.gov (United States)

    Langarizadeh, Mostafa; Orooji, Azam; Sheikhtaheri, Abbas

    2018-01-01

    An ever growing for application of electronic health records (EHRs) has improved healthcare providers' communications, access to data for secondary use and promoted the quality of services. Patient's privacy has been changed to a great issue today since there are large loads of critical information in EHRs. Therefore, many privacy preservation techniques have been proposed and anonymization is a common one. This study aimed to investigate the effectiveness of anonymization in preserving patients' privacy. The articles published in the 2005-2016 were included. Pubmed, Cochrane, IEEE and ScienceDirect were searched with a variety of related keywords. Finally, 18 articles were included. In the present study, the relevant anonymization issues were investigated in four categories: secondary use of anonymized data, re-identification risk, anonymization effect on information extraction and inadequacy of current methods for different document types. The results revealed that though anonymization cannot reduce the risk of re-identification to zero, if implemented correctly, can manage to help preserve patient's privacy.

  19. Alcoholics Anonymous and nursing. Lessons in holism and spiritual care.

    Science.gov (United States)

    McGee, E M

    2000-03-01

    Alcoholic Anonymous (AA) is a worldwide, million-member organization that has assisted countless alcoholics to achieve sobriety through a spiritual program of recovery from alcoholism. Based on spiritual principles known as the "Twelve Steps" and "Twelve Traditions," AA has provided a model for other recovery programs such as Narcotics Anonymous (NA), Gamblers Anonymous (GA), and Sex and Love Addicts Anonymous (SLAA). Recovery in AA appears to involve a process of self-transcendence. In recent years, nursing scholars have increasingly explored the concepts of self-transcendence and spirituality as they apply to nursing theory and practice. This article explores the roots and spiritual dimensions of 12-step recovery programs. It further explores the ways in which theoretical and clinical knowledge about the delivery of spiritual care interventions may be gained from an understanding of AA's spiritual approach to recovery.

  20. Culture or anonymity? Differences in proposer behaviour in Korea and Germany.

    Science.gov (United States)

    Horak, Sven

    2015-10-01

    This study explores the proposer behaviour in an ultimatum game (UG) frame under anonymous and non-anonymous conditions among a Korean and German subject pool (n = 590) in comparison. Whereas the anonymous condition is represented by the standard UG, the non-anonymous condition integrates an aggregate of the Korean cultural context variables university affiliation, regional origin and seniority. The latter, a classic Confucian context variable, is measured by age differentials. The former two are impactful components of so-called Yongo networks, a unique Korean informal institution identical to Chinese Guanxi ties. Yongo networks, yet underrepresented in research, are said to be a central context variable to explain Korean social ties and decision-making behaviour. We observe significant differences between the offer behaviours of Korean and German subjects when exposing selected cultural variables. We argue that the behavioural differences observed are in fact due to culture not anonymity. © 2015 International Union of Psychological Science.

  1. Scalable and Anonymous Group Communication with MTor

    Directory of Open Access Journals (Sweden)

    Lin Dong

    2016-04-01

    Full Text Available This paper presents MTor, a low-latency anonymous group communication system. We construct MTor as an extension to Tor, allowing the construction of multi-source multicast trees on top of the existing Tor infrastructure. MTor does not depend on an external service to broker the group communication, and avoids central points of failure and trust. MTor’s substantial bandwidth savings and graceful scalability enable new classes of anonymous applications that are currently too bandwidth-intensive to be viable through traditional unicast Tor communication-e.g., group file transfer, collaborative editing, streaming video, and real-time audio conferencing.

  2. Anonymous living liver donation: donor profiles and outcomes.

    Science.gov (United States)

    Reichman, T W; Fox, A; Adcock, L; Wright, L; Abbey, S E; Levy, G; Grant, D R

    2010-09-01

    There are no published series of the assessment process, profiles and outcomes of anonymous, directed or nondirected live liver donation. The outcomes of 29 consecutive potential anonymous liver donors at our center were assessed. We used our standard live liver assessment process, augmented with the following additional acceptance criteria: a logical rationale for donation, a history of social altruism, strong social supports and a willingness to maintain confidentiality of patient information. Seventeen potential donors were rejected and 12 donors were ultimately accepted (six male, six female). All donors were strongly motivated by a desire and sense of responsibility to help others. Four donations were directed toward recipients who undertook media appeals. The donor operations included five left lateral segmentectomies and seven right hepatectomies. The overall donor morbidity was 40% with one patient having a transient Clavien level 3 complication (a pneumothorax). All donors are currently well. None expressed regret about their decision to donate, and all volunteered the opinion that donation had improved their lives. The standard live liver donor assessment process plus our additional requirements appears to provide a robust assessment process for the selection of anonymous live liver donors. Acceptance of anonymous donors enlarges the donor liver pool. © 2010 The Authors Journal compilation © 2010 The American Society of Transplantation and the American Society of Transplant Surgeons.

  3. Using anonymized reflection to teach ethics: a pilot study.

    Science.gov (United States)

    Kyle, Gaye

    2008-01-01

    Anonymized reflection was employed as an innovative way of teaching ethics in order to enhance students' ability in ethical decision making during a Care of the Dying Patient and Family' module. Both qualitative and quantitative data were collected from the first two student cohorts who experienced anonymized reflection ( n = 24). The themes identified were the richness and relevance of scenarios, small-group work and a team approach to teaching. Students indicated that they preferred this style of teaching. This finding was verified by a postal questionnaire conducted four months later. The conclusions drawn from this study suggest that using anonymized reflection is an effective method for teaching ethics to nurses and indicates that learning about ethical issues in this way reduces uncertainties.

  4. Criminal offenses in gamblers anonymous and hospital treated pathological gamblers.

    Science.gov (United States)

    Blaszczynski, A P; McConaghy, N

    1994-06-01

    The purpose of this study was to compare the nature and prevalence of gambling and non-gambling related offenses in samples of pathological gamblers seeking behavioural treatment from a hospital-based program and those attending Gamblers Anonymous. A semi-structured interview schedule obtaining demographic data and details of the nature, frequency, and consequent legal action of criminal offenses committed was administered to 152 consecutive hospital treated pathological gamblers, and 154 Gamblers Anonymous attendees who volunteered to participate in the study. Of the total sample, 59% admitted a gambling-related offense, and 23% to a conviction. There was no difference in the proportion of hospital treated and Gamblers Anonymous subjects who offended. The most common gambling-related offenses were larceny, embezzlement and misappropriation. Gamblers committed a median of ten offenses over an average ten year period of pathological gambling with a median value of $ A 300(1) per offense. The median value for each non-gambling-related offense was $ A 130. Except for the significantly older mean age of Gamblers Anonymous subjects, hospital treated gamblers did not differ from Gamblers Anonymous attenders on relevant demographic features or parameters of gambling behaviour. Findings were interpreted to suggest a possible causal link between pathological gambling and the commission of non-violent property offenses.

  5. Enabling genomic-phenomic association discovery without sacrificing anonymity.

    Directory of Open Access Journals (Sweden)

    Raymond D Heatherly

    Full Text Available Health information technologies facilitate the collection of massive quantities of patient-level data. A growing body of research demonstrates that such information can support novel, large-scale biomedical investigations at a fraction of the cost of traditional prospective studies. While healthcare organizations are being encouraged to share these data in a de-identified form, there is hesitation over concerns that it will allow corresponding patients to be re-identified. Currently proposed technologies to anonymize clinical data may make unrealistic assumptions with respect to the capabilities of a recipient to ascertain a patients identity. We show that more pragmatic assumptions enable the design of anonymization algorithms that permit the dissemination of detailed clinical profiles with provable guarantees of protection. We demonstrate this strategy with a dataset of over one million medical records and show that 192 genotype-phenotype associations can be discovered with fidelity equivalent to non-anonymized clinical data.

  6. A New Heuristic Anonymization Technique for Privacy Preserved Datasets Publication on Cloud Computing

    Science.gov (United States)

    Aldeen Yousra, S.; Mazleena, Salleh

    2018-05-01

    Recent advancement in Information and Communication Technologies (ICT) demanded much of cloud services to sharing users’ private data. Data from various organizations are the vital information source for analysis and research. Generally, this sensitive or private data information involves medical, census, voter registration, social network, and customer services. Primary concern of cloud service providers in data publishing is to hide the sensitive information of individuals. One of the cloud services that fulfill the confidentiality concerns is Privacy Preserving Data Mining (PPDM). The PPDM service in Cloud Computing (CC) enables data publishing with minimized distortion and absolute privacy. In this method, datasets are anonymized via generalization to accomplish the privacy requirements. However, the well-known privacy preserving data mining technique called K-anonymity suffers from several limitations. To surmount those shortcomings, I propose a new heuristic anonymization framework for preserving the privacy of sensitive datasets when publishing on cloud. The advantages of K-anonymity, L-diversity and (α, k)-anonymity methods for efficient information utilization and privacy protection are emphasized. Experimental results revealed the superiority and outperformance of the developed technique than K-anonymity, L-diversity, and (α, k)-anonymity measure.

  7. Reexamination of the Association between Anonymity and Self-Interested Unethical Behavior in Adults

    Science.gov (United States)

    Nogami, Tatsuya

    2009-01-01

    The well-established notion that the frequency of self-interested unethical behavior increases among anonymous people was reexamined employing a more strict definition of anonymity, voluntary unethical behavior, and adult individuals. Anonymity was defined as nonassociability of the participant's traits with respect to unethical behavior. The…

  8. Spontaneous Subarachnoid Hemorrhage: A Systematic Review and Meta-analysis Describing the Diagnostic Accuracy of History, Physical Examination, Imaging, and Lumbar Puncture With an Exploration of Test Thresholds.

    Science.gov (United States)

    Carpenter, Christopher R; Hussain, Adnan M; Ward, Michael J; Zipfel, Gregory J; Fowler, Susan; Pines, Jesse M; Sivilotti, Marco L A

    2016-09-01

    Spontaneous subarachnoid hemorrhage (SAH) is a rare, but serious etiology of headache. The diagnosis of SAH is especially challenging in alert, neurologically intact patients, as missed or delayed diagnosis can be catastrophic. The objective was to perform a diagnostic accuracy systematic review and meta-analysis of history, physical examination, cerebrospinal fluid (CSF) tests, computed tomography (CT), and clinical decision rules for spontaneous SAH. A secondary objective was to delineate probability of disease thresholds for imaging and lumbar puncture (LP). PubMed, Embase, Scopus, and research meeting abstracts were searched up to June 2015 for studies of emergency department patients with acute headache clinically concerning for spontaneous SAH. QUADAS-2 was used to assess study quality and, when appropriate, meta-analysis was conducted using random effects models. Outcomes were sensitivity, specificity, and positive (LR+) and negative (LR-) likelihood ratios. To identify test and treatment thresholds, we employed the Pauker-Kassirer method with Bernstein test indication curves using the summary estimates of diagnostic accuracy. A total of 5,022 publications were identified, of which 122 underwent full-text review; 22 studies were included (average SAH prevalence = 7.5%). Diagnostic studies differed in assessment of history and physical examination findings, CT technology, analytical techniques used to identify xanthochromia, and criterion standards for SAH. Study quality by QUADAS-2 was variable; however, most had a relatively low risk of biases. A history of neck pain (LR+ = 4.1; 95% confidence interval [CI] = 2.2 to 7.6) and neck stiffness on physical examination (LR+ = 6.6; 95% CI = 4.0 to 11.0) were the individual findings most strongly associated with SAH. Combinations of findings may rule out SAH, yet promising clinical decision rules await external validation. Noncontrast cranial CT within 6 hours of headache onset accurately ruled in (LR+ = 230; 95

  9. College Students' Experiences with Anonymous Social Media: Implications for Campus Racial Climate

    Science.gov (United States)

    Armstrong, Amanda; Thomas, Jaymi; Smith, Madeline

    2017-01-01

    The purpose of this exploratory case study was to gather undergraduate students' perceptions of anonymous racist messages found on Yik Yak and to better understand the implications of anonymous platforms on campus racial climate. Given the limited research surrounding students' use of anonymous social media platforms, as well as the predominant…

  10. An outcome study of Gamblers Anonymous.

    Science.gov (United States)

    Stewart, R M; Brown, R I

    1988-02-01

    Retrospective and prospective studies of a total sample of 232 attenders at groups of Gamblers Anonymous suggest that total abstinence from gambling was maintained by 8% of all comers at one year from first attendance and by 7% at two years.

  11. Social distance and anonymity modulate fairness consideration: An ERP study

    Science.gov (United States)

    Yu, Rongjun; Hu, Pan; Zhang, Ping

    2015-01-01

    Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we found that acceptance rate and reaction time can be substantially modified by social distance and anonymity. Feedback-related negativity, an ERP component associated with conflict between cognitive and emotion motives, was more negative in response to unfairness than fairness from strangers; however, it showed an opposite trend for unfair offers provided by friends, suggesting that the influence of social distance on fairness perception is relatively fast. The P300 in response to fair offers was more positive when the proposers made offers when uncertain about partner identity than when certain about partner identity. These results suggest that unfairness is evaluated in a fast conflict detection stage and a slower stage that integrates more complex social contextual factors such as anonymity. PMID:26293456

  12. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  13. Anonymous voting for multi-dimensional CV quantum system

    International Nuclear Information System (INIS)

    Shi Rong-Hua; Xiao Yi; Shi Jin-Jing; Guo Ying; Lee, Moon-Ho

    2016-01-01

    We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. (paper)

  14. Ultra-low threshold gallium nitride photonic crystal nanobeam laser

    Energy Technology Data Exchange (ETDEWEB)

    Niu, Nan, E-mail: nanniu@fas.harvard.edu; Woolf, Alexander; Wang, Danqing; Hu, Evelyn L. [School of Engineering and Applied Sciences, Harvard University, Cambridge, Massachusetts 02138 (United States); Zhu, Tongtong; Oliver, Rachel A. [Department of Materials Science and Metallurgy, University of Cambridge, 27 Charles Babbage Road, Cambridge CB3 0FS (United Kingdom); Quan, Qimin [Rowland Institute at Harvard University, Cambridge, Massachusetts 02142 (United States)

    2015-06-08

    We report exceptionally low thresholds (9.1 μJ/cm{sup 2}) for room temperature lasing at ∼450 nm in optically pumped Gallium Nitride (GaN) nanobeam cavity structures. The nanobeam cavity geometry provides high theoretical Q (>100 000) with small modal volume, leading to a high spontaneous emission factor, β = 0.94. The active layer materials are Indium Gallium Nitride (InGaN) fragmented quantum wells (fQWs), a critical factor in achieving the low thresholds, which are an order-of-magnitude lower than obtainable with continuous QW active layers. We suggest that the extra confinement of photo-generated carriers for fQWs (compared to QWs) is responsible for the excellent performance.

  15. Ultra-low threshold gallium nitride photonic crystal nanobeam laser

    International Nuclear Information System (INIS)

    Niu, Nan; Woolf, Alexander; Wang, Danqing; Hu, Evelyn L.; Zhu, Tongtong; Oliver, Rachel A.; Quan, Qimin

    2015-01-01

    We report exceptionally low thresholds (9.1 μJ/cm 2 ) for room temperature lasing at ∼450 nm in optically pumped Gallium Nitride (GaN) nanobeam cavity structures. The nanobeam cavity geometry provides high theoretical Q (>100 000) with small modal volume, leading to a high spontaneous emission factor, β = 0.94. The active layer materials are Indium Gallium Nitride (InGaN) fragmented quantum wells (fQWs), a critical factor in achieving the low thresholds, which are an order-of-magnitude lower than obtainable with continuous QW active layers. We suggest that the extra confinement of photo-generated carriers for fQWs (compared to QWs) is responsible for the excellent performance

  16. The anonymity paradox in patient engagement: reputation, risk and web-based public feedback.

    Science.gov (United States)

    Speed, Ewen; Davison, Charlie; Gunnell, Caroline

    2016-06-01

    The UK National Health Service (NHS) has long espoused patient and public engagement. Recent years have seen increasing use of internet-based methods of collecting feedback about patient experience and public and staff views about NHS services and priorities. Often hailed as a means of facilitating participative democratic patient engagement, these processes raise a number of complex issues. A key aspect of it is the opportunity for comment to be made anonymously. Our research reveals an anonymity paradox whereby patients clearly demonstrate a perception that anonymity is a prerequisite for effective use of these feedback processes, whereas professionals demonstrate a perception that patient anonymity is a barrier to effective use. The risks of anonymity are constructed very differently by patients and professionals. Patient concerns around anonymity were not motivated by a general concern about a loss of privacy, but more that a positive identification might compromise future care. For professionals, concerns were voiced more around risks of reputational damage for specific practitioners or practices (in that anyone could say anything) and also that this anonymous feedback was available publicly and that it might go against the medical opinion of the professional. These concerns pointed to important differences in perceptions of patient and professional vulnerability. In the qualitative analysis that follows the key finding was that while anonymity makes service users feel less vulnerable, it can have the opposite effect on managers and clinical staff. This raises important implications for the use and utility of internet-based methods of collecting patient feedback. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  17. BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-12-01

    Full Text Available With the widespread use of Internet, Web, and mobile technologies, a new category of applications and transactions that requires anonymity is gaining increased interest and importance. Examples of such new applications are innovative payment systems, digital notaries, electronic voting, documents sharing, electronic auctions, medical applications, and many others. In addition to anonymity, these applications and transactions also require standard security services: identification, authentication, and authorization of users and protection of their transactions. Providing those services in combination with anonymity is an especially challenging issue, because all security services require explicit user identification and authentication. To solve this issue and enable applications with security and also anonymity we introduce a new type of cryptographically encapsulated objects called BIX certificates. “BIX” is an abbreviation for “Blockchain Information Exchange.” Their purpose is equivalent to X.509 certificates: to support security services for users and transactions, but also enhanced with anonymity. This paper describes the structure and attributes of BIX certificate objects and all related protocols for their creation, distribution, and use. The BIX Certification Infrastructure (BCI as a distributed public ledger is also briefly described.

  18. Pauses in spontaneous written communication: a keystroke logging study

    Directory of Open Access Journals (Sweden)

    Evgeny Chukharev-Hudilainen

    2014-06-01

    Full Text Available Spontaneous writing observed in chats, instant messengers, and social media has become established as productive modes of communication and discourse genres. However, they remain understudied from the perspective of writing process research. In this paper, we present an empirical study wherein keystrokes made by chat users in a game were recorded. The distributions of the inter-key intervals were analyzed and fitted with ex-Gaussian distribution equation, and an argument for psycholinguistic interpretation of the distribution parameters is presented. This analysis leads to establishing a threshold of 500 ms for the identification of pauses in spontaneous writing. Furthermore, we demonstrate that pauses longer than 1.2 s may correspond to higher-level linguistic processing beyond a single propositional expression (functional element of the discourse.

  19. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    Directory of Open Access Journals (Sweden)

    Youngsook Lee

    2014-01-01

    Full Text Available An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1 it fails to provide user anonymity against any third party as well as the foreign agent, (2 it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3 it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.

  20. Bayesian modeling of consumer behavior in the presence of anonymous visits

    Science.gov (United States)

    Novak, Julie Esther

    Tailoring content to consumers has become a hallmark of marketing and digital media, particularly as it has become easier to identify customers across usage or purchase occasions. However, across a wide variety of contexts, companies find that customers do not consistently identify themselves, leaving a substantial fraction of anonymous visits. We develop a Bayesian hierarchical model that allows us to probabilistically assign anonymous sessions to users. These probabilistic assignments take into account a customer's demographic information, frequency of visitation, activities taken when visiting, and times of arrival. We present two studies, one with synthetic and one with real data, where we demonstrate improved performance over two popular practices (nearest-neighbor matching and deleting the anonymous visits) due to increased efficiency and reduced bias driven by the non-ignorability of which types of events are more likely to be anonymous. Using our proposed model, we avoid potential bias in understanding the effect of a firm's marketing on its customers, improve inference about the total number of customers in the dataset, and provide more precise targeted marketing to both previously observed and unobserved customers.

  1. Can anonymous posters on medical forums be reidentified?

    Science.gov (United States)

    Bobicev, Victoria; Sokolova, Marina; El Emam, Khaled; Jafer, Yasser; Dewar, Brian; Jonker, Elizabeth; Matwin, Stan

    2013-10-03

    Participants in medical forums often reveal personal health information about themselves in their online postings. To feel comfortable revealing sensitive personal health information, some participants may hide their identity by posting anonymously. They can do this by using fake identities, nicknames, or pseudonyms that cannot readily be traced back to them. However, individual writing styles have unique features and it may be possible to determine the true identity of an anonymous user through author attribution analysis. Although there has been previous work on the authorship attribution problem, there has been a dearth of research on automated authorship attribution on medical forums. The focus of the paper is to demonstrate that character-based author attribution works better than word-based methods in medical forums. The goal was to build a system that accurately attributes authorship of messages posted on medical forums. The Authorship Attributor system uses text analysis techniques to crawl medical forums and automatically correlate messages written by the same authors. Authorship Attributor processes unstructured texts regardless of the document type, context, and content. The messages were labeled by nicknames of the forum participants. We evaluated the system's performance through its accuracy on 6000 messages gathered from 2 medical forums on an in vitro fertilization (IVF) support website. Given 2 lists of candidate authors (30 and 50 candidates, respectively), we obtained an F score accuracy in detecting authors of 75% to 80% on messages containing 100 to 150 words on average, and 97.9% on longer messages containing at least 300 words. Authorship can be successfully detected in short free-form messages posted on medical forums. This raises a concern about the meaningfulness of anonymous posting on such medical forums. Authorship attribution tools can be used to warn consumers wishing to post anonymously about the likelihood of their identity being

  2. Optical bistability via quantum interference from incoherent pumping and spontaneous emission

    International Nuclear Information System (INIS)

    Sahrai, M.; Asadpour, S.H.; Sadighi-Bonabi, R.

    2011-01-01

    We theoretically investigate the optical bistability (OB) in a V-type three-level atomic system confined in a unidirectional ring cavity via incoherent pumping field. It is shown that the threshold of optical bistability can be controlled by the rate of an incoherent pumping field and by interference mechanism arising from the spontaneous emission and incoherent pumping field. We demonstrate that the optical bistability converts to optical multi-stability (OM) by the quantum interference mechanism. - Highlights: → We modulate the optical bistability (OB) in a four-level N-type atomic system. → The threshold of optical bistability can be controlled by the quantum interferences. → OB converts to optical multi-stability (OM) by the quantum interferences. → We discuss the effect of an incoherent pumping field on reduction of OB threshold.

  3. Anonymity and Electronics: Adapting Preparation for Radiology Resident Examination.

    Science.gov (United States)

    Chapman, Teresa; Reid, Janet R; O'Conner, Erin E

    2017-06-01

    Diagnostic radiology resident assessment has evolved from a traditional oral examination to computerized testing. Teaching faculty struggle to reconcile the differences between traditional teaching methods and residents' new preferences for computerized testing models generated by new examination styles. We aim to summarize the collective experiences of senior residents at three different teaching hospitals who participated in case review sessions using a computer-based, interactive, anonymous teaching tool, rather than the Socratic method. Feedback was collected from radiology residents following participation in a senior resident case review session using Nearpod, which allows residents to anonymously respond to the teaching material. Subjective resident feedback was uniformly enthusiastic. Ninety percent of residents favor a case-based board review incorporating multiple-choice questions, and 94% favor an anonymous response system. Nearpod allows for inclusion of multiple-choice questions while also providing direct feedback to the teaching faculty, helping to direct the instruction and clarify residents' gaps in knowledge before the Core Examination. Copyright © 2017 The Association of University Radiologists. Published by Elsevier Inc. All rights reserved.

  4. Browsing the Internet: good-bye anonymity!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Do you consider browsing the Internet to be your private business? When visiting random web-sites, how far do you assume you are anonymous? Would it matter to you that Google or Facebook can profile your browsing behaviour in order to better target you with advertisements? Did you notice that you already get targeted ads when you are logged on to Google or Facebook even if you are visiting completely different websites? If matters to you, note that browsing anonymously on the Internet is far from easy.   When you are connected to the Internet, you give away a variety of information: your PC’s IP address, some browser settings like language or screen size, and, probably, your login information. So how private is private? You might argue that your current IP address has been picked from a pool of addresses and therefore regularly changes, so it does not necessarily always pinpoint you. On the other hand, with the dawn of IPv6 there is no need any more for shared IP addresses as the...

  5. Anonymous Web Browsing and Hosting

    OpenAIRE

    MANOJ KUMAR; ANUJ RANI

    2013-01-01

    In today’s high tech environment every organization, individual computer users use internet for accessing web data. To maintain high confidentiality and security of the data secure web solutions are required. In this paper we described dedicated anonymous web browsing solutions which makes our browsing faster and secure. Web application which play important role for transferring our secret information including like email need more and more security concerns. This paper also describes that ho...

  6. Cochlear neuropathy and the coding of supra-threshold sound.

    Science.gov (United States)

    Bharadwaj, Hari M; Verhulst, Sarah; Shaheen, Luke; Liberman, M Charles; Shinn-Cunningham, Barbara G

    2014-01-01

    Many listeners with hearing thresholds within the clinically normal range nonetheless complain of difficulty hearing in everyday settings and understanding speech in noise. Converging evidence from human and animal studies points to one potential source of such difficulties: differences in the fidelity with which supra-threshold sound is encoded in the early portions of the auditory pathway. Measures of auditory subcortical steady-state responses (SSSRs) in humans and animals support the idea that the temporal precision of the early auditory representation can be poor even when hearing thresholds are normal. In humans with normal hearing thresholds (NHTs), paradigms that require listeners to make use of the detailed spectro-temporal structure of supra-threshold sound, such as selective attention and discrimination of frequency modulation (FM), reveal individual differences that correlate with subcortical temporal coding precision. Animal studies show that noise exposure and aging can cause a loss of a large percentage of auditory nerve fibers (ANFs) without any significant change in measured audiograms. Here, we argue that cochlear neuropathy may reduce encoding precision of supra-threshold sound, and that this manifests both behaviorally and in SSSRs in humans. Furthermore, recent studies suggest that noise-induced neuropathy may be selective for higher-threshold, lower-spontaneous-rate nerve fibers. Based on our hypothesis, we suggest some approaches that may yield particularly sensitive, objective measures of supra-threshold coding deficits that arise due to neuropathy. Finally, we comment on the potential clinical significance of these ideas and identify areas for future investigation.

  7. Cochlear Neuropathy and the Coding of Supra-threshold Sound

    Directory of Open Access Journals (Sweden)

    Hari M Bharadwaj

    2014-02-01

    Full Text Available Many listeners with hearing thresholds within the clinically normal range nonetheless complain of difficulty hearing in everyday settings and understanding speech in noise. Converging evidence from human and animal studies points to one potential source of such difficulties: differences in the fidelity with which supra-threshold sound is encoded in the early portions of the auditory pathway. Measures of auditory subcortical steady-state responses in humans and animals support the idea that the temporal precision of the early auditory representation can be poor even when hearing thresholds are normal. In humans with normal hearing thresholds, behavioral ability in paradigms that require listeners to make use of the detailed spectro-temporal structure of supra-threshold sound, such as selective attention and discrimination of frequency modulation, correlate with subcortical temporal coding precision. Animal studies show that noise exposure and aging can cause a loss of a large percentage of auditory nerve fibers without any significant change in measured audiograms. Here, we argue that cochlear neuropathy may reduce encoding precision of supra-threshold sound, and that this manifests both behaviorally and in subcortical steady-state responses in humans. Furthermore, recent studies suggest that noise-induced neuropathy may be selective for higher-threshold, lower-spontaneous-rate nerve fibers. Based on our hypothesis, we suggest some approaches that may yield particularly sensitive, objective measures of supra-threshold coding deficits that arise due to neuropathy. Finally, we comment on the potential clinical significance of these ideas and identify areas for future investigation.

  8. HOP: Achieving Efficient Anonymity in MANETs by Combining HIP, OLSR, and Pseudonyms

    Directory of Open Access Journals (Sweden)

    Campos Javier

    2011-01-01

    Full Text Available Offering secure and anonymous communications in mobile ad hoc networking environments is essential to achieve confidence and privacy, thus promoting widespread adoption of this kind of networks. In addition, some minimum performance levels must be achieved for any solution to be practical and become widely adopted. In this paper, we propose and implement HOP, a novel solution based on cryptographic Host Identity Protocol (HIP that offers security and user-level anonymity in MANET environments while maintaining good performance levels. In particular, we introduce enhancements to the authentication process to achieve Host Identity Tag (HIT relationship anonymity, along with source/destination HIT anonymity when combined with multihoming. Afterward we detail how we integrate our improved version of HIP with the OLSR routing protocol to achieve efficient support for pseudonyms. We implemented our proposal in an experimental testbed, and the results obtained show that performance levels achieved are quite good, and that the integration with OLSR is achieved with a low overhead.

  9. Cost-effectiveness thresholds in health care: a bookshelf guide to their meaning and use.

    Science.gov (United States)

    Culyer, Anthony J

    2016-10-01

    There is misunderstanding about both the meaning and the role of cost-effectiveness thresholds in policy decision making. This article dissects the main issues by use of a bookshelf metaphor. Its main conclusions are as follows: it must be possible to compare interventions in terms of their impact on a common measure of health; mere effectiveness is not a persuasive case for inclusion in public insurance plans; public health advocates need to address issues of relative effectiveness; a 'first best' benchmark or threshold ratio of health gain to expenditure identifies the least effective intervention that should be included in a public insurance plan; the reciprocal of this ratio - the 'first best' cost-effectiveness threshold - will rise or fall as the health budget rises or falls (ceteris paribus); setting thresholds too high or too low costs lives; failure to set any cost-effectiveness threshold at all also involves avertable deaths and morbidity; the threshold cannot be set independently of the health budget; the threshold can be approached from either the demand side or the supply side - the two are equivalent only in a health-maximising equilibrium; the supply-side approach generates an estimate of a 'second best' cost-effectiveness threshold that is higher than the 'first best'; the second best threshold is the one generally to be preferred in decisions about adding or subtracting interventions in an established public insurance package; multiple thresholds are implied by systems having distinct and separable health budgets; disinvestment involves eliminating effective technologies from the insured bundle; differential weighting of beneficiaries' health gains may affect the threshold; anonymity and identity are factors that may affect the interpretation of the threshold; the true opportunity cost of health care in a community, where the effectiveness of interventions is determined by their impact on health, is not to be measured in money - but in health

  10. Fieldale-Collinsville Middle School: Banishing Anonymity

    Science.gov (United States)

    Principal Leadership, 2010

    2010-01-01

    It is no accident that the staff at Fieldale-Collinsville Middle School adopted a central tenet of "Breaking Ranks in the Middle"--to banish anonymity by creating a personalized learning environment for all of its students. The school was created six years ago when the four middle schools in Henry County, VA, were consolidated into two…

  11. Very long spatial and temporal spontaneous coherence of 2D polariton condensates across the parametric threshold

    DEFF Research Database (Denmark)

    Spano, R.; Cuadra, J.; Lingg, C.

    2011-01-01

    , and a relative large beam area (∅~50 μm) to obtain a true 2D condensate. Its coherence properties are measured with a Michelson interferometer. A finite correlation length is measured at an energy δE=-0.19 meV from the parametric threshold, as shown in Fig. 1(A). Once the threshold is reached, by changing...

  12. Social Media and Higher Education: The Problem of Anonymous Electronic Threats to the Campus Community

    Science.gov (United States)

    Reynolds, Cristin Lee; Platt, R. Eric; Malone Schaffer, Lenore; Foster, Holly

    2017-01-01

    This case is for use in graduate courses pertaining to student affairs and higher education administration. It presents challenges higher education professionals face concerning anonymous social media, and specifically how threats made through anonymous social media platforms such as Yik Yak affect the entire university community. The anonymity of…

  13. Achieving sink node anonymity in tactical wireless sensor networks using a reactive routing protocol

    Science.gov (United States)

    2017-06-01

    node anonymity, base station anonymity, Wireless Sensor Networks (WSN), Mobile Ad hoc Network (MANET), Lightweight Ad hoc On-Demand – Next Generation ... Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified protocol prevents an attacker from identifying the sink node without...within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand – Next Generation

  14. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    Directory of Open Access Journals (Sweden)

    Balázs Bodó

    2014-11-01

    Full Text Available This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs. Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of online political activism. Through the short summary of the ad-hoc vigilante group Anonymous, this article describes hacktivism 1.0 as electronic civil disobedience conducted by outsiders. Through the analysis of Wikileaks, the anonymous whistleblowing website, it describes how strong PETs enable the development of hacktivism 2.0, where the source of threat is shifted from outsiders to insiders. Insiders have access to documents with which power can be exposed, and who, by using PETs, can anonymously engage in political action. We also describe the emergence of a third generation of hacktivists who use PETs to disengage and create their own autonomous spaces rather than to engage with power through anonymous whistleblowing.

  15. Botnet detection and prevention in anonymous networks

    NARCIS (Netherlands)

    Kuhnert, Katharina; Steinberger, Jessica; Baier, Harald

    Botnets are a major threat to the Internet landscape and have been responsible for large scale distributed attacks on online services. To make take down measures more difficult, Botnet operators started to incorporate anonymous networks into their software to protect their users and their Botnets.

  16. Simplifying Itai-Rodeh leaderelection for anonymous rings

    NARCIS (Netherlands)

    W.J. Fokkink (Wan); J. Pang

    2004-01-01

    textabstractWe present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh. In contrast to the Itai-Rodeh algorithm, our algorithms are finite-state. So they can be analyzed using explicit state space

  17. Between control and hacker activism: the political actions of Anonymous Brasil.

    Science.gov (United States)

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions.

  18. All or Nothing: The False Promise of Anonymity

    Directory of Open Access Journals (Sweden)

    Neil Walker

    2017-05-01

    Full Text Available In early 2016, the International Committee of Medical Journal Editors (ICMJE proposed that responsible sharing of de-identified individual-level data be required for clinical trials published in their affiliated journals. There would be a delay in implementing this policy to allow for the necessary informed consents to work their way through ethical review. Meanwhile, some researchers and policy makers have conflated the notions of de-identification and anonymity. The former is a process that seeks to mitigate disclosure risk though careful application of rules and statistical analysis, while the latter is an absolute state. The consequence of confusing the process and the state is profound. Extensions to the ICMJE proposal based on the presumed anonymity of data include: sharing unconsented data; sharing data without managing access, as Open Data; and proposals to sell data. This essay aims to show that anonymity (the state cannot be guaranteed by de-identification (the process, and so these extensions to the ICMJE proposal should be rejected on governance grounds, if no other. This is not as negative a position as it might seem, as other disciplines have been aware of these limitations and concomitant responsibilities for many years. The essay concludes with an example from social science of managed access strategies that could be adopted by the medical field.

  19. Enhancing physicians' use of Alcoholics Anonymous: Internet-based training.

    Science.gov (United States)

    Sellers, Brealyn; Galanter, Marc; Dermatis, Helen; Nachbar, Martin

    2005-01-01

    Alcoholics Anonymous is not yet fully employed by the medical community as a means to enhance patient outcome. The purpose of this study was to evaluate visitors' use of an Internet course on Alcoholics Anonymous, and to compare how various disciplines learned about, gained access to and participated in the course. Demographic information was collected from 414 visitors to the course. 64% of the 414 respondents received their last educational degree within the last 10 years, and had an interest in the topic of addiction prior to their accessing the site. 294 (71%) of those who accessed the course completed it, and those who accessed it learned about it from various sources other than print advertisement in professional journals. Within the 230 physician respondents, 143 (62%) were psychiatrists, 82 (78%) of whom learned about the Internet course via professional journal. Given the need for further training among physicians in the use of Alcoholics Anonymous, the Internet can be utilized to make information available to a large number of people. Because it allows the user to access information outside the traditional means, the barriers to its use are minimal, and it has the potential to effectively convey useful clinical information.

  20. Interim policy on establishment and operation of internet open, anonymous information servers and services

    OpenAIRE

    Acting Dean of Computer and Information Services

    1995-01-01

    Purpose. To establish interim NPS general policy regarding establishment and operation of Open, Anonymous Information Servers and Services, such as World Wide Web (http), Gopher, Anonymous FTP, etc...

  1. Threshold corrections to dimension-six proton decay operators in non-minimal SUSY SU(5 GUTs

    Directory of Open Access Journals (Sweden)

    Borut Bajc

    2016-09-01

    Full Text Available We calculate the high and low scale threshold corrections to the D=6 proton decay mode in supersymmetric SU(5 grand unified theories with higher-dimensional representation Higgs multiplets. In particular, we focus on a missing-partner model in which the grand unified group is spontaneously broken by the 75-dimensional Higgs multiplet and the doublet–triplet splitting problem is solved. We find that in the missing-partner model the D=6 proton decay rate gets suppressed by about 60%, mainly due to the threshold effect at the GUT scale, while the SUSY-scale threshold corrections are found to be less prominent when sfermions are heavy.

  2. Authority and Hierarchy within Anonymous Internet Relay Chat Networks

    Directory of Open Access Journals (Sweden)

    Stewart Kenton Bertram

    2015-09-01

    Full Text Available 'The protest group Anonymous has emerged as one of the most significant social movements of recent years, announcing their arrival as a globally recognized brand with regular disruptive cyber attacks and the leak of large volumes of sensitive data. Despite the obvious significance of Anonymous, to date, little academic research has been focused on what role hierarchy and internal authority play (if any within the group. Bespoke software was used to structure over 5000 examples of IRC log files, so that a base line descriptive statistical picture could be drawn, as well as a more granular enumeration of the privileges associated with individual users.'

  3. Yahtzee: an anonymized group level matching procedure.

    Directory of Open Access Journals (Sweden)

    Jason J Jones

    Full Text Available Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  4. Yahtzee: an anonymized group level matching procedure.

    Science.gov (United States)

    Jones, Jason J; Bond, Robert M; Fariss, Christopher J; Settle, Jaime E; Kramer, Adam D I; Marlow, Cameron; Fowler, James H

    2013-01-01

    Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  5. De-anonymizing Genomic Databases Using Phenotypic Traits

    Directory of Open Access Journals (Sweden)

    Humbert Mathias

    2015-06-01

    Full Text Available People increasingly have their genomes sequenced and some of them share their genomic data online. They do so for various purposes, including to find relatives and to help advance genomic research. An individual’s genome carries very sensitive, private information such as its owner’s susceptibility to diseases, which could be used for discrimination. Therefore, genomic databases are often anonymized. However, an individual’s genotype is also linked to visible phenotypic traits, such as eye or hair color, which can be used to re-identify users in anonymized public genomic databases, thus raising severe privacy issues. For instance, an adversary can identify a target’s genome using known her phenotypic traits and subsequently infer her susceptibility to Alzheimer’s disease. In this paper, we quantify, based on various phenotypic traits, the extent of this threat in several scenarios by implementing de-anonymization attacks on a genomic database of OpenSNP users sequenced by 23andMe. Our experimental results show that the proportion of correct matches reaches 23% with a supervised approach in a database of 50 participants. Our approach outperforms the baseline by a factor of four, in terms of the proportion of correct matches, in most scenarios. We also evaluate the adversary’s ability to predict individuals’ predisposition to Alzheimer’s disease, and we observe that the inference error can be halved compared to the baseline. We also analyze the effect of the number of known phenotypic traits on the success rate of the attack. As progress is made in genomic research, especially for genotype-phenotype associations, the threat presented in this paper will become more serious.

  6. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ling Xiong

    2017-11-01

    Full Text Available Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  7. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks.

    Science.gov (United States)

    Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai

    2017-11-21

    Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation-the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  8. "People Are Either Too Fake or Too Real": Opportunities and Challenges in Tie-Based Anonymity

    DEFF Research Database (Denmark)

    Ma, Xiao; Andabili, Nazanin; Barkhuus, Louise

    2017-01-01

    In recent years, several mobile applications allowed individuals to anonymously share information with friends and contacts, without any persistent identity marker. The functions of these “tie-based” anonymity services may be notably different than other social media services. We use semi-structu...... disclosure needs and social probing. Still, challenges for making such applications successful, for example the prevalence of negativity and bullying, are substantial.......In recent years, several mobile applications allowed individuals to anonymously share information with friends and contacts, without any persistent identity marker. The functions of these “tie-based” anonymity services may be notably different than other social media services. We use semi...

  9. Effects of chronic furosemide on central neural hyperactivity and cochlear thresholds after cochlear trauma in guinea pig

    Directory of Open Access Journals (Sweden)

    Wilhelmina eMulders

    2014-08-01

    Full Text Available Increased neuronal spontaneous firing rates have been observed throughout the central auditory system after trauma to the cochlea and this hyperactivity is believed to be associated with the phantom perception of tinnitus. Previously we have shown in an animal model of hearing loss, that an acute injection with furosemide can significantly decrease hyperactivity after cochlear trauma and eliminate behavioural evidence of tinnitus of early onset. However, furosemide also has the potential to affect cochlear thresholds. In this paper we measured the effects of a chronic (daily injections for 7 days furosemide treatment on the spontaneous firing rate of inferior colliculus neurons and on cochlear thresholds in order to establish whether a beneficial effect on hyperactivity can be obtained without causing additional hearing loss. Guinea pigs were exposed to a 10 kHz, 124dB, 2 hour acoustic trauma, and after 5 days of recovery, were given daily i.p. injections of 80mg/kg furosemide or an equivalent amount of saline. The activity of single IC neurons was recorded 24 hours following the last injection. The furosemide treatment had no effect on cochlear thresholds compared to saline injections but did result in significant reductions in spontaneous firing rates recorded in inferior colliculus. These results that suggest a long term beneficial effect of furosemide on hyperactivity after cochlear trauma may be achievable without detrimental effects on hearing, which is important when considering therapeutic potential.

  10. Anonymizing patient genomic data for public sharing association studies.

    Science.gov (United States)

    Fernandez-Lozano, Carlos; Lopez-Campos, Guillermo; Seoane, Jose A; Lopez-Alonso, Victoria; Dorado, Julian; Martín-Sanchez, Fernando; Pazos, Alejandro

    2013-01-01

    The development of personalized medicine is tightly linked with the correct exploitation of molecular data, especially those associated with the genome sequence along with these use of genomic data there is an increasing demand to share these data for research purposes. Transition of clinical data to research is based in the anonymization of these data so the patient cannot be identified, the use of genomic data poses a great challenge because its nature of identifying data. In this work we have analyzed current methods for genome anonymization and propose a one way encryption method that may enable the process of genomic data sharing accessing only to certain regions of genomes for research purposes.

  11. Generalised universality of gauge thresholds in heterotic vacua with and without supersymmetry

    CERN Document Server

    Angelantonj, Carlo; Tsulaia, Mirian

    2015-01-01

    We study one-loop quantum corrections to gauge couplings in heterotic vacua with spontaneous supersymmetry breaking. Although in non-supersymmetric constructions these corrections are not protected and are typically model dependent, we show how a universal behaviour of threshold differences, typical of supersymmetric vacua, may still persist. We formulate specific conditions on the way supersymmetry should be broken for this to occur. Our analysis implies a generalised notion of threshold universality even in the case of unbroken supersymmetry, whenever extra charged massless states appear at enhancement points in the bulk of moduli space. Several examples with universality, including non-supersymmetric chiral models in four dimensions, are presented.

  12. The influence of anonymous peers on prosocial behavior.

    Directory of Open Access Journals (Sweden)

    Soowon Park

    Full Text Available Peer influence on students' maladaptive behaviors has been well documented; however, the influence on positive development is less acknowledged.The purpose of this study was to examine anonymous peer influence on college students' prosocial behavior, specifically behavior for the improvement of society (i.e., donating money or participating in social campaigns via an experimental approach. The effects of indirect peer influence (IP and direct peer influence (DP on college students' prosocial behavior were examined.A total of 125 college students participated in an online survey and laboratory experiment. Self-reported helping behavior, social concern goals, and empathy were measured by the online survey. In the laboratory experiments, reading of a prosocial paragraph (IP and confederates' prosocial behavior (DP were manipulated. Participation in a signature campaign and money donation for illness were observed. Furthermore, 19 participants among those who donated were asked about their reasons for participating in such prosocial behavior.Prosocial behavior of anonymous peers (confederates exerts a profound influence on college students' participation in a signature campaign and money donation, whereas the reading of a prosocial paragraph has no effect. Furthermore, no participants reported peer influence as a reason for engaging in prosocial behavior.This finding supports and extends recent research examining the positive impacts of anonymous peers on prosocial behavior. Prosocial behavior is not only a foundational and consistent aspect of personality, as previous studies report, but is also highly malleable and unstable in response to immediate situations.

  13. The influence of anonymous peers on prosocial behavior

    Science.gov (United States)

    Shin, Jongho

    2017-01-01

    Background Peer influence on students’ maladaptive behaviors has been well documented; however, the influence on positive development is less acknowledged. Purpose The purpose of this study was to examine anonymous peer influence on college students’ prosocial behavior, specifically behavior for the improvement of society (i.e., donating money or participating in social campaigns) via an experimental approach. The effects of indirect peer influence (IP) and direct peer influence (DP) on college students’ prosocial behavior were examined. Methods A total of 125 college students participated in an online survey and laboratory experiment. Self-reported helping behavior, social concern goals, and empathy were measured by the online survey. In the laboratory experiments, reading of a prosocial paragraph (IP) and confederates’ prosocial behavior (DP) were manipulated. Participation in a signature campaign and money donation for illness were observed. Furthermore, 19 participants among those who donated were asked about their reasons for participating in such prosocial behavior. Results Prosocial behavior of anonymous peers (confederates) exerts a profound influence on college students’ participation in a signature campaign and money donation, whereas the reading of a prosocial paragraph has no effect. Furthermore, no participants reported peer influence as a reason for engaging in prosocial behavior. Conclusion This finding supports and extends recent research examining the positive impacts of anonymous peers on prosocial behavior. Prosocial behavior is not only a foundational and consistent aspect of personality, as previous studies report, but is also highly malleable and unstable in response to immediate situations. PMID:29016612

  14. Impact of Anonymity and Identity Deception on Social Media eWOM

    OpenAIRE

    Kapoor , Payal ,; Gunta , Srinivas

    2016-01-01

    Part 4: Information Sharing on Social Media; International audience; Brand-related consumer to consumer communication, eWOM, is taking place in many forms across the social media space. Rules that governed credibility assessment of brand-related communication, WOM, in the Face to Face context may vary on social media, specifically because of anonymity that is afforded on different social media sites. The current study looks closely on the impact of anonymity in typical eWOM behaviour context ...

  15. Utility-preserving transaction data anonymization with low information loss.

    Science.gov (United States)

    Loukides, Grigorios; Gkoulalas-Divanis, Aris

    2012-08-01

    Transaction data record various information about individuals, including their purchases and diagnoses, and are increasingly published to support large-scale and low-cost studies in domains such as marketing and medicine. However, the dissemination of transaction data may lead to privacy breaches, as it allows an attacker to link an individual's record to their identity. Approaches that anonymize data by eliminating certain values in an individual's record or by replacing them with more general values have been proposed recently, but they often produce data of limited usefulness. This is because these approaches adopt value transformation strategies that do not guarantee data utility in intended applications and objective measures that may lead to excessive data distortion. In this paper, we propose a novel approach for anonymizing data in a way that satisfies data publishers' utility requirements and incurs low information loss. To achieve this, we introduce an accurate information loss measure and an effective anonymization algorithm that explores a large part of the problem space. An extensive experimental study, using click-stream and medical data, demonstrates that our approach permits many times more accurate query answering than the state-of-the-art methods, while it is comparable to them in terms of efficiency.

  16. k-Degree Anonymity Model for Social Network Data Publishing

    Directory of Open Access Journals (Sweden)

    MACWAN, K. R.

    2017-11-01

    Full Text Available Publicly accessible platform for social networking has gained special attraction because of its easy data sharing. Data generated on such social network is analyzed for various activities like marketing, social psychology, etc. This requires preservation of sensitive attributes before it becomes easily accessible. Simply removing the personal identities of the users before publishing data is not enough to maintain the privacy of the individuals. The structure of the social network data itself reveals much information regarding its users and their connections. To resolve this problem, k-degree anonymous method is adopted. It emphasizes on the modification of the graph to provide at least k number of nodes that contain the same degree. However, this approach is not efficient on a huge amount of social data and the modification of the original data fails to maintain data usefulness. In addition to this, the current anonymization approaches focus on a degree sequence-based graph model which leads to major modification of the graph topological properties. In this paper, we have proposed an improved k-degree anonymity model that retain the social network structural properties and also to provide privacy to the individuals. Utility measurement approach for community based graph model is used to verify the performance of the proposed technique.

  17. Local and global recoding methods for anonymizing set-valued data

    KAUST Repository

    Terrovitis, Manolis

    2010-06-10

    In this paper, we study the problem of protecting privacy in the publication of set-valued data. Consider a collection of supermarket transactions that contains detailed information about items bought together by individuals. Even after removing all personal characteristics of the buyer, which can serve as links to his identity, the publication of such data is still subject to privacy attacks from adversaries who have partial knowledge about the set. Unlike most previous works, we do not distinguish data as sensitive and non-sensitive, but we consider them both as potential quasi-identifiers and potential sensitive data, depending on the knowledge of the adversary. We define a new version of the k-anonymity guarantee, the k m-anonymity, to limit the effects of the data dimensionality, and we propose efficient algorithms to transform the database. Our anonymization model relies on generalization instead of suppression, which is the most common practice in related works on such data. We develop an algorithm that finds the optimal solution, however, at a high cost that makes it inapplicable for large, realistic problems. Then, we propose a greedy heuristic, which performs generalizations in an Apriori, level-wise fashion. The heuristic scales much better and in most of the cases finds a solution close to the optimal. Finally, we investigate the application of techniques that partition the database and perform anonymization locally, aiming at the reduction of the memory consumption and further scalability. A thorough experimental evaluation with real datasets shows that a vertical partitioning approach achieves excellent results in practice. © 2010 Springer-Verlag.

  18. To Speak or Not to Speak: Developing Legal Standards for Anonymous Speech on the Internet

    Directory of Open Access Journals (Sweden)

    Tomas A. Lipinski

    2002-01-01

    Full Text Available This paper explores recent developments in the regulation of Internet speech, in specific, injurious or defamatory speech and the impact such speech has on the rights of anonymous speakers to remain anonymous as opposed to having their identity revealed to plaintiffs or other third parties. The paper proceeds in four sections.  First, a brief history of the legal attempts to regulate defamatory Internet speech in the United States is presented. As discussed below this regulation has altered the traditional legal paradigm of responsibility and as a result creates potential problems for the future of anonymous speech on the Internet.  As a result plaintiffs are no longer pursuing litigation against service providers but taking their dispute directly to the anonymous speaker. Second, several cases have arisen in the United States where plaintiffs have requested that the identity of an anonymous Internet speaker be revealed.  These cases are surveyed.  Third, the cases are analyzed in order to determine the factors that courts require to be present before the identity of an anonymous speaker will be revealed.  The release is typically accomplished by the enforcement of a discovery subpoena instigated by the party seeking the identity of the anonymous speaker. The factors courts have used are as follows: jurisdiction, good faith (both internal and external, necessity (basic and sometimes absolute, and at times proprietary interest. Finally, these factors are applied in three scenarios--e-commerce, education, and employment--to guide institutions when adopting policies that regulate when the identity of an anonymous speaker--a customer, a student or an employee--would be released as part of an internal initiative, but would nonetheless be consistent with developing legal standards.

  19. A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

    Directory of Open Access Journals (Sweden)

    Kai Chain

    2016-11-01

    Full Text Available Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity of a mobile user’s home agent in the authentication phase. By using this information, the attacker can mount distributed denial-of-service attacks in the roaming phase through replay attacks targeting the network’s foreign agent and mobile user’s home agent by using their corresponding session keys. Li’s method also has some shortcomings regarding anonymity that we aim to address. To overcome these issues, this study proposes an elliptic curve–based wireless roaming anonymous login method for the authentication phase. The problems faced in the roaming phase are resolved, and this approach provides balanced session key computation between senders and receivers. Burrows-Abadi-Needham logic (BAN-logic is used to verify the security of the proposed scheme. The proposed scheme affords good security, efficiency, and integrity and maintains anonymity.

  20. Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference.

    Science.gov (United States)

    Teich, Al; Frankel, Mark S.; Kling, Rob; Lee, Yaching

    1999-01-01

    Reports the results of a conference on the Internet and anonymous communication organized by the American Association for the Advancement of Science (AAAS). Discusses how anonymous communications can be shaped by the law, education, and public awareness, and highlights the importance of involving all affected interests in policy development.…

  1. Distributed Performance Measurement and Usability Assessment of the Tor Anonymization Network

    Directory of Open Access Journals (Sweden)

    Steffen Kunz

    2012-05-01

    Full Text Available While the Internet increasingly permeates everyday life of individuals around the world, it becomes crucial to prevent unauthorized collection and abuse of personalized information. Internet anonymization software such as Tor is an important instrument to protect online privacy. However, due to the performance overhead caused by Tor, many Internet users refrain from using it. This causes a negative impact on the overall privacy provided by Tor, since it depends on the size of the user community and availability of shared resources. Detailed measurements about the performance of Tor are crucial for solving this issue. This paper presents comparative experiments on Tor latency and throughput for surfing to 500 popular websites from several locations around the world during the period of 28 days. Furthermore, we compare these measurements to critical latency thresholds gathered from web usability research, including our own user studies. Our results indicate that without massive future optimizations of Tor performance, it is unlikely that a larger part of Internet users would adopt it for everyday usage. This leads to fewer resources available to the Tor community than theoretically possible, and increases the exposure of privacy-concerned individuals. Furthermore, this could lead to an adoption barrier of similar privacy-enhancing technologies for a Future Internet.

  2. (a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems.

    Science.gov (United States)

    Li, Hongtao; Guo, Feng; Zhang, Wenyin; Wang, Jie; Xing, Jinsheng

    2018-02-14

    The widely use of IoT technologies in healthcare services has pushed forward medical intelligence level of services. However, it also brings potential privacy threat to the data collection. In healthcare services system, health and medical data that contains privacy information are often transmitted among networks, and such privacy information should be protected. Therefore, there is a need for privacy-preserving data collection (PPDC) scheme to protect clients (patients) data. We adopt (a,k)-anonymity model as privacy pretection scheme for data collection, and propose a novel anonymity-based PPDC method for healthcare services in this paper. The threat model is analyzed in the client-server-to-user (CS2U) model. On client-side, we utilize (a,k)-anonymity notion to generate anonymous tuples which can resist possible attack, and adopt a bottom-up clustering method to create clusters that satisfy a base privacy level of (a 1 ,k 1 )-anonymity. On server-side, we reduce the communication cost through generalization technology, and compress (a 1 ,k 1 )-anonymous data through an UPGMA-based cluster combination method to make the data meet the deeper level of privacy (a 2 ,k 2 )-anonymity (a 1  ≥ a 2 , k 2  ≥ k 1 ). Theoretical analysis and experimental results prove that our scheme is effective in privacy-preserving and data quality.

  3. Quantifying the Arousal Threshold Using Polysomnography in Obstructive Sleep Apnea.

    Science.gov (United States)

    Sands, Scott A; Terrill, Philip I; Edwards, Bradley A; Taranto Montemurro, Luigi; Azarbarzin, Ali; Marques, Melania; de Melo, Camila M; Loring, Stephen H; Butler, James P; White, David P; Wellman, Andrew

    2018-01-01

    Precision medicine for obstructive sleep apnea (OSA) requires noninvasive estimates of each patient's pathophysiological "traits." Here, we provide the first automated technique to quantify the respiratory arousal threshold-defined as the level of ventilatory drive triggering arousal from sleep-using diagnostic polysomnographic signals in patients with OSA. Ventilatory drive preceding clinically scored arousals was estimated from polysomnographic studies by fitting a respiratory control model (Terrill et al.) to the pattern of ventilation during spontaneous respiratory events. Conceptually, the magnitude of the airflow signal immediately after arousal onset reveals information on the underlying ventilatory drive that triggered the arousal. Polysomnographic arousal threshold measures were compared with gold standard values taken from esophageal pressure and intraoesophageal diaphragm electromyography recorded simultaneously (N = 29). Comparisons were also made to arousal threshold measures using continuous positive airway pressure (CPAP) dial-downs (N = 28). The validity of using (linearized) nasal pressure rather than pneumotachograph ventilation was also assessed (N = 11). Polysomnographic arousal threshold values were correlated with those measured using esophageal pressure and diaphragm EMG (R = 0.79, p < .0001; R = 0.73, p = .0001), as well as CPAP manipulation (R = 0.73, p < .0001). Arousal threshold estimates were similar using nasal pressure and pneumotachograph ventilation (R = 0.96, p < .0001). The arousal threshold in patients with OSA can be estimated using polysomnographic signals and may enable more personalized therapeutic interventions for patients with a low arousal threshold. © Sleep Research Society 2017. Published by Oxford University Press on behalf of the Sleep Research Society. All rights reserved. For permissions, please e-mail journals.permissions@oup.com.

  4. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  5. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  6. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  7. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints

    Directory of Open Access Journals (Sweden)

    Anas Bushnag

    2016-06-01

    Full Text Available Wireless sensor networks (WSN are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP. The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD, Dummy Adaptive Distribution (DAD and Controlled Dummy Adaptive Distribution (CAD were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network. Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  8. Use of WhatsApp in Higher Education: What's Up with Assessing Peers Anonymously?

    Science.gov (United States)

    Güler, Çetin

    2017-01-01

    The aim of this study is to investigate the use of WhatsApp application in anonymous peer assessment in higher education. The mobile phone application WhatsApp was used as both an anonymous and nonanonymous peer assessment tool in a classroom environment. The participants of the study were the students of two classes (sophomores and juniors), half…

  9. Enhanced amplified spontaneous emission using layer-by-layer assembled cowpea mosaic virus

    Science.gov (United States)

    Li, Na; Deng, Zhaoqi; Lin, Yuan; Zhang, Xiaojie; Geng, Yanhou; Ma, Dongge; Su, Zhaohui

    2009-01-01

    Layer-by-layer assembly technique was used to construct ultrathin film of cowpea mosaic virus (CPMV) by electrostatic interactions, and the film was employed as a precursor on which an OF8T2 film was deposited by spin coating. Amplified spontaneous emission (ASE) was observed and improved for the OF8T2 film. Compared with OF8T2 film on quartz, the introduction of CPMV nanoparticles reduced the threshold and loss, and remarkably increased the net gain. The threshold, loss, and gain reached 0.05 mJ/pulse, 6.9 cm-1, and 82 cm-1, respectively. CPMV nanoparticles may enormously scatter light, resulting in a positive feedback, thus the ASE is easily obtained and improved.

  10. Ongoing spontaneous activity controls access to consciousness: a neuronal model for inattentional blindness.

    Directory of Open Access Journals (Sweden)

    Stanislas Dehaene

    2005-05-01

    Full Text Available Even in the absence of sensory inputs, cortical and thalamic neurons can show structured patterns of ongoing spontaneous activity, whose origins and functional significance are not well understood. We use computer simulations to explore the conditions under which spontaneous activity emerges from a simplified model of multiple interconnected thalamocortical columns linked by long-range, top-down excitatory axons, and to examine its interactions with stimulus-induced activation. Simulations help characterize two main states of activity. First, spontaneous gamma-band oscillations emerge at a precise threshold controlled by ascending neuromodulator systems. Second, within a spontaneously active network, we observe the sudden "ignition" of one out of many possible coherent states of high-level activity amidst cortical neurons with long-distance projections. During such an ignited state, spontaneous activity can block external sensory processing. We relate those properties to experimental observations on the neural bases of endogenous states of consciousness, and particularly the blocking of access to consciousness that occurs in the psychophysical phenomenon of "inattentional blindness," in which normal subjects intensely engaged in mental activity fail to notice salient but irrelevant sensory stimuli. Although highly simplified, the generic properties of a minimal network may help clarify some of the basic cerebral phenomena underlying the autonomy of consciousness.

  11. Ongoing spontaneous activity controls access to consciousness: a neuronal model for inattentional blindness.

    Science.gov (United States)

    Dehaene, Stanislas; Changeux, Jean-Pierre

    2005-05-01

    Even in the absence of sensory inputs, cortical and thalamic neurons can show structured patterns of ongoing spontaneous activity, whose origins and functional significance are not well understood. We use computer simulations to explore the conditions under which spontaneous activity emerges from a simplified model of multiple interconnected thalamocortical columns linked by long-range, top-down excitatory axons, and to examine its interactions with stimulus-induced activation. Simulations help characterize two main states of activity. First, spontaneous gamma-band oscillations emerge at a precise threshold controlled by ascending neuromodulator systems. Second, within a spontaneously active network, we observe the sudden "ignition" of one out of many possible coherent states of high-level activity amidst cortical neurons with long-distance projections. During such an ignited state, spontaneous activity can block external sensory processing. We relate those properties to experimental observations on the neural bases of endogenous states of consciousness, and particularly the blocking of access to consciousness that occurs in the psychophysical phenomenon of "inattentional blindness," in which normal subjects intensely engaged in mental activity fail to notice salient but irrelevant sensory stimuli. Although highly simplified, the generic properties of a minimal network may help clarify some of the basic cerebral phenomena underlying the autonomy of consciousness.

  12. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    OpenAIRE

    Feng Tao; Zhao Ming-Tao

    2017-01-01

    Tor (The Second Onion Router) is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was use...

  13. Anonymous electronic trading versus floor trading

    OpenAIRE

    Franke, Günter; Hess, Dieter

    1995-01-01

    This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...

  14. Simplifying Itai-Rodeh Leader Election for Anonymous Rings

    NARCIS (Netherlands)

    Fokkink, W.J.; Pang, J.

    2005-01-01

    We present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh [A. Itai and M. Rodeh. Symmetry breaking in distributive networks. In Proc. FOCS'81, pp. 150-158. IEEE Computer Society, 1981]. In contrast to the

  15. An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs

    Directory of Open Access Journals (Sweden)

    Tianhan Gao

    2017-01-01

    Full Text Available Access security and privacy have become a bottleneck for the popularization of future Cyber-Physical System (CPS networks. Furthermore, users’ need for privacy-preserved access during movement procedure is more urgent. To address the anonymous access authentication issue for CPS Wireless Mesh Network (CPS-WMN, a novel anonymous access authentication scheme based on proxy ring signature is proposed. A hierarchical authentication architecture is presented first. The scheme is then achieved from the aspect of intergroup and intragroup anonymous mutual authentication through proxy ring signature mechanism and certificateless signature mechanism, respectively. We present a formal security proof of the proposed protocol with SVO logic. The simulation and performance analysis demonstrate that the proposed scheme owns higher efficiency and adaptability than the typical one.

  16. Anonymous pastoral care for problems pertaining to sexuality

    NARCIS (Netherlands)

    van Drie, A.; Ganzevoort, R.R.; Spiering, M.

    2014-01-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria

  17. Spontaneous hole-clump pair creation in weakly unstable plasmas

    International Nuclear Information System (INIS)

    Berk, H.L.; Breizman, B.N.; Petviashvili, N.V.

    1997-03-01

    A numerical simulation of a kinetic instability near threshold shows how a hole and clump spontaneously appear in the particle distribution function. The hole and clump support a pair of Bernstein, Greene, Kruskal (BGK) nonlinear waves that last much longer than the inverse linear damping rate while they are upshifting and downshifting in frequency. The frequency shifting allows a balance between the power nonlinearly extracted from the resonant particles and the power dissipated into the background plasma. These waves eventually decay due to phase space gradient smoothing caused by collisionality

  18. Verbal Venting in the Social Web: Effects of Anonymity and Group Norms on Aggressive Language Use in Online Comments

    Directory of Open Access Journals (Sweden)

    Leonie Rösner

    2016-08-01

    Full Text Available Scholars often blame the occurrence of aggressive behavior in online discussions on the anonymity of the Internet; however, even on today’s less anonymous platforms, such as social networking sites, users write plenty of aggressive comments, which can elicit a whole wave of negative remarks. Drawing on the social identity and deindividuation effects (SIDE model, this research conducts a laboratory experiment with a 2 (anonymity vs. no anonymity × 2 (aggressive norm vs. non-aggressive norm between-subjects design in order to disentangle the effects of anonymity, social group norms, and their interactions on aggressive language use in online comments. Results reveal that participants used more aggressive expressions in their comments when peer comments on a blog included aggressive wording (i.e., the social group norm was aggressive. Anonymity had no direct effect; however, we found a tendency that users’ conformity to an aggressive social norm of commenting is stronger in an anonymous environment.

  19. Confidentiality, anonymity and amnesty for midwives in distress seeking online support - Ethical?

    Science.gov (United States)

    Pezaro, Sally; Clyne, Wendy; Gerada, Clare

    2018-06-01

    Midwife health is intrinsically linked to the quality of safe patient care. To ensure safe patient care, there is a need to deliver emotional support to midwives. One option that midwives may turn to may be a confidential online intervention, instead of localised, face-to-face support. Following the Realist And MEta-narrative Evidence Syntheses: Evolving Standards publication standards, this realist synthesis approach explores the ethical considerations in permitting confidentiality, anonymity and amnesty in online interventions to support midwives in work-related psychological distress. An iterative search methodology was used to select nine papers for review. To assimilate information, papers were examined for ideas relating to ethical dimensions of online interventions to support midwives in work-related psychological distress. This review takes a narrative approach. Online interventions can support the development of insight, help seeking and open discussion. Additionally, Internet support groups can become morally persuasive in nature. Anonymity and confidentiality are both effective and therapeutic features of online interventions when used in collaboration with effective online moderation. Yet, ethical dilemmas remain where users cannot be identified. Confidentiality and anonymity remain key components of successful online interventions. However, sanctioning the corollary component of amnesty may provoke moral discomfort for those seeking immediate accountability. For others, amnesty is seen as essential for open disclosure and help seeking. Ultimately, the needs of midwives must be balanced with the requirement to protect the public and the professional reputation of midwifery. In supporting midwives online, the principles of anonymity, confidentiality and amnesty may evoke some resistance on ethical grounds. However, without offering identity protection, it may not be possible to create effective online support services for midwives. The authors of this

  20. Dynamical Compactification as a Mechanism of Spontaneous Supersymmetry Breaking

    CERN Document Server

    Dvali, Gia

    1997-01-01

    Supersymmetry breaking and compactification of extra space-time dimensions may have a common dynamical origin if our universe is spontaneously generated in the form of a four-dimensional topological or non-topological defect in higher dimensional space-time. Within such an approach the conventional particles are zero modes trapped in the core of the defect. In many cases solutions of this type spontaneously break all supersymmetries of the original theory, so that the low-energy observer from ``our'' universe inside the core would not detect supersymmetry. Since the extra dimensions are not compact but, rather, inaccessible to low-energy observers, the usual infinite tower of the Kaluza-Klein excitations does not exist. Production of superpartners at the energy scale of SUSY restoration will be accompanied by four-momentum non-conservation. (Depending on the nature of the solution at hand, the non-conservation may either happen above some threshold energy or be continuous). In either case, the door to extra d...

  1. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2016-06-01

    Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

  2. An Anonymous Surveying Protocol via Greenberger-Horne-Zeilinger States

    Science.gov (United States)

    Naseri, Mosayeb; Gong, Li-Hua; Houshmand, Monireh; Matin, Laleh Farhang

    2016-10-01

    A new experimentally feasible anonymous survey protocol with authentication using Greenberger-Horne-Zeilinger (GHZ) entangled states is proposed. In this protocol, a chief executive officer (CEO) of a firm or company is trying to find out the effect of a possible action. In order to prepare a fair voting, the CEO would like to make an anonymous survey and is also interested in the total action for the whole company and he doesn't want to have a partial estimate for each department. In our proposal, there are two voters, Alice and Bob, voting on a question with a response of either "yes" or "no" and a tallyman, whose responsibility is to determine whether they have cast the same vote or not. In the proposed protocol the total response of the voters is calculated without revealing the actual votes of the voters.

  3. The dissimilar time course of temporary threshold shifts and reduction of inhibition in the inferior colliculus following intense sound exposure.

    Science.gov (United States)

    Heeringa, A N; van Dijk, P

    2014-06-01

    Excessive noise exposure is known to produce an auditory threshold shift, which can be permanent or transient in nature. Recent studies showed that noise-induced temporary threshold shifts are associated with loss of synaptic connections to the inner hair cells and with cochlear nerve degeneration, which is reflected in a decreased amplitude of wave I of the auditory brainstem response (ABR). This suggests that, despite normal auditory thresholds, central auditory processing may be abnormal. We recorded changes in central auditory processing following a sound-induced temporary threshold shift. Anesthetized guinea pigs were exposed for 1 h to a pure tone of 11 kHz (124 dB sound pressure level). Hearing thresholds, amplitudes of ABR waves I and IV, and spontaneous and tone-evoked firing rates in the inferior colliculus (IC) were assessed immediately, one week, two weeks, and four weeks post exposure. Hearing thresholds were elevated immediately following overexposure, but recovered within one week. The amplitude of the ABR wave I was decreased in all sound-exposed animals for all test periods. In contrast, the ABR wave IV amplitude was only decreased immediately after overexposure and recovered within a week. The proportion of IC units that show inhibitory responses to pure tones decreased substantially up to two weeks after overexposure, especially when stimulated with high frequencies. The proportion of excitatory responses to low frequencies was increased. Spontaneous activity was unaffected by the overexposure. Despite rapid normalization of auditory thresholds, our results suggest an increased central gain following sound exposure and an abnormal balance between excitatory and inhibitory responses in the midbrain up to two weeks after overexposure. These findings may be associated with hyperacusis after a sound-induced temporary threshold shift. Copyright © 2014 The Authors. Published by Elsevier B.V. All rights reserved.

  4. An Anonymous Credit Card System

    Science.gov (United States)

    Androulaki, Elli; Bellovin, Steven

    Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.

  5. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    Directory of Open Access Journals (Sweden)

    Salma Umme

    2011-04-01

    Full Text Available Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004/23/EC. To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225 in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004/23/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  6. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    LENUS (Irish Health Repository)

    Walsh, Anthony PH

    2011-04-20

    Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004\\/23\\/EC). To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225) in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD) age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer) in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat) testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004\\/23\\/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  7. The Role of the Anonymous Voice in Post-Publication Peer Review Versus Traditional Peer Review

    Directory of Open Access Journals (Sweden)

    Jaime A. Teixeira da Silva

    2015-12-01

    Full Text Available Traditional peer review (TPR has several limitations and weaknesses. Post-publication peer review is one practical way to repair the ills of TPR and reinforce it. A literature that is marked by errors is unhealthy and should, if given the opportunity, be corrected or further improved. The anonymous voice is one source of critique and differs from the blind peer review in TPR in which the reviewer remains anonymous to the authors and/or vice versa, but the identity is known to the editor. If unregulated, the anonymous voice can pose a threat to established editorial norms in TPR, to one of the most important criteria of science publishing, i.e., transparency, and to worthwhile discussion. Yet, if the anonymous voice is not heard, then a vast and potentially valuable pool of untapped opinions may be lost, opinions that may provide valuable solutions to improving TPR.

  8. Visibility and anonymity effects on attraction and group cohesiveness

    NARCIS (Netherlands)

    Lea, Martin; Spears, Russell; Watt, Susan E.

    2007-01-01

    This study investigated attraction and group cohesiveness under different visibility and anonymity conditions for social categories that differed in their capacity to be visually cued. Using computer-mediated communication in 36 mixed gender (visually cued category) and nationality (non-visually

  9. Spontaneous mutation by mutagenic repair of spontaneous lesions in DNA

    International Nuclear Information System (INIS)

    Hastings, P.J.; Quah, S.-K.; Borstel, R.C. von

    1976-01-01

    It is stated that strains of yeast carrying mutations in many of the steps in pathways repairing radiation-induced damage to DNA have enhanced spontaneous mutation rates. Most strains isolated because they have enhanced spontaneous mutation carry mutations in DNA repair systems. This suggests that much spontaneous mutation arises by mutagenic repair of spontaneous lesions. (author)

  10. Evaluation of pro-convulsant risk in the rat: spontaneous and provoked convulsions.

    Science.gov (United States)

    Esneault, Elise; Peyon, Guillaume; Froger-Colléaux, Christelle; Castagné, Vincent

    2015-01-01

    The aim of the present study was to evaluate the utility of different tests performed in the absence or presence of factors promoting seizures in order to evaluate the pro-convulsant effects of drugs. We studied the effects of theophylline in the rat since this is a well-known pro-convulsant substance in humans. The occurrence of spontaneous convulsions following administration of theophylline was evaluated by observation in the Irwin Test and by measuring brain activity using video-EEG recording in conscious telemetered animals. Theophylline was also tested in the electroconvulsive shock (ECS) threshold and pentylenetetrazole (PTZ)-induced convulsions tests, two commonly used models of provoked convulsions. In the Irwin test, theophylline induced convulsions in 1 out of 6 rats at 128 mg/kg. Paroxysmal/seizure activity was also observed by video-EEG recording in 4 out of the 12 animals tested at 128 mg/kg, in presence of clonic convulsions in 3 out of the 4 rats. Paroxysmal activity was observed in two rats in the absence of clear behavioral symptoms, indicating that some precursor signs can be detected using video-EEG. Clear pro-convulsant activity was shown over the dose-range 32-128 mg/kg in the ECS threshold and PTZ-induced convulsions tests. Evaluation of spontaneous convulsions provides information on the therapeutic window of a drug and the translational value of the approach is increased by the use of video-EEG. Tests based on provoked convulsions further complement the evaluation since they try to mimic high risk situations. Measurement of both spontaneous and provoked convulsions improves the evaluation of the pro-convulsant risk of novel pharmacological substances. Copyright © 2014 Elsevier Inc. All rights reserved.

  11. Self ordering threshold and superradiant backscattering to slow a fast gas beam in a ring cavity with counter propagating pump.

    Science.gov (United States)

    Maes, C; Asbóth, J K; Ritsch, H

    2007-05-14

    We study the dynamics of a fast gaseous beam in a high Q ring cavity counter propagating a strong pump laser with large detuning from any particle optical resonance. As spontaneous emission is strongly suppressed the particles can be treated as polarizable point masses forming a dynamic moving mirror. Above a threshold intensity the particles exhibit spatial periodic ordering enhancing collective coherent backscattering which decelerates the beam. Based on a linear stability analysis in their accelerated rest frame we derive analytic bounds for the intensity threshold of this selforganization as a function of particle number, average velocity, kinetic temperature, pump detuning and resonator linewidth. The analytical results agree well with time dependent simulations of the N-particle motion including field damping and spontaneous emission noise. Our results give conditions which may be easily evaluated for stopping and cooling a fast molecular beam.

  12. The Efficacy of Non-Anonymous Measures of Bullying

    Science.gov (United States)

    Chan, John H. F.; Myron, Rowan; Crawshaw, Martin

    2005-01-01

    The Olweus checklist, along with most of the questionnaires commonly used in bullying research, is anonymous. The respondent is not required to put down his/her name. This has been accepted as the "best suited" method of assessing bullying. However, this assumption has not been adequately tested, and there is contrary evidence that this…

  13. Auditory Tones and Foot-Shock Recapitulate Spontaneous Sub-Threshold Activity in Basolateral Amygdala Principal Neurons and Interneurons.

    Directory of Open Access Journals (Sweden)

    François Windels

    Full Text Available In quiescent states such as anesthesia and slow wave sleep, cortical networks show slow rhythmic synchronized activity. In sensory cortices this rhythmic activity shows a stereotypical pattern that is recapitulated by stimulation of the appropriate sensory modality. The amygdala receives sensory input from a variety of sources, and in anesthetized animals, neurons in the basolateral amygdala (BLA show slow rhythmic synchronized activity. Extracellular field potential recordings show that these oscillations are synchronized with sensory cortex and the thalamus, with both the thalamus and cortex leading the BLA. Using whole-cell recording in vivo we show that the membrane potential of principal neurons spontaneously oscillates between up- and down-states. Footshock and auditory stimulation delivered during down-states evokes an up-state that fully recapitulates those occurring spontaneously. These results suggest that neurons in the BLA receive convergent input from networks of cortical neurons with slow oscillatory activity and that somatosensory and auditory stimulation can trigger activity in these same networks.

  14. For the Lulz: Anonymous, Aesthetics and Affect

    Directory of Open Access Journals (Sweden)

    Rodrigo Ferrada Stoehrel

    2014-03-01

    Full Text Available The focus of this paper is on different but connected areas of power – relating to things such as economic globalisation, surveillance, censorship/freedom, ‘terrorism’ and/or specific military activity – visually represented through online media, and intentionally produced to inform a wide spectrum of individuals and interest groups about global and local social injustices. Or, more importantly, produced and distributed with the purpose of providing users with possibilities to engage, bodily and emotionally, in diverse ways: may it be through physical antiwar/anti-wall street protests or hacktivist tactics (e.g. DDoS attacks. We examine a sample of videos, photographs and propaganda posters produced, and digitally distributed (2008-2013, by the fragmented body of activists united globally under the generic name of Anonymous. Analytically, we will draw upon Mouffe’s thoughts on ‘antagonism’ and ‘passion,’ Foucault’s ideas on international citizenship and the (ethical ‘right to intervene’ (beyond governmentality, together with Sontag’s notion of institutional political inertia and the Deleuzian/Spinozian perspective on affect as a capacity for action. The goal is to analyse the ways in which Anonymous systematically inspire (not only the radical and social imaginary but also other direct forms of action that have potential societal effects.

  15. Policy-Aware Sender Anonymity in Location-Based Services

    Science.gov (United States)

    Vyas, Avinash

    2011-01-01

    Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…

  16. Does spousal participation in Gamblers Anonymous benefit compulsive gamblers?

    Science.gov (United States)

    Johnson, E E; Nora, R M

    1992-12-01

    Extent of gambling-free periods was compared for 90 compulsive gamblers, 44 with spouses who participated in Gamblers Anonymous and 46 with spouses who did not. Although the results were in the direction of a beneficial effect of spousal participation, the relationship was statistically nonsignificant.

  17. The Risk of a Halo Bias as a Reason to Keep Students Anonymous during Grading

    Science.gov (United States)

    Malouff, John M.; Emmerton, Ashley J.; Schutte, Nicola S.

    2013-01-01

    Experts have advocated anonymous grading as a means of eliminating actual or perceived evaluator bias in subjective student assessment. The utility of anonymity in assessment rests on whether information derived from student identity can unduly influence evaluation. The halo effect provides a conceptual background for why a bias might occur. In…

  18. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Directory of Open Access Journals (Sweden)

    Javier Portela

    2016-11-01

    Full Text Available Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks.

  19. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Science.gov (United States)

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  20. Using an expiratory resistor, arterial pulse pressure variations predict fluid responsiveness during spontaneous breathing: an experimental porcine study.

    Science.gov (United States)

    Dahl, Michael K; Vistisen, Simon T; Koefoed-Nielsen, Jacob; Larsson, Anders

    2009-01-01

    Fluid responsiveness prediction is difficult in spontaneously breathing patients. Because the swings in intrathoracic pressure are minor during spontaneous breathing, dynamic parameters like pulse pressure variation (PPV) and systolic pressure variation (SPV) are usually small. We hypothesized that during spontaneous breathing, inspiratory and/or expiratory resistors could induce high arterial pressure variations at hypovolemia and low variations at normovolemia and hypervolemia. Furthermore, we hypothesized that SPV and PPV could predict fluid responsiveness under these conditions. Eight prone, anesthetized and spontaneously breathing pigs (20 to 25 kg) were subjected to a sequence of 30% hypovolemia, normovolemia, and 20% and 40% hypervolemia. At each volemic level, the pigs breathed in a randomized order either through an inspiratory and/or an expiratory threshold resistor (7.5 cmH2O) or only through the tracheal tube without any resistor. Hemodynamic and respiratory variables were measured during the breathing modes. Fluid responsiveness was defined as a 15% increase in stroke volume (DeltaSV) following fluid loading. Stroke volume was significantly lower at hypovolemia compared with normovolemia, but no differences were found between normovolemia and 20% or 40% hypervolemia. Compared with breathing through no resistor, SPV was magnified by all resistors at hypovolemia whereas there were no changes at normovolemia and hypervolemia. PPV was magnified by the inspiratory resistor and the combined inspiratory and expiratory resistor. Regression analysis of SPV or PPV versus DeltaSV showed the highest R2 (0.83 for SPV and 0.52 for PPV) when the expiratory resistor was applied. The corresponding sensitivity and specificity for prediction of fluid responsiveness were 100% and 100%, respectively, for SPV and 100% and 81%, respectively, for PPV. Inspiratory and/or expiratory threshold resistors magnified SPV and PPV in spontaneously breathing pigs during hypovolemia

  1. Noncritical generation of nonclassical frequency combs via spontaneous rotational symmetry breaking

    Science.gov (United States)

    Navarrete-Benlloch, Carlos; Patera, Giuseppe; de Valcárcel, Germán J.

    2017-10-01

    Synchronously pumped optical parametric oscillators (SPOPOs) are optical cavities driven by mode-locked lasers, and containing a nonlinear crystal capable of down-converting a frequency comb to lower frequencies. SPOPOs have received a lot of attention lately because their intrinsic multimode nature makes them compact sources of quantum correlated light with promising applications in modern quantum information technologies. In this work we show that SPOPOs are also capable of accessing the challenging and interesting regime where spontaneous symmetry breaking confers strong nonclassical properties to the emitted light, which has eluded experimental observation so far. Apart from opening the possibility of studying experimentally this elusive regime of dissipative phase transitions, our predictions will have a practical impact, since we show that spontaneous symmetry breaking provides a specific spatiotemporal mode with large quadrature squeezing for any value of the system parameters, turning SPOPOs into robust sources of highly nonclassical light above threshold.

  2. Alcoholics anonymous, other 12-step movements and psychotherapy in the US population, 1990.

    Science.gov (United States)

    Room, R; Greenfield, T

    1993-04-01

    Based on the 1990 US National Alcohol Survey, this note provides the first available comprehensive findings on self-reported utilization of a variety of sources of personal support and counselling for alcohol and other problems. Respondents were queried about lifetime attendance and number of times they went to identified sources of help in the prior year. Twelve-step groups included Alcoholics Anonymous, Al-Anon, Adult Children of Alcoholics, and other non-alcohol-oriented groups like Gamblers Anonymous, Narcotics Anonymous, and Overeaters Anonymous; additional questions inquired about support or therapy groups and individual counselling for non-alcohol problems. Of the US adult population, 9% have been to an AA meeting at some time, 3.6% in the prior year, only about one-third of these for problems of their own. About half these percentages, mostly women, have attended Al-Anon. Of the same population, 13.3% indicate ever attending a 12-step meeting (including non-alcohol-oriented groups), 5.3% in the last year. During the prior year a further 2.1% used other support/therapy groups and 5.5% sought individual counselling/therapy for personal problems other than alcohol. In contrast to this high reported utilization, only 4.9% (ever) and 2.3% (12-months) reported going to anyone including AA for a problem (of their own) related to drinking.

  3. Who Goes There? Staying Anonymous on the Internet

    Science.gov (United States)

    Descy, Don E.

    2009-01-01

    Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…

  4. [Examination of the Young maladaptive schemes in a group of Gamblers Anonymous].

    Science.gov (United States)

    Katona, Zsuzsa; Körmendi, Attila

    2012-01-01

    Literature of gambling addiction has become widespread in last years. Many studies were written about the vulnerability factors helping the development of addiction, theoretical models, comorbid problems and therapy possibilities. Currently there is no integrated theoretical model that could explain sufficiently the development and maintenance of pathological gambling. The treatment issue is also unresolved. Cognitive psychology is a dynamically developing field of psychology and good results are achieved in gambling treatment with applying cognitive techniques. Jeffrey Young's schema-focused therapy is a recent theoretical and therapeutic direction within cognitive psychology which emphasizes the necessity of emotional changes beside rational ones in the interest of efficiency. The purpose of our research is to examine and analyse active maladaptive schemas among gamblers who are members of Gamblers Anonymous self-help group. 23 control persons and 23 gamblers associated with support group of Gamblers Anonymous took part in our research. The severity of gambling behaviour was measured by Gamblers Anonymous Twenty Questions. For exploring maladaptive schemas we used the shorter 114-item version of the Young Schema Questionnaire (YSQ-S3). All the examined gamblers were considered as problem gamblers based on Gamblers Anonymous Twenty Questions. In the control group there where no active schemas while in the group of gamblers several schemas (Emotional deprivation, Self-sacrifice, Recognition seeking, Emotional inhibition, Unrelenting standards, Self-punitiveness, Insufficient self-control) showed activity. Active schemas show similarity in their matter with main establishments of researches about gamblers and support the role of impulsivity, narcissistic traits, self-medicalization and emotional deprivation in the development and maintenance of pathological gambling.

  5. Taxonomy for and Analysis of Anonymous Communications Networks

    Science.gov (United States)

    2009-03-01

    degradation, preservation and elimination in cyberspace to enhance the security of information assets. This includes discovery/obfuscation of...a means of communication and information dissemination, concerns about Internet privacy and security are escalating. In 1980’s, Chaum began work...variety of different systems including the T9000 Transputer AFIT/DCS/ENG/09-08 - 123 - [Bar95] and a secure ecommerce system [HaC02]. Anonymity

  6. Gamblers anonymous and cognitive-behavioral therapies for pathological gamblers.

    Science.gov (United States)

    Petry, Nancy M

    2005-01-01

    Numerous types of treatments for pathological gambling have been described, but two of the most common are Gamblers Anonymous (GA) and cognitive-behavioral therapy. This paper describes some outcome data associated with the two approaches. It also reviews evidence suggesting that a combined intervention may enhance therapy engagement and reduce relapse rates.

  7. Secure anonymous mutual authentication for star two-tier wireless body area networks.

    Science.gov (United States)

    Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga

    2016-10-01

    Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is

  8. An Efficient Big Data Anonymization Algorithm Based on Chaos and Perturbation Techniques

    Directory of Open Access Journals (Sweden)

    Can Eyupoglu

    2018-05-01

    Full Text Available The topic of big data has attracted increasing interest in recent years. The emergence of big data leads to new difficulties in terms of protection models used for data privacy, which is of necessity for sharing and processing data. Protecting individuals’ sensitive information while maintaining the usability of the data set published is the most important challenge in privacy preserving. In this regard, data anonymization methods are utilized in order to protect data against identity disclosure and linking attacks. In this study, a novel data anonymization algorithm based on chaos and perturbation has been proposed for privacy and utility preserving in big data. The performance of the proposed algorithm is evaluated in terms of Kullback–Leibler divergence, probabilistic anonymity, classification accuracy, F-measure and execution time. The experimental results have shown that the proposed algorithm is efficient and performs better in terms of Kullback–Leibler divergence, classification accuracy and F-measure compared to most of the existing algorithms using the same data set. Resulting from applying chaos to perturb data, such successful algorithm is promising to be used in privacy preserving data mining and data publishing.

  9. Potential harms, anonymization, and the right to withdraw consent to biobank research.

    Science.gov (United States)

    Eriksson, Stefan; Helgesson, Gert

    2005-09-01

    This paper discusses the potential harms involved in biobank research and how ethical review, informed consent, withdrawals, and anonymization of samples should be handled in the light of these harms. There is less risk involved in biobank research than in human subject research; it should therefore be treated differently. In our view, anonymization should not be an automatically permissible response to requests for withdrawal. Nor should a request for withdrawal necessarily stop research on identifiable samples. Apart from not being particularly appropriate for protecting the interests of individuals, anonymization of samples has a negative impact on research. We suggest that the current view on withdrawal from research, supported by the Declaration of Helsinki and subsequent ethical guidelines, be abandoned in the context of biobank research and be replaced by an approach inspired by the Nuremberg Code. This approach requires those wishing to withdraw their samples from research to present sufficient reason for doing so. Our interpretation of 'sufficient reason' includes all those involving genuine, deeply felt concerns that are not based on misconceptions. Still, this underlines the fact that we all share a responsibility for health research and that no one should take withdrawal from biobank research lightly.

  10. Spontaneous scalarization with an extremely massive field and heavy neutron stars

    Science.gov (United States)

    Morisaki, Soichiro; Suyama, Teruaki

    2017-10-01

    We investigate the internal structure and the mass-radius relation of neutron stars in a recently proposed scalar-tensor theory dubbed asymmetron in which a massive scalar field undergoes spontaneous scalarization inside neutron stars. We focus on the case where the Compton wavelength is shorter than 10 km, which has not been investigated in the literature. By solving the modified Einstein equations, either purely numerically or by partially using a semianalytic method, we find that not only the weakening of gravity by spontaneous scalarization but also the scalar force affect the internal structure significantly in the massive case. We also find that the maximum mass of neutron stars is larger for certain parameter sets than that in general relativity and reaches 2 M⊙ even if the effect of strange hadrons is taken into account. There is even a range of parameters where the maximum mass of neutron stars largely exceeds the threshold that violates the causality bound in general relativity.

  11. Gain and Threshold Current in Type II In(AsSb Mid-Infrared Quantum Dot Lasers

    Directory of Open Access Journals (Sweden)

    Qi Lu

    2015-04-01

    Full Text Available In this work, we improved the performance of mid-infrared type II InSb/InAs quantum dot (QD laser diodes by incorporating a lattice-matched p-InAsSbP cladding layer. The resulting devices exhibited emission around 3.1 µm and operated up to 120 K in pulsed mode, which is the highest working temperature for this type of QD laser. The modal gain was estimated to be 2.9 cm−1 per QD layer. A large blue shift (~150 nm was observed in the spontaneous emission spectrum below threshold due to charging effects. Because of the QD size distribution, only a small fraction of QDs achieve threshold at the same injection level at 4 K. Carrier leakage from the waveguide into the cladding layers was found to be the main reason for the high threshold current at higher temperatures.

  12. Anonymously Productive and Socially Engaged While Learning at Work

    Science.gov (United States)

    Magni, Luca

    2016-01-01

    Many concurrent variables appear to influence people when they interact anonymously, either face-to-face (F2F) or in computer-mediated communications (CMC).This paper presents the results of a small exploratory research, conducted in a medical company in Italy, to investigate how the use of pseudonyms influences CMC behaviours. The study involved…

  13. Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking

    Directory of Open Access Journals (Sweden)

    Rong Ma

    2017-01-01

    Full Text Available Content Centric Networking (CCN is an effective communication paradigm that well matches the features of wireless environments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of location-independent security, CCN must at least have parity with existing solutions for confidential and anonymous communication. This paper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE, that enables the router to test whether an encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the core protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and security is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of only three elements.

  14. Towards Predicting Efficient and Anonymous Tor Circuits

    OpenAIRE

    Barton, Armon; Imani, Mohsen; Ming, Jiang; Wright, Matthew

    2018-01-01

    The Tor anonymity system provides online privacy for millions of users, but it is slower than typical web browsing. To improve Tor performance, we propose PredicTor, a path selection technique that uses a Random Forest classifier trained on recent measurements of Tor to predict the performance of a proposed path. If the path is predicted to be fast, then the client builds a circuit using those relays. We implemented PredicTor in the Tor source code and show through live Tor experiments and Sh...

  15. Does Spontaneous Favorability to Power (vs. Universalism) Values Predict Spontaneous Prejudice and Discrimination?

    Science.gov (United States)

    Souchon, Nicolas; Maio, Gregory R; Hanel, Paul H P; Bardin, Brigitte

    2017-10-01

    We conducted five studies testing whether an implicit measure of favorability toward power over universalism values predicts spontaneous prejudice and discrimination. Studies 1 (N = 192) and 2 (N = 86) examined correlations between spontaneous favorability toward power (vs. universalism) values, achievement (vs. benevolence) values, and a spontaneous measure of prejudice toward ethnic minorities. Study 3 (N = 159) tested whether conditioning participants to associate power values with positive adjectives and universalism values with negative adjectives (or inversely) affects spontaneous prejudice. Study 4 (N = 95) tested whether decision bias toward female handball players could be predicted by spontaneous attitude toward power (vs. universalism) values. Study 5 (N = 123) examined correlations between spontaneous attitude toward power (vs. universalism) values, spontaneous importance toward power (vs. universalism) values, and spontaneous prejudice toward Black African people. Spontaneous positivity toward power (vs. universalism) values was associated with spontaneous negativity toward minorities and predicted gender bias in a decision task, whereas the explicit measures did not. These results indicate that the implicit assessment of evaluative responses attached to human values helps to model value-attitude-behavior relations. © 2016 The Authors. Journal of Personality Published by Wiley Periodicals, Inc.

  16. Auditory brainstem response latency in forward masking, a marker of sensory deficits in listeners with normal hearing thresholds

    DEFF Research Database (Denmark)

    Mehraei, Golbarg; Paredes Gallardo, Andreu; Shinn-Cunningham, Barbara G.

    2017-01-01

    -spontaneous rate fibers results in a faster recovery of wave-V latency as the slow contribution of these fibers is reduced. Results showed that in young audiometrically normal listeners, a larger change in wave-V latency with increasing masker-to-probe interval was related to a greater effect of a preceding masker......-V latency changes with increasing masker-to-probe intervals. In the same listeners, behavioral forward masking detection thresholds were measured. We hypothesized that 1) auditory nerve fiber deafferentation increases forward masking thresholds and increases wave-V latency and 2) a preferential loss of low...

  17. String Threshold corrections in models with spondaneously broken supersymmetry

    CERN Document Server

    Kiritsis, Elias B; Petropoulos, P M; Rizos, J

    1999-01-01

    We analyse a class of four-dimensional heterotic ground states with N=2 space-time supersymmetry. From the ten-dimensional perspective, such models can be viewed as compactifications on a six-dimensional manifold with SU(2) holonomy, which is locally but not globally K3 x T^2. The maximal N=4 supersymmetry is spontaneously broken to N=2. The masses of the two massive gravitinos depend on the (T,U) moduli of T^2. We evaluate the one-loop threshold corrections of gauge and R^2 couplings and we show that they fall in several universality classes, in contrast to what happens in usual K3 x T^2 compactifications, where the N=4 supersymmetry is explicitly broken to N=2, and where a single universality class appears. These universality properties follow from the structure of the elliptic genus. The behaviour of the threshold corrections as functions of the moduli is analysed in detail: it is singular across several rational lines of the T^2 moduli because of the appearance of extra massless states, and suffers only f...

  18. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  19. An Analysis of College Students' Anonymous Questions about Human Sexuality.

    Science.gov (United States)

    Valois, Robert F.; Waring, Kathryn A.

    1991-01-01

    Study analyzed the frequency and type of questions about sexuality submitted anonymously by college students in health education courses over five semesters. The most common categories were sexual arousal/response; general anatomy/physiology; contraception; dating/relationships; pregnancy/fertility; and sexually transmitted diseases. The appendix…

  20. An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

    Directory of Open Access Journals (Sweden)

    Guomin Zhou

    2017-01-01

    Full Text Available Digital signature schemes with additional properties have broad applications, such as in protecting the identity of signers allowing a signer to anonymously sign a message in a group of signers (also known as a ring. While these number-theoretic problems are still secure at the time of this research, the situation could change with advances in quantum computing. There is a pressing need to design PKC schemes that are secure against quantum attacks. In this paper, we propose a novel code-based threshold ring signature scheme with a leader-participant model. A leader is appointed, who chooses some shared parameters for other signers to participate in the signing process. This leader-participant model enhances the performance because every participant including the leader could execute the decoding algorithm (as a part of signing process upon receiving the shared parameters from the leader. The time complexity of our scheme is close to Courtois et al.’s (2001 scheme. The latter is often used as a basis to construct other types of code-based signature schemes. Moreover, as a threshold ring signature scheme, our scheme is as efficient as the normal code-based ring signature.

  1. Nursing lives in the blogosphere: A thematic analysis of anonymous online nursing narratives.

    Science.gov (United States)

    Castro, Aimee; Andrews, Gavin

    2018-02-01

    The aim of this study was to explore the work-life narratives of nurses through a thematic analysis of the nursing accounts they post in their publicly accessible, anonymous blogs. Many nurses participate on social media. Blogs have been advocated as a self-reflective tool in nursing practice, yet as far as the authors are aware, no previous studies have explored nurses' individual blogs for their potential to reveal nurses' perceptions of nursing work. The research design was qualitative description. Between May-August 2015, Internet search engines were used to discover lists of nursing blogs recommended by organizations representing nurses' interests. Recommended blogs were purposively sampled. Four anonymous blogs written by nurses from different nursing specialties met the sampling criteria. All 520 of their entries from 2014 were read and copied into NVivo 10, where an inductive coding process was followed. Three major themes arose in these nurses' online discussions of their work lives: they truly care about and value their nursing work, but they are feeling stressed and burnt out and they are using their anonymous blogs to share factors that frustrate them in their nursing work. Three main areas of frustration were revealed: teamwork problems, challenging patients and families, and management issues. Anonymous nursing blogs offer valuable, longitudinal insights into nurses' perceptions of their work lives. Nursing blogs should be further explored for ongoing insights into nurses' experiences of nursing work, as well as nurses' recommendations for addressing issues causing them to feel frustrated in their work environments. © 2017 John Wiley & Sons Ltd.

  2. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Directory of Open Access Journals (Sweden)

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  3. Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party

    Directory of Open Access Journals (Sweden)

    Jingyu Hua

    2017-01-01

    Full Text Available In collaborative data publishing (CDP, an m-adversary attack refers to a scenario where up to m malicious data providers collude to infer data records contributed by other providers. Existing solutions either rely on a trusted third party (TTP or introduce expensive computation and communication overheads. In this paper, we present a practical distributed k-anonymization scheme, m-k-anonymization, designed to defend against m-adversary attacks without relying on any TTPs. We then prove its security in the semihonest adversary model and demonstrate how an extension of the scheme can also be proven secure in a stronger adversary model. We also evaluate its efficiency using a commonly used dataset.

  4. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    Directory of Open Access Journals (Sweden)

    Sills Eric

    2010-08-01

    Full Text Available Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF and embryo transfer (ET where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  5. K-Anonymity Based Privacy Risk Budgeting System for Interactive Record Linkage

    Directory of Open Access Journals (Sweden)

    Hye-Chung Kum

    2017-04-01

    The k-anonymity based privacy risk budgeting system provides a mechanism where we can concretely reason about the tradeoff between the privacy risks due to information disclosed, accuracy gained, and biases reduced during interactive record linkage.

  6. [Comment on “Anonymous reviews: Self-serving, counterproductive, and unacceptable”] from R.E. Criss and A.M. Hofmeister

    Science.gov (United States)

    Criss, Robert E.; Hofmeister, Anne M.

    We share many of the experiences and most of the sentiments relayed by Myrl Beck in his 1 July contribution to the Eos Forum, as well as those of a similar nature expressed by Alexander McBirney in his March 2003 commentary in GSA Today. We are in fact delighted that senior scientists are speaking up about the unsatisfactory nature of anonymous reviews. However, we believe they understate the problems, partly because the situation is worsening with time. Moreover, the brunt of such problems is disproportionately felt not by emeritus professors but by young scientists, women, and minorities, and this is the crux of the issue.This year, we have, like Beck, received rejections based on comments by two anonymous reviewers and an anonymous associate editor. We have also received rejections from anonymous associate editors based on a single constructive review requesting minor revision, along with an anonymous hostile “review” that could have been written about any manuscript on any topic by any author. More common than these are rejections from identified associate editors based on one or two anonymous reviews, which more often than not err on most of the points made, and in two cases dispute work that resulted in Nobel Prizes. We have examples this year of each type where the senior authors are recent Ph.D.s, whose vulnerabilities underscore the reprehensible nature of this “process.”

  7. Anonymous letters? DNA and fingerprints technologies combined to solve a case.

    Science.gov (United States)

    Barbaro, A; Cormaci, P; Teatino, A; La Marca, A; Barbaro, A

    2004-12-02

    Two brothers, living in two different cities, received two different anonymous letters. We performed latent prints development and DNA research on the letters and also on a glass used by a cousin suspected to be the letters' sender.

  8. Computational analysis of the amplified spontaneous emission in quantum dot doped plastic optical fibers

    International Nuclear Information System (INIS)

    Peng, Xuefeng; Han, Yinxia; Hu, Guoqiang; Wu, Pinghui

    2014-01-01

    The properties of amplified spontaneous emission (ASE) in CdSe/ZnS quantum dot (QD) doped step-index polymer optical fibers (POFs) were computationally analyzed in this paper. A theoretical model based on the rate equations between two main energy levels of CdSe/ZnS QD was built in terms of time (t), distance traveled by light (z) and wavelength (λ), which can describe the ASE successfully. Through analyzing the spectral evolution with distance of the pulses propagating along the CdSe/ZnS QD doped POFs, dependences of the ASE threshold and the slope efficiency on the numerical aperture were obtained. Compared to the ASE in common dye-doped POFs, the pump threshold was just about 1/1000, but the slope efficiency was much higher. (paper)

  9. Forming Circle Formations of Anonymous Mobile Agents With Order Preservation

    NARCIS (Netherlands)

    Wang, Chen; Xie, Guangming; Cao, Ming

    2013-01-01

    We propose distributed control laws for a group of anonymous mobile agents to form desired circle formations when the agents move in the one-dimensional space of a circle. The agents are modeled by kinematic points. They share the common knowledge of the orientation of the circle, but are oblivious

  10. “The Question Exists, but You Don’t Exist With It”: Strategic Anonymity in the Social Lives of Adolescents

    Directory of Open Access Journals (Sweden)

    Nicole B. Ellison

    2016-10-01

    Full Text Available Anonymous interactions may have important implications for adolescents’ social and psychological development. In this article, we use semi-structured interview data collected from US adolescents aged 13–18 years ( N  = 22 to explore how the specific affordances of an online platform that enables selective anonymity shape adolescents’ practices and perceptions. We contribute to scholarship on the effects of anonymous interaction online by surfacing positive outcomes for young adults who choose to interact in anonymous contexts—specifically, a question-and-answer site popular with teenagers ( Ask.fm —and explicating the ways in which these interactions assist in key developmental tasks during adolescence. We identify five primary themes: (1 perceived authenticity, (2 circumventing social expectations, (3 learning about the self, (4 managing identity and self-presentation, and (5 initiating and developing relationships. Across these themes, we find that users strategically employ anonymity to achieve their social goals. Use of the site was often deeply embedded in offline social structures, such that the platform was used to circumvent rigid norms around socialization (who can talk to whom and information-seeking (who can ask what, enforced in educational institutions and elsewhere. We conclude that the strategic use of selective anonymity has the potential to scaffold social processes through which adolescents work toward critical developmental goals.

  11. Darknet and bitcoin, the obscure and anonymous side of the internet in healthcare.

    Science.gov (United States)

    Masoni, Marco; Guelfi, Maria Renza; Gensini, Gian Franco

    2016-11-14

    Illegal activities prosecutable by law in the real life can be committed on the internet alike. In the healthcare domain, we refer mainly to selling of illegal and counterfeit drugs, exchange of pedo-pornographic material and marketing of stolen medical records. These illegal activities are made easier by recent developments of the Internet that medical community must be aware of: darknet and bitcoin. The first allows anonymous surfing and the last anonymous financial transactions. After discussing which healthcare areas are affected by these technological developments of the Internet and the deriving consequences, then the Authors express their opinion on what actions can be taken to protect internet community.

  12. Suicidal behavior among members of Gamblers Anonymous.

    Science.gov (United States)

    Frank, M L; Lester, D; Wexler, A

    1991-09-01

    A national sample of 500 members of Gamblers Anonymous was surveyed by mail in order to gather information on suicidal history. One hundred sixty two usable surveys were returned representing 32.4% of the original sample. Compulsive gamblers who had a history of suicidal preoccupation began gambling at an earlier age than nonsuicidal gamblers and were more likely to have stolen to support their gambling. They also tended to have addicted relatives and children more than nonsuicidal gamblers did. The data suggest that those gamblers who had been suicidal tend to be more serious gamblers than nonsuicidal respondents.

  13. Anonymity communication VPN and Tor: a comparative study

    Science.gov (United States)

    Ramadhani, E.

    2018-03-01

    VPN and Tor is a technology based on anonymity communication. These two technologies have their advantage and disadvantage. The objective of this paper is to find the difference between VPN and Tor technologies by comparing their security of communication on the public network based on the CIA triad concept. The comparative study in this paper is based on the survey method. At last, the result of this paper is a recommendation on when to use a VPN and Tor to secure communication

  14. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    Science.gov (United States)

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  15. Threshold intensity factors as lower boundaries for crack propagation in ceramics

    Directory of Open Access Journals (Sweden)

    Walter Per-Ole

    2004-11-01

    Full Text Available Abstract Background Slow crack growth can be described in a v (crack velocity versus KI (stress intensity factor diagram. Slow crack growth in ceramics is attributed to corrosion assisted stress at the crack tip or at any pre-existing defect in the ceramic. The combined effect of high stresses at the crack tip and the presence of water or body fluid molecules (reducing surface energy at the crack tip induces crack propagation, which eventually may result in fatigue. The presence of a threshold in the stress intensity factor, below which no crack propagation occurs, has been the subject of important research in the last years. The higher this threshold, the higher the reliability of the ceramic, and consequently the longer its lifetime. Methods We utilize the Irwin K-field displacement relation to deduce crack tip stress intensity factors from the near crack tip profile. Cracks are initiated by indentation impressions. The threshold stress intensity factor is determined as the time limit of the tip stress intensity when the residual stresses have (nearly disappeared. Results We determined the threshold stress intensity factors for most of the all ceramic materials presently important for dental restorations in Europe. Of special significance is the finding that alumina ceramic has a threshold limit nearly identical with that of zirconia. Conclusion The intention of the present paper is to stress the point that the threshold stress intensity factor represents a more intrinsic property for a given ceramic material than the widely used toughness (bend strength or fracture toughness, which refers only to fast crack growth. Considering two ceramics with identical threshold limits, although with different critical stress intensity limits, means that both ceramics have identical starting points for slow crack growth. Fast catastrophic crack growth leading to spontaneous fatigue, however, is different. This growth starts later in those ceramic materials

  16. Different responses of spontaneous and stimulus-related alpha activity to ambient luminance changes.

    Science.gov (United States)

    Benedetto, Alessandro; Lozano-Soldevilla, Diego; VanRullen, Rufin

    2017-12-04

    Alpha oscillations are particularly important in determining our percepts and have been implicated in fundamental brain functions. Oscillatory activity can be spontaneous or stimulus-related. Furthermore, stimulus-related responses can be phase- or non-phase-locked to the stimulus. Non-phase-locked (induced) activity can be identified as the average amplitude changes in response to a stimulation, while phase-locked activity can be measured via reverse-correlation techniques (echo function). However, the mechanisms and the functional roles of these oscillations are far from clear. Here, we investigated the effect of ambient luminance changes, known to dramatically modulate neural oscillations, on spontaneous and stimulus-related alpha. We investigated the effect of ambient luminance on EEG alpha during spontaneous human brain activity at rest (experiment 1) and during visual stimulation (experiment 2). Results show that spontaneous alpha amplitude increased by decreasing ambient luminance, while alpha frequency remained unaffected. In the second experiment, we found that under low-luminance viewing, the stimulus-related alpha amplitude was lower, and its frequency was slightly faster. These effects were evident in the phase-locked part of the alpha response (echo function), but weaker or absent in the induced (non-phase-locked) alpha responses. Finally, we explored the possible behavioural correlates of these modulations in a monocular critical flicker frequency task (experiment 3), finding that dark adaptation in the left eye decreased the temporal threshold of the right eye. Overall, we found that ambient luminance changes impact differently on spontaneous and stimulus-related alpha expression. We suggest that stimulus-related alpha activity is crucial in determining human temporal segmentation abilities. © 2017 Federation of European Neuroscience Societies and John Wiley & Sons Ltd.

  17. Presbycusis Disrupts Spontaneous Activity Revealed by Resting-State Functional MRI

    Directory of Open Access Journals (Sweden)

    Yu-Chen Chen

    2018-03-01

    Full Text Available Purpose: Presbycusis, age-related hearing loss, is believed to involve neural changes in the central nervous system, which is associated with an increased risk of cognitive impairment. The goal of this study was to determine if presbycusis disrupted spontaneous neural activity in specific brain areas involved in auditory processing, attention and cognitive function using resting-state functional magnetic resonance imaging (fMRI approach.Methods: Hearing and resting-state fMRI measurements were obtained from 22 presbycusis patients and 23 age-, sex- and education-matched healthy controls. To identify changes in spontaneous neural activity associated with age-related hearing loss, we compared the amplitude of low-frequency fluctuations (ALFF and regional homogeneity (ReHo of fMRI signals in presbycusis patients vs. controls and then determined if these changes were linked to clinical measures of presbycusis.Results: Compared with healthy controls, presbycusis patients manifested decreased spontaneous activity mainly in the superior temporal gyrus (STG, parahippocampal gyrus (PHG, precuneus and inferior parietal lobule (IPL as well as increased neural activity in the middle frontal gyrus (MFG, cuneus and postcentral gyrus (PoCG. A significant negative correlation was observed between ALFF/ReHo activity in the STG and average hearing thresholds in presbycusis patients. Increased ALFF/ReHo activity in the MFG was positively correlated with impaired Trail-Making Test B (TMT-B scores, indicative of impaired cognitive function involving the frontal lobe.Conclusions: Presbycusis patients have disrupted spontaneous neural activity reflected by ALFF and ReHo measurements in several brain regions; these changes are associated with specific cognitive performance and speech/language processing. These findings mainly emphasize the crucial role of aberrant resting-state ALFF/ReHo patterns in presbycusis patients and will lead to a better understanding of the

  18. Presbycusis Disrupts Spontaneous Activity Revealed by Resting-State Functional MRI.

    Science.gov (United States)

    Chen, Yu-Chen; Chen, Huiyou; Jiang, Liang; Bo, Fan; Xu, Jin-Jing; Mao, Cun-Nan; Salvi, Richard; Yin, Xindao; Lu, Guangming; Gu, Jian-Ping

    2018-01-01

    Purpose : Presbycusis, age-related hearing loss, is believed to involve neural changes in the central nervous system, which is associated with an increased risk of cognitive impairment. The goal of this study was to determine if presbycusis disrupted spontaneous neural activity in specific brain areas involved in auditory processing, attention and cognitive function using resting-state functional magnetic resonance imaging (fMRI) approach. Methods : Hearing and resting-state fMRI measurements were obtained from 22 presbycusis patients and 23 age-, sex- and education-matched healthy controls. To identify changes in spontaneous neural activity associated with age-related hearing loss, we compared the amplitude of low-frequency fluctuations (ALFF) and regional homogeneity (ReHo) of fMRI signals in presbycusis patients vs. controls and then determined if these changes were linked to clinical measures of presbycusis. Results : Compared with healthy controls, presbycusis patients manifested decreased spontaneous activity mainly in the superior temporal gyrus (STG), parahippocampal gyrus (PHG), precuneus and inferior parietal lobule (IPL) as well as increased neural activity in the middle frontal gyrus (MFG), cuneus and postcentral gyrus (PoCG). A significant negative correlation was observed between ALFF/ReHo activity in the STG and average hearing thresholds in presbycusis patients. Increased ALFF/ReHo activity in the MFG was positively correlated with impaired Trail-Making Test B (TMT-B) scores, indicative of impaired cognitive function involving the frontal lobe. Conclusions : Presbycusis patients have disrupted spontaneous neural activity reflected by ALFF and ReHo measurements in several brain regions; these changes are associated with specific cognitive performance and speech/language processing. These findings mainly emphasize the crucial role of aberrant resting-state ALFF/ReHo patterns in presbycusis patients and will lead to a better understanding of the

  19. Anonymous sex and HIV risk practices among men using the Internet specifically to find male partners for unprotected sex.

    Science.gov (United States)

    Klein, H

    2012-06-01

    To examine the popularity of anonymous sex practices among men using the Internet to find male partners for unprotected sex, and how anonymous sex relates to involvement in other HIV-related risk behaviours, and to investigate the factors associated with engaging in anonymous sex. Structured telephone interviews were conducted with men who used the Internet specifically to find male partners for unprotected sex. Random sampling from 16 websites was used to obtain a national sample. The data reported in this paper were based on quantitative interviews collected with a cross-sectional study design. Between January 2008 and May 2009, confidential telephone interviews lasting approximately 1-2 h were completed with 332 men. Participants were paid $35 for their participation. Most of the men (67.4%) liked anonymous sex, and slightly more than half (51.2%) had engaged in the behaviour during the month prior to interview. Involvement in anonymous sex was associated with greater involvement in a variety of human immunodeficiency virus (HIV)-related risk practices, such as illegal drug use, number of sex partners, and amount of unprotected sex. Four factors were associated with having vs not having anonymous sex: (1) being HIV positive; (2) answering all of the HIV-related knowledge questions correctly; (3) deriving greater enjoyment from having sex in public places, such as parks, public toilets, or adult book shops; and (4) greater impulsivity. Seven factors were associated with greater vs lesser involvement in anonymous sex among those practising the behaviour: (1) being involved in a relationship with a long-term partner; (2) liking to have sex in public places; (3) using bareback-oriented websites to identify sex partners; (4) greater impulsivity; (5) low level of condom use self-efficacy; (6) greater knowledge about HIV/acquired immunodeficiency syndrome; and either (7a) severe childhood maltreatment or (7b) Caucasian race. Men in this population often sought

  20. Is cyberbullying worse than traditional bullying? Examining the differential roles of medium, publicity, and anonymity for the perceived severity of bullying.

    Science.gov (United States)

    Sticca, Fabio; Perren, Sonja

    2013-05-01

    Cyberbullying, a modern form of bullying performed using electronic forms of contact (e.g., SMS, MMS, Facebook, YouTube), has been considered as being worse than traditional bullying in its consequences for the victim. This difference was mainly attributed to some specific aspect that are believed to distinguish cyberbullying from traditional bullying: an increased potential for a large audience, an increased potential for anonymous bullying, lower levels of direct feedback, decreased time and space limits, and lower levels of supervision. The present studies investigated the relative importance of medium (traditional vs. cyber), publicity (public vs. private), and bully's anonymity (anonymous vs. not anonymous) for the perceived severity of hypothetical bullying scenarios among a sample of Swiss seventh- and eight-graders (study 1: 49% female, mean age = 13.7; study 2: 49% female, mean age = 14.2). Participants ranked a set of hypothetical bullying scenarios from the most severe one to the least severe one. The scenarios were experimentally manipulated based on the aspect of medium and publicity (study 1), and medium and anonymity (study 2). Results showed that public scenarios were perceived as worse than private ones, and that anonymous scenarios were perceived as worse than not anonymous ones. Cyber scenarios generally were perceived as worse than traditional ones, although effect sizes were found to be small. These results suggest that the role of medium is secondary to the role of publicity and anonymity when it comes to evaluating bullying severity. Therefore, cyberbullying is not a priori perceived as worse than traditional bullying. Implications of the results for cyberbullying prevention and intervention are discussed.

  1. Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2013-01-01

    Full Text Available We apply LU decomposition of matrices to present an anonymous bilateral authentication scheme. This paper aims at improving security and providing more excellent performances for remote user authentication scheme. The proposed scheme can provide bilateral authentication and session key agreement, can quickly check the validity of the input password, and can really protect the user anonymity. The security of the proposed scheme is based on the discrete logarithm problem (DLP, Diffie-Hellman problem (DHP, and the one-way hash function. It can resist various attacks such as insider attack, impersonation attack, server spoofing attack, and stolen smart card attack. Moreover, the presented scheme is computationally efficient for real-life implementation.

  2. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.

  3. Spontaneous acute spinal subdural hematoma: spontaneous recovery from severe paraparesis--case report and review.

    Science.gov (United States)

    Payer, Michael; Agosti, Reto

    2010-11-01

    Spontaneous idiopathic acute spinal subdural hematomas are highly exceptional. Neurological symptoms are usually severe, and rapid diagnosis with MRI is mandatory. Surgical evacuation has frequently been used therapeutically; however, spontaneous recovery in mild cases has also been reported. We present a case of spontaneous recovery from severe paraparesis after spontaneous acute SSDH, and review the English-speaking literature.

  4. Anonymity and informed consent in artificial procreation: a report from Denmark

    DEFF Research Database (Denmark)

    Lebech, Anne Mette

    1997-01-01

    a problem concerning its application when dealing with people having a serious mental, social or even physical disability. Within the field of artificial procreation there are even more problems. Informed written consent is often demanded from anonymous donors of gametes in order to ensure their consent...

  5. THE WIKILEAKS´S CASE AND ANONYMITY: EFFECTS ON THE INFORMATION FREEDOM

    Directory of Open Access Journals (Sweden)

    Marlus Heriberto Arns de Oliveira

    2015-10-01

    Full Text Available The Constitution of the Federative Republic of Brazil, enacted in 1988 during the democratization process of the country after the end of an authoritarian regime preceded by several others that show a non-democratic tradition in the Brazilian Republic, remained still remnants an authoritarian Patronizing and Paternalist state, the example of the final part of the Article 5, item IV, which claims to be the free expression of thought, but forbids anonymity, prohibition which deserves to be rethought, especially on the internet, where the navigation data of people deserve protection, as well as their rights to remain anonymous, a fact which entails the need for reflection on the scope and how best to interpret the constitutional provision cited, a debate that, in the proposed article will deal think the ideas of paternalism, authoritarianism and freedom, whose focus will be about within the Internet, social networks and the Knowledge Society.

  6. Controllable optical bistability and multistability in asymmetric double quantum wells via spontaneously generated coherence

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Yuan; Deng, Li [Department of Applied Physics, East China Jiaotong University, Nanchang, 330013 (China); Chen, Aixi, E-mail: aixichen@ecjtu.jx.cn [Department of Applied Physics, East China Jiaotong University, Nanchang, 330013 (China); Institute for Quantum Computing, University of Waterloo, Ontario N2L 3G1 (Canada)

    2015-02-15

    We investigate the nonlinear optical phenomena of the optical bistability and multistability via spontaneously generated coherence in an asymmetric double quantum well structure coupled by a weak probe field and a controlling field. It is shown that the threshold and hysteresis cycle of the optical bistability can be conveniently controlled only by adjusting the intensity of the SGC or the controlling field. Moreover, switching between optical bistability and multistability can be achieved. These studies may have practical significance for the preparation of optical bistable switching device.

  7. Controllable optical bistability and multistability in asymmetric double quantum wells via spontaneously generated coherence

    International Nuclear Information System (INIS)

    Chen, Yuan; Deng, Li; Chen, Aixi

    2015-01-01

    We investigate the nonlinear optical phenomena of the optical bistability and multistability via spontaneously generated coherence in an asymmetric double quantum well structure coupled by a weak probe field and a controlling field. It is shown that the threshold and hysteresis cycle of the optical bistability can be conveniently controlled only by adjusting the intensity of the SGC or the controlling field. Moreover, switching between optical bistability and multistability can be achieved. These studies may have practical significance for the preparation of optical bistable switching device

  8. An improved experimental scheme for simultaneous measurement of high-resolution zero electron kinetic energy (ZEKE) photoelectron and threshold photoion (MATI) spectra

    Science.gov (United States)

    Michels, François; Mazzoni, Federico; Becucci, Maurizio; Müller-Dethlefs, Klaus

    2017-10-01

    An improved detection scheme is presented for threshold ionization spectroscopy with simultaneous recording of the Zero Electron Kinetic Energy (ZEKE) and Mass Analysed Threshold Ionisation (MATI) signals. The objective is to obtain accurate dissociation energies for larger molecular clusters by simultaneously detecting the fragment and parent ion MATI signals with identical transmission. The scheme preserves an optimal ZEKE spectral resolution together with excellent separation of the spontaneous ion and MATI signals in the time-of-flight mass spectrum. The resulting improvement in sensitivity will allow for the determination of dissociation energies in clusters with substantial mass difference between parent and daughter ions.

  9. Gamblers Anonymous as a Recovery Pathway: A Scoping Review

    OpenAIRE

    Schuler, Andr?e; Ferentzy, Peter; Turner, Nigel E.; Skinner, Wayne; McIsaac, Kathryn E.; Ziegler, Carolyn P.; Matheson, Flora I.

    2016-01-01

    Given the preponderance of Gamblers Anonymous (GA), there has been relatively little effort to explore the existing evidence base on its effectiveness as a recovery approach for problem gambling. To remedy this gap in the literature we conducted a scoping review of the literature on mutual aid for individuals experiencing problem gambling published between 2002 and 2015. We searched 13 databases and reviewed reference lists and websites of relevant organizations. We reviewed records for eligi...

  10. Towards an anonymous access control and accountability scheme for cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schäge, Sven; Schwenk, Jörg

    2010-01-01

    An important aspect of trust in cloud computing consists in preventing the cloud provider from misusing the user's data. In this work-in-progress paper, we propose the approach of data anonymization to solve this problem. As this directly leads to problems of cloud usage accounting, we also propose...

  11. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    LENUS (Irish Health Repository)

    Sills, Eric Scott

    2010-08-11

    Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF) and embryo transfer (ET) where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor) was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p < 0.001). Infertility duration was ≥3 yrs for couples enrolling in dual gamete donation, and each had ≥2 prior failed fertility treatments using native oocytes. All seven recipient couples proceeded to embryo transfer, although one patient had two transfers. Clinical pregnancy was achieved for 5\\/7 (71.4%) patients. Non-transferred cryopreserved embryos were available for all seven couples. Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  12. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  13. Anonymity versus privacy in the dictator game: revealing donor decisions to recipients does not substantially impact donor behavior.

    Directory of Open Access Journals (Sweden)

    Jeffrey Winking

    Full Text Available Anonymity is often offered in economic experiments in order to eliminate observer effects and induce behavior that would be exhibited under private circumstances. However, anonymity differs from privacy in that interactants are only unaware of each others' identities, while having full knowledge of each others' actions. Such situations are rare outside the laboratory and anonymity might not meet the requirements of some participants to psychologically engage as if their actions were private. In order to explore the impact of a lack of privacy on prosocial behaviors, I expand on a study reported in Dana et al. (2006 in which recipients were left unaware of the Dictator Game and given donations as "bonuses" to their show-up fees for other tasks. In the current study, I explore whether differences between a private Dictator Game (sensu Dana et al. (2006 and a standard anonymous one are due to a desire by dictators to avoid shame or to pursue prestige. Participants of a Dictator Game were randomly assigned to one of four categories-one in which the recipient knew of (1 any donation by an anonymous donor (including zero donations, (2 nothing at all, (3 only zero donations, and (4 and only non-zero donations. The results suggest that a lack of privacy increases the shame that selfish-acting participants experience, but that removing such a cost has only minimal effects on actual behavior.

  14. Computational Account of Spontaneous Activity as a Signature of Predictive Coding.

    Directory of Open Access Journals (Sweden)

    Veronika Koren

    2017-01-01

    Full Text Available Spontaneous activity is commonly observed in a variety of cortical states. Experimental evidence suggested that neural assemblies undergo slow oscillations with Up ad Down states even when the network is isolated from the rest of the brain. Here we show that these spontaneous events can be generated by the recurrent connections within the network and understood as signatures of neural circuits that are correcting their internal representation. A noiseless spiking neural network can represent its input signals most accurately when excitatory and inhibitory currents are as strong and as tightly balanced as possible. However, in the presence of realistic neural noise and synaptic delays, this may result in prohibitively large spike counts. An optimal working regime can be found by considering terms that control firing rates in the objective function from which the network is derived and then minimizing simultaneously the coding error and the cost of neural activity. In biological terms, this is equivalent to tuning neural thresholds and after-spike hyperpolarization. In suboptimal working regimes, we observe spontaneous activity even in the absence of feed-forward inputs. In an all-to-all randomly connected network, the entire population is involved in Up states. In spatially organized networks with local connectivity, Up states spread through local connections between neurons of similar selectivity and take the form of a traveling wave. Up states are observed for a wide range of parameters and have similar statistical properties in both active and quiescent state. In the optimal working regime, Up states are vanishing, leaving place to asynchronous activity, suggesting that this working regime is a signature of maximally efficient coding. Although they result in a massive increase in the firing activity, the read-out of spontaneous Up states is in fact orthogonal to the stimulus representation, therefore interfering minimally with the network

  15. Anonymity as an Instructional Scaffold in Peer Assessment: Its Effects on Peer Feedback Quality and Evolution in Students' Perceptions about Peer Assessment Skills

    Science.gov (United States)

    Rotsaert, Tijs; Panadero, Ernesto; Schellens, Tammy

    2018-01-01

    Although previous research has indicated that providing anonymity is an effective way to create a safe peer assessment setting, continuously ensuring anonymity prevents students from experiencing genuine two-way interactive feedback dialogues. The present study investigated how installing a transitional approach from an anonymous to a…

  16. Threshold quantum cryptography

    International Nuclear Information System (INIS)

    Tokunaga, Yuuki; Okamoto, Tatsuaki; Imoto, Nobuyuki

    2005-01-01

    We present the concept of threshold collaborative unitary transformation or threshold quantum cryptography, which is a kind of quantum version of threshold cryptography. Threshold quantum cryptography states that classical shared secrets are distributed to several parties and a subset of them, whose number is greater than a threshold, collaborates to compute a quantum cryptographic function, while keeping each share secretly inside each party. The shared secrets are reusable if no cheating is detected. As a concrete example of this concept, we show a distributed protocol (with threshold) of conjugate coding

  17. ZebraLancer: Private and Anonymous Crowdsourcing System atop Open Blockchain

    OpenAIRE

    Lu, Yuan; Tang, Qiang; Wang, Guiling

    2018-01-01

    We design and implement the first private and anonymous decentralized crowdsourcing system ZebraLancer. It realizes the fair exchange (i.e. security against malicious workers and dishonest requesters) without using any third-party arbiter. More importantly, it overcomes two fundamental challenges of decentralization, i.e. data leakage and identity breach. First, our outsource-then-prove methodology resolves the critical tension between blockchain transparency and data confidentiality without ...

  18. Spontaneous L-H transitions under marginal hot cathode biasing in the Tohoku University Heliac

    International Nuclear Information System (INIS)

    Kitajima, S; Takahashi, H; Tanaka, Y; Utoh, H; Yokoyama, M; Inagaki, S; Suzuki, Y; Nishimura, K; Shinde, J; Ogawa, M; Iwazaki, K; Aoyama, H; Okamoto, A; Shinto, K; Sasao, M

    2006-01-01

    A series of hot cathode biasing experiments with marginal conditions for improved mode transition were carried out in the Tohoku University Heliac (TU-Heliac). Spontaneous transitions were observed accompanied by a delay of a few milliseconds. Transition conditions were explored over a wide operation range. The transition points can be identified clearly and easily in the operation range, because the plasma parameters changed slowly until the spontaneous transition. Although operation conditions were spread over a wide range, poloidal Mach numbers for transitions were concentrated in the range of -M p = 1-2 and normalized driving forces for poloidal rotation agreed well with the local maximum value of ion viscosity predicted by neoclassical theory. The local maximum of ion viscosity against the poloidal Mach number was found to play a key role in the L-H transition. Marginal hot cathode biasing is suitable to determine the threshold conditions for the L-H transition

  19. Secondary Analysis of Audio Data. Technical Procedures for Virtual Anonymization and Pseudonymization

    Directory of Open Access Journals (Sweden)

    Henning Pätzold

    2005-01-01

    Full Text Available Qualitative material presented as audio data requires a greater degree of protecting of anonymity than for example textual data. Apart from the verbal content, it carries paraverbal aspects including voice characteristics, thus making it easier to identify the speaker. This complicates secondary analysis or reanalysis conducted by researchers who were not involved in the data collection. Difficulties increase if the chances are high that the researcher and the interviewee come in contact for example through a meeting. This paper describes the technical procedures that are used to modify the sound of the audio source in a way that it reduces the possibility of recognition (i.e. similar to that of a carefully written transcript. A discussion of the technical possibilities of this procedure along with an exploration of the boundaries of anonymization is presented. URN: urn:nbn:de:0114-fqs0501249

  20. The Pattern of Drug Abuse in Anonymous Adidcts

    Directory of Open Access Journals (Sweden)

    Seyede Maryam Vahdat-Shariat-Panahi

    2010-04-01

    Full Text Available Objective: Having the information about pattern of substance abuse in the community and its epidemiological features is one of the most important protocols for evaluation, follow–up and control of the use of these substances. The aim of this study was to evaluate the patterns of substances abuse among narcotic anonymous (N. A. addicted patients. Materials & Methods: In this descriptive and analytical study, three hundred patients from narcotic abusers anonymous (N. A. association who were referred to a treatment center in Tehran were participated consecutively. The information about demographic characteristics, socioeconomic status, type of drug and the patterns of substance abuse of all cases were collected by researcher made questionnaire. Data were analyzed by Chi–Square test. Results: 80% of the patients were male. Almost 65. 2% of cases aged less than 40 years. More than two–third of cases had free jobs and 21. 2% of them were unemployed. Also, 32% of patients had college degrees. The most common types of abused substance were opium (88%, cigarette (76.7%, and alcohol (63% and 34% of them used substances intravenously. The use of alcohol (P=0.033, cannabis (P<0.001, cocaine (P=0.009 and ecstasy (P<0.001 was more prevalent significantly in the cases less than 40 years old than the elderly. Conclusion: It seems that the trend of substance abuse has been changed to younger population. The pattern of drug abuse in young adults is more toward psychosis drugs such as cocaine and ecstasy.

  1. Your choice MATor(s) : large-scale quantitative anonymity assessment of Tor path selection algorithms against structural attacks

    OpenAIRE

    Backes, Michael; Meiser, Sebastian; Slowik, Marcin

    2015-01-01

    In this paper, we present a rigorous methodology for quantifying the anonymity provided by Tor against a variety of structural attacks, i.e., adversaries that compromise Tor nodes and thereby perform eavesdropping attacks to deanonymize Tor users. First, we provide an algorithmic approach for computing the anonymity impact of such structural attacks against Tor. The algorithm is parametric in the considered path selection algorithm and is, hence, capable of reasoning about variants of Tor and...

  2. A Framework For Enhancing Privacy In Location Based Services Using K-Anonymity Model

    Directory of Open Access Journals (Sweden)

    Jane Mugi

    2015-08-01

    Full Text Available Abstract This paper presents a framework for enhancing privacy in Location Based Services using K-anonymity model. Users of location based services have to reveal their location information in order to use these services however this has threatened the user privacy. K-anonymity approach has been studied extensively in various forms. However it is only effective when the user location is fixed. When a user moves and continuously sends their location information the location service provider can approximate user trajectory which poses a threat to the trajectory privacy of the user. This framework will ensure that user privacy is enhanced for both snapshot and continuous queries. The efficiency and effectiveness of the proposed framework was evaluated the results indicate that the proposed framework has high success rate and good run time performance.

  3. Medical Relabeling in Gamblers Anonymous: The Construction of an Ideal Member.

    Science.gov (United States)

    Turner, David N.; Saunders, Danny

    1990-01-01

    Observed 2 Gamblers Anonymous (GA) groups in South Wales over a 12-month period. Determined 2 broad consequences arose from encountering fellow sufferers: acceptance of diagnosis and commitment to recovery and to will of GA, or rejection of the diagnosis with the knowledge that they are returning to the outside world with a reconstituted…

  4. Quem controla a política de ninguém? Anonymous Brasil e o ativismo hacker nas redes de comunicação (Who control the politics of no one? Anonymous Brazil and hacktivism in communication networks Doi: 10.5212/Emancipacao.v.15i2.0008

    Directory of Open Access Journals (Sweden)

    Bárbara Maria Farias Mota

    2016-08-01

    Full Text Available Resumo: Esse artigo analisa a atuação política dos hackers a partir de um estudo de caso da rede Anonymous Brasil, uma das vertentes do hacktivismo no contexto brasileiro. Para tanto, utiliza as postagens de um dos diferentes perfis Anonymous no Twitter, no período da Operação Hacking Cup (#OpHackingCup, que consistiu em uma série de protestos virtuais contra a Copa do Mundo de 2014. Metodologicamente, o desenho de pesquisa adota uma abordagem multimétodo, unindo análise de conteúdo e estatística descritiva. Os resultados evidenciam que por meio da utilização de ferramentas digitais transgressivas e do anonimato, esses atores não estatais evidenciam táticas estratégicas de ação diante do controle/vigilância presentes na sociedade contemporânea. Palavras-chave: Anonymous Brasil. Ativismo hacker. Redes informacionais. Abstract: This article analyses the political actuation of hackers from a study case of the Anonymous Brazil network, one of the faces of hacktivism in the Brazilian context. For such, this paper utilises tweets from one Anonymous profile in Twitter, during the period of the Operation Hacking Cup (#OpHackingCup, which entailed several digital protests against the 2014 World Cup. Methodologically, this paper adopts a research design based on a multi-method approach, uniting content analysis and descriptive statistics. The results show that, by the means of transgressive digital tools and anonymity, those actors spotlight strategical tactics as a countermeasure to the control/surveillance that is present in the contemporary society. Keywords: Anonymous Brazil. Hacktivism. Informational networks.

  5. Spontaneous and evoked cerebral activity modifications on whole-body γ irradiated adult rabbit

    International Nuclear Information System (INIS)

    Court, L.; Dufour, R.; Bassant, M.H.; Fatome, M.

    1976-01-01

    Whole-body γ-exposure from 150 to 850 rads (dose-rate: 14 rads.min -1 ) delivered to adult rabbits chronically implanted with electrodes resulted in prompt and delayed changes of behavior, arousal and spontaneous and evoked electrical activities. Electrophysiological techniques of polygraphic recording and signal processing showed that the alterations were related to the absorbed dose. The threshold dose accompanied with transient changes of arousal should be in the range of 50-100 rads; below this range, to the exclusion of some possible behavior changes, exposure should act as a stimulation that would become nociceptive at higher doses only [fr

  6. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-05-19

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  7. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Jingwei Liu

    2016-05-01

    Full Text Available Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  8. Is the introduction of anonymous delivery associated with a reduction of high neonaticide rates in Austria? A retrospective study.

    Science.gov (United States)

    Klier, C M; Grylli, C; Amon, S; Fiala, C; Weizmann-Henelius, G; Pruitt, S L; Putkonen, H

    2013-03-01

    To assess rates of neonaticide after the implementation of a preventative 'anonymous delivery' law in mid-2001 in Austria. Women are allowed to access antenatal care and give birth in a hospital anonymously, without showing any ID and free of charge. Retrospective study. A complete census of police-reported neonaticides was obtained from the police statistics of Austria, Sweden and Finland. All neonaticides reported to the police, 1991-2009. Neonaticide rates before (1991-2001) and after (2002-2009) the introduction of anonymous delivery legislation per 100 000 births. The Mann-Whitney U-test for two independent samples was used to compare neonaticide rates in the period before the new law was introduced with the rates observed after the implementation of the new law for each country. On average the rate of police-reported neonaticides was 7.2 per 100 000 births (SD 3.5, median 7.1) in Austria prior to the new law being passed, and 3.1 per 100 000 births (SD 2.1, median 2.6) after the law was passed. A significant decrease in neonaticide was observed in Austria after the implementation of anonymous delivery (Mann-Whitney U-test P = 0.017). Whereas the Finnish and Swedish rates were lower than the Austrian rates before and after the implementation of the Austrian law, they remained unchanged over the study period. Our data demonstrate a significant decrease in the number of police-reported neonaticides in Austria after the implementation of anonymous delivery. Even though underlying factors associated with neonaticide are complex, the findings could indicate an effect of anonymous delivery in the prevention of this crime. © 2012 The Authors BJOG An International Journal of Obstetrics and Gynaecology © 2012 RCOG.

  9. Spontaneous external gallbladder perforation

    International Nuclear Information System (INIS)

    Noeldge, G.; Wimmer, B.; Kirchner, R.

    1981-01-01

    Spontaneous perforation of the gallbladder is one complication of cholelithiasis. There is a greater occurence of free perforation in the peritoneal cavity with bilary pertonitis, followed by the perforation into the stomach, small intestine and colon. A single case of the nowadays rare spontaneous perforation in and through the abdominal wall will be reported. Spontaneous gallbladder perforation appears nearly asymptomatic in its clinical course because of absent biliary peritonitis. (orig.) [de

  10. Preference for anonymity in sperm donation for artificial insemination: an experience from low-resource settings in Nigeria

    Science.gov (United States)

    Ezugwu, Euzebus Chinonye; Eleje, George U; Iyoke, Chukwuemeka A; Mba, Sunday G; Nnaji, Henry C; Enechukwu, Chukwunonso I; Nkwo, Peter O

    2018-01-01

    Objective Anonymous sperm donation is a common practice in Nigeria with its associated legal and ethical challenges. This study aimed to investigate infertile couples’ opinions about issues of sperm donor anonymity and to determine factors that might influence their preferences. Methods A cross-sectional, multicentered, questionnaire-based study was conducted among infertile couples attending infertility clinics in three tertiary hospitals in the south-eastern region of Nigeria over a period of 6 months. Results A total of 450 infertile couples were recruited consecutively from the three study centers. However, 450 females and 352 males (total=802) participated in the study. The level of awareness of artificial insemination using donor sperm for the management of male infertility among the respondents was 69.2%, while its acceptability rate was 62.7%. The majority of the respondents indicated their preference for secrecy and anonymity in sperm donation. Approximately 84% of the respondents indicated that the mode of conception should never be disclosed to the donor-conceived child, and ~92% of them indicated that the identity of the sperm donor should never be revealed to the donor-conceived child. Fear of adverse effect of such disclosure on the child and the possible of rejection of the father in order to seek for the donor were the major reasons for their preference for anonymity. Conclusion Although it has been argued that every child has a right to know their genetic parents, the reasons proffered by the respondents for their preference for anonymity cannot be totally ignored. Establishing a regulatory body and enacting laws that will address both the ethical and legal issues associated with gamete donation in the developing world will go a long way in promoting openness and honest communication with donor-conceived children. PMID:29670338

  11. CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY

    Directory of Open Access Journals (Sweden)

    Sowmiya Murthy

    2014-10-01

    Full Text Available We propose a secure cloud storage model that addresses security and storage issues for cloud computing environments. Security is achieved by anonymous authentication which ensures that cloud users remain anonymous while getting duly authenticated. For achieving this goal, we propose a digital signature based authentication scheme with a decentralized architecture for distributed key management with multiple Key Distribution Centers. Homomorphic encryption scheme using Paillier public key cryptosystem is used for encrypting the data that is stored in the cloud. We incorporate a query driven approach for validating the access policies defined by an individual user for his/her data i.e. the access is granted to a requester only if his credentials matches with the hidden access policy. Further, since data is vulnerable to losses or damages due to the vagaries of the network, we propose an automatic retrieval mechanism where lost data is recovered by data replication and file replacement with string matching algorithm. We describe a prototype implementation of our proposed model.

  12. Definition of spontaneous reconnection

    International Nuclear Information System (INIS)

    Schindler, K.

    1984-01-01

    The author discusses his view of driven versus spontaneous. There is a close link between ''spontaneous'' and ''instability.'' One of the prominent examples for instability is the thermal convection instability. Just to remind you, if you heat a fluid layer from below, it takes a certain Rayleigh number to make it unstable. Beyond the onset point you find qualitatively new features. That is called ''spontaneous,'' and this is a bit more than semantics. It's a new qualitative property that appears and it is spontaneous although we have an energy flux through the system. It's a misconception, to call this ''driven'' pointing at the energy flux through it. Of course, the convection would not exist without this energy flux. But what makes it ''spontaneous'' is that without any particular external signal, a new qualitative feature appears. And this is what is called an ''instability'' and ''spontaneous.'' From these considerations the author got a little reassured of what distinction should be made in the field of the magnetosphere. If we have a smooth energy transport into the magnetosphere and suddenly we have this qualitatively new feature (change of B-topology) coming up; then, using this terminology we don't have a choice other than calling this spontaneous or unstable, if you like. If we ''tell'' the system where it should make its neutral line and where it should make its plasmoids, then, it is driven. And this provides a very clear-cut observational distinction. The author emphasizes the difference he sees is a qualitative difference, not only a quantitative one

  13. Quantum election scheme based on anonymous quantum key distribution

    International Nuclear Information System (INIS)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  14. Forensic linguistics: Applications of forensic linguistics methods to anonymous letters

    OpenAIRE

    NOVÁKOVÁ, Veronika

    2011-01-01

    The title of my bachelor work is ?Forensic linguistics: Applications of forensic linguistics methods to anonymous letters?. Forensic linguistics is young and not very known branch of applied linguistics. This bachelor work wants to introduce forensic linguistics and its method. The bachelor work has two parts ? theory and practice. The theoretical part informs about forensic linguistics in general. Its two basic aspects utilized in forensic science and respective methods. The practical part t...

  15. Informed Traders as Liquidity Providers: Anonymity, Liquidity and Price Formation

    OpenAIRE

    Barbara Rindi

    2008-01-01

    The tendency to introduce anonymity into financial markets apparently runs counter to the theory supporting transparency. This paper studies the impact of pre-trade transparency on liquidity in a market where risk-averse traders accommodate the liquidity demand of noise traders. When some risk-averse investors become informed, an adverse selection problem ensues for the others, making them reluctant to supply liquidity. Hence the disclosure of traders' identities improves liquidity by mitigat...

  16. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    Science.gov (United States)

    2014-02-01

    attack is also similar to those that rely on misbehaving receivers and optimistic ACKs to bypass flow control protocol mechanisms [40]–[42]. In particular...thank the anonymous reviewers for their feedback and suggestions, Damon McCoy for discussions about misbehaving receivers and authenticated signals...ping-o-death. html. [40] S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, “TCP Con- gestion Control with a Misbehaving Receiver,” ACM SIGCOMM CCR

  17. Self-bridging of vertical silicon nanowires and a universal capacitive force model for spontaneous attraction in nanostructures.

    Science.gov (United States)

    Sun, Zhelin; Wang, Deli; Xiang, Jie

    2014-11-25

    Spontaneous attractions between free-standing nanostructures have often caused adhesion or stiction that affects a wide range of nanoscale devices, particularly nano/microelectromechanical systems. Previous understandings of the attraction mechanisms have included capillary force, van der Waals/Casimir forces, and surface polar charges. However, none of these mechanisms universally applies to simple semiconductor structures such as silicon nanowire arrays that often exhibit bunching or adhesions. Here we propose a simple capacitive force model to quantitatively study the universal spontaneous attraction that often causes stiction among semiconductor or metallic nanostructures such as vertical nanowire arrays with inevitably nonuniform size variations due to fabrication. When nanostructures are uniform in size, they share the same substrate potential. The presence of slight size differences will break the symmetry in the capacitive network formed between the nanowires, substrate, and their environment, giving rise to electrostatic attraction forces due to the relative potential difference between neighboring wires. Our model is experimentally verified using arrays of vertical silicon nanowire pairs with varied spacing, diameter, and size differences. Threshold nanowire spacing, diameter, or size difference between the nearest neighbors has been identified beyond which the nanowires start to exhibit spontaneous attraction that leads to bridging when electrostatic forces overcome elastic restoration forces. This work illustrates a universal understanding of spontaneous attraction that will impact the design, fabrication, and reliable operation of nanoscale devices and systems.

  18. CARA Risk Assessment Thresholds

    Science.gov (United States)

    Hejduk, M. D.

    2016-01-01

    Warning remediation threshold (Red threshold): Pc level at which warnings are issued, and active remediation considered and usually executed. Analysis threshold (Green to Yellow threshold): Pc level at which analysis of event is indicated, including seeking additional information if warranted. Post-remediation threshold: Pc level to which remediation maneuvers are sized in order to achieve event remediation and obviate any need for immediate follow-up maneuvers. Maneuver screening threshold: Pc compliance level for routine maneuver screenings (more demanding than regular Red threshold due to additional maneuver uncertainty).

  19. Factors associated with attendance in 12-step groups (Alcoholics Anonymous/Narcotics Anonymous) among adults with alcohol problems living with HIV/AIDS.

    Science.gov (United States)

    Orwat, John; Samet, Jeffrey H; Tompkins, Christopher P; Cheng, Debbie M; Dentato, Michael P; Saitz, Richard

    2011-01-15

    Despite the value of 12-step meetings, few studies have examined factors associated with attendance among those living with HIV/AIDS, such as the impact of HIV disease severity and demographics. This study examines predisposing characteristics, enabling resources and need on attendance at Alcoholic Anonymous (AA) and Narcotics Anonymous (NA) meetings among those living with HIV/AIDS and alcohol problems. Secondary analysis of prospective data from the HIV-Longitudinal Interrelationships of Viruses and Ethanol study, a cohort of 400 adults living with HIV/AIDS and alcohol problems. Factors associated with AA/NA attendance were identified using the Anderson model for vulnerable populations. Generalized estimating equation logistic regression models were fit to identify factors associated with self-reported AA/NA attendance. At study entry, subjects were 75% male, 12% met diagnostic criteria for alcohol dependence, 43% had drug dependence and 56% reported attending one or more AA/NA meetings (past 6 months). In the adjusted model, female gender negatively associated with attendance, as were social support systems that use alcohol and/or drugs, while presence of HCV antibody, drug dependence diagnosis, and homelessness associated with higher odds of attendance. Non-substance abuse related barriers to AA/NA group attendance exist for those living with HIV/AIDS, including females and social support systems that use alcohol and/or drugs. Positive associations of homelessness, HCV infection and current drug dependence were identified. These findings provide implications for policy makers and treatment professionals who wish to encourage attendance at 12-step meetings for those living with HIV/AIDS and alcohol or other substance use problems. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  20. THINKING ABOUT REFERRALS TO ALCOHOLICS ANONYMOUS IN RELATIONAL WAYS

    Directory of Open Access Journals (Sweden)

    Christopher K. Bitten

    2010-02-01

    Full Text Available This article examines Alcoholics Anonymous (AA as a relational therapy, seen through the lens of the relational needs described by Richard Erskine. AA as a resource may be underemployed by therapists who do not realize its potential to heal the relational damage suffered and inflicted by their alcoholic clients. Common misconceptions about AA are addressed, and ways for therapists to facilitate successful referrals of clients to AA are described. The author posits that there is a synergistic benefit in combining integrative psychotherapy with the client’s involvement in AA.

  1. (In)visible Ghosts in the Machine and the Powers that Bind: The Relational Securitization of Anonymous

    DEFF Research Database (Denmark)

    Dunn Cavelty, Myriam; Jaeger, Mark Daniel

    2015-01-01

    prerogative to secrecy, and challenging its claim to unrestrained surveillance. At the same time, the state's bases are implicated and reproduced in the way this conflict is constructed. The conflict not only (re)produces and makes visible “the state” as a social entity, but also changes or at least...... designations give rise to the visibility of political entities and agency in the first place. Applying this framework, we can better understand the movement's path from a bunch of anonymous individuals to the collectivity “Anonymous,” posing a threat to certain bases of the state's ontological existence, its...

  2. Spontaneous intracranial hypotension.

    LENUS (Irish Health Repository)

    Fullam, L

    2012-01-31

    INTRODUCTION: Spontaneous\\/primary intracranial hypotension is characterised by orthostatic headache and is associated with characteristic magnetic resonance imaging findings. CASE REPORT: We present a case report of a patient with typical symptoms and classical radiological images. DISCUSSION: Spontaneous intracranial hypotension is an under-recognised cause of headache and can be diagnosed by history of typical orthostatic headache and findings on MRI brain.

  3. dCache, towards Federated Identities & Anonymized Delegation

    Science.gov (United States)

    Ashish, A.; Millar, AP; Mkrtchyan, T.; Fuhrmann, P.; Behrmann, G.; Sahakyan, M.; Adeyemi, O. S.; Starek, J.; Litvintsev, D.; Rossi, A.

    2017-10-01

    For over a decade, dCache has relied on the authentication and authorization infrastructure (AAI) offered by VOMS, Kerberos, Xrootd etc. Although the established infrastructure has worked well and provided sufficient security, the implementation of procedures and the underlying software is often seen as a burden, especially by smaller communities trying to adopt existing HEP software stacks [1]. Moreover, scientists are increasingly dependent on service portals for data access [2]. In this paper, we describe how federated identity management systems can facilitate the transition from traditional AAI infrastructure to novel solutions like OpenID Connect. We investigate the advantages offered by OpenID Connect in regards to ‘delegation of authentication’ and ‘credential delegation for offline access’. Additionally, we demonstrate how macaroons can provide a more fine-granular authorization mechanism that supports anonymized delegation.

  4. Protecting whistle-blowers: Anonymity on the internet

    International Nuclear Information System (INIS)

    Guinnessy, P.

    1997-01-01

    Even though strict legislation exists in many countries, it appears that the next few years should be a golden opportunity for groups to successfully monitor and publish the activity of the nuclear states, and human right violations through use of the Internet. The reasons for this are: 1. The Internet is becoming widespread even in repressive regimes; 2. Software is available to either hide messages from others or hide the mailers account; 3. Information from sites in other countries can be easily obtained to be read inside repressive regimes from the Internet. In this regard It is suggested the Pugwash or a similar organization should set up either an anonymous account to receive information or maybe use a more heavily protected cyperpunk remailer. Such an ability would hopefully prompt more people to notify treaty violations

  5. Montreal Accord on Patient-Reported Outcomes (PROs) use series - Paper 9: anonymization and ethics considerations for capturing and sharing patient reported outcomes.

    Science.gov (United States)

    Arbuckle, Luk; Moher, Ester; Bartlett, Susan J; Ahmed, Sara; El Emam, Khaled

    2017-09-01

    Patient-reported outcomes (PROs) are collected with consent for care; however, using the data for any other purpose requires consent for that additional purpose, or the anonymization of the data. Collecting explicit consent to use this data for secondary purposes, before the patient completes a PRO, can also bias the responses. We consider the ethical and security issues related to the collection of data at the point of care or in the population and the aggregation and integration of PRO data with administrative databases to facilitate decision making and comparative effectiveness research. In this article, we describe risk-based anonymization, taking the context of the data release into account, so that we may consider the degree by which the release is considered anonymized. We also consider the ethical use of anonymized data, the anonymization of free-form text, and the secure linking data sets without sharing any personal information. Many good standards and best practices exist for the sharing of health data and could be used as a baseline in the development of a national PRO initiative. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. Location Prediction Based on Transition Probability Matrices Constructing from Sequential Rules for Spatial-Temporal K-Anonymity Dataset

    Science.gov (United States)

    Liu, Zhao; Zhu, Yunhong; Wu, Chenxue

    2016-01-01

    Spatial-temporal k-anonymity has become a mainstream approach among techniques for protection of users’ privacy in location-based services (LBS) applications, and has been applied to several variants such as LBS snapshot queries and continuous queries. Analyzing large-scale spatial-temporal anonymity sets may benefit several LBS applications. In this paper, we propose two location prediction methods based on transition probability matrices constructing from sequential rules for spatial-temporal k-anonymity dataset. First, we define single-step sequential rules mined from sequential spatial-temporal k-anonymity datasets generated from continuous LBS queries for multiple users. We then construct transition probability matrices from mined single-step sequential rules, and normalize the transition probabilities in the transition matrices. Next, we regard a mobility model for an LBS requester as a stationary stochastic process and compute the n-step transition probability matrices by raising the normalized transition probability matrices to the power n. Furthermore, we propose two location prediction methods: rough prediction and accurate prediction. The former achieves the probabilities of arriving at target locations along simple paths those include only current locations, target locations and transition steps. By iteratively combining the probabilities for simple paths with n steps and the probabilities for detailed paths with n-1 steps, the latter method calculates transition probabilities for detailed paths with n steps from current locations to target locations. Finally, we conduct extensive experiments, and correctness and flexibility of our proposed algorithm have been verified. PMID:27508502

  7. [Spontaneous bacterial peritonitis].

    Science.gov (United States)

    Velkey, Bálint; Vitális, Eszter; Vitális, Zsuzsanna

    2017-01-01

    Spontaneous bacterial peritonitis occurs most commonly in cirrhotic patients with ascites. Pathogens get into the circulation by intestinal translocation and colonize in peritoneal fluid. Diagnosis of spontaneous bacterial peritonitis is based on elevated polymorphonuclear leukocyte count in the ascites (>0,25 G/L). Ascites culture is often negative but aids to get information about antibiotic sensitivity in positive cases. Treatment in stable patient can be intravenous then orally administrated ciprofloxacin or amoxicillin/clavulanic acid, while in severe cases intravenous III. generation cephalosporin. Nosocomial spontaneous bacterial peritonitis often caused by Gram-positive bacteria and multi-resistant pathogens can also be expected thus carbapenem should be the choice of the empiric treatment. Antibiotic prophylaxis should be considered. Norfloxacin is used most commonly, but changes are expected due to increase in quinolone resistance. As a primary prophylaxis, a short-term antibiotic treatment is recommended after gastrointestinal bleeding for 5 days, while long-term prophylaxis is for patients with low ascites protein, and advanced disease (400 mg/day). Secondary prophylaxis is recommended for all patients recovered from spontaneous bacterial peritonitis. Due to increasing antibiotic use of antibiotics prophylaxis is debated to some degree. Orv. Hetil., 2017, 158(2), 50-57.

  8. Social influence in computer-mediated communication : The effects of anonymity on group behavior

    NARCIS (Netherlands)

    Postmes, T; Spears, R; Sakhel, K; de Groot, D

    2001-01-01

    Two studies examined hypotheses derived from a Social Identity model of Deindividuation Effects (SIDE) as applied to social influence in computer-mediated communication (CMC) in groups. This model predicts that anonymity can increase social influence if a common group identity is salient. In a first

  9. Genetics Home Reference: primary spontaneous pneumothorax

    Science.gov (United States)

    ... Home Health Conditions Primary spontaneous pneumothorax Primary spontaneous pneumothorax Printable PDF Open All Close All Enable Javascript ... view the expand/collapse boxes. Description Primary spontaneous pneumothorax is an abnormal accumulation of air in the ...

  10. Use of anonymous Web communities and websites by medical consumers in Japan to research drug information.

    Science.gov (United States)

    Kishimoto, Keiko; Fukushima, Noriko

    2011-01-01

    In this study, we investigated the status of researching drug information online, and the type of Internet user who uses anonymous Web communities and websites. A Web-based cross-sectional survey of 10875 male and female Internet users aged 16 and over was conducted in March 2010. Of 10282 analyzed respondents, excluding medical professionals, about 47% reported that they had previously searched the Internet for drug information and had used online resources ranging from drug information search engines and pharmaceutical industry websites to social networking sites and Twitter. Respondents who had researched drug information online (n=4861) were analyzed by two multivariable logistic regressions. In Model 1, the use of anonymous websites associated with age (OR, 0.778; 95% CI, 0.742-0.816), referring to the reputation and the narrative of other Internet users on shopping (OR, 1.640; 95% CI, 1.450-1.855), taking a prescription drug (OR, 0.806; 95% CI, 0.705-0.922), and frequent consulting with non-professionals about medical care and health (OR, 1.613; 95% CI, 1.396-1.865). In Model 2, use of only anonymous websites was associated with age (OR, 0.753; 95% CI, 0.705-0.805), using the Internet daily (OR, 0.611; 95% CI, 0.462-0.808), taking a prescription drug (OR, 0.614; 95% CI, 0.505-0.747), and experience a side effect (OR, 0.526; 95% CI, 0.421-0.658). The analysis revealed the profiles of Internet users who researched drug information on social media sites where the information providers are anonymous and do not necessarily have adequate knowledge of medicine and online information literacy.

  11. Conducting Anonymous, Incentivized, Online Surveys With Sexual and Gender Minority Adolescents: Lessons Learned From a National Polyvictimization Study.

    Science.gov (United States)

    Sterzing, Paul R; Gartner, Rachel E; McGeough, Briana L

    2018-03-01

    Sexual and gender minority adolescents represent an understudied and hard-to-reach population who experience higher rates of mental and behavioral health problems in comparison to their cisgender, heterosexual peers. Online surveys and the proliferation of Internet-connected devices among adolescents offer an exciting opportunity for researchers to begin addressing research gaps and past methodological limitations with these hard-to-reach populations. The purpose of this article is to provide guidance to researchers who are designing and implementing anonymous, incentivized, online surveys by examining the following critical domains-(a) recruitment and engagement: means of leveraging social media and videos to recruit and engage a more nationally representative sample; (b) safety and protection: strategies for administering informed consent and protecting participant anonymity and well-being; and (c) data integrity: mechanisms to detect dishonest and repeat responders. To facilitate discussion of these aims, concrete examples are used from SpeakOut-a 3-year, national study funded by the National Institute of Justice that utilized an anonymous, incentivized, online survey with a large sample of sexual and gender minority adolescents ( N = 1,177) to identify the prevalence, incidence, and correlates of polyvictimization. The article concludes with lessons learned from this national study and recommendations for technological innovations and future research that will strengthen the utility of anonymous, incentivized, online surveys to study sexual and gender minority adolescents and other hard-to-reach populations.

  12. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data

    Science.gov (United States)

    Majeed, Abdul; Ullah, Farman; Lee, Sungchang

    2017-01-01

    Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims. PMID:28481298

  13. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data

    Directory of Open Access Journals (Sweden)

    Abdul Majeed

    2017-05-01

    Full Text Available Personally identifiable information (PII affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims.

  14. Theory of threshold phenomena

    International Nuclear Information System (INIS)

    Hategan, Cornel

    2002-01-01

    Theory of Threshold Phenomena in Quantum Scattering is developed in terms of Reduced Scattering Matrix. Relationships of different types of threshold anomalies both to nuclear reaction mechanisms and to nuclear reaction models are established. Magnitude of threshold effect is related to spectroscopic factor of zero-energy neutron state. The Theory of Threshold Phenomena, based on Reduced Scattering Matrix, does establish relationships between different types of threshold effects and nuclear reaction mechanisms: the cusp and non-resonant potential scattering, s-wave threshold anomaly and compound nucleus resonant scattering, p-wave anomaly and quasi-resonant scattering. A threshold anomaly related to resonant or quasi resonant scattering is enhanced provided the neutron threshold state has large spectroscopic amplitude. The Theory contains, as limit cases, Cusp Theories and also results of different nuclear reactions models as Charge Exchange, Weak Coupling, Bohr and Hauser-Feshbach models. (author)

  15. Spontaneous emergence of social influence in online systems.

    Science.gov (United States)

    Onnela, Jukka-Pekka; Reed-Tsochas, Felix

    2010-10-26

    Social influence drives both offline and online human behavior. It pervades cultural markets, and manifests itself in the adoption of scientific and technical innovations as well as the spread of social practices. Prior empirical work on the diffusion of innovations in spatial regions or social networks has largely focused on the spread of one particular technology among a subset of all potential adopters. Here we choose an online context that allows us to study social influence processes by tracking the popularity of a complete set of applications installed by the user population of a social networking site, thus capturing the behavior of all individuals who can influence each other in this context. By extending standard fluctuation scaling methods, we analyze the collective behavior induced by 100 million application installations, and show that two distinct regimes of behavior emerge in the system. Once applications cross a particular threshold of popularity, social influence processes induce highly correlated adoption behavior among the users, which propels some of the applications to extraordinary levels of popularity. Below this threshold, the collective effect of social influence appears to vanish almost entirely, in a manner that has not been observed in the offline world. Our results demonstrate that even when external signals are absent, social influence can spontaneously assume an on-off nature in a digital environment. It remains to be seen whether a similar outcome could be observed in the offline world if equivalent experimental conditions could be replicated.

  16. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks

    Science.gov (United States)

    2018-01-01

    Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675

  17. Business Information Exchange System with Security, Privacy, and Anonymity

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-01-01

    Full Text Available Business Information Exchange is an Internet Secure Portal for secure management, distribution, sharing, and use of business e-mails, documents, and messages. It has three applications supporting three major types of information exchange systems: secure e-mail, secure instant messaging, and secure sharing of business documents. In addition to standard security services for e-mail letters, which are also applied to instant messages and documents, the system provides innovative features of privacy and full anonymity of users and their locations, actions, transactions, and exchanged resources. In this paper we describe design, implementation, and use of the system.

  18. "Un-Googling” publications: The ethics and problems of anonymization

    DEFF Research Database (Denmark)

    Shklovski, Irina; Vertesi, Janet

    2013-01-01

    Digital tools of research dissemination make scholarly publications accessible to the public at large through simple search engines. As a result, the users that we study, interview, and cite may be at risk of exposure to unwelcome types of scrutiny and scholars must grapple with challenges...... to the ethics of exposure of our research participants. We present one approach to anonymization of research results with search engines in mind, which we call un-Googling, that we have developed to minimize risk to our participants. We discuss the considerations that this approach raises and pose a challenge...

  19. Ziprasidone-induced spontaneous orgasm.

    Science.gov (United States)

    Boora, K; Chiappone, K; Dubovsky, S; Xu, J

    2010-06-01

    Neuroleptic treatment in schizophrenic patients has been associated with sexual dysfunction, including impotence and decreased libido. Spontaneous ejaculation without sexual arousal during typical antipsychotic treatment is a rare condition that has been described with zuclopentixol, trifluoperazine, and thiothixene. Here, we are reporting a case of spontaneous orgasm with ziprasidone in a bipolar patient. This patient began to repeatedly experience spontaneous sexual arousal and orgasm, which she had never experienced in the past. Ziprasidone might be causing an increase in sexual orgasm by 5-HT2 receptor antagonism, which preclinical evidence suggests that it facilitates dopamine release in the cortex.

  20. Particles near threshold

    International Nuclear Information System (INIS)

    Bhattacharya, T.; Willenbrock, S.

    1993-01-01

    We propose returning to the definition of the width of a particle in terms of the pole in the particle's propagator. Away from thresholds, this definition of width is equivalent to the standard perturbative definition, up to next-to-leading order; however, near a threshold, the two definitions differ significantly. The width as defined by the pole position provides more information in the threshold region than the standard perturbative definition and, in contrast with the perturbative definition, does not vanish when a two-particle s-wave threshold is approached from below

  1. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    NARCIS (Netherlands)

    Bodó, B.

    2014-01-01

    This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs). Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of

  2. A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment

    Directory of Open Access Journals (Sweden)

    Chenyu Wang

    2018-01-01

    Full Text Available With the great development of network technology, the multiserver system gets widely used in providing various of services. And the two-factor authentication protocols in multiserver system attract more and more attention. Recently, there are two new schemes for multiserver environment which claimed to be secure against the known attacks. However, after a scrutinization of these two schemes, we found that (1 their description of the adversary’s abilities is inaccurate; (2 their schemes suffer from many attacks. Thus, firstly, we corrected their description on the adversary capacities to introduce a widely accepted adversary model and then summarized fourteen security requirements of multiserver based on the works of pioneer contributors. Secondly, we revealed that one of the two schemes fails to preserve forward secrecy and user anonymity and cannot resist stolen-verifier attack and off-line dictionary attack and so forth and also demonstrated that another scheme fails to preserve forward secrecy and user anonymity and is not secure to insider attack and off-line dictionary attack, and so forth. Finally, we designed an enhanced scheme to overcome these identified weaknesses, proved its security via BAN logic and heuristic analysis, and then compared it with other relevant schemes. The comparison results showed the superiority of our scheme.

  3. Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay

    OpenAIRE

    Biryukov, Alex; Pustogarov, Ivan

    2015-01-01

    In this paper we propose a new micropayments scheme which can be used to reward Tor relay operators. Tor clients do not pay Tor relays with electronic cash directly but submit proof of work shares which the relays can resubmit to a crypto-currency mining pool. Relays credit users who submit shares with tickets that can later be used to purchase improved service. Both shares and tickets when sent over Tor circuits are anonymous. The analysis of the crypto-currencies market prices shows that th...

  4. Preference for anonymity in sperm donation for artificial insemination: an experience from low-resource settings in Nigeria

    Directory of Open Access Journals (Sweden)

    Ezugwu EC

    2018-04-01

    Full Text Available Euzebus Chinonye Ezugwu,1,2 George U Eleje,3,4 Chukwuemeka A Iyoke,1,2 Sunday G Mba,5 Henry C Nnaji,2 Chukwunonso I Enechukwu,4 Peter O Nkwo1,2 1Department of Obstetrics and Gynecology, Faculty of Medical Sciences, College of Medicine, University of Nigeria, Ittuku Ozalla Campus, Enugu State, Nigeria; 2Department of Obstetrics and Gynecology, University of Nigeria Teaching Hospital, Ituku-Ozalla, Enugu State, Nigeria; 3Department of Obstetrics and Gynecology, Faculty of Medicine, Nnamdi Azikiwe University, Awka, Anambra State, Nigeria; 4Department of Obstetrics and Gynecology, Nnamdi Azikiwe University Teaching Hospital, Nnewi, Anambra State, Nigeria; 5Department of Obstetrics and Gynecology, Enugu State University Teaching Hospital, Enugu State, Nigeria Objective: Anonymous sperm donation is a common practice in Nigeria with its associated legal and ethical challenges. This study aimed to investigate infertile couples’ opinions about issues of sperm donor anonymity and to determine factors that might influence their preferences.Methods: A cross-sectional, multicentered, questionnaire-based study was conducted among infertile couples attending infertility clinics in three tertiary hospitals in the south-eastern region of Nigeria over a period of 6 months.Results: A total of 450 infertile couples were recruited consecutively from the three study centers. However, 450 females and 352 males (total=802 participated in the study. The level of awareness of artificial insemination using donor sperm for the management of male infertility among the respondents was 69.2%, while its acceptability rate was 62.7%. The majority of the respondents indicated their preference for secrecy and anonymity in sperm donation. Approximately 84% of the respondents indicated that the mode of conception should never be disclosed to the donor-conceived child, and ~92% of them indicated that the identity of the sperm donor should never be revealed to the donor

  5. Mutual support and recovery in the Russian Alcoholics Anonymous online community

    Directory of Open Access Journals (Sweden)

    Lyytikäinen Laura

    2016-04-01

    Full Text Available AIMS – In Russia the paradigm of alcoholism as a disease is still in contrast to the general perception of alcoholics as weak-willed. This article studies alcoholism and recovery in Russia through the case study of the Russian Alcoholics Anonymous online group. It studies how people who are seeking help for their drinking problems in this online community come to incorporate a new self-understanding of being ill with alcoholism.

  6. Annotation and Anonymity: Playful Photo-Sharing by Visiting Groups of Teenagers

    OpenAIRE

    Rowland, Duncan; Appiah-Kubi, Kwamena; Shipp, Victoria; Mortier, Richard Michael; Benford, Steve

    2015-01-01

    This paper investigates the playful photo taking behaviour of teenagers during group visits to two touristic public events (an airshow and a guided tour of a museum). These studies provide the feedback for the iterative development of a smartphone based anonymous image annotation and sharing application. The resulting implications for the design of such photo systems are examined, specifically the appropriateness of opportunistic upload for social media. Playfulness in photography has many im...

  7. Where's the Noise? Key Features of Spontaneous Activity and Neural Variability Arise through Learning in a Deterministic Network.

    Directory of Open Access Journals (Sweden)

    Christoph Hartmann

    2015-12-01

    Full Text Available Even in the absence of sensory stimulation the brain is spontaneously active. This background "noise" seems to be the dominant cause of the notoriously high trial-to-trial variability of neural recordings. Recent experimental observations have extended our knowledge of trial-to-trial variability and spontaneous activity in several directions: 1. Trial-to-trial variability systematically decreases following the onset of a sensory stimulus or the start of a motor act. 2. Spontaneous activity states in sensory cortex outline the region of evoked sensory responses. 3. Across development, spontaneous activity aligns itself with typical evoked activity patterns. 4. The spontaneous brain activity prior to the presentation of an ambiguous stimulus predicts how the stimulus will be interpreted. At present it is unclear how these observations relate to each other and how they arise in cortical circuits. Here we demonstrate that all of these phenomena can be accounted for by a deterministic self-organizing recurrent neural network model (SORN, which learns a predictive model of its sensory environment. The SORN comprises recurrently coupled populations of excitatory and inhibitory threshold units and learns via a combination of spike-timing dependent plasticity (STDP and homeostatic plasticity mechanisms. Similar to balanced network architectures, units in the network show irregular activity and variable responses to inputs. Additionally, however, the SORN exhibits sequence learning abilities matching recent findings from visual cortex and the network's spontaneous activity reproduces the experimental findings mentioned above. Intriguingly, the network's behaviour is reminiscent of sampling-based probabilistic inference, suggesting that correlates of sampling-based inference can develop from the interaction of STDP and homeostasis in deterministic networks. We conclude that key observations on spontaneous brain activity and the variability of neural

  8. Keeping mum about dad: "contracts" to protect gamete donor anonymity.

    Science.gov (United States)

    Rees, Anne

    2012-06-01

    This article considers the legal status of so-called contracts for anonymity between fertility clinics and donors of gametes that were made in the period before legislation authorising disclosure. It notes that while clinics frequently cite the existence of these "contracts" to argue against retrospective legislation authorising disclosure of the donor's identity, they may be nothing more than one-sided statements of informed consent. However, the article notes that even if an agreement between a donor and a clinic is not contractual, it does not follow that a person conceived through assisted reproductive technology has any right of access to the identity of the donor. The writer has not been able to locate examples of written promises by the clinics promising anonymity. There are written promises by the donors not to seek the identity of the recipients. These promises do not bind the resulting offspring nor do they appear to be supported by consideration. The article suggests that the basis for any individual donor to restrain a clinic from revealing their identity may be found in promissory estoppel. Nevertheless, there is no real issue in Australia concerning clinics revealing these details absent legislative authority. The issue is whether parliaments will legislate to authorise the disclosure. The article notes that it would be rare for parliaments to legislate to overturn existing legal contracts but suggests that the contract argument may not be as strong as has been thought.

  9. Compatibility of Adlerian Theory and Practice with the Philosophy and Practices of Alcoholics Anonymous.

    Science.gov (United States)

    Carroll, Jane J.

    1999-01-01

    Tenets of Adlerian theory and practice are compatible with the philosophy and practices of Alcoholics Anonymous. Counselors can expect treatment approaches based on Adlerian counseling theory to be congruent with 12-step practices of individuals who are in recovery from alcohol dependence. (Author)

  10. Amplified Spontaneous Emission of Organic Pyridinium Dye doped Polymeric Waveguide

    International Nuclear Information System (INIS)

    Jun, Xi; Li-Hua, Ye; Qiong, Wang; Deng, Xu; Chang-Gui, Lu; Guo-Hua, Hu; Yi-Ping, Cui

    2009-01-01

    An organic dye salt trans-4-[p-(N-hydroxyethyl-N-methylamino)styryl]-N-methylpyridinium iodide (ASPI) is doped with an electron transport organic molecule tris(8-hydroxyquinoline) aluminium (Alq3) in a host matrix of poly(methylmethacrylate) (PMMA), and the amplified spontaneous emission (ASE) is studied. By efficient Forster energy transfer from Alq3 to ASPI, it is demonstrated that the ASE threshold of ASPI:Alq3:PMMA waveguide (about 11μJ/pulse) is much lower than that of ASPI:PMMA system (about 38μJ/pulse). Meanwhile, the peak position of ASE can be controlled by the effect of film thickness on waveguide modes. We show that the ASE peak position can be tuned over 37nm. These characteristics indicate the ASPI:Alq3 system as a promising gain medium for optical amplifiers and organic semiconductor lasers

  11. Quality of life changes in an alcoholics anonymous self-help group

    Directory of Open Access Journals (Sweden)

    INDRĖ DIRGĖLIENĖ

    2017-09-01

    Full Text Available The issue of alcohol addiction is one of the most pressing in contemporary society as it causes an effect in the context of poverty, violence and suicidal behaviour. After the restoration of Lithuania‘s Independence a new helping profession such as social worker appeared: they were expected to provide professional help to people in order to help them find inner motivation for positive socialization or re-socialization. The issue of alcohol addiction/dependence was first viewed systemically, with the understanding of the need for systemic help: social, psychological, spiritual and medical. Long-term rehabilitation centres have been created and self-help groups formed: those of Alcoholics Anonymous (AA, Al-anon (self – help groups for friends and families who have relatives suffering from alcohol and ACA (Adult Children of Alcoholics self-help group. The article analyzes the quality of life changes in an Alcoholics Anonymous self-help group. Qualitative survey data are presented in this article. Six life stories of people attending Alcoholics Anonymous (AA self-help groups are provided. The age of the participants ranges from 31 to 58. The main criterion to participate in the research is: people who have or have had problems because of alcohol usage and who are Alcoholics Anonymous self-help group (AA participants that have reached Step 12. This means they are ready to spread the message about recovering from this abuse to people who suffer from it. Deep analysis interview has been used to collect the data. Interview notional blocks are: 1 childhood experiences; 2 addiction to alcohol period and crisis; 3 changes of life quality when attending AA groups. The study data have been provided using content analysis through the deduction method. The theoretical basis is a systematic approach to a person in the course of his life‘ spiritual concepts and stages of recovery (May, 2004; Linn, Linn, 2003; Kubler-Ross, 2008 and the theory of integrated

  12. Spontaneous rib fractures.

    Science.gov (United States)

    Katrancioglu, Ozgur; Akkas, Yucel; Arslan, Sulhattin; Sahin, Ekber

    2015-07-01

    Other than trauma, rib fracture can occur spontaneously due to a severe cough or sneeze. In this study, patients with spontaneous rib fractures were analyzed according to age, sex, underlying pathology, treatment, and complications. Twelve patients who presented between February 2009 and February 2011 with spontaneous rib fracture were reviewed retrospectively. The patients' data were evaluated according to anamnesis, physical examination, and chest radiographs. The ages of the patients ranged from 34 to 77 years (mean 55.91 ± 12.20 years), and 7 (58.4%) were male. All patients had severe cough and chest pain. The fractures were most frequently between 4th and 9th ribs; multiple rib fractures were detected in 5 (41.7%) patients. Eight (66.7%) patients had chronic obstructive pulmonary disease, 2 (16.7%) had bronchial asthma, and 2 (16.7%) had osteoporosis. Bone densitometry revealed a high risk of bone fracture in all patients. Patients with chronic obstructive pulmonary disease or bronchial asthma had been treated with high-dose steroids for over a year. Spontaneous rib fracture due to severe cough may occur in patients with osteoporosis, chronic obstructive pulmonary disease, or bronchial asthma, receiving long-term steroid therapy. If these patients have severe chest pain, chest radiography should be performed to check for bone lesions. © The Author(s) 2015.

  13. A large-scale examination of the effectiveness of anonymous marking in reducing group performance differences in higher education assessment.

    Directory of Open Access Journals (Sweden)

    Daniel P Hinton

    Full Text Available The present research aims to more fully explore the issues of performance differences in higher education assessment, particularly in the context of a common measure taken to address them. The rationale for the study is that, while performance differences in written examinations are relatively well researched, few studies have examined the efficacy of anonymous marking in reducing these performance differences, particularly in modern student populations. By examining a large archive (N = 30674 of assessment data spanning a twelve-year period, the relationship between assessment marks and factors such as ethnic group, gender and socio-environmental background was investigated. In particular, analysis focused on the impact that the implementation of anonymous marking for assessment of written examinations and coursework has had on the magnitude of mean score differences between demographic groups of students. While group differences were found to be pervasive in higher education assessment, these differences were observed to be relatively small in practical terms. Further, it appears that the introduction of anonymous marking has had a negligible effect in reducing them. The implications of these results are discussed, focusing on two issues, firstly a defence of examinations as a fair and legitimate form of assessment in Higher Education, and, secondly, a call for the re-examination of the efficacy of anonymous marking in reducing group performance differences.

  14. A large-scale examination of the effectiveness of anonymous marking in reducing group performance differences in higher education assessment.

    Science.gov (United States)

    Hinton, Daniel P; Higson, Helen

    2017-01-01

    The present research aims to more fully explore the issues of performance differences in higher education assessment, particularly in the context of a common measure taken to address them. The rationale for the study is that, while performance differences in written examinations are relatively well researched, few studies have examined the efficacy of anonymous marking in reducing these performance differences, particularly in modern student populations. By examining a large archive (N = 30674) of assessment data spanning a twelve-year period, the relationship between assessment marks and factors such as ethnic group, gender and socio-environmental background was investigated. In particular, analysis focused on the impact that the implementation of anonymous marking for assessment of written examinations and coursework has had on the magnitude of mean score differences between demographic groups of students. While group differences were found to be pervasive in higher education assessment, these differences were observed to be relatively small in practical terms. Further, it appears that the introduction of anonymous marking has had a negligible effect in reducing them. The implications of these results are discussed, focusing on two issues, firstly a defence of examinations as a fair and legitimate form of assessment in Higher Education, and, secondly, a call for the re-examination of the efficacy of anonymous marking in reducing group performance differences.

  15. Music effect on pain threshold evaluated with current perception threshold

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    AIM: Music relieves anxiety and psychotic tension. This effect of music is applied to surgical operation in the hospital and dental office. It is still unclear whether this music effect is only limited to the psychological aspect but not to the physical aspect or whether its music effect is influenced by the mood or emotion of audience. To elucidate these issues, we evaluated the music effect on pain threshold by current perception threshold (CPT) and profile of mood states (POMC) test. METHODS: Healthy 30 subjects (12 men, 18 women, 25-49 years old, mean age 34.9) were tested. (1)After POMC test, all subjects were evaluated pain threshold with CPT by Neurometer (Radionics, USA) under 6 conditions, silence, listening to the slow tempo classic music, nursery music, hard rock music, classic paino music and relaxation music with 30 seconds interval. (2)After Stroop color word test as the stresser, pain threshold was evaluated with CPT under 2 conditions, silence and listening to the slow tempo classic music. RESULTS: Under litening to the music, CPT sores increased, especially 2 000 Hz level related with compression, warm and pain sensation. Type of music, preference of music and stress also affected CPT score. CONCLUSION: The present study demonstrated that the concentration on the music raise the pain threshold and that stress and mood influence the music effect on pain threshold.

  16. Changes in spontaneous brain activity in early Parkinson's disease.

    Science.gov (United States)

    Yang, Hong; Zhou, Xiaohong Joe; Zhang, Min-Ming; Zheng, Xu-Ning; Zhao, Yi-Lei; Wang, Jue

    2013-08-09

    Resting state brain activity can provide valuable insights into the pathophysiology of Parkinson's disease (PD). The purpose of the present study was (a) to investigate abnormal spontaneous neuronal activity in early PD patients using resting-state functional MRI (fMRI) with a regional homogeneity (ReHo) method and (b) to demonstrate the potential of using changes in abnormal spontaneous neuronal activity for monitoring the progression of PD during its early stages. Seventeen early PD patients were assessed with the Unified Parkinson's Disease Rating Scale (UPDRS), the Hoehn and Yahr disability scale and the Mini-mental State Examination (MMSE) were compared with seventeen gender- and age-matched healthy controls. All subjects underwent MRI scans using a 1.5T General Electric Signa Excite II scanner. The MRI scan protocol included whole-brain volumetric imaging using a 3D inversion recovery prepared (IR-Prep) fast spoiled gradient-echo pulse sequence and 2D multi-slice (22 axial slices covering the whole brain) resting-state fMRI using an echo planar imaging (EPI) sequence. Images were analyzed in SPM5 together with a ReHo algorithm using the in-house software program REST. A corrected threshold of pbrain regions, including the left cerebellum, left parietal lobe, right middle temporal lobe, right sub-thalamic nucleus areas, right superior frontal gyrus, middle frontal gyrus (MFG), right inferior parietal lobe (IPL), right precuneus lobe, left MFG and left IPL. Additionally, significantly reduced ReHo was also observed in the early PD patients in the following brain regions: the left putamen, left inferior frontal gyrus, right hippocampus, right anterior cingulum, and bilateral lingual gyrus. Moreover, in PD patients, ReHo in the left putamen was negatively correlated with the UPDRS scores (r=-0.69). These results indicate that the abnormal resting state spontaneous brain activity associated with patients with early PD can be revealed by Reho analysis. Copyright

  17. METAL DELM - metal avrelianis contribution to the study of mining coins and anonymous quadrantes

    Directory of Open Access Journals (Sweden)

    Vojvoda Mirjana D.

    2016-01-01

    Full Text Available In the course of rescue archaeological investigations at the Viminacium necropolis of Vi{e Grobalja in 1984, one anonymous quadrans of the VIII Apollo group was discovered (cat. 1. It was discovered in trench 63 in the immediate vicinity of a grave with an inhumation (G 343 that, besides two pottery vessels, also yielded as grave offerings one as of Faustina the Elder, minted after her death, in AD 141. Other finds presented here are four specimens of Roman mining coins from the private collection of Petar Fajfri} from [abac (cat. 2-5. All specimens come from the well known site of Duge Njive in the area of the village of Banatsko Polje (Bogati} borough where, by all appearances, are the remains of a vicus or smaller settlement. Five specimens of mining coins from that site have already been published. Both mining coins and anonymous quadrantes represent, in general, rare types of numismatic finds. Nine anonymous quadrantes are known so far from the territory of Serbia (Table 1 and the provenance is known for three specimens from the region of Guberevac-Babe (Kosmaj, housed in the National Museum in Belgrade. All three belong to the Minerva group with an owl facing to the right represented on the reverse. For two more anonymous quadrantes the place of discovery is known: one specimen comes from Singidunum and belongs to the Mercury group and the other that was found at Viminacium and is the subject of this paper is of the Apollo group. There are four more specimens from unknown sites for which it is assumed that they come from the Upper Moesia territory. Two of them are from the Vajfert collection and two from the Kovačević collection in the National Museum in Belgrade, There has, however, been a somewhat greater number (38 of Roman mining coins discovered in Serbia (Table 1. We know the finding locations of 25 of them: from the Kosmaj area (Babe, Guberevac and Stojnik, the Ibar valley (from the vicinity of Trepča and So~anica, Ritopek

  18. Spontaneous tension haemopneumothorax.

    Science.gov (United States)

    Patterson, Benjamin Oliver; Itam, Sarah; Probst, Fey

    2008-10-31

    We present a patient with sudden onset progressive shortness of breath and no history of trauma, who rapidly became haemodynamically compromised with a pneumothorax and pleural effusion seen on chest radiograph. He was treated for spontaneous tension pneumothorax but this was soon revealed to be a tension haemopneumothorax. He underwent urgent thoracotomy after persistent bleeding to explore an apical vascular abnormality seen on CT scanning. To our knowledge this is the first such case reported.Aetiology and current approach to spontaneous haemothorax are discussed briefly.

  19. Design and Implement of the Anonymous Communications in the Mobile IP Networks%移动IP中通信匿名技术的设计与实现

    Institute of Scientific and Technical Information of China (English)

    康凯; 郭伟; 吴诗其

    2002-01-01

    One of the key problems in the mobile communication is the anonymous communication. The mobile userwants to hide his real identifying information to the visiting domain and the public network which he does not trust,and prevent from being tracked and located. In this paper, we have discoursed the anonymous communications in themobile IP, and presented a novel strategy of the dynamic address allocation and the routing with anonymity. The sug-gested method enables any identifying information can be carried over the anonymous and secure connections, andprovide end-to-end security. The implements of the mobile host and the mobile subnet are also presented.

  20. Anonymous Search Histories Featuring Personalized Advertisement - Balancing Privacy with Economic Interests

    OpenAIRE

    Thorben Burghardt; Klemens Bohm; Achim Guttmann; Chris Clifton

    2011-01-01

    Search engines are key to finding information on the web. Search presently is free for users financed by targeted advertisement. Today, the current search terms determine the ad placement. In the near future, search-engine providers will make use of detailed user profiles for better ad placement. This puts user privacy at risk. Anonymizing search histories, which is a solution in principle, gives way to a trade-off between privacy and the usability of the data for ad placement. This paper stu...

  1. Spontaneous tension haemopneumothorax

    Directory of Open Access Journals (Sweden)

    Itam Sarah

    2008-10-01

    Full Text Available Abstract We present a patient with sudden onset progressive shortness of breath and no history of trauma, who rapidly became haemodynamically compromised with a pneumothorax and pleural effusion seen on chest radiograph. He was treated for spontaneous tension pneumothorax but this was soon revealed to be a tension haemopneumothorax. He underwent urgent thoracotomy after persistent bleeding to explore an apical vascular abnormality seen on CT scanning. To our knowledge this is the first such case reported. Aetiology and current approach to spontaneous haemothorax are discussed briefly.

  2. Mirroring the videos of Anonymous:cloud activism, living networks, and political mimesis

    OpenAIRE

    Fish, Adam Richard

    2016-01-01

    Mirrors describe the multiplication of data across a network. In this article, I examine the politics of mirroring as practiced on videos by the hacktivist network Anonymous. Mirrors are designed to retain visibility on social media platforms and motivate viewers towards activism. They emerge from a particular social structure and propagate a specific symbolic system. Furthermore, mirrors are not exact replicas nor postmodern representations. Rather, mirroring maps a contestation over visibil...

  3. Spontaneous compactification to homogeneous spaces

    International Nuclear Information System (INIS)

    Mourao, J.M.

    1988-01-01

    The spontaneous compactification of extra dimensions to compact homogeneous spaces is studied. The methods developed within the framework of coset space dimensional reduction scheme and the most general form of invariant metrics are used to find solutions of spontaneous compactification equations

  4. Bystander's willingness to report theft, physical assault, and sexual assault: the impact of gender, anonymity, and relationship with the offender.

    Science.gov (United States)

    Nicksa, Sarah C

    2014-01-01

    This research examines bystander willingness to report three different crimes to the police or campus authorities among a college student sample (n = 295). Twelve original vignettes varied anonymity when reporting, bystander's relationship with the offender (friend or stranger), and crime type. A factorial analysis of variance showed that main effects were found for crime type, bystander's gender, and bystander's relationship with the offender; anonymity was not significant. The physical assault was the most likely to be reported (4.47), followed by theft (3.26), and sexual assault (2.36). Women were more likely than men to report each crime type, and bystanders who were good friends of the offender were less likely to report than strangers. No two- or three-way interactions were significant, but a significant four-way interaction indicated that anonymity, relationship with the offender, and bystander's gender predicted willingness to report for the sexual assault scenario.

  5. AN EFFECTIVE MULTI-CLUSTERING ANONYMIZATION APPROACH USING DISCRETE COMPONENT TASK FOR NON-BINARY HIGH DIMENSIONAL DATA SPACES

    Directory of Open Access Journals (Sweden)

    L.V. Arun Shalin

    2016-01-01

    Full Text Available Clustering is a process of grouping elements together, designed in such a way that the elements assigned to similar data points in a cluster are more comparable to each other than the remaining data points in a cluster. During clustering certain difficulties related when dealing with high dimensional data are ubiquitous and abundant. Works concentrated using anonymization method for high dimensional data spaces failed to address the problem related to dimensionality reduction during the inclusion of non-binary databases. In this work we study methods for dimensionality reduction for non-binary database. By analyzing the behavior of dimensionality reduction for non-binary database, results in performance improvement with the help of tag based feature. An effective multi-clustering anonymization approach called Discrete Component Task Specific Multi-Clustering (DCTSM is presented for dimensionality reduction on non-binary database. To start with we present the analysis of attribute in the non-binary database and cluster projection identifies the sparseness degree of dimensions. Additionally with the quantum distribution on multi-cluster dimension, the solution for relevancy of attribute and redundancy on non-binary data spaces is provided resulting in performance improvement on the basis of tag based feature. Multi-clustering tag based feature reduction extracts individual features and are correspondingly replaced by the equivalent feature clusters (i.e. tag clusters. During training, the DCTSM approach uses multi-clusters instead of individual tag features and then during decoding individual features is replaced by corresponding multi-clusters. To measure the effectiveness of the method, experiments are conducted on existing anonymization method for high dimensional data spaces and compared with the DCTSM approach using Statlog German Credit Data Set. Improved tag feature extraction and minimum error rate compared to conventional anonymization

  6. Case of spontaneous ventriculocisternostomy

    Energy Technology Data Exchange (ETDEWEB)

    Yamane, Kanji; Yoshimoto, Hisanori; Harada, Kiyoshi; Uozumi, Tohru [Hiroshima Univ. (Japan). School of Medicine; Kuwabara, Satoshi

    1983-05-01

    The authors experienced a case of spontaneous ventriculocisternostomy diagnosed by CT scan with metrizamide and Conray. Patient was 23-year-old male who had been in good health until one month before admission, when he began to have headache and tinnitus. He noticed bilateral visual acuity was decreased about one week before admission and vomiting appeared two days before admission. He was admitted to our hospital because of bilateral papilledema and remarkable hydrocephalus diagnosed by CT scan. On admission, no abnormal neurological signs except for bilateral papilledema were noted. Immediately, right ventricular drainage was performed. Pressure of the ventricle was over 300mmH/sub 2/O and CSF was clear. PVG and PEG disclosed an another cavity behind the third ventricle, which was communicated with the third ventricle, and occlusion of aqueduct of Sylvius. Metrizamide CT scan and Conray CT scan showed a communication between this cavity and quadrigeminal and supracerebellar cisterns. On these neuroradiological findings, the diagnosis of obstructive hydrocephalus due to benign aqueduct stenosis accompanied with spontaneous ventriculocisternostomy was obtained. Spontaneous ventriculocisternostomy was noticed to produce arrest of hydrocephalus, but with our case, spontaneous regression of such symptoms did not appeared. By surgical ventriculocisternostomy (method by Torkildsen, Dandy, or Scarff), arrest of hydrocephalus was seen in about 50 to 70 per cent, which was the same results as those of spontaneous ventriculocisternostomy. It is concluded that VP shunt or VA shunt is thought to be better treatment of obstructive hydrocephalus than the various kinds of surgical ventriculocisternostomy.

  7. Standing economy: does the heterogeneity in the energy cost of posture maintenance reside in differential patterns of spontaneous weight-shifting?

    Science.gov (United States)

    Miles-Chan, Jennifer L; Fares, Elie-Jacques; Berkachy, Redina; Jacquet, Philippe; Isacco, Laurie; Schutz, Yves; Montani, Jean-Pierre; Dulloo, Abdul G

    2017-04-01

    Due to sedentarity-associated disease risks, there is much interest in methods to increase low-intensity physical activity. In this context, it is widely assumed that altering posture allocation can modify energy expenditure (EE) to impact body-weight regulation and health. However, we have recently shown the existence of two distinct phenotypes pertaining to the energy cost of standing-with most individuals having no sustained increase in EE during steady-state standing relative to sitting comfortably. Here, we investigated whether these distinct phenotypes are related to the presence/absence of spontaneous "weight-shifting", i.e. the redistribution of body-weight from one foot to the other. Using indirect calorimetry to measure EE in young adults during sitting and 10 min of steady-state standing, we examined: (i) heterogeneity in EE during standing (n = 36); (ii) EE and spontaneous weight-shifting patterns (n = 18); (iii) EE during spontaneous weight-shifting versus experimentally induced weight-shifting (n = 7), and; (iv) EE during spontaneous weight-shifting versus intermittent leg/body displacement (n = 6). Despite heterogeneity in EE response to steady-state standing, no differences were found in the amount or pattern of spontaneous weight-shifting between the two phenotypes. Whilst experimentally induced weight-shifting resulted in a mean EE increase of only 11% (range: 0-25%), intermittent leg/body displacement increased EE to >1.5 METs in all participants. Although the variability in spontaneous weight-shifting signatures between individuals does not appear to underlie heterogeneity in the energy cost of standing posture maintenance, these studies underscore the fact that leg/body displacement, rather than standing posture alone, is needed to increase EE above the currently defined sedentary threshold.

  8. Spontaneous Intracranial Hypotension without Orthostatic Headache

    Directory of Open Access Journals (Sweden)

    Tülay Kansu

    2009-03-01

    Full Text Available We report 2 cases of spontaneous intracranial hypotension that presented with unilateral abducens nerve palsy, without orthostatic headache. While sixth nerve palsies improved without any intervention, subdural hematoma was detected with magnetic resonance imaging. We conclude that headache may be absent in spontaneous intracranial hypotension and spontaneous improvement of sixth nerve palsy can occur, even after the development of a subdural hematoma

  9. Combining task-evoked and spontaneous activity to improve pre-operative brain mapping with fMRI

    Science.gov (United States)

    Fox, Michael D.; Qian, Tianyi; Madsen, Joseph R.; Wang, Danhong; Li, Meiling; Ge, Manling; Zuo, Huan-cong; Groppe, David M.; Mehta, Ashesh D.; Hong, Bo; Liu, Hesheng

    2016-01-01

    Noninvasive localization of brain function is used to understand and treat neurological disease, exemplified by pre-operative fMRI mapping prior to neurosurgical intervention. The principal approach for generating these maps relies on brain responses evoked by a task and, despite known limitations, has dominated clinical practice for over 20 years. Recently, pre-operative fMRI mapping based on correlations in spontaneous brain activity has been demonstrated, however this approach has its own limitations and has not seen widespread clinical use. Here we show that spontaneous and task-based mapping can be performed together using the same pre-operative fMRI data, provide complimentary information relevant for functional localization, and can be combined to improve identification of eloquent motor cortex. Accuracy, sensitivity, and specificity of our approach are quantified through comparison with electrical cortical stimulation mapping in eight patients with intractable epilepsy. Broad applicability and reproducibility of our approach is demonstrated through prospective replication in an independent dataset of six patients from a different center. In both cohorts and every individual patient, we see a significant improvement in signal to noise and mapping accuracy independent of threshold, quantified using receiver operating characteristic curves. Collectively, our results suggest that modifying the processing of fMRI data to incorporate both task-based and spontaneous activity significantly improves functional localization in pre-operative patients. Because this method requires no additional scan time or modification to conventional pre-operative data acquisition protocols it could have widespread utility. PMID:26408860

  10. Spontaneous intraorbital hematoma: case report

    Directory of Open Access Journals (Sweden)

    Vinodan Paramanathan

    2010-12-01

    Full Text Available Vinodan Paramanathan, Ardalan ZolnourianQueen's Hospital NHS Foundation Trust, Burton on Trent, Staffordshire DE13 0RB, UKAbstract: Spontaneous intraorbital hematoma is an uncommon clinical entity seen in ophthalmology practice. It is poorly represented in the literature. Current evidence attributes it to orbital trauma, neoplasm, vascular malformations, acute sinusitis, and systemic abnormalities. A 65-year-old female presented with spontaneous intraorbital hematoma manifesting as severe ocular pains, eyelid edema, proptosis, and diplopia, without a history of trauma. Computer tomography demonstrated a fairly well defined extraconal lesion with opacification of the paranasal sinuses. The principal differential based on all findings was that of a spreading sinus infection and an extraconal tumor. An unprecedented finding of a spontaneous orbital hematoma was discovered when the patient was taken to theater. We discuss the rarity of this condition and its management.Keywords: hemorrhage, ophthalmology, spontaneous, intra-orbital, hematoma

  11. Screening for spontaneous preterm birth

    NARCIS (Netherlands)

    van Os, M.A.; van Dam, A.J.E.M.

    2015-01-01

    Preterm birth is the most important cause of perinatal morbidity and mortality worldwide. In this thesis studies on spontaneous preterm birth are presented. The main objective was to investigate the predictive capacity of mid-trimester cervical length measurement for spontaneous preterm birth in a

  12. Early pregnancy angiogenic markers and spontaneous abortion

    DEFF Research Database (Denmark)

    Andersen, Louise B; Dechend, Ralf; Karumanchi, S Ananth

    2016-01-01

    BACKGROUND: Spontaneous abortion is the most commonly observed adverse pregnancy outcome. The angiogenic factors soluble Fms-like kinase 1 and placental growth factor are critical for normal pregnancy and may be associated to spontaneous abortion. OBJECTIVE: We investigated the association between...... maternal serum concentrations of soluble Fms-like kinase 1 and placental growth factor, and subsequent spontaneous abortion. STUDY DESIGN: In the prospective observational Odense Child Cohort, 1676 pregnant women donated serum in early pregnancy, gestational week ..., interquartile range 71-103). Concentrations of soluble Fms-like kinase 1 and placental growth factor were determined with novel automated assays. Spontaneous abortion was defined as complete or incomplete spontaneous abortion, missed abortion, or blighted ovum

  13. Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Hong Lai

    2012-01-01

    Full Text Available We apply semigroup property of enhanced Chebyshev polynomials to present an anonymous authentication protocol. This paper aims at improving security and reducing computational and storage overhead. The proposed scheme not only has much lower computational complexity and cost in the initialization phase but also allows the users to choose their passwords freely. Moreover, it can provide revocation of lost or stolen smart card, which can resist man-in-the-middle attack and off-line dictionary attack together with various known attacks.

  14. A Comparison of the Effects of K-Anonymity on Machine Learning Algorithms

    OpenAIRE

    Hayden Wimmer; Loreen Powell

    2014-01-01

    While research has been conducted in machine learning algorithms and in privacy preserving in data mining (PPDM), a gap in the literature exists which combines the aforementioned areas to determine how PPDM affects common machine learning algorithms. The aim of this research is to narrow this literature gap by investigating how a common PPDM algorithm, K-Anonymity, affects common machine learning and data mining algorithms, namely neural networks, logistic regression, decision trees, and Baye...

  15. Spontaneous emission by moving atoms

    International Nuclear Information System (INIS)

    Meystre, P.; Wilkens, M.

    1994-01-01

    It is well known that spontaneous emission is not an intrinsic atomic property, but rather results from the coupling of the atom to the vacuum modes of the electromagnetic field. As such, it can be modified by tailoring the electromagnetic environment into which the atom can radiate. This was already realized by Purcell, who noted that the spontaneous emission rate can be enhanced if the atom placed inside a cavity is resonant with one of the cavity is resonant with one of the cavity modes, and by Kleppner, who discussed the opposite case of inhibited spontaneous emission. It has also been recognized that spontaneous emission need not be an irreversible process. Indeed, a system consisting of a single atom coupled to a single mode of the electromagnetic field undergoes a periodic exchange of excitation between the atom and the field. This periodic exchange remains dominant as long as the strength of the coupling between the atom and a cavity mode is itself dominant. 23 refs., 6 figs

  16. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  17. Thresholds in radiobiology

    International Nuclear Information System (INIS)

    Katz, R.; Hofmann, W.

    1982-01-01

    Interpretations of biological radiation effects frequently use the word 'threshold'. The meaning of this word is explored together with its relationship to the fundamental character of radiation effects and to the question of perception. It is emphasised that although the existence of either a dose or an LET threshold can never be settled by experimental radiobiological investigations, it may be argued on fundamental statistical grounds that for all statistical processes, and especially where the number of observed events is small, the concept of a threshold is logically invalid. (U.K.)

  18. A Case of Multiple Spontaneous Keloid Scars

    Directory of Open Access Journals (Sweden)

    Abdulhadi Jfri

    2015-07-01

    Full Text Available Keloid scars result from an abnormal healing response to cutaneous injury or inflammation that extends beyond the borders of the original wound. Spontaneous keloid scars forming in the absence of any previous trauma or surgical procedure are rare. Certain syndromes have been associated with this phenomenon, and few reports have discussed the evidence of single spontaneous keloid scar, which raises the question whether they are really spontaneous. Here, we present a 27-year-old mentally retarded single female with orbital hypertelorism, broad nasal bridge, repaired cleft lip and high-arched palate who presented with progressive multiple spontaneous keloid scars in different parts of her body which were confirmed histologically by the presence of typical keloidal collagen. This report supports the fact that keloid scars can appear spontaneously and are possibly linked to a genetic factor. Furthermore, it describes a new presentation of spontaneous keloid scars in the form of multiple large lesions in different sites of the body.

  19. Anonymity versus privacy: selective information sharing in online cancer communities.

    Science.gov (United States)

    Frost, Jeana; Vermeulen, Ivar E; Beekers, Nienke

    2014-05-14

    Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients' prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. The goal of the present study is to document patient preferences for sharing information within online health platforms. A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F1,114=135.59, P=.001, η(2)=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Respondents' information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity information. The results suggest the need to focus on

  20. Spontaneous pneumothorax in silicotuberculosis of lung

    International Nuclear Information System (INIS)

    Kolenic, J.; Jurgova, T.; Zimacek, J.; Vajo, J.; Krchnavy, M.

    1995-01-01

    The authors describe the case of 62 years old man with the appearance of spontaneous pneumothorax, in whom the basic pulmonary disease was silicotuberculosis of the lung. At clinic of occupational diseases in Kosice have been evidence 965 cases of silicosis and silicotuberculosis. From 1971 they have now the first case of spontaneous pneumothorax. The authors make discussion about possible mechanical and biochemical factors, which cause relatively low incidence of spontaneous pneumothorax in silicosis of the lung. (authors)

  1. Competitive behavior of photons contributing to junction voltage jump in narrow band-gap semiconductor multi-quantum-well laser diodes at lasing threshold

    Energy Technology Data Exchange (ETDEWEB)

    Feng, Liefeng, E-mail: fengliefeng@tju.edu.cn, E-mail: lihongru@nankai.edu.cn; Yang, Xiufang; Wang, Cunda; Yao, Dongsheng [Tianjin Key Laboratory of Low Dimensional Materials Physics and Preparing Technology, Faculty of Science, Tianjin University, Tianjin 300072 (China); Li, Yang [Business and Vocational College of Hainan, Haikou 570203 (China); Li, Ding; Hu, Xiaodong [Research Center for Wide Band Gap Semiconductors, State Key Laboratory for Artificial Microstructure and Mesoscopic Physics, School of Physics, Peking University, Beijing 100871 (China); Li, Hongru, E-mail: fengliefeng@tju.edu.cn, E-mail: lihongru@nankai.edu.cn [State Key Laboratory for Medicinal Chemistry and Biology, College of Pharmacy, Nankai University, Tianjin 300071 (China)

    2015-04-15

    The junction behavior of different narrow band-gap multi-quantum-well (MQW) laser diodes (LDs) confirmed that the jump in the junction voltage in the threshold region is a general characteristic of narrow band-gap LDs. The relative change in the 1310 nm LD is the most obvious. To analyze this sudden voltage change, the threshold region is divided into three stages by I{sub th}{sup l} and I{sub th}{sup u}, as shown in Fig. 2; I{sub th}{sup l} is the conventional threshold, and as long as the current is higher than this threshold, lasing exists and the IdV/dI-I plot drops suddenly; I{sub th}{sup u} is the steady lasing point, at which the separation of the quasi-Fermi levels of electron and holes across the active region (V{sub j}) is suddenly pinned. Based on the evolutionary model of dissipative structure theory, the rate equations of the photons in a single-mode LD were deduced in detail at I{sub th}{sup l} and I{sub th}{sup u}. The results proved that the observed behavior of stimulated emission suddenly substituting for spontaneous emission, in a manner similar to biological evolution, must lead to a sudden increase in the injection carriers in the threshold region, which then causes the sudden increase in the junction voltage in this region.

  2. Competitive behavior of photons contributing to junction voltage jump in narrow band-gap semiconductor multi-quantum-well laser diodes at lasing threshold

    International Nuclear Information System (INIS)

    Feng, Liefeng; Yang, Xiufang; Wang, Cunda; Yao, Dongsheng; Li, Yang; Li, Ding; Hu, Xiaodong; Li, Hongru

    2015-01-01

    The junction behavior of different narrow band-gap multi-quantum-well (MQW) laser diodes (LDs) confirmed that the jump in the junction voltage in the threshold region is a general characteristic of narrow band-gap LDs. The relative change in the 1310 nm LD is the most obvious. To analyze this sudden voltage change, the threshold region is divided into three stages by I th l and I th u , as shown in Fig. 2; I th l is the conventional threshold, and as long as the current is higher than this threshold, lasing exists and the IdV/dI-I plot drops suddenly; I th u is the steady lasing point, at which the separation of the quasi-Fermi levels of electron and holes across the active region (V j ) is suddenly pinned. Based on the evolutionary model of dissipative structure theory, the rate equations of the photons in a single-mode LD were deduced in detail at I th l and I th u . The results proved that the observed behavior of stimulated emission suddenly substituting for spontaneous emission, in a manner similar to biological evolution, must lead to a sudden increase in the injection carriers in the threshold region, which then causes the sudden increase in the junction voltage in this region

  3. Selfrando: Securing the Tor Browser against De-anonymization Exploits

    Directory of Open Access Journals (Sweden)

    Conti Mauro

    2016-10-01

    Full Text Available Tor is a well-known anonymous communication system used by millions of users, including journalists and civil rights activists all over the world. The Tor Browser gives non-technical users an easy way to access the Tor Network. However, many government organizations are actively trying to compromise Tor not only in regions with repressive regimes but also in the free world, as the recent FBI incidents clearly demonstrate. Exploiting software vulnerabilities in general, and browser vulnerabilities in particular, constitutes a clear and present threat to the Tor software. The Tor Browser shares a large part of its attack surface with the Firefox browser. Therefore, Firefox vulnerabilities (even patched ones are highly valuable to attackers trying to monitor users of the Tor Browser.

  4. Spontaneous body movements in spatial cognition

    Directory of Open Access Journals (Sweden)

    Sergiu eTcaci Popescu

    2012-05-01

    Full Text Available People often perform spontaneous body movements during spatial tasks such as giving complex directions or orienting themselves on maps. How are these spontaneous gestures related to spatial problem-solving? We measured spontaneous movements during a perspective-taking task inspired by map reading. Analyzing the motion data to isolate rotation and translation components of motion in specific geometric relation to the task, we found out that most participants executed spontaneous miniature rotations of the head that were significantly related to the main task parameter. These head rotations were as if participants were trying to align themselves with the orientation on the map either in the image plane or on the ground plane, but with tiny amplitudes, typically below 1% of the actual movements. Our results are consistent with a model of sensorimotor prediction driving spatial reasoning. The efference copy of planned movements triggers this prediction mechanism. The movements themselves may then be mostly inhibited; the small spontaneous gestures that we measure are the visible traces of these planned but inhibited actions.

  5. Spontaneous pneumothorax in diffuse cystic lung diseases.

    Science.gov (United States)

    Cooley, Joseph; Lee, Yun Chor Gary; Gupta, Nishant

    2017-07-01

    Diffuse cystic lung diseases (DCLDs) are a heterogeneous group of disorders with varying pathophysiologic mechanisms that are characterized by the presence of air-filled lung cysts. These cysts are prone to rupture, leading to the development of recurrent spontaneous pneumothoraces. In this article, we review the epidemiology, clinical features, and management DCLD-associated spontaneous pneumothorax, with a focus on lymphangioleiomyomatosis, Birt-Hogg-Dubé syndrome, and pulmonary Langerhans cell histiocytosis. DCLDs are responsible for approximately 10% of apparent primary spontaneous pneumothoraces. Computed tomography screening for DCLDs (Birt-Hogg-Dubé syndrome, lymphangioleiomyomatosis, and pulmonary Langerhans cell histiocytosis) following the first spontaneous pneumothorax has recently been shown to be cost-effective and can help facilitate early diagnosis of the underlying disorders. Patients with DCLD-associated spontaneous pneumothorax have a very high rate of recurrence, and thus pleurodesis should be considered following the first episode of spontaneous pneumothorax in these patients, rather than waiting for a recurrent episode. Prior pleurodesis is not a contraindication to future lung transplant. Although DCLDs are uncommon, spontaneous pneumothorax is often the sentinel event that provides an opportunity for diagnosis. By understanding the burden and implications of pneumothoraces in DCLDs, clinicians can facilitate early diagnosis and appropriate management of the underlying disorders.

  6. Shifts in the relationship between motor unit recruitment thresholds versus derecruitment thresholds during fatigue.

    Science.gov (United States)

    Stock, Matt S; Mota, Jacob A

    2017-12-01

    Muscle fatigue is associated with diminished twitch force amplitude. We examined changes in the motor unit recruitment versus derecruitment threshold relationship during fatigue. Nine men (mean age = 26 years) performed repeated isometric contractions at 50% maximal voluntary contraction (MVC) knee extensor force until exhaustion. Surface electromyographic signals were detected from the vastus lateralis, and were decomposed into their constituent motor unit action potential trains. Motor unit recruitment and derecruitment thresholds and firing rates at recruitment and derecruitment were evaluated at the beginning, middle, and end of the protocol. On average, 15 motor units were studied per contraction. For the initial contraction, three subjects showed greater recruitment thresholds than derecruitment thresholds for all motor units. Five subjects showed greater recruitment thresholds than derecruitment thresholds for only low-threshold motor units at the beginning, with a mean cross-over of 31.6% MVC. As the muscle fatigued, many motor units were derecruited at progressively higher forces. In turn, decreased slopes and increased y-intercepts were observed. These shifts were complemented by increased firing rates at derecruitment relative to recruitment. As the vastus lateralis fatigued, the central nervous system's compensatory adjustments resulted in a shift of the regression line of the recruitment versus derecruitment threshold relationship. Copyright © 2017 IPEM. Published by Elsevier Ltd. All rights reserved.

  7. Facebook’s Ugly Sisters: Anonymity and Abuse on Formspring and Ask.fm

    OpenAIRE

    Binns, Amy

    2013-01-01

    New question and answer websites Ask.fm and Formspring have brought highly specific and personal abuse to a new level amongst young people by providing easy anonymity to users within a circle of offline friendship groups culled from Facebook. Relatively unknown due to their unattractiveness to adults, these sites are growing rapidly and have already been associated with at least eight suicides amongst teenagers. \\ud \\ud Media educators at school level encouraging self-awareness of social medi...

  8. An Anonymous Mutual Authenticated Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Chien-Ming Chen

    2018-07-01

    Full Text Available The advancement of Wireless Body Area Networks (WBAN have led to significant progress in medical and health care systems. However, such networks still suffer from major security and privacy threats, especially for the data collected in medical or health care applications. Lack of security and existence of anonymous communication in WBAN brings about the operation failure of these networks. Recently, Li et al. proposed a lightweight protocol for wearable sensors in wireless body area networks. In their paper, the authors claimed that the protocol may provide anonymous mutual authentication and resist against various types of attacks. This study shows that such a protocol is still vulnerable to three types of attacks, i.e., the offline identity guessing attack, the sensor node impersonation attack and the hub node spoofing attack. We then present a secure scheme that addresses these problems, and retains similar efficiency in wireless sensors nodes and mobile phones.

  9. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    International Nuclear Information System (INIS)

    Xie Qi; Hu Bin; Chen Ke-Fei; Liu Wen-Hao; Tan Xiao

    2015-01-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. (paper)

  10. FEL gain optimisation and spontaneous radiation

    Energy Technology Data Exchange (ETDEWEB)

    Bali, L.M.; Srivastava, A.; Pandya, T.P. [Lucknow Univ. (India)] [and others

    1995-12-31

    Colson have evaluated FEL gains for small deviations from perfect electron beam injection, with radiation of the same polarisation as that of the wiggler fields. We find that for optimum gain the polarisation of the optical field should be the same as that of the spontaneous emission under these conditions. With a helical wiggler the axial oscillations resulting from small departures from perfect electron beam injection lead to injection dependent unequal amplitudes and phases of the spontaneous radiation in the two transverse directions. Viewed along the axis therefore the spontaneous emission is elliptically polarised. The azimuth of the ellipse varies with the difference of phase of the two transverse components of spontaneous emission but the eccentricity remains the same. With planar wigglers the spontaneous emission viewed in the axial direction is linearly polarised, again with an injection dependent azimuth. For optimum coherent gain of a radiation field its polarisation characteristics must be the same as those of the spontaneous radiation with both types of wiggler. Thus, with a helical wiggler and the data reported earlier, an increase of 10% in the FEL gain at the fundamental frequency and of 11% at the fifth harmonic has been calculated in the small gain per pass limit. Larger enhancements in gain may result from more favourable values of input parameters.

  11. Spontaneous Bacterial Peritonitis in Subclinical Hypothyroidism

    Directory of Open Access Journals (Sweden)

    Dalip Gupta

    2013-11-01

    Full Text Available Hypothyroidism is an uncommon cause of ascites. Here we describe a case of a 75 year-old female patient with spontaneous bacterial peritonitis and subclinical hypothyroidism that resolved with thyroid replacement and antibiotic therapy respectively. Ascitic fluid analysis revealed a gram-positive bacterium on gram staining. A review of the literature revealed just one other reported case of myxoedema ascites with concomitant spontaneous bacterial peritonitis and no case has till been reported of spontaneous bacterial peritonitis in subclinical hypothyroidism.

  12. Spontaneous formation of dynamical groups in an adaptive networked system

    International Nuclear Information System (INIS)

    Li Menghui; Guan Shuguang; Lai, C-H

    2010-01-01

    In this work, we investigate a model of an adaptive networked dynamical system, where the coupling strengths among phase oscillators coevolve with the phase states. It is shown that in this model the oscillators can spontaneously differentiate into two dynamical groups after a long time evolution. Within each group, the oscillators have similar phases, while oscillators in different groups have approximately opposite phases. The network gradually converts from the initial random structure with a uniform distribution of connection strengths into a modular structure that is characterized by strong intra-connections and weak inter-connections. Furthermore, the connection strengths follow a power-law distribution, which is a natural consequence of the coevolution of the network and the dynamics. Interestingly, it is found that if the inter-connections are weaker than a certain threshold, the two dynamical groups will almost decouple and evolve independently. These results are helpful in further understanding the empirical observations in many social and biological networks.

  13. Spontaneous mutation rates and the rate-doubling dose

    International Nuclear Information System (INIS)

    Von Borstel, R.C.; Moustaccki, E.; Latarjet, R.

    1978-01-01

    The amount of radiation required to double the frequency of mutations or tumours over the rate of those that occur spontaneously is called the rate-doubling dose. An equivalent concept has been proposed for exposure to other environmental mutagens. The doubling dose concept is predicated on the assumption that all human populations have the same spontaneous mutation rate, and that this spontaneous mutation rate is known. It is now established for prokaryotes and lower eukaryotes that numerous genes control the spontaneous mutation rate, and it is likely that the same is true for human cells as well. Given that the accepted mode of evolution of human populatons is from small, isolated groups of individuals, it seems likely that each population would have a different spontaneous mutation rate. Given that a minimum of twenty genes control or affect the spontaneous mutation rate, and that each of these in turn is susceptible to spontaneously arising or environmentally induced mutations, it seems likely that every individual within a population (except for siblings from identical multiple births) will have a unique spontaneous mutation rate. If each individual in a population does have a different spontaneous mutation rate, the doubling dose concept, in rigorous terms, is fallacious. Therefore, as with other concepts of risk evaluation, the doubling dose concept is subject to criticism. Nevertheless, until we know individual spontaneous mutation rates with precision, and can evaluate risks based on this information, the doubling dose concept has a heuristic value and is needed for practical assessment of risks for defined populations. (author)

  14. Threshold factorization redux

    Science.gov (United States)

    Chay, Junegone; Kim, Chul

    2018-05-01

    We reanalyze the factorization theorems for the Drell-Yan process and for deep inelastic scattering near threshold, as constructed in the framework of the soft-collinear effective theory (SCET), from a new, consistent perspective. In order to formulate the factorization near threshold in SCET, we should include an additional degree of freedom with small energy, collinear to the beam direction. The corresponding collinear-soft mode is included to describe the parton distribution function (PDF) near threshold. The soft function is modified by subtracting the contribution of the collinear-soft modes in order to avoid double counting on the overlap region. As a result, the proper soft function becomes infrared finite, and all the factorized parts are free of rapidity divergence. Furthermore, the separation of the relevant scales in each factorized part becomes manifest. We apply the same idea to the dihadron production in e+e- annihilation near threshold, and show that the resultant soft function is also free of infrared and rapidity divergences.

  15. Cloud Based Data Protection in Anonymously Controlled SDN

    Directory of Open Access Journals (Sweden)

    Jian Shen

    2018-01-01

    Full Text Available Nowadays, Software Defined Network (SDN develops rapidly for its novel structure which separates the control plane and the data plane of network devices. Many researchers devoted themselves to the study of such a special network. However, some limitations restrict the development of SDN. On the one hand, the single controller in the conventional model bears all threats, and the corruption of it will result in network paralysis. On the other hand, the data will be increasing more in SDN switches in the data plane, while the storage space of these switches is limited. In order to solve the mentioned issues, we propose two corresponding protocols in this paper. Specifically, one is an anonymous protocol in the control plane, and the other is a verifiable outsourcing protocol in the data plane. The evaluation indicates that our protocol is correct, secure, and efficient.

  16. Comparison between intensity- duration thresholds and cumulative rainfall thresholds for the forecasting of landslide

    Science.gov (United States)

    Lagomarsino, Daniela; Rosi, Ascanio; Rossi, Guglielmo; Segoni, Samuele; Catani, Filippo

    2014-05-01

    This work makes a quantitative comparison between the results of landslide forecasting obtained using two different rainfall threshold models, one using intensity-duration thresholds and the other based on cumulative rainfall thresholds in an area of northern Tuscany of 116 km2. The first methodology identifies rainfall intensity-duration thresholds by means a software called MaCumBA (Massive CUMulative Brisk Analyzer) that analyzes rain-gauge records, extracts the intensities (I) and durations (D) of the rainstorms associated with the initiation of landslides, plots these values on a diagram, and identifies thresholds that define the lower bounds of the I-D values. A back analysis using data from past events can be used to identify the threshold conditions associated with the least amount of false alarms. The second method (SIGMA) is based on the hypothesis that anomalous or extreme values of rainfall are responsible for landslide triggering: the statistical distribution of the rainfall series is analyzed, and multiples of the standard deviation (σ) are used as thresholds to discriminate between ordinary and extraordinary rainfall events. The name of the model, SIGMA, reflects the central role of the standard deviations in the proposed methodology. The definition of intensity-duration rainfall thresholds requires the combined use of rainfall measurements and an inventory of dated landslides, whereas SIGMA model can be implemented using only rainfall data. These two methodologies were applied in an area of 116 km2 where a database of 1200 landslides was available for the period 2000-2012. The results obtained are compared and discussed. Although several examples of visual comparisons between different intensity-duration rainfall thresholds are reported in the international literature, a quantitative comparison between thresholds obtained in the same area using different techniques and approaches is a relatively undebated research topic.

  17. Airplane pilot mental health and suicidal thoughts: a cross-sectional descriptive study via anonymous web-based survey.

    Science.gov (United States)

    Wu, Alexander C; Donnelly-McLay, Deborah; Weisskopf, Marc G; McNeely, Eileen; Betancourt, Theresa S; Allen, Joseph G

    2016-12-15

    The Germanwings Flight 9525 crash has brought the sensitive subject of airline pilot mental health to the forefront in aviation. Globally, 350 million people suffer from depression-a common mental disorder. This study provides further information on this important topic regarding mental health especially among female airline pilots. This is the first study to describe airline pilot mental health-with a focus on depression and suicidal thoughts-outside of the information derived from aircraft accident investigations, regulated health examinations, or identifiable self-reports, which are records protected by civil aviation authorities and airline companies. This is a descriptive cross-sectional study via an anonymous web-based survey administered between April and December 2015. Pilots were recruited from unions, airline companies, and airports via convenience sampling. Data analysis included calculating absolute number and prevalence of health characteristics and depression scores. One thousand eight hundred thirty seven (52.7%) of the 3485 surveyed pilots completed the survey, with 1866 (53.5%) completing at least half of the survey. 233 (12.6%) of 1848 airline pilots responding to the Patient Health Questionnaire 9 (PHQ-9), and 193 (13.5%) of 1430 pilots who reported working as an airline pilot in the last seven days at time of survey, met depression threshold-PHQ-9 total score ≥ 10. Seventy-five participants (4.1%) reported having suicidal thoughts within the past two weeks. We found a significant trend in proportions of depression at higher levels of use of sleep-aid medication (trend test z = 6.74, p sexual harassment (z = 3.18, p = 0.001) or verbal harassment (z = 6.13, p < 0.001). Hundreds of pilots currently flying are managing depressive symptoms perhaps without the possibility of treatment due to the fear of negative career impacts. This study found 233 (12.6%) airline pilots meeting depression threshold and 75 (4.1%) pilots

  18. The Anonymization Protection Algorithm Based on Fuzzy Clustering for the Ego of Data in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Mingshan Xie

    2017-01-01

    Full Text Available In order to enhance the enthusiasm of the data provider in the process of data interaction and improve the adequacy of data interaction, we put forward the concept of the ego of data and then analyzed the characteristics of the ego of data in the Internet of Things (IOT in this paper. We implement two steps of data clustering for the Internet of things; the first step is the spatial location of adjacent fuzzy clustering, and the second step is the sampling time fuzzy clustering. Equivalent classes can be obtained through the two steps. In this way we can make the data with layout characteristics to be classified into different equivalent classes, so that the specific location information of the data can be obscured, the layout characteristics of tags are eliminated, and ultimately anonymization protection would be achieved. The experimental results show that the proposed algorithm can greatly improve the efficiency of protection of the data in the interaction with others in the incompletely open manner, without reducing the quality of anonymization and enhancing the information loss. The anonymization data set generated by this method has better data availability, and this algorithm can effectively improve the security of data exchange.

  19. Combining task-evoked and spontaneous activity to improve pre-operative brain mapping with fMRI.

    Science.gov (United States)

    Fox, Michael D; Qian, Tianyi; Madsen, Joseph R; Wang, Danhong; Li, Meiling; Ge, Manling; Zuo, Huan-Cong; Groppe, David M; Mehta, Ashesh D; Hong, Bo; Liu, Hesheng

    2016-01-01

    Noninvasive localization of brain function is used to understand and treat neurological disease, exemplified by pre-operative fMRI mapping prior to neurosurgical intervention. The principal approach for generating these maps relies on brain responses evoked by a task and, despite known limitations, has dominated clinical practice for over 20years. Recently, pre-operative fMRI mapping based on correlations in spontaneous brain activity has been demonstrated, however this approach has its own limitations and has not seen widespread clinical use. Here we show that spontaneous and task-based mapping can be performed together using the same pre-operative fMRI data, provide complimentary information relevant for functional localization, and can be combined to improve identification of eloquent motor cortex. Accuracy, sensitivity, and specificity of our approach are quantified through comparison with electrical cortical stimulation mapping in eight patients with intractable epilepsy. Broad applicability and reproducibility of our approach are demonstrated through prospective replication in an independent dataset of six patients from a different center. In both cohorts and every individual patient, we see a significant improvement in signal to noise and mapping accuracy independent of threshold, quantified using receiver operating characteristic curves. Collectively, our results suggest that modifying the processing of fMRI data to incorporate both task-based and spontaneous activity significantly improves functional localization in pre-operative patients. Because this method requires no additional scan time or modification to conventional pre-operative data acquisition protocols it could have widespread utility. Copyright © 2015. Published by Elsevier Inc.

  20. Highly pH-responsive sensor based on amplified spontaneous emission coupled to colorimetry.

    Science.gov (United States)

    Zhang, Qi; Castro Smirnov, Jose R; Xia, Ruidong; Pedrosa, Jose M; Rodriguez, Isabel; Cabanillas-Gonzalez, Juan; Huang, Wei

    2017-04-07

    We demonstrated a simple, directly-readable approach for high resolution pH sensing. The method was based on sharp changes in Amplified Spontaneous Emission (ASE) of a Stilbene 420 (ST) laser dye triggered by the pH-dependent absorption of Bromocresol Green (BG). The ASE threshold of BG:ST solution mixtures exhibited a strong dependence on BG absorption, which was drastically changed by the variations of the pH of BG solution. As a result, ASE on-off or off-on was observed with different pH levels achieved by ammonia doping. By changing the concentration of the BG solution and the BG:ST blend ratio, this approach allowed to detect pH changes with a sensitivity down to 0.05 in the 10-11 pH range.

  1. Peritonitis - spontaneous bacterial

    Science.gov (United States)

    Spontaneous bacterial peritonitis (SBP); Ascites - peritonitis; Cirrhosis - peritonitis ... who are on peritoneal dialysis for kidney failure. Peritonitis may have other causes . These include infection from ...

  2. Search for spontaneous fission of 226Ra and systematics of the spontaneous fission, α-decay and cluster decay probabilities

    International Nuclear Information System (INIS)

    Mikheev, V.L.; Tret'yakova, S.P.; Golovchenko, A.N.; Timofeeva, O.V.; Hussonnois, M.; Le Naour, C.

    1998-01-01

    The low limit of the 226 Ra spontaneous fission half-life corresponding to T 1/2 ≥ 4 · 10 18 years is measured. The 226 Ra spontaneous fission probability proved to be about 50 times less than the value expected from the known systematics, connecting the ratios of theα-decay and spontaneous fission probabilities with the fissility parameter Z 2 /A. It is shown that the probabilities of spontaneous fission, α-decay and cluster decay can be systematized in the same way according to the difference between the decay products Coulomb energy near the scission point and decay energy Q

  3. Dorsomedial prefontal cortex supports spontaneous thinking per se.

    Science.gov (United States)

    Raij, T T; Riekki, T J J

    2017-06-01

    Spontaneous thinking, an action to produce, consider, integrate, and reason through mental representations, is central to our daily experience and has been suggested to serve crucial adaptive purposes. Such thinking occurs among other experiences during mind wandering that is associated with activation of the default mode network among other brain circuitries. Whether and how such brain activation is linked to the experience of spontaneous thinking per se remains poorly known. We studied 51 healthy subjects using a comprehensive experience-sampling paradigm during 3T functional magnetic resonance imaging. In comparison with fixation, the experiences of spontaneous thinking and spontaneous perception were related to activation of wide-spread brain circuitries, including the cortical midline structures, the anterior cingulate cortex and the visual cortex. In direct comparison of the spontaneous thinking versus spontaneous perception, activation was observed in the anterior dorsomedial prefrontal cortex. Modality congruence of spontaneous-experience-related brain activation was suggested by several findings, including association of the lingual gyrus with visual in comparison with non-verbal-non-visual thinking. In the context of current literature, these findings suggest that the cortical midline structures are involved in the integrative core substrate of spontaneous thinking that is coupled with other brain systems depending on the characteristics of thinking. Furthermore, involvement of the anterior dorsomedial prefrontal cortex suggests the control of high-order abstract functions to characterize spontaneous thinking per se. Hum Brain Mapp 38:3277-3288, 2017. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  4. Threshold guidance update

    International Nuclear Information System (INIS)

    Wickham, L.E.

    1986-01-01

    The Department of Energy (DOE) is developing the concept of threshold quantities for use in determining which waste materials must be handled as radioactive waste and which may be disposed of as nonradioactive waste at its sites. Waste above this concentration level would be managed as radioactive or mixed waste (if hazardous chemicals are present); waste below this level would be handled as sanitary waste. Last years' activities (1984) included the development of a threshold guidance dose, the development of threshold concentrations corresponding to the guidance dose, the development of supporting documentation, review by a technical peer review committee, and review by the DOE community. As a result of the comments, areas have been identified for more extensive analysis, including an alternative basis for selection of the guidance dose and the development of quality assurance guidelines. Development of quality assurance guidelines will provide a reasonable basis for determining that a given waste stream qualifies as a threshold waste stream and can then be the basis for a more extensive cost-benefit analysis. The threshold guidance and supporting documentation will be revised, based on the comments received. The revised documents will be provided to DOE by early November. DOE-HQ has indicated that the revised documents will be available for review by DOE field offices and their contractors

  5. Maternal smoking predicts the risk of spontaneous abortion

    DEFF Research Database (Denmark)

    Nielsen, Ann; Hannibal, Charlotte Gerd; Lindekilde, Bodil Eriksen

    2006-01-01

    BACKGROUND: Few studies have examined smoking prior to pregnancy and the occurrence of spontaneous abortion, as most studies have addressed the risk of spontaneous abortion in relation to smoking during pregnancy. However, results are not entirely consistent. The aim of the present study...... was to assess the risk of spontaneous abortion considering smoking prior to pregnancy. METHODS: We performed a nested case-control study using prospective data from a population-based cohort comprising 11,088 women aged 20-29 years. From this cohort, women who experienced either a spontaneous abortion (n=343......) or who gave birth (n=1,578) during follow-up were selected. Associations between self-reported smoking at enrollment and subsequent spontaneous abortion were analyzed by means of multiple logistic regression. RESULTS: The risk of spontaneous abortion in relation to pre-pregnancy smoking showed a clear...

  6. Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities

    Science.gov (United States)

    Vermeulen, Ivar E; Beekers, Nienke

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients’ prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. Objective The goal of the present study is to document patient preferences for sharing information within online health platforms. Methods A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Results Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F 1,114=135.59, P=.001, η2=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Conclusions Respondents’ information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity

  7. Osteonecrosis or spontaneous fractures following renal transplantation

    International Nuclear Information System (INIS)

    Andresen, J.; Nielsen, H.E.; Aarhus Univ.

    1981-01-01

    31 renal transplant recipients with posttransplant development of osteonecrosis or spontaneous fractures were evaluated with regard to age, duration of dialysis before transplantation. Determination of metacarpal bone mass at the time of transplantation and registration of bone resorption and soft tissue calcification at the time of transplantation and at the time of onset of osteonecrosis and spontaneous fractures were made. Apart from the increased mean age in patients with spontaneous fractures no difference was seen between the groups. Osteonecrosis and spontaneous fractures occurred in areas of trabecular bone. It seems most likely that after renal transplantation the patients show bone complications of different localization. (orig.) [de

  8. An improved biometrics-based remote user authentication scheme with user anonymity.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.

  9. A Case of Spontaneously Resolved Bilateral Primary Spontaneous Pneumothorax

    Directory of Open Access Journals (Sweden)

    Hasan Kahraman

    2014-03-01

    Full Text Available A condition of intrapleural air-space accumulation in individuals without any history of trauma or lung disease is called as primary spontaneous pneumothorax (PSP. Sixteen-years-old male patient admitted with complains of chest pain and dyspnea beginning 3 day ago. On physical examination, severity of breath sounds decreased on right side. Chest radiograph was taken and right-sided pneumothorax was detected and tube thoracostomy was inserted. Two months ago the patient referred to a doctor with similar complaints and physical examination and chest radiograph were reported as normal. The radiograph was retrospectively examined and bilateral PSP was detected. We presented the case duo to spontaneous recovery of bilateral PSP is seen very rarely and so contributes data to the literature. In patients admitted to the clinic with chest pain and shortness of breath, pneumothorax should be considered at differential diagnosis.

  10. Atheists, agnostics and Alcoholics Anonymous.

    Science.gov (United States)

    Tonigan, J Scott; Miller, W R; Schermer, Carol

    2002-09-01

    In spite of the strong emphasis in AA on spiritual beliefs and practices, findings are mixed about the importance of such beliefs in predicting AA affiliation. This study of the Project MATCH outpatient (N = 952) and aftercare (N = 774) samples tested three hypotheses about the role of client God belief and subsequent AA attendance and benefit, taking into account that some individuals may, in fact, deny the existence of a God. Longitudinal analyses were conducted (N = 1,526) investigating client God beliefs, AA attendance, patterns of AA attendance and alcohol use. Assessments were conducted at intake and in 3-month intervals using the Form 90, Religious Behaviors and Background, and the Alcoholics Anonymous Inventory. 12-Step treatment was significantly more likely to promote pre-post shifts in client God beliefs, and atheist and agnostic clients attended AA significantly less often throughout follow-up relative to clients self-labeled as spiritual and religious. AA attendance, however, was significantly associated with increased abstinence and reductions in drinking intensity regardless of God belief. Finally, no differences in percent days abstinence and drinking intensity were found between atheist and agnostic versus spiritual and religious clients, but clients unsure about their God belief reported significantly higher drinking frequency relative to the other groups. God belief appears to be relatively unimportant in deriving AA-related benefit, but atheist and agnostic clients are less likely to initiate and sustain AA attendance relative to spiritual and religious clients. This apparent reticence to affiliate with AA ought to be clinically recognized when encouraging AA participation.

  11. Maternal underweight and the risk of spontaneous abortion

    DEFF Research Database (Denmark)

    Helgstrand, Stine; Andersen, Anne-Marie Nybo

    2005-01-01

    BACKGROUND: To evaluate the risk of spontaneous abortion in relation to maternal pre-pregnant underweight. METHODS: The study was designed as a cohort study within the framework of the Danish National Birth Cohort (DNBC). The participants were a total of 23 821 women recruited consecutively...... spontaneous abortion. Relative risk of spontaneous abortion was calculated as Hazard Ratios using Cox regression with delayed entry. RESULTS: The outcome measure was spontaneous abortion. The hazard ratio for spontaneous abortion in women with a pre-pregnant body mass index (BMI) below 18.5 was 1.24 (95......% confidence limits 0.95-1.63) compared to women with pre-pregnant BMI 18.5-24.9. Women with a BMI of 25 or more had a smaller increase in risk of spontaneous abortion. Adjustment for maternal age, parity, previous miscarriages, and lifestyle factors did not affect the estimates substantially, neither did...

  12. Spontaneous deregulation

    NARCIS (Netherlands)

    Edelman, Benjamin; Geradin, Damien

    Platform businesses such as Airbnb and Uber have risen to success partly by sidestepping laws and regulations that encumber their traditional competitors. Such rule flouting is what the authors call “spontaneous private deregulation,” and it’s happening in a growing number of industries. The authors

  13. Effect of spontaneous decay of superconductor quasiparticles in the tunneling density of states

    International Nuclear Information System (INIS)

    Coffey, D.

    1993-01-01

    Superconductivity has been successfully described with either the Landau-Ginzburg theory of second order phase transitions or with strong-coupling versions of the original BCS theory for almost fifty years. Recent tunneling and photoemission data on the cuprate oxide superconductors may now provide evidence of corrections to the mean field approximation. It has been shown by Zasadzinski et al. that there is a dip at eV ≅ 3Δ 0 in the SIS tunneling conductance, which is the derivative of the current across a superconductor-insulator-superconductor junction with respect to the applied voltage, for a set of cuprate superconductors whose T c 's range from 5.5K to 100K. Recently L. Coffey and I proposed an explanation of this feature in terms of the spontaneous decay of mean field quasiparticles. We showed that corrections to the mean field approximation for a superconductor lead to different frequency thresholds for spontaneous quasiparticle decay with different superconductor order parameter symmetries. These effects lead to features in the superconductor density of states and in the SIS tunneling conductance and provide experimental evidence of d-wave symmetry for the superconductor order parameter in the cuprates. I discuss model and also evidence of quasiparticle decay in ARPES data on Bi 2 Sr 2 CaCu 2 O 8

  14. A case of spontaneous ventriculocisternostomy

    International Nuclear Information System (INIS)

    Yamane, Kanji; Yoshimoto, Hisanori; Harada, Kiyoshi; Uozumi, Tohru; Kuwabara, Satoshi.

    1983-01-01

    The authors experienced a case of spontaneous ventriculocisternostomy diagnosed by CT scan with metrizamide and Conray. Patient was 23-year-old male who had been in good health until one month before admission, when he began to have headache and tinnitus. He noticed bilateral visual acuity was decreased about one week before admission and vomiting appeared two days before admission. He was admitted to our hospital because of bilateral papilledema and remarkable hydrocephalus diagnosed by CT scan. On admission, no abnormal neurological signs except for bilateral papilledema were noted. Immediately, right ventricular drainage was performed. Pressure of the ventricle was over 300mmH 2 O and CSF was clear. PVG and PEG disclosed an another cavity behind the third ventricle, which was communicated with the third ventricle, and occlusion of aqueduct of Sylvius. Metrizamide CT scan and Conray CT scan showed a communication between this cavity and quadrigeminal and supracerebellar cisterns. On these neuroradiological findings, the diagnosis of obstructive hydrocephalus due to benign aqueduct stenosis accompanied with spontaneous ventriculocisternostomy was obtained. Spontaneous ventriculocisternostomy was noticed to produce arrest of hydrocephalus, but with our case, spontaneous regression of such symptoms did not appeared. By surgical ventriculocisternostomy (method by Torkildsen, Dandy, or Scarff), arrest of hydrocephalus was seen in about 50 to 70 per cent, which was the same results as those of spontaneous ventriculocisternostomy. It is concluded that VP shunt or VA shunt is thought to be better treatment of obstructive hydrocephalus than the various kinds of surgical ventriculocisternostomy. (J.P.N.)

  15. RSEQtools: a modular framework to analyze RNA-Seq data using compact, anonymized data summaries.

    Science.gov (United States)

    Habegger, Lukas; Sboner, Andrea; Gianoulis, Tara A; Rozowsky, Joel; Agarwal, Ashish; Snyder, Michael; Gerstein, Mark

    2011-01-15

    The advent of next-generation sequencing for functional genomics has given rise to quantities of sequence information that are often so large that they are difficult to handle. Moreover, sequence reads from a specific individual can contain sufficient information to potentially identify and genetically characterize that person, raising privacy concerns. In order to address these issues, we have developed the Mapped Read Format (MRF), a compact data summary format for both short and long read alignments that enables the anonymization of confidential sequence information, while allowing one to still carry out many functional genomics studies. We have developed a suite of tools (RSEQtools) that use this format for the analysis of RNA-Seq experiments. These tools consist of a set of modules that perform common tasks such as calculating gene expression values, generating signal tracks of mapped reads and segmenting that signal into actively transcribed regions. Moreover, the tools can readily be used to build customizable RNA-Seq workflows. In addition to the anonymization afforded by MRF, this format also facilitates the decoupling of the alignment of reads from downstream analyses. RSEQtools is implemented in C and the source code is available at http://rseqtools.gersteinlab.org/.

  16. A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Science.gov (United States)

    Wen, Fengtong

    2013-12-01

    User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.

  17. Intermediate structure and threshold phenomena

    International Nuclear Information System (INIS)

    Hategan, Cornel

    2004-01-01

    The Intermediate Structure, evidenced through microstructures of the neutron strength function, is reflected in open reaction channels as fluctuations in excitation function of nuclear threshold effects. The intermediate state supporting both neutron strength function and nuclear threshold effect is a micro-giant neutron threshold state. (author)

  18. Sexuality Information Needs of Latino and African American Ninth Graders: A Content Analysis of Anonymous Questions

    Science.gov (United States)

    Angulo-Olaiz, Francisca; Goldfarb, Eva S.; Constantine, Norman A.

    2014-01-01

    This study used qualitative content analysis to examine anonymous questions about sex and sexuality submitted by Latino and African American adolescents in Los Angeles, California, classrooms. The majority of questions asked about sexuality and sexual behavior, or anatomy and physiology, with fewer questions about pregnancy and pregnancy…

  19. Spontaneous magnetic fluctuations and collisionless regulation of the Earth's plasma sheet

    Science.gov (United States)

    Moya, P. S.; Espinoza, C.; Stepanova, M. V.; Antonova, E. E.; Valdivia, J. A.

    2017-12-01

    Even in the absence of instabilities, plasmas often exhibit inherent electromagnetic fluctuations which are present due to the thermal motion of charged particles, sometimes called thermal (quasi-thermal) noise. One of the fundamental and challenging problems of laboratory, space, and astrophysical plasma physics is the understanding of the relaxation processes of nearly collisionless plasmas, and the resultant state of electromagnetic plasma turbulence. The study of thermal fluctuations can be elegantly addressed by using the Fluctuation-Dissipation Theorem that describes the average amplitude of the fluctuations through correlations of the linear response of the media with the perturbations of the equilibrium state (the dissipation). Recently, it has been shown that solar wind plasma beta and temperature anisotropy observations are bounded by kinetic instabilities such as the ion cyclotron, mirror, and firehose instabilities. The magnetic fluctuations observed within the bounded area are consistent with the predictions of the Fluctuation-Dissipation theorem even far below the kinetic instability thresholds, with an enhancement of the fluctuation level near the thresholds. Here, for the very first time, using in-situ magnetic field and plasma data from the THEMIS spacecraft, we show that such regulation also occurs in the Earth's plasma sheet at the ion scales and that, regardless of the clear differences between the solar wind and the magnetosphere environments, spontaneous fluctuation and their collisionless regulation seem to be fundamental features of space and astrophysical plasmas, suggesting the universality of the processes.

  20. Nuclear threshold effects and neutron strength function

    International Nuclear Information System (INIS)

    Hategan, Cornel; Comisel, Horia

    2003-01-01

    One proves that a Nuclear Threshold Effect is dependent, via Neutron Strength Function, on Spectroscopy of Ancestral Neutron Threshold State. The magnitude of the Nuclear Threshold Effect is proportional to the Neutron Strength Function. Evidence for relation of Nuclear Threshold Effects to Neutron Strength Functions is obtained from Isotopic Threshold Effect and Deuteron Stripping Threshold Anomaly. The empirical and computational analysis of the Isotopic Threshold Effect and of the Deuteron Stripping Threshold Anomaly demonstrate their close relationship to Neutron Strength Functions. It was established that the Nuclear Threshold Effects depend, in addition to genuine Nuclear Reaction Mechanisms, on Spectroscopy of (Ancestral) Neutron Threshold State. The magnitude of the effect is proportional to the Neutron Strength Function, in their dependence on mass number. This result constitutes also a proof that the origins of these threshold effects are Neutron Single Particle States at zero energy. (author)

  1. More than addiction: Examining the role of anonymity, endless narrative, and socialization in prolonged gaming and instant messaging practices

    Directory of Open Access Journals (Sweden)

    Kishonna Gray

    2015-06-01

    Full Text Available This ethnographic study explores a user’s prolonged engagement within virtual gaming communities. Likening prolonged engagement with addiction, this research provides an alternative perspective into virtual addiction focusing on three interrelated themes: 1 anonymity, 2 endless narrative, and 3 socialization. By employing narrative interviews and virtual observations, the researchers examine two different cultural, racial and age groups’ user experience within console and computer-based multiplayer environments. More specifically, they explore how the three factors (i.e., anonymity; endless narrative; socialization relate to the prolonged and extended use within these virtual communities and highlight the multifaceted uses of traditional chat services, social media, and the convergence of media existing within these chat communities.

  2. Quantifying emissions from spontaneous combustion

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-09-01

    Spontaneous combustion can be a significant problem in the coal industry, not only due to the obvious safety hazard and the potential loss of valuable assets, but also with respect to the release of gaseous pollutants, especially CO2, from uncontrolled coal fires. This report reviews methodologies for measuring emissions from spontaneous combustion and discusses methods for quantifying, estimating and accounting for the purpose of preparing emission inventories.

  3. Paradox of spontaneous cancer regression: implications for fluctuational radiothermy and radiotherapy

    International Nuclear Information System (INIS)

    Roy, Prasun K.; Dutta Majumder, D.; Biswas, Jaydip

    1999-01-01

    Spontaneous regression of malignant tumours without treatment is a most enigmatic phenomenon with immense therapeutic potentialities. We analyse such cases to find that the commonest cause is a preceding episode of high fever-induced thermal fluctuation which produce fluctuation of biochemical and immunological parameters. Using Prigogine-Glansdorff thermodynamic stability formalism and biocybernetic principles, we develop the theoretical foundation of tumour regression induced by thermal, radiational or oxygenational fluctuations. For regression, a preliminary threshold condition of fluctuations is derived, namely σ > 2.83. We present some striking confirmation of such fluctuation-induced regression of various therapy-resistant masses as Ewing tumour, neurogranuloma and Lewis lung carcinoma by utilising σ > 2.83. Our biothermodynamic stability model of malignancy appears to illuminate the marked increase of aggressiveness of mammalian malignancy which occurred around 250 million years ago when homeothermic warm-blooded pre-mammals evolved. Using experimental data, we propose a novel approach of multi-modal hyper-fluctuation therapy involving modulation of radiotherapeutic hyper-fractionation, temperature, radiothermy and immune-status. (author)

  4. Improvement of amplified spontaneous emission performance by doping tris(8-hydroxyquinoline) aluminum (Alq3) in dye-doped polymer thin films.

    Science.gov (United States)

    Lu, Wu; You, Han; Fang, Junfeng; Ma, Dongge

    2007-04-20

    A well-known red fluorescent dye 4-(dicy-anomethylene)-2-t-butyl-6(1,1,7,7-tetramethyljulolidyl-9-enyl)-4H-pyran (DCJTB) was codoped with an electron transport organic molecule tris(8-hydroxyquinoline) aluminum (Alq(3)) in a host matrix of polystyrene (PS), and the amplified spontaneous emission (ASE) was studied by optically pumping. It was found that the ASE performance was significantly improved by the introduction of Alq(3). The Alq(3):DCJTB:PS blending thin films showed a low threshold (2.4 microJ/pulse) and a high net gain coefficient (109.95 cm(-1)) compared with the pure DCJTB:PS system (threshold of 15.2 microJ/pulse and gain of 35.94 cm(-1)). The improvement of the ASE performance was considered to be attributable to the effective Föster energy transfer from Alq(3) to DCJTB. Our results demonstrate that the Alq(3):DCJTB could be a promising candidate as gain medium for red organic diode lasers.

  5. Robust anonymous authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  6. Spontaneous and Induced Platelet Aggregation during Pregnancy and Labor

    Directory of Open Access Journals (Sweden)

    T. P. Bondar

    2016-01-01

    Full Text Available Objective: to evaluate changes in characteristics of spontaneous platelet (Pt aggregation in patients with obstetric complications associated with hereditary thrombophilia.Materials and methods. Blood samples were taken from 52 recently confined women on the first day after labor; at that, ethic regulations for the preanalytical phase were followed. Determination of PlA1/ PlA2 polymorphism enotype was performed by means of amplificationrestriction analysis. Geometrical characteristics of patients' peripheral blood Pt aggregation were studied by means of AFM Integra Prima. The degree of confidence of the parameters under test was determined using the ttest, and the significance level was considered valid at P<0.05.Results. A statistical analysis of the findings demonstrated that the length of Pt aggregates in healthy pregnant women was significantly higher than that in healthy nonpregnant women at all study phases. Patients with the P1A1/P1A2 polymorphism in the GP IIb/IIIa Pt receptor gene demonstrated increased widthm height, and density of Pt aggregates. The changes were most significant during the incubation phase lasting for 15 and 30 minutes. The study of geometric parameters of different exposures demonstrated the following: the longer the incubation period, the greater the difference between geometric parameters of the aggregates (e.g. height, length, and width. Conclusion. The analysis of obtained data demonstrated that the presence of P1A1/P1A2 polymorphism in GP IIb/IIIa Pt gene receptor contributes to the decrease in the platelet response threshold and enhances the spontaneous Pt aggregation. The imaging of aggregates provides strong evidence for the accelerated growth of the aggregates in thrombotic complications of pregnancy.

  7. A New Wavelet Threshold Function and Denoising Application

    Directory of Open Access Journals (Sweden)

    Lu Jing-yi

    2016-01-01

    Full Text Available In order to improve the effects of denoising, this paper introduces the basic principles of wavelet threshold denoising and traditional structures threshold functions. Meanwhile, it proposes wavelet threshold function and fixed threshold formula which are both improved here. First, this paper studies the problems existing in the traditional wavelet threshold functions and introduces the adjustment factors to construct the new threshold function basis on soft threshold function. Then, it studies the fixed threshold and introduces the logarithmic function of layer number of wavelet decomposition to design the new fixed threshold formula. Finally, this paper uses hard threshold, soft threshold, Garrote threshold, and improved threshold function to denoise different signals. And the paper also calculates signal-to-noise (SNR and mean square errors (MSE of the hard threshold functions, soft thresholding functions, Garrote threshold functions, and the improved threshold function after denoising. Theoretical analysis and experimental results showed that the proposed approach could improve soft threshold functions with constant deviation and hard threshold with discontinuous function problems. The proposed approach could improve the different decomposition scales that adopt the same threshold value to deal with the noise problems, also effectively filter the noise in the signals, and improve the SNR and reduce the MSE of output signals.

  8. An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity

    Directory of Open Access Journals (Sweden)

    Muhammad Khurram Khan

    2013-01-01

    Full Text Available The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An’s scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An’s scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.

  9. Spontaneous calf haematoma: case report.

    Science.gov (United States)

    Zubaidah, N H; Liew, N C

    2014-02-01

    Spontaneous calf haematoma is a rare condition and few case reports have been published in the English literature. Common conditions like deep vein thrombosis and traumatic gastrocnemius muscle tear need to be considered when a patient presents with unilateral calf swelling and tenderness. Ultrasound and Magnetic Resonance Imaging are essential for confirmation of diagnosis. The purpose of this paper is to report on a rare case of spontaneous calf hematoma and its diagnosis and management.

  10. F. VON HAYEK’S THEORY OF SPONTANEOUS ORDER

    Directory of Open Access Journals (Sweden)

    О. Nesterenko

    2013-04-01

    Full Text Available The essence and the genesis of spontaneous order are disclosed in the context of critical analysis of constructivism. The author’s approach to the definition of the characteristic features of the spontaneous order is proposed. The dichotomy of the order is revealed towards the economic sphere in form of spontaneous order and organization.

  11. Sex Differences in Attitudes towards Online Privacy and Anonymity among Israeli Students with Different Technical Backgrounds

    Science.gov (United States)

    Weinberger, Maor; Zhitomirsky-Geffet, Maayan; Bouhnik, Dan

    2017-01-01

    Introduction: In this exploratory study, we proposed an experimental framework to investigate and model male/female differences in attitudes towards online privacy and anonymity among Israeli students. Our aim was to comparatively model men and women's online privacy attitudes, and to assess the online privacy gender gap. Method: Various factors…

  12. Spontaneous pneumomediastinum after bench press training.

    Science.gov (United States)

    Nishino, Tomoya

    2017-04-01

    Spontaneous pneumomediastinum is often associated with asthma and mainly affects adolescent males with a tall, thin body habitus. A 17-year-old man complained of chest and pharyngeal pain after bench press training and spontaneous pneumomediastinum was diagnosed. It should be considered in the differential diagnosis of chest pain of uncertain cause.

  13. Criminología Informática. Anonymous: ¿justicia cibernética o terrorismo enmascarado?/Informatic Criminology. Anonymous: ¿Cyber Justice or masked terrorism?

    Directory of Open Access Journals (Sweden)

    Daniel Romano Ozcáriz

    2017-08-01

    Full Text Available Desde hace ya una década se viene escuchando las acciones cibernéticas de un grupo de ciberactivistas autodenominado Anonymous, pero ¿qué sabemos realmente de ellos? Ciertamente poco, debido en parte a la anárquica organización que los representa y a la ingente cantidad de bulos y rumores sin confirmar que inundan las redes. En honor a la verdad, es imprescindible hacer una limpieza de información y separar lo que es este grupo realmente de lo que es puro desprestigio o sobrevaloración, y de las mentiras. Para ello analizaremos cinco puntos fundamentales, para una mejor comprensión: su definición, valores, principios, simbología y su historia/acciones más representativas.

  14. Spontaneous cooperation for prosocials, but not for proselfs: Social value orientation moderates spontaneous cooperation behavior

    Science.gov (United States)

    Mischkowski, Dorothee; Glöckner, Andreas

    2016-01-01

    Cooperation is essential for the success of societies and there is an ongoing debate whether individuals have therefore developed a general spontaneous tendency to cooperate or not. Findings that cooperative behavior is related to shorter decision times provide support for the spontaneous cooperation effect, although contrary results have also been reported. We show that cooperative behavior is better described as person × situation interaction, in that there is a spontaneous cooperation effect for prosocial but not for proself persons. In three studies, one involving population representative samples from the US and Germany, we found that cooperation in a public good game is dependent on an interaction between individuals’ social value orientation and decision time. Increasing deliberation about the dilemma situation does not affect persons that are selfish to begin with, but it is related to decreasing cooperation for prosocial persons that gain positive utility from outcomes of others and score high on the related general personality trait honesty/humility. Our results demonstrate that the spontaneous cooperation hypothesis has to be qualified in that it is limited to persons with a specific personality and social values. Furthermore, they allow reconciling conflicting previous findings by identifying an important moderator for the effect. PMID:26876773

  15. Anonymous or confidential HIV counseling and voluntary testing in federally funded testing sites--United States, 1995-1997.

    Science.gov (United States)

    1999-06-25

    Human immunodeficiency virus (HIV) counseling and voluntary testing (CT) programs have been an important part of national HIV prevention efforts since the first HIV antibody tests became available in 1985. In 1995, these programs accounted for approximately 15% of annual HIV antibody testing in the United States, excluding testing for blood donation. CT opportunities are offered to persons at risk for HIV infection at approximately 11,000 sites, including dedicated HIV CT sites, sexually transmitted disease (STD) clinics, drug-treatment centers, hospitals, and prisons. In 39 states, testing can be obtained anonymously, where persons do not have to give their name to get tested. All states provide confidential testing (by name) and have confidentiality laws and regulations to protect this information. This report compares patterns of anonymous and confidential testing in all federally funded CT programs from 1995 through 1997 and documents the importance of both types of testing opportunities.

  16. Conceptualization of Collective Behavior Events in the New York "Times."

    Science.gov (United States)

    Blake, Joseph A.; And Others

    1978-01-01

    Reports that most collective behavior events reported in the New York "Times" are described in terms of emotionality and anonymity of membership and are alleged to be violent and spontaneous, and that there are significant rank-order correlations between the reported presence of control agents, reported violence, and attributions of spontaneity.…

  17. Gamblers Anonymous in Israel: a participant observation study of a self-help group.

    Science.gov (United States)

    Cromer, G

    1978-10-01

    This participant observation study of the first Gamblers Anonymous group in Israel is designed to show (1) the ways in which the group helps it members rehabilitate themselves, (2) the three stages through which they must go in order to ensure success, and (3) the reason why some participants fail to do so. The article concludes with a number of observations concerning the extent of gambling in Israel and the different ways that should be developed for dealing with the problem.

  18. Threshold behavior in electron-atom scattering

    International Nuclear Information System (INIS)

    Sadeghpour, H.R.; Greene, C.H.

    1996-01-01

    Ever since the classic work of Wannier in 1953, the process of treating two threshold electrons in the continuum of a positively charged ion has been an active field of study. The authors have developed a treatment motivated by the physics below the double ionization threshold. By modeling the double ionization as a series of Landau-Zener transitions, they obtain an analytical formulation of the absolute threshold probability which has a leading power law behavior, akin to Wannier's law. Some of the noteworthy aspects of this derivation are that the derivation can be conveniently continued below threshold giving rise to a open-quotes cuspclose quotes at threshold, and that on both sides of the threshold, absolute values of the cross sections are obtained

  19. Spontaneous ischaemic stroke in dogs

    DEFF Research Database (Denmark)

    Gredal, Hanne Birgit; Skerritt, G. C.; Gideon, P.

    2013-01-01

    Translation of experimental stroke research into the clinical setting is often unsuccessful. Novel approaches are therefore desirable. As humans, pet dogs suffer from spontaneous ischaemic stroke and may hence offer new ways of studying genuine stroke injury mechanisms.......Translation of experimental stroke research into the clinical setting is often unsuccessful. Novel approaches are therefore desirable. As humans, pet dogs suffer from spontaneous ischaemic stroke and may hence offer new ways of studying genuine stroke injury mechanisms....

  20. Spontaneity and international marketing performance

    OpenAIRE

    Souchon, Anne L.; Hughes, Paul; Farrell, Andrew M.; Nemkova, Ekaterina; Oliveira, Joao S.

    2016-01-01

    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link. Purpose – The purpose of this paper is to ascertain how today’s international marketers can perform better on the global scene by harnessing spontaneity. Design/methodology/approach – The authors draw on contingency theory to develop a model of the spontaneity – international marketing performance relationship, and identify three potential m...

  1. Analysis of the Spontaneous Abortion in Chinese Married Women

    Institute of Scientific and Technical Information of China (English)

    高尔生; 邓新清; 何更生; 方可娟; 唐威; 楼超华

    1994-01-01

    The spontaneous abortion is a common type of pregnant outcomes. The spontaneous abortion rate can be used to indicate the women's fecundity and the level of the reproductive health. It is also a sensitive indicator for determing the social, economic, and health status and prenatal care. To explore the preventive method for spontaneous abortion and improve women's health level, it is important to evaluate the status of spontaneous abortion and to determine the factors affecting

  2. Double Photoionization Near Threshold

    Science.gov (United States)

    Wehlitz, Ralf

    2007-01-01

    The threshold region of the double-photoionization cross section is of particular interest because both ejected electrons move slowly in the Coulomb field of the residual ion. Near threshold both electrons have time to interact with each other and with the residual ion. Also, different theoretical models compete to describe the double-photoionization cross section in the threshold region. We have investigated that cross section for lithium and beryllium and have analyzed our data with respect to the latest results in the Coulomb-dipole theory. We find that our data support the idea of a Coulomb-dipole interaction.

  3. Spontaneous Vesicle Recycling in the Synaptic Bouton

    Directory of Open Access Journals (Sweden)

    Sven eTruckenbrodt

    2014-12-01

    Full Text Available The trigger for synaptic vesicle exocytosis is Ca2+, which enters the synaptic bouton following action potential stimulation. However, spontaneous release of neurotransmitter also occurs in the absence of stimulation in virtually all synaptic boutons. It has long been thought that this represents exocytosis driven by fluctuations in local Ca2+ levels. The vesicles responding to these fluctuations are thought to be the same ones that release upon stimulation, albeit potentially triggered by different Ca2+ sensors. This view has been challenged by several recent works, which have suggested that spontaneous release is driven by a separate pool of synaptic vesicles. Numerous articles appeared during the last few years in support of each of these hypotheses, and it has been challenging to bring them into accord. We speculate here on the origins of this controversy, and propose a solution that is related to developmental effects. Constitutive membrane traffic, needed for the biogenesis of vesicles and synapses, is responsible for high levels of spontaneous membrane fusion in young neurons, probably independent of Ca2+. The vesicles releasing spontaneously in such neurons are not related to other synaptic vesicle pools and may represent constitutively releasing vesicles (CRVs rather than bona fide synaptic vesicles. In mature neurons, constitutive traffic is much dampened, and the few remaining spontaneous release events probably represent bona fide spontaneously releasing synaptic vesicles (SRSVs responding to Ca2+ fluctuations, along with a handful of CRVs that participate in synaptic vesicle turnover.

  4. Spontaneous Atraumatic Mediastinal Hemorrhage

    Directory of Open Access Journals (Sweden)

    Morkos Iskander BSc, BMBS, MRCS, PGCertMedEd

    2013-04-01

    Full Text Available Spontaneous atraumatic mediastinal hematomas are rare. We present a case of a previously fit and well middle-aged lady who presented with acute breathlessness and an increasing neck swelling and spontaneous neck bruising. On plain chest radiograph, widening of the mediastinum was noted. The bruising was later confirmed to be secondary to mediastinal hematoma. This life-threatening diagnostic conundrum was managed conservatively with a multidisciplinary team approach involving upper gastrointestinal and thoracic surgeons, gastroenterologists, radiologists, intensivists, and hematologists along with a variety of diagnostic modalities. A review of literature is also presented to help surgeons manage such challenging and complicated cases.

  5. Spontaneous Retropharyngeal Emphysema: A Case Report | Chi ...

    African Journals Online (AJOL)

    ... is a rare clinical condition in pediatric otolaryngology. The predominant symptoms are sore throat, odynophagia, dysphagia, and neck pain. Here, we report a case of spontaneous retropharyngeal emphysema. Keywords: Iatrogenic injury, retropharyngeal emphysema, spontaneous retropharyngeal emphysem, trauma ...

  6. Spontaneous regression of pulmonary bullae

    International Nuclear Information System (INIS)

    Satoh, H.; Ishikawa, H.; Ohtsuka, M.; Sekizawa, K.

    2002-01-01

    The natural history of pulmonary bullae is often characterized by gradual, progressive enlargement. Spontaneous regression of bullae is, however, very rare. We report a case in which complete resolution of pulmonary bullae in the left upper lung occurred spontaneously. The management of pulmonary bullae is occasionally made difficult because of gradual progressive enlargement associated with abnormal pulmonary function. Some patients have multiple bulla in both lungs and/or have a history of pulmonary emphysema. Others have a giant bulla without emphysematous change in the lungs. Our present case had treated lung cancer with no evidence of local recurrence. He had no emphysematous change in lung function test and had no complaints, although the high resolution CT scan shows evidence of underlying minimal changes of emphysema. Ortin and Gurney presented three cases of spontaneous reduction in size of bulla. Interestingly, one of them had a marked decrease in the size of a bulla in association with thickening of the wall of the bulla, which was observed in our patient. This case we describe is of interest, not only because of the rarity with which regression of pulmonary bulla has been reported in the literature, but also because of the spontaneous improvements in the radiological picture in the absence of overt infection or tumor. Copyright (2002) Blackwell Science Pty Ltd

  7. Amplified spontaneous emission and laser emission from a high optical-gain medium of dye-doped dendrimer

    International Nuclear Information System (INIS)

    Yokoyama, Shiyoshi; Nakahama, Tatsuo; Mashiko, Shinro

    2005-01-01

    We measured the amplified spontaneous emission and laser emission from high-gain media of laser-dye encapsulated dendrimers. A highly branched poly(amidoamine) (PAMAM-OH) dendrimer formed a guest-host complex with a conventional laser-dye (DCM), resulting in a high optical-gain. Of particular note was the appearance of a laser threshold, above which a super-narrowed laser spectrum was observed, although laser feedback was caused without any mirror cavity devices. The optical feedback was attributed to spatial confinement of the light due to gain guiding under optical excitation. The laser spectrum clearly indicated a resonant laser-mode with a spectrum linewidth of less than 0.1 nm. This order of spectrum narrowing is comparable to that seen in the laser emission from ordinary laser devices

  8. Video-assisted thoracoscopy treatment of spontaneous pneumothorax

    International Nuclear Information System (INIS)

    Chen Haitao; Ren Jian; Che Jiaming; Hang Junbiao; Qiu Weicheng; Chen Zhongyuan

    2002-01-01

    Objective: To propose a treatment protocol by video thoracoscopy in spontaneous pneumothorax. Methods: One hundred and three patients underwent Video-assisted thoracoscopy (VATS) treatment of spontaneous pneumothorax and hemothorax. Indications included recurrent pneumothorax, persistent air leakage following conservative therapy, complicated hemothorax and CT scan identified bullae formation. Results: No operative deaths occurred, conversion rate was 2.91%, recurrence rate was 0.97%, complication rate was 3.81% and mean postoperative hospital stay was 5.6 days. Conclusions: VATS treatment of spontaneous pneumothorax is better than open chest surgery and also superior than conservative therapy

  9. Spontaneous Dissection of the Superior Mesenteric Artery

    International Nuclear Information System (INIS)

    Sheldon, Patrick J.; Esther, James B.; Sheldon, Elana L.; Sparks, Steven R.; Brophy, David P.; Oglevie, Steven B.

    2001-01-01

    Spontaneous dissection of the superior mesenteric artery (SMA) is a rare occurrence, especially when not associated with aortic dissection. Currently, only 28 cases appear to have been reported. Due to the scarcity of cases in the literature, the natural history of isolated, spontaneous SMA dissection is unclear. CT has been reported to be useful for the initial diagnosis of SMA dissection [2-5]. We present two recent cases of spontaneous SMA dissection in which enhanced spiral CT was instrumental in following the disease process and guiding clinical decision making

  10. Endometriosis-related spontaneous diaphragmatic rupture.

    Science.gov (United States)

    Triponez, Frédéric; Alifano, Marco; Bobbio, Antonio; Regnard, Jean-François

    2010-10-01

    Non-traumatic, spontaneous diaphragmatic rupture is a rare event whose pathophysiology is not known. We report the case of endometriosis-related spontaneous rupture of the right diaphragm with intrathoracic herniation of the liver, gallbladder and colon. We hypothesize that the invasiveness of endometriotic tissue caused diaphragm fragility, which finally lead to its complete rupture without traumatic event. The treatment consisted of a classical management of diaphragmatic rupture, with excision of the endometriotic nodule followed by medical ovarian suppression for six months.

  11. Evaluation of the pentylenetetrazole seizure threshold test in epileptic mice as surrogate model for drug testing against pharmacoresistant seizures.

    Science.gov (United States)

    Töllner, Kathrin; Twele, Friederike; Löscher, Wolfgang

    2016-04-01

    Resistance to antiepileptic drugs (AEDs) is a major problem in epilepsy therapy, so that development of more effective AEDs is an unmet clinical need. Several rat and mouse models of epilepsy with spontaneous difficult-to-treat seizures exist, but because testing of antiseizure drug efficacy is extremely laborious in such models, they are only rarely used in the development of novel AEDs. Recently, the use of acute seizure tests in epileptic rats or mice has been proposed as a novel strategy for evaluating novel AEDs for increased antiseizure efficacy. In the present study, we compared the effects of five AEDs (valproate, phenobarbital, diazepam, lamotrigine, levetiracetam) on the pentylenetetrazole (PTZ) seizure threshold in mice that were made epileptic by pilocarpine. Experiments were started 6 weeks after a pilocarpine-induced status epilepticus. At this time, control seizure threshold was significantly lower in epileptic than in nonepileptic animals. Unexpectedly, only one AED (valproate) was less effective to increase seizure threshold in epileptic vs. nonepileptic mice, and this difference was restricted to doses of 200 and 300 mg/kg, whereas the difference disappeared at 400mg/kg. All other AEDs exerted similar seizure threshold increases in epileptic and nonepileptic mice. Thus, induction of acute seizures with PTZ in mice pretreated with pilocarpine does not provide an effective and valuable surrogate method to screen drugs for antiseizure efficacy in a model of difficult-to-treat chronic epilepsy as previously suggested from experiments with this approach in rats. Copyright © 2016 Elsevier Inc. All rights reserved.

  12. Spontaneous Scalarization: Dead or Alive?

    Science.gov (United States)

    Berti, Emanuele; Crispino, Luis; Gerosa, Davide; Gualtieri, Leonardo; Horbatsch, Michael; Macedo, Caio; Okada da Silva, Hector; Pani, Paolo; Sotani, Hajime; Sperhake, Ulrich

    2015-04-01

    In 1993, Damour and Esposito-Farese showed that a wide class of scalar-tensor theories can pass weak-field gravitational tests and exhibit nonperturbative strong-field deviations away from General Relativity in systems involving neutron stars. These deviations are possible in the presence of ``spontaneous scalarization,'' a phase transition similar in nature to spontaneous magnetization in ferromagnets. More than twenty years after the original proposal, binary pulsar experiments have severely constrained the possibility of spontaneous scalarization occurring in nature. I will show that these experimental constraints have important implications for the torsional oscillation frequencies of neutron stars and for the so-called ``I-Love-Q'' relations in scalar-tensor theories. I will also argue that there is still hope to observe strong scalarization effects, despite the strong experimental bounds on the original mechanism. In particular, I will discuss two mechanisms that could produce strong scalarization in neutron stars: anisotropy and multiscalarization. This work was supported by NSF CAREER Award PHY-1055103.

  13. Detection of target phonemes in spontaneous and read speech.

    Science.gov (United States)

    Mehta, G; Cutler, A

    1988-01-01

    Although spontaneous speech occurs more frequently in most listeners' experience than read speech, laboratory studies of human speech recognition typically use carefully controlled materials read from a script. The phonological and prosodic characteristics of spontaneous and read speech differ considerably, however, which suggests that laboratory results may not generalise to the recognition of spontaneous speech. In the present study listeners were presented with both spontaneous and read speech materials, and their response time to detect word-initial target phonemes was measured. Responses were, overall, equally fast in each speech mode. However, analysis of effects previously reported in phoneme detection studies revealed significant differences between speech modes. In read speech but not in spontaneous speech, later targets were detected more rapidly than targets preceded by short words. In contrast, in spontaneous speech but not in read speech, targets were detected more rapidly in accented than in unaccented words and in strong than in weak syllables. An explanation for this pattern is offered in terms of characteristic prosodic differences between spontaneous and read speech. The results support claims from previous work that listeners pay great attention to prosodic information in the process of recognising speech.

  14. Spontaneous CP violation on the lattice

    CERN Document Server

    Laine, Mikko

    2000-01-01

    At finite temperatures around the electroweak phase transition, the thermodynamics of the MSSM can be described by a three-dimensional two Higgs doublet effective theory. This effective theory has a phase where CP is spontaneously violated. We study spontaneous CP violation with non-perturbative lattice simulations, and analyse whether one could end up in this phase for any physical MSSM parameter values.

  15. Spontaneous pneumothorax associated with lung cancer

    International Nuclear Information System (INIS)

    Sung, Dong Wook; Jung, Seung Hyae; Yoon, Yup; Lim, Jae Hoon; Cho, Kyu Soek; Yang, Moon Ho

    1991-01-01

    Spontaneous pneumothorax is a rare manifestation of lung cancer. Eight cases of pneumothorax found in 1648 patients with lung cancer from 1979-1990 are reported. Histopathologic types of cancer were adenocarcinoma in three cases, squamous cell carcinoma in two cases, bronchioloalveolar carcinoma in two cases, and metastatic renal cell carcinoma in one case. The primary tumor mass was not found even after thoracotomy in two cases. Spontaneous pneumothorax occurred on the ipsilateral side of the cancer. All the patients were more than 40 years old with a history of smoking 1-2 packs a day for 20 to 50 years, and had chronic lung diseases. The authors emphasize that bronchogenic carcinoma may be one of the causes of spontaneous pneumothorax in appropriate clinical settings

  16. SAM: Secure Access of Media Independent Information Service with User Anonymity

    Directory of Open Access Journals (Sweden)

    Li Guangsong

    2010-01-01

    Full Text Available Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH services. The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers. In this paper, we focus specifically on security of Media Independent Information Service (MIIS and present a new access authentication scheme with user anonymity for MIIS. The protocol can be used to establish a secure channel between the mobile node and the information server. Security and performance of the protocol are also analyzed in this paper.

  17. Spontaneous generation in medieval Jewish philosophy and theology.

    Science.gov (United States)

    Gaziel, Ahuva

    2012-01-01

    The concept of life forms emerging from inanimate matter--spontaneous generation--was widely accepted until the nineteenth century. Several medieval Jewish scholars acknowledged this scientific theory in their philosophical and religious contemplations. Quite interestingly, it served to reinforce diverse, or even opposite, theological conclusions. One approach excluded spontaneously-generated living beings form the biblical account of creation or the story of the Deluge. Underlying this view is an understanding that organisms that generate spontaneously evolve continuously in nature and, therefore, do not require divine intervention in their formation or survival during disastrous events. This naturalistic position reduces the miraculous dimension of reality. Others were of the opinion that spontaneous generation is one of the extraordinary marvels exhibited in this world and, accordingly, this interpretation served to accentuate the divine aspect of nature. References to spontaneous generation also appear in legal writings, influencing practical applications such as dietary laws and actions forbidden on the Sabbath.

  18. Spontaneous low-frequency oscillations in cerebral vessels

    DEFF Research Database (Denmark)

    Schytz, Henrik W; Hansson, Andreas; Phillip, Dorte

    2010-01-01

    ). Analysis of CA by measurement of spontaneous oscillations in the low-frequency spectrum in cerebral vessels might be a useful tool for assessing risk and investigating different treatment strategies in carotid artery disease (CAD) and stroke. We reviewed studies exploring spontaneous oscillations...

  19. Adaptive Response Against Spontaneous Neoplastic Transformation In Vitro Induced by Ionizing Radiation

    International Nuclear Information System (INIS)

    Redpath, J. Leslie

    2003-01-01

    The goal of this project was to establish a dose response curve for radiation-induced neoplastic transformation of HeLa x skin fibroblast human hybrid cells in vitro under experimental conditions were an adaptive response, if it were induced, would have an opportunity to be expressed. During the first two years of the grant an exhaustive series of experiments were performed and the resulting data were reported at the 2000 Annual Meeting of the Radiation Research Society and then Subsequently published. The data showed that an adaptive response against spontaneous neoplastic transformation was seen up to doses of 10cGy of Cs-137 gamma rays. At dose of 30, 50 and 100 cGy the transformation frequencies were above background. This indicated that for this system, under the specific experimental conditions used, there was a threshold of somewhere between 10 and 30 cGy. The results also indicated some unexpected, though very interesting, correlations with relative risk estimates made from human epidemiologic studies

  20. Small-threshold behaviour of two-loop self-energy diagrams: two-particle thresholds

    International Nuclear Information System (INIS)

    Berends, F.A.; Davydychev, A.I.; Moskovskij Gosudarstvennyj Univ., Moscow; Smirnov, V.A.; Moskovskij Gosudarstvennyj Univ., Moscow

    1996-01-01

    The behaviour of two-loop two-point diagrams at non-zero thresholds corresponding to two-particle cuts is analyzed. The masses involved in a cut and the external momentum are assumed to be small as compared to some of the other masses of the diagram. By employing general formulae of asymptotic expansions of Feynman diagrams in momenta and masses, we construct an algorithm to derive analytic approximations to the diagrams. In such a way, we calculate several first coefficients of the expansion. Since no conditions on relative values of the small masses and the external momentum are imposed, the threshold irregularities are described analytically. Numerical examples, using diagrams occurring in the standard model, illustrate the convergence of the expansion below the first large threshold. (orig.)

  1. Spontaneous rupture of vaginal enterocele

    DEFF Research Database (Denmark)

    Svendsen, J H; Galatius, H; Hansen, P K

    1985-01-01

    Spontaneous rupture of an enterocele is a rare complication. Only 24 cases including the present case have been reported in the literature. The patients were elderly and had had at least one vaginal operation. The patients were remarkably unaffected symptomatically on admission.......Spontaneous rupture of an enterocele is a rare complication. Only 24 cases including the present case have been reported in the literature. The patients were elderly and had had at least one vaginal operation. The patients were remarkably unaffected symptomatically on admission....

  2. Attachment Styles and Changes among Women Members of Overeaters Anonymous Who Have Recovered from Binge-Eating Disorder

    Science.gov (United States)

    Hertz, Pnina; Addad, Moshe; Ronel, Natti

    2012-01-01

    In Overeaters Anonymous (OA), the 12-step self-help program for compulsive overeaters, binge eating is regarded as a physical, spiritual, and emotional disorder. Consequently, the program proposes recovery through the adoption of a lifestyle that leads to physical, spiritual, and emotional well-being. A qualitative phenomenological study that…

  3. Spontaneous emission spectra and simulating multiple spontaneous generation coherence in a five-level atomic medium

    International Nuclear Information System (INIS)

    Li Jiahua; Liu Jibing; Qi Chunchao; Chen Aixi

    2006-01-01

    We investigate the features of the spontaneous emission spectra in a coherently driven cold five-level atomic system by means of a radio frequency (rf) or microwave field driving a hyperfine transition within the ground state. It is shown that a few interesting phenomena such as spectral-line narrowing, spectral-line enhancement, spectral-line suppression, and spontaneous emission quenching can be realized by modulating the frequency and intensity of the rf-driving field in our system. In the dressed-state picture of the coupling and rf-driving fields, we find that this coherently driven atomic system has three close-lying levels so that multiple spontaneously generated coherence (SGC) arises. Our considered atomic model can be found in real atoms, such as rubidium or sodium, so a corresponding experiment can be done to observe the expected phenomena related to SGC reported by Fountoulakis et al. [Phys. Rev. A 73, 033811 (2006)], since no rigorous conditions are required

  4. A new class of spontaneously polarized materials

    DEFF Research Database (Denmark)

    Field, David; Plekan, Oksana; Cassidy, Andrew

    2011-01-01

    Very large electric fields form spontaneously within films of seemingly prosaic chemicals such as nitrous oxide or propane.We describe how the discovery of this unexpected phenomenon took place and how we attempt to understand the nature of the new class of spontaneously polarized materials...

  5. Spontaneous rupture of choledochal cyst: case report

    International Nuclear Information System (INIS)

    Shin, Ho Seob; Nam, Kyung Jin; Lee, Jin Hwa; Kim, Chan Sung; Choi, Jong Cheol; Oh, Jong Young

    2002-01-01

    Spontaneous rupture of a choledochal cyst leading to biliary peritonitis is a rare complication which can be fatal if not promptly diagnosed. The authors report the ultrasound and CT findings of two cases of spontaneous choledochal cystic rupture and the biliary peritonitis which ensued

  6. Spontaneous rupture of choledochal cyst: case report

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Ho Seob; Nam, Kyung Jin; Lee, Jin Hwa; Kim, Chan Sung; Choi, Jong Cheol; Oh, Jong Young [Dong-a University College of Medicine, Pusan (Korea, Republic of)

    2002-11-01

    Spontaneous rupture of a choledochal cyst leading to biliary peritonitis is a rare complication which can be fatal if not promptly diagnosed. The authors report the ultrasound and CT findings of two cases of spontaneous choledochal cystic rupture and the biliary peritonitis which ensued.

  7. Spontaneous symmetry breaking and its cosmological consequences

    International Nuclear Information System (INIS)

    Kobzarev, I.Yu.

    1975-01-01

    The concept of symmetry and of the spontaneous symmetry breaking are presented in popular form as applied to quantum physics. Though the presence of the spontaneous symmetry breaking is not proved directly for interactions of elementary particles, on considering the hypothesis of its presence as applied to the hot Universe theory a possibility of obtaining rather uncommon cosmological consequences is discussed. In particular, spontaneous symmetry breaking of vacuum and the rather hot Universe lead necessarily to the presence of the domain structure of the Universe with the surfase energy at the domain interface in the form of a real physical object

  8. Shared risk aversion in spontaneous and induced abortion.

    Science.gov (United States)

    Catalano, Ralph; Bruckner, Tim A; Karasek, Deborah; Adler, Nancy E; Mortensen, Laust H

    2016-05-01

    Does the incidence of spontaneous abortion correlate positively over conception cohorts with the incidence of non-clinically indicated induced abortion as predicted by shared risk aversion? We find that the number of spontaneous and non-clinically indicated induced abortions correlates in conception cohorts, suggesting that risk aversion affects both the conscious and non-conscious mechanisms that control parturition. Much literature speculates that natural selection conserved risk aversion because the trait enhanced Darwinian fitness. Risk aversion, moreover, supposedly influences all decisions including those that individuals can and cannot report making. We argue that these circumstances, if real, would manifest in conscious and non-conscious decisions to invest in prospective offspring, and therefore affect incidence of induced and spontaneous abortion over time. Using data from Denmark, we test the hypothesis that monthly conception cohorts yielding unexpectedly many non-clinically indicated induced abortions also yield unexpectedly many spontaneous abortions. The 180 month test period (January 1995 through December 2009), yielded 1 351 800 gestations including 156 780 spontaneous as well as 233 280 induced abortions 9100 of which were clinically indicated. We use Box-Jenkins transfer functions to adjust the incidence of spontaneous and non-clinically indicated induced abortions for autocorrelation (including seasonality), cohort size, and fetal as well as gestational anomalies over the 180-month test period. We use cross-correlation to test our hypothesized association. We find a positive association between spontaneous and non-clinically indicated induced abortions. This suggests, consistent with our theory, that mothers of conception cohorts that yielded more spontaneous abortions than expected opted more frequently than expected for non-clinically indicated induced abortion. Limitations of our work include that even the world's best registration system

  9. iDASH: integrating data for analysis, anonymization, and sharing

    Science.gov (United States)

    Bafna, Vineet; Boxwala, Aziz A; Chapman, Brian E; Chapman, Wendy W; Chaudhuri, Kamalika; Day, Michele E; Farcas, Claudiu; Heintzman, Nathaniel D; Jiang, Xiaoqian; Kim, Hyeoneui; Kim, Jihoon; Matheny, Michael E; Resnic, Frederic S; Vinterbo, Staal A

    2011-01-01

    iDASH (integrating data for analysis, anonymization, and sharing) is the newest National Center for Biomedical Computing funded by the NIH. It focuses on algorithms and tools for sharing data in a privacy-preserving manner. Foundational privacy technology research performed within iDASH is coupled with innovative engineering for collaborative tool development and data-sharing capabilities in a private Health Insurance Portability and Accountability Act (HIPAA)-certified cloud. Driving Biological Projects, which span different biological levels (from molecules to individuals to populations) and focus on various health conditions, help guide research and development within this Center. Furthermore, training and dissemination efforts connect the Center with its stakeholders and educate data owners and data consumers on how to share and use clinical and biological data. Through these various mechanisms, iDASH implements its goal of providing biomedical and behavioral researchers with access to data, software, and a high-performance computing environment, thus enabling them to generate and test new hypotheses. PMID:22081224

  10. Anonymization of Electronic Medical Records to Support Clinical Analysis

    CERN Document Server

    Gkoulalas-Divanis, Aris

    2013-01-01

    Anonymization of Electronic Medical Records to Support Clinical Analysis closely examines the privacy threats that may arise from medical data sharing, and surveys the state-of-the-art methods developed to safeguard data against these threats. To motivate the need for computational methods, the book first explores the main challenges facing the privacy-protection of medical data using the existing policies, practices and regulations. Then, it takes an in-depth look at the popular computational privacy-preserving methods that have been developed for demographic, clinical and genomic data sharing, and closely analyzes the privacy principles behind these methods, as well as the optimization and algorithmic strategies that they employ. Finally, through a series of in-depth case studies that highlight data from the US Census as well as the Vanderbilt University Medical Center, the book outlines a new, innovative class of privacy-preserving methods designed to ensure the integrity of transferred medical data for su...

  11. Group theory of spontaneous symmetry breaking

    International Nuclear Information System (INIS)

    Ghaboussi, F.

    1987-01-01

    The connection between the minimality of the Higgs field potential and the maximal little groups of its representation obtained by spontaneous symmetry breaking is analyzed. It is shown that for several representations the lowest minimum of the potential is related to the maximal little group of those representations. Furthermore, a practical necessity criterion is given for the representation of the Higgs field needed for spontaneous symmetry breaking

  12. Spontaneous polyploidization in cucumber.

    Science.gov (United States)

    Ramírez-Madera, Axel O; Miller, Nathan D; Spalding, Edgar P; Weng, Yiqun; Havey, Michael J

    2017-07-01

    This is the first quantitative estimation of spontaneous polyploidy in cucumber and we detected 2.2% polyploids in a greenhouse study. We provide evidence that polyploidization is consistent with endoreduplication and is an on-going process during plant growth. Cucumber occasionally produces polyploid plants, which are problematic for growers because these plants produce misshaped fruits with non-viable seeds. In this study, we undertook the first quantitative study to estimate the relative frequency of spontaneous polyploids in cucumber. Seeds of recombinant inbred lines were produced in different environments, plants were grown in the field and greenhouse, and flow cytometry was used to establish ploidies. From 1422 greenhouse-grown plants, the overall relative frequency of spontaneous polyploidy was 2.2%. Plants possessed nuclei of different ploidies in the same leaves (mosaic) and on different parts of the same plant (chimeric). Our results provide evidence of endoreduplication and polysomaty in cucumber, and that it is an on-going and dynamic process. There was a significant effect (p = 0.018) of seed production environment on the occurrence of polyploid plants. Seed and seedling traits were not accurate predictors of eventual polyploids, and we recommend that cucumber producers rogue plants based on stature and leaf serration to remove potential polyploids.

  13. Hyper-arousal decreases human visual thresholds.

    Directory of Open Access Journals (Sweden)

    Adam J Woods

    Full Text Available Arousal has long been known to influence behavior and serves as an underlying component of cognition and consciousness. However, the consequences of hyper-arousal for visual perception remain unclear. The present study evaluates the impact of hyper-arousal on two aspects of visual sensitivity: visual stereoacuity and contrast thresholds. Sixty-eight participants participated in two experiments. Thirty-four participants were randomly divided into two groups in each experiment: Arousal Stimulation or Sham Control. The Arousal Stimulation group underwent a 50-second cold pressor stimulation (immersing the foot in 0-2° C water, a technique known to increase arousal. In contrast, the Sham Control group immersed their foot in room temperature water. Stereoacuity thresholds (Experiment 1 and contrast thresholds (Experiment 2 were measured before and after stimulation. The Arousal Stimulation groups demonstrated significantly lower stereoacuity and contrast thresholds following cold pressor stimulation, whereas the Sham Control groups showed no difference in thresholds. These results provide the first evidence that hyper-arousal from sensory stimulation can lower visual thresholds. Hyper-arousal's ability to decrease visual thresholds has important implications for survival, sports, and everyday life.

  14. Spontaneous Achilles tendon rupture in alkaptonuria | Mohammed ...

    African Journals Online (AJOL)

    Spontaneous Achilles tendon ruptures are uncommon. We present a 46-year-old man with spontaneous Achilles tendon rupture due to ochronosis. To our knowledge, this has not been previously reported in Sudan literature. The tendon of the reported patient healed well after debridement and primary repairs.

  15. Spontaneous magnetization in high-density quark matter

    DEFF Research Database (Denmark)

    Tsue, Yasuhiko; da Providência, João; Providência, Constanca

    2015-01-01

    It is shown that spontaneous magnetization occurs due to the anomalous magnetic moments of quarks in high-density quark matter under the tensor-type four-point interaction. The spin polarized condensate for each flavor of quark appears at high baryon density, which leads to the spontaneous magnet...

  16. Children's Spontaneous Vocalisations during Play: Aesthetic Dimensions

    Science.gov (United States)

    Countryman, June; Gabriel, Martha; Thompson, Katherine

    2016-01-01

    This paper explores the phenomenon of spontaneous vocalisations in the self-chosen, unstructured outdoor play of children aged 3-12. Spontaneous vocalisations encompass the whole range of children's unprompted, natural, expressive vocal soundings beyond spoken language. Non-participant observations at childcare centres and on elementary school…

  17. Spontaneous baryogenesis from asymmetric inflaton

    International Nuclear Information System (INIS)

    Takahashi, Fuminobu

    2015-10-01

    We propose a variant scenario of spontaneous baryogenesis from asymmetric inflaton based on current-current interactions between the inflaton and matter fields with a non-zero B-L charge. When the inflaton starts to oscillate around the minimum after inflation, it may lead to excitation of a CP-odd component, which induces an effective chemical potential for the B-L number through the current-current interactions. We study concrete inflation models and show that the spontaneous baryogenesis scenario can be naturally implemented in the chaotic inflation in supergravity.

  18. Radiologic findings of acute spontaneous subdural hematomas

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Jung; Bae, Won Kyong; Gyu, Cha Jang; Kim, Gun Woo; Cho, Won Su; Kim, Il Young; Lee, Kyung Suk [Soonchunhyang University, Chonan (Korea, Republic of). Chonan Hospital

    1998-03-01

    To evaluate the characteristic CT and cerebral angiographic findings in patients with acute spontaneous subdural hematomas and correlate these imaging findings with causes of bleeding and clinical outcome. Twenty-one patients with nontraumatic acute spontaneous subdural hematoma presenting during the last five years underwent CT scanning and cerebral angiography was performed in twelve. To determine the cause of bleedings, CT and angiographic findings were retrospectively analysed. Clinical history, laboratory and operative findings, and final clinical outcome were reviewed. Acute spontaneous subdural hematoma is a rare condition, and the mortality rate is high. In patients with acute spontaneous subdural hematoma, as seen on CT, associated subarachnoid or intracerebral hemorrhage is strongly indicative of intracerebral vascular abnormalities such as aneurysm and arteriovenous malformation, and cerebral angiography is necessary. To ensure proper treatment and thus markedly reduce mortality, the causes of bleedings should be prompty determined by means of cerebral angiography. (author). 20 refs., 1 tab., 4 figs.

  19. A numerical study of threshold states

    International Nuclear Information System (INIS)

    Ata, M.S.; Grama, C.; Grama, N.; Hategan, C.

    1979-01-01

    There are some experimental evidences of charged particle threshold states. On the statistical background of levels, some simple structures were observed in excitation spectrum. They occur near the coulombian threshold and have a large reduced width for the decay in the threshold channel. These states were identified as charged cluster threshold states. Such threshold states were observed in sup(15,16,17,18)O, sup(18,19)F, sup(19,20)Ne, sup(24)Mg, sup(32)S. The types of clusters involved were d, t, 3 He, α and even 12 C. They were observed in heavy-ions transfer reactions in the residual nucleus as strong excited levels. The charged particle threshold states occur as simple structures at high excitation energy. They could be interesting both from nuclear structure as well as nuclear reaction mechanism point of view. They could be excited as simple structures both in compound and residual nucleus. (author)

  20. Conceptions of nuclear threshold status

    International Nuclear Information System (INIS)

    Quester, G.H.

    1991-01-01

    This paper reviews some alternative definitions of nuclear threshold status. Each of them is important, and major analytical confusions would result if one sense of the term is mistaken for another. The motives for nations entering into such threshold status are a blend of civilian and military gains, and of national interests versus parochial or bureaucratic interests. A portion of the rationale for threshold status emerges inevitably from the pursuit of economic goals, and another portion is made more attraction by the derives of the domestic political process. Yet the impact on international security cannot be dismissed, especially where conflicts among the states remain real. Among the military or national security motives are basic deterrence, psychological warfare, war-fighting and, more generally, national prestige. In the end, as the threshold phenomenon is assayed for lessons concerning the role of nuclear weapons more generally in international relations and security, one might conclude that threshold status and outright proliferation coverage to a degree in the motives for all of the states involved and in the advantages attained. As this paper has illustrated, nuclear threshold status is more subtle and more ambiguous than outright proliferation, and it takes considerable time to sort out the complexities. Yet the world has now had a substantial amount of time to deal with this ambiguous status, and this may tempt more states to exploit it

  1. Domestic violence in a UK abortion clinic: anonymous cross-sectional prevalence survey.

    Science.gov (United States)

    Motta, Silvia; Penn-Kekana, Loveday; Bewley, Susan

    2015-04-01

    To measure the prevalence of domestic violence (DV) experienced by women seeking termination of pregnancy (TOP) in a UK abortion clinic. A cross-sectional anonymous questionnaire survey of all women aged over 16 years accessing a TOP clinic in inner London between 20 May 2012 and 2 July 2012. The main outcome measures were: distribution of questionnaires, response rate, lifetime prevalence of abuse, past-year prevalence of physical and sexual abuse, prevalence of physical abuse during current pregnancy, relationship of lifetime abuse to number of terminations, and receptivity to DV services. Questionnaires were distributed to 46% (383/828) of women accessing the clinic. Response rate was 50% (190/383). Lifetime prevalence of abuse was 16%. Past-year prevalence of physical abuse was 11% and sexual abuse was 4%. Prevalence of physical abuse during the current pregnancy was 4%. Prevalence of lifetime abuse was lower in women having a first termination (12%) versus one (20%) or two or more previous terminations (24%), although this was not statistically significant (p=0.192). The majority (75%) of participants expressing an opinion on the possibility of having a support service for DV in the abortion clinic setting were positive, unrelated to their personal experience, but some concerns were raised about implementation. In order to provide effective support for women, services require a needs assessment of their local population. Asking women presenting for abortion about DV, even anonymously, is challenging but feasible. Future work should be directed to women's unmet safety needs. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  2. What affects your MS? Responses to an anonymous, Internet-based epidemiological survey.

    Science.gov (United States)

    Simmons, Rex D; Ponsonby, Anne-Louise; van der Mei, Ingrid A F; Sheridan, Peter

    2004-04-01

    Evolving information technology has raised the possibility of new methods of data collection in multiple sclerosis (MS) research. An anonymous, self-report, Internet-based survey was developed, which asked people with MS their opinion on how various extrinsic factors affected their condition. From September 2001 to July 2002, a total of 2529 people completed the questionnaire. The demographic and clinical profiles of the anonymous respondents indicated that most were likely to have MS. Common factors reported as beneficial were cannabis, cold baths, meditation and dietary factors. Common adverse factors reported were high stress, exposure to high temperatures and viral infections. There was an increasing report of high temperatures as being adverse with increasing respondent age (test for trend, P < 0.001). The adverse report of high temperatures correlated significantly with the report of strong sunlight apparently making MS worse (r = 0.35, P < 0.0001). In Australia, high temperatures were more likely to be reported as adverse in warmer, lower latitude regions. The association between strong sunlight as adverse and age or region did not persist after adjustment for high temperatures. Thus, this apparent adverse factor appeared to relate to solar heat, not solar light. People with MS may risk vitamin D deficiency because of sun avoidance due to heat-related fatigue or intolerance. This is of clinical significance not only for bone health but because vitamin D may have beneficial immunomodulatory properties. The present study provides new information from people with MS on factors that may influence symptoms or clinical course. This information will now be used in the design of formal epidemiological cohort studies.

  3. Spontaneous onset of Complex Regional Pain Syndrome

    NARCIS (Netherlands)

    de Rooij, A.M.; Perez, R.S.G.M.; Huygen, F.J.; van Eijs, F.; van Kleef, M.; Bauer, M.C.R.; van Hilten, J.J.; Marinus, J.

    2010-01-01

    Complex Regional Pain Syndrome (CRPS) usually develops after a noxious event, but spontaneous onsets have been described in 3-11% of the cases. The existence of spontaneous-onset CRPS is highly debated and the aim of the present study was therefore to compare the phenotypic characteristics of CRPS

  4. Moves on the Street: Classifying Crime Hotspots Using Aggregated Anonymized Data on People Dynamics.

    Science.gov (United States)

    Bogomolov, Andrey; Lepri, Bruno; Staiano, Jacopo; Letouzé, Emmanuel; Oliver, Nuria; Pianesi, Fabio; Pentland, Alex

    2015-09-01

    The wealth of information provided by real-time streams of data has paved the way for life-changing technological advancements, improving the quality of life of people in many ways, from facilitating knowledge exchange to self-understanding and self-monitoring. Moreover, the analysis of anonymized and aggregated large-scale human behavioral data offers new possibilities to understand global patterns of human behavior and helps decision makers tackle problems of societal importance. In this article, we highlight the potential societal benefits derived from big data applications with a focus on citizen safety and crime prevention. First, we introduce the emergent new research area of big data for social good. Next, we detail a case study tackling the problem of crime hotspot classification, that is, the classification of which areas in a city are more likely to witness crimes based on past data. In the proposed approach we use demographic information along with human mobility characteristics as derived from anonymized and aggregated mobile network data. The hypothesis that aggregated human behavioral data captured from the mobile network infrastructure, in combination with basic demographic information, can be used to predict crime is supported by our findings. Our models, built on and evaluated against real crime data from London, obtain accuracy of almost 70% when classifying whether a specific area in the city will be a crime hotspot or not in the following month.

  5. Spatial diversity of spontaneous activity in the cortex

    Directory of Open Access Journals (Sweden)

    Andrew Yong-Yi Tan

    2015-09-01

    Full Text Available The neocortex is a layered sheet across which a basic organization is thought to widely apply. The variety of spontaneous activity patterns is similar throughout the cortex, consistent with the notion of a basic cortical organization. However, the basic organization is only an outline which needs adjustments and additions to account for the structural and functional diversity across cortical layers and areas. Such diversity suggests that spontaneous activity is spatially diverse in any particular behavioral state. Accordingly, this review summarizes the laminar and areal diversity in cortical activity during fixation and slow oscillations, and the effects of attention, anesthesia and plasticity on the cortical distribution of spontaneous activity. Among questions that remain open, characterizing the spatial diversity in spontaneous membrane potential may help elucidate how differences in circuitry among cortical regions supports their varied functions. More work is also needed to understand whether cortical spontaneous activity not only reflects cortical circuitry, but also contributes to determining the outcome of plasticity, so that it is itself a factor shaping the functional diversity of the cortex.

  6. A case of spontaneous coronary artery dissection presenting with acute anterior wall myocardial infarction in a young adult male - an increasingly recognized rare disease.

    Science.gov (United States)

    Taha, Mohamed; Latt, Htun; Al-Khafaji, Jaafar; Ali, Mohamed; Seher, Richard

    2018-01-01

    Background : Spontaneous coronary artery dissection (SCAD) is increasingly recognized as an important cause of myocardial infarction and sudden death. Although some correlations have been noted in relation to aetiology, no direct causes have been identified in a large number of patients. Most of the patients are women in peripartum period or of childbearing age, with few if any risk factors for coronary heart disease. In men, however, risk factors for atherosclerosis are more prevalent in cases of SCAD Case report : We report a case of a 43-years-old healthy male, with no known risk factors, who presented with ischemic chest pain and elevated troponin levels. He underwent an emergent percutaneous transluminal coronary angiography which revealed a total occlusion of the left anterior descending artery at its origin with an evidence of spontaneous dissection as the cause of the occlusion, which was subsequently treated with placement of a drug-eluting stent and thrombectomy from the distal occluded portion. This case highlights the importance of including spontaneous coronary artery dissection as a cause of ischemic cardiac insults and illustrates the approach to treatment. Conclusion : Internists should have a low threshold of clinical suspicion for SCAD especially in a young patient with no known risk factors and should know the importance of emergency in management.

  7. Socioeconomic position and the risk of spontaneous abortion

    DEFF Research Database (Denmark)

    Norsker, Filippa Nyboe; Espenhain, Laura; rogvi, Sofie

    2012-01-01

    To investigate the relationship between different indicators of socioeconomic position and the risk of spontaneous abortion.......To investigate the relationship between different indicators of socioeconomic position and the risk of spontaneous abortion....

  8. Spontaneous indices are inconsistent with arterial baroreflex gain.

    Science.gov (United States)

    Lipman, Ruth D; Salisbury, Julie K; Taylor, J Andrew

    2003-10-01

    Spontaneously occurring, parallel fluctuations in arterial pressure and heart period are frequently used as indices of baroreflex function. Despite the convenience of spontaneous indices, their relation to the arterial baroreflex remains unclear. Therefore, in 97 volunteers, we derived 5 proposed indices (sequence method, alpha-index, transfer function, low-frequency transfer function, and impulse response function), compared them with arterial baroreflex gain (by the modified Oxford pharmacologic technique), and examined their relation to carotid distensibility and respiratory sinus arrhythmia. The subjects comprised men and women (n=41) aged 25 to 86 years, 30% of whom had established coronary artery disease. Generally, the indices were correlated with each other (except alpha-index and low-frequency transfer function) and with baroreflex gain. However, the Bland-Altman method demonstrated that the spontaneous indices had limits of agreement as large as the baroreflex gain itself. Even in individuals within the lowest tertile of baroreflex gain for whom baroreflex gain appears to be the most clinically relevant, spontaneous indices failed to relate to baroreflex gain. In fact, for these individuals, there was no correlation between any index and baroreflex gain. Forward stepwise linear regression showed that all spontaneous indices and baroreflex gain were related to respiratory sinus arrhythmia, but only baroreflex gain was related to carotid distensibility. Therefore, these data suggest that spontaneous indices are inadequate estimates of gain and are inconsistent with arterial baroreflex function.

  9. Threshold Concepts in Finance: Student Perspectives

    Science.gov (United States)

    Hoadley, Susan; Kyng, Tim; Tickle, Leonie; Wood, Leigh N.

    2015-01-01

    Finance threshold concepts are the essential conceptual knowledge that underpin well-developed financial capabilities and are central to the mastery of finance. In this paper we investigate threshold concepts in finance from the point of view of students, by establishing the extent to which students are aware of threshold concepts identified by…

  10. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

    Science.gov (United States)

    Hernández-Ramos, José L.; Bernabe, Jorge Bernal; Moreno, M. Victoria; Skarmeta, Antonio F.

    2015-01-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things. PMID:26140349

  11. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

    Directory of Open Access Journals (Sweden)

    José L. Hernández-Ramos

    2015-07-01

    Full Text Available As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  12. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

    Science.gov (United States)

    Hernández-Ramos, José L; Bernabe, Jorge Bernal; Moreno, M Victoria; Skarmeta, Antonio F

    2015-07-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  13. Effects of Cultural Orientation on Attitude Toward Anonymity in E-Collaboration

    Science.gov (United States)

    Zhong, Yingqin; Liu, Na; Lim, John

    The important role of attitude in the acceptance and diffusion of technology has been widely acknowledged. Greater research efforts have been called for examining the relationships between cultural variables and attitude toward technology. In this regard, this study investigates the impact of cultural orientation (focusing on an individual's degree of collectivism) on attitude toward e-collaboration technology. A theoretical model is proposed and subsequently tested using a questionnaire survey involving 236 data points. Self-reliance, competitive success, and group work orientation are found as significant indicators reflecting an individual's degree of collectivism, which in turn influences willingness to participate, evaluation of collaborative effort, and preference for anonymity feature. Subsequently, the three variables are found to affect perceptions about decision quality, enjoyment, uncertainty, and pressure in e-collaboration.

  14. Thresholding magnetic resonance images of human brain

    Institute of Scientific and Technical Information of China (English)

    Qing-mao HU; Wieslaw L NOWINSKI

    2005-01-01

    In this paper, methods are proposed and validated to determine low and high thresholds to segment out gray matter and white matter for MR images of different pulse sequences of human brain. First, a two-dimensional reference image is determined to represent the intensity characteristics of the original three-dimensional data. Then a region of interest of the reference image is determined where brain tissues are present. The non-supervised fuzzy c-means clustering is employed to determine: the threshold for obtaining head mask, the low threshold for T2-weighted and PD-weighted images, and the high threshold for T1-weighted, SPGR and FLAIR images. Supervised range-constrained thresholding is employed to determine the low threshold for T1-weighted, SPGR and FLAIR images. Thresholding based on pairs of boundary pixels is proposed to determine the high threshold for T2- and PD-weighted images. Quantification against public data sets with various noise and inhomogeneity levels shows that the proposed methods can yield segmentation robust to noise and intensity inhomogeneity. Qualitatively the proposed methods work well with real clinical data.

  15. Near threshold fatigue testing

    Science.gov (United States)

    Freeman, D. C.; Strum, M. J.

    1993-01-01

    Measurement of the near-threshold fatigue crack growth rate (FCGR) behavior provides a basis for the design and evaluation of components subjected to high cycle fatigue. Typically, the near-threshold fatigue regime describes crack growth rates below approximately 10(exp -5) mm/cycle (4 x 10(exp -7) inch/cycle). One such evaluation was recently performed for the binary alloy U-6Nb. The procedures developed for this evaluation are described in detail to provide a general test method for near-threshold FCGR testing. In particular, techniques for high-resolution measurements of crack length performed in-situ through a direct current, potential drop (DCPD) apparatus, and a method which eliminates crack closure effects through the use of loading cycles with constant maximum stress intensity are described.

  16. Distinct spontaneous shrinkage of a sporadic vestibular schwannoma

    DEFF Research Database (Denmark)

    Huang, Xiaowen; Cayé-Thomasen, Per; Stangerup, Sven-Eric

    2013-01-01

    on "shrinkage" or "negative growth" or "regression" or "involution" of the tumor were selected, and the contents on the rate, extent and mechanism of spontaneous tumor shrinkage were extracted and reviewed. The reported rate of spontaneous shrinkage of vestibular schwannoma is 5-10% of patients managed......We present a case with outspoken spontaneous vestibular schwannoma shrinkage and review the related literature. The patient was initially diagnosed with a left-sided, intrameatal vestibular schwannoma, which subsequently grew into the cerebello-pontine angle (CPA), followed by total shrinkage...... of the CPA component without any intervention over a 12-year observation period. The literature on spontaneous tumor shrinkage was retrieved by searching the subject terms "vestibular schwannoma, conservative management" in PubMed/MEDLINE database, without a time limit. Of the published data, the articles...

  17. Spontaneous breathing during lung-protective ventilation in an experimental acute lung injury model: high transpulmonary pressure associated with strong spontaneous breathing effort may worsen lung injury.

    Science.gov (United States)

    Yoshida, Takeshi; Uchiyama, Akinori; Matsuura, Nariaki; Mashimo, Takashi; Fujino, Yuji

    2012-05-01

    We investigated whether potentially injurious transpulmonary pressure could be generated by strong spontaneous breathing and exacerbate lung injury even when plateau pressure is limited to ventilation, each combined with weak or strong spontaneous breathing effort. Inspiratory pressure for low tidal volume ventilation was set at 10 cm H2O and tidal volume at 6 mL/kg. For moderate tidal volume ventilation, the values were 20 cm H2O and 7-9 mL/kg. The groups were: low tidal volume ventilation+spontaneous breathingweak, low tidal volume ventilation+spontaneous breathingstrong, moderate tidal volume ventilation+spontaneous breathingweak, and moderate tidal volume ventilation+spontaneous breathingstrong. Each group had the same settings for positive end-expiratory pressure of 8 cm H2O. Respiratory variables were measured every 60 mins. Distribution of lung aeration and alveolar collapse were histologically evaluated. Low tidal volume ventilation+spontaneous breathingstrong showed the most favorable oxygenation and compliance of respiratory system, and the best lung aeration. By contrast, in moderate tidal volume ventilation+spontaneous breathingstrong, the greatest atelectasis with numerous neutrophils was observed. While we applied settings to maintain plateau pressure at ventilation+spontaneous breathingstrong, transpulmonary pressure rose >33 cm H2O. Both minute ventilation and respiratory rate were higher in the strong spontaneous breathing groups. Even when plateau pressure is limited to mechanical ventilation, transpulmonary pressure and tidal volume should be strictly controlled to prevent further lung injury.

  18. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  19. The Definition of a Prolonged Intensive Care Unit Stay for Spontaneous Intracerebral Hemorrhage Patients: An Application with National Health Insurance Research Database

    Directory of Open Access Journals (Sweden)

    Chien-Lung Chan

    2014-01-01

    Full Text Available Introduction. Length of stay (LOS in the intensive care unit (ICU of spontaneous intracerebral hemorrhage (sICH patients is one of the most important issues. The disease severity, psychosocial factors, and institutional factors will influence the length of ICU stay. This study is used in the Taiwan National Health Insurance Research Database (NHIRD to define the threshold of a prolonged ICU stay in sICH patients. Methods. This research collected the demographic data of sICH patients in the NHIRD from 2005 to 2009. The threshold of prolonged ICU stay was calculated using change point analysis. Results. There were 1599 sICH patients included. A prolonged ICU stay was defined as being equal to or longer than 10 days. There were 436 prolonged ICU stay cases and 1163 nonprolonged cases. Conclusion. This study showed that the threshold of a prolonged ICU stay is a good indicator of hospital utilization in ICH patients. Different hospitals have their own different care strategies that can be identified with a prolonged ICU stay. This indicator can be improved using quality control methods such as complications prevention and efficiency of ICU bed management. Patients’ stay in ICUs and in hospitals will be shorter if integrated care systems are established.

  20. Sources of variation and genetic profile of spontaneous, out-of-season ovulatory activity in the Chios sheep

    Directory of Open Access Journals (Sweden)

    Kouttos Athanasios

    2003-01-01

    Full Text Available Abstract Organising the breeding plan of a seasonally breeding species, such as sheep, presents a challenge to farmers and the industry as a whole, since both economical and biological considerations need to be carefully balanced. Understanding the breeding activity of individual animals becomes a prerequisite for a successful breeding program. This study set out to investigate the sources of variation and the genetic profile of the spontaneous, out-of-season ovulatory activity of ewes of the Chios dairy sheep breed in Greece. The definition of the trait was based on blood progesterone levels, measured before exposing the ewes to rams, which marks the onset of the usual breeding season. Data were 707 records, taken over two consecutive years, of 435 ewes kept at the Agricultural Research Station of Chalkidiki in northern Greece. When all available pedigree was included, the total number of animals involved was 1068. On average, 29% of all ewes exhibited spontaneous, out-of-season ovulatory activity, with no substantial variation between the years. Significant sources of systematic variation were the ewe age and live weight, and the month of previous lambing. Older, heavier ewes, that had lambed early the previous autumn, exhibited more frequent activity. Heritability estimates were 0.216 (± 0.084 with a linear and 0.291 with a threshold model. The latter better accounts for the categorical nature of the trait. The linear model repeatability was 0.230 (± 0.095. The results obtained in this study support the notion that spontaneous out-of-season ovulatory activity can be considered in the development of a breeding plan for the Chios sheep breed.

  1. Inseminação artificial e anonimato do doador Artificial insemination and donor anonymity

    Directory of Open Access Journals (Sweden)

    Maria do Carmo Demasi Wanssa

    2010-12-01

    Full Text Available Através desse trabalho, objetiva-se abordar o tema de doação de gametas e do anonimato envolvendo este ato na reprodução medicamente assistida. Analisando rapidamente o caráter técnico da doação e seleção dos gametas e a necessidade de uma legislação específica sobre o assunto nos diferentes países do mundo que adotaram esse método, diante da pluralidade social existente. Consideram-se os aspectos éticos e legais vigentes no Brasil ditados pela Resolução do Conselho Federal de Medicina n° 1.358/93 que determina as condutas dos médicos brasileiros e define, dentre outros aspectos, o da doação e do anonimato, envolvendo o aspecto autonomia. A necessidade de proteção dos sujeitos através do termo de consentimento informado ou de recusa informada, permitindo garantir a informação e esclarecimento necessário ao casal que decide submeter-se aos planos de reprodução medicamente assistida assim como ao doador que, por sua vez, também deve dar garantias escritas quanto à espontaneidade e à alienação dos direitos sobre os gametas à instituição que se torna a responsável por estes. Tudo isso, aliado à veracidade e confidencialidade, compõe os elementos fundamentais para a manutenção do anonimato entre o doador e o receptor. Anonimato este, ainda muito discutido pelos estudiosos de diversas áreas e países.This article aims to address the issue of the donation of gametes and the anonymity involved in this act of medically-assisted reproduction. It briefly discusses the technical aspects of the donation and selection of gametes and the need for specific legislation on the issue in various countries that have adopted this method, in view of the plurality of different social systems in the world today. The article addresses the legal and ethical issues that are currently being aired in Brazil, and the rulings contained in the Federal Medical Council Resolution 1,358/93, which rules on the conduct of physicians in

  2. At-Risk-of-Poverty Threshold

    Directory of Open Access Journals (Sweden)

    Táňa Dvornáková

    2012-06-01

    Full Text Available European Statistics on Income and Living Conditions (EU-SILC is a survey on households’ living conditions. The main aim of the survey is to get long-term comparable data on social and economic situation of households. Data collected in the survey are used mainly in connection with the evaluation of income poverty and determinationof at-risk-of-poverty rate. This article deals with the calculation of the at risk-of-poverty threshold based on data from EU-SILC 2009. The main task is to compare two approaches to the computation of at riskof-poverty threshold. The first approach is based on the calculation of the threshold for each country separately,while the second one is based on the calculation of the threshold for all states together. The introduction summarizes common attributes in the calculation of the at-risk-of-poverty threshold, such as disposable household income, equivalised household income. Further, different approaches to both calculations are introduced andadvantages and disadvantages of these approaches are stated. Finally, the at-risk-of-poverty rate calculation is described and comparison of the at-risk-of-poverty rates based on these two different approaches is made.

  3. Anonymization of Court Decisions: Are Restrictions on the Right to Information in “Accordance with the Law”?

    Directory of Open Access Journals (Sweden)

    Gruodytė Edita

    2016-12-01

    Full Text Available In Lithuania rules for the anonymization of court decisions were introduced in 2005. These rules require automatic anonymization of all court decisions, which in the opinion of the authors violates the public interest to know and freedom of expression is unjustifiably restricted on behalf of the right to privacy. This issue covers two diametrically opposed human rights: the right to privacy and the right to information. The first question is how the balance between two equivalent rights could be reached. The second question is whether this regulation is in accordance with the law as it is established in the national Constitution and revealed by the Constitutional Court of the Republic of Lithuania and developed by the jurisprudence of the European Court of Human Rights. The authors conclude that the legislator is not empowered to delegate to the Judicial Council issues which are a matter of legal regulation and suggest possible solutions evaluating practice of the Court of Justice of the European Union, the European Court of Human Rights, and selected EU countries.

  4. Cigarette, alcohol, and caffeine consumption: risk factors for spontaneous abortion

    DEFF Research Database (Denmark)

    Rasch, Vibeke

    2003-01-01

    OBJECTIVE: To study the association between cigarette, alcohol, and caffeine consumption and the occurrence of spontaneous abortion. METHODS: The study population consisted of 330 women with spontaneous abortion and 1168 pregnant women receiving antenatal care. A case-control design was utilized;...... units alcohol per week and 375 mg or more caffeine per day during pregnancy may increase the risk of spontaneous abortion.......OBJECTIVE: To study the association between cigarette, alcohol, and caffeine consumption and the occurrence of spontaneous abortion. METHODS: The study population consisted of 330 women with spontaneous abortion and 1168 pregnant women receiving antenatal care. A case-control design was utilized......; cases were defined as women with a spontaneous abortion in gestational week 6-16 and controls as women with a live fetus in gestational week 6-16. The variables studied comprise age, parity, occupational situation, cigarette, alcohol, and caffeine consumption. The association between cigarette, alcohol...

  5. Spontaneous Hedonic Reactions to Social Media Cues.

    Science.gov (United States)

    van Koningsbruggen, Guido M; Hartmann, Tilo; Eden, Allison; Veling, Harm

    2017-05-01

    Why is it so difficult to resist the desire to use social media? One possibility is that frequent social media users possess strong and spontaneous hedonic reactions to social media cues, which, in turn, makes it difficult to resist social media temptations. In two studies (total N = 200), we investigated less-frequent and frequent social media users' spontaneous hedonic reactions to social media cues using the Affect Misattribution Procedure-an implicit measure of affective reactions. Results demonstrated that frequent social media users showed more favorable affective reactions in response to social media (vs. control) cues, whereas less-frequent social media users' affective reactions did not differ between social media and control cues (Studies 1 and 2). Moreover, the spontaneous hedonic reactions to social media (vs. control) cues were related to self-reported cravings to use social media and partially accounted for the link between social media use and social media cravings (Study 2). These findings suggest that frequent social media users' spontaneous hedonic reactions in response to social media cues might contribute to their difficulties in resisting desires to use social media.

  6. Bidirectional threshold switching characteristics in Ag/ZrO2/Pt electrochemical metallization cells

    Directory of Open Access Journals (Sweden)

    Gang Du

    2016-08-01

    Full Text Available A bidirectional threshold switching (TS characteristic was demonstrated in Ag/ZrO2/Pt electrochemical metallization cells by using the electrochemical active Ag electrode and appropriate programming operation strategies The volatile TS was stable and reproducible and the rectify ratio could be tuned to ∼107 by engineering the compliance current. We infer that the volatile behavior is essentially due to the moisture absorption in the electron beam evaporated films, which remarkably improved the anodic oxidation as well as the migration of Ag+ ions. The resultant electromotive force would act as a driving force for the metal filaments dissolution, leading to the spontaneous volatile characteristics. Moreover, conductance quantization behaviors were also achieved owing to formation and annihilation of atomic scale metal filaments in the film matrix. Our results illustrate that the Ag/ZrO2/Pt device with superior TS performances is a promising candidate for selector applications in passive crossbar arrays.

  7. Summary of DOE threshold limits efforts

    International Nuclear Information System (INIS)

    Wickham, L.E.; Smith, C.F.; Cohen, J.J.

    1987-01-01

    The Department of Energy (DOE) has been developing the concept of threshold quantities for use in determining which waste materials may be disposed of as nonradioactive waste in DOE sanitary landfills. Waste above a threshold level could be managed as radioactive or mixed waste (if hazardous chemicals are present); waste below this level would be handled as sanitary waste. After extensive review of a draft threshold guidance document in 1985, a second draft threshold background document was produced in March 1986. The second draft included a preliminary cost-benefit analysis and quality assurance considerations. The review of the second draft has been completed. Final changes to be incorporated include an in-depth cost-benefit analysis of two example sites and recommendations of how to further pursue (i.e. employ) the concept of threshold quantities within the DOE. 3 references

  8. On the existence of a threshold for preventive behavioral responses to suppress epidemic spreading.

    Science.gov (United States)

    Sahneh, Faryad Darabi; Chowdhury, Fahmida N; Scoglio, Caterina M

    2012-01-01

    The spontaneous behavioral responses of individuals to the progress of an epidemic are recognized to have a significant impact on how the infection spreads. One observation is that, even if the infection strength is larger than the classical epidemic threshold, the initially growing infection can diminish as the result of preventive behavioral patterns adopted by the individuals. In order to investigate such dynamics of the epidemic spreading, we use a simple behavioral model coupled with the individual-based SIS epidemic model where susceptible individuals adopt a preventive behavior when sensing infection. We show that, given any infection strength and contact topology, there exists a region in the behavior-related parameter space such that infection cannot survive in long run and is completely contained. Several simulation results, including a spreading scenario in a realistic contact network from a rural district in the State of Kansas, are presented to support our analytical arguments.

  9. Spontaneous globe luxation associated with chronic obstructive pulmonary disease

    Directory of Open Access Journals (Sweden)

    M Ashok Kumar

    2012-01-01

    Full Text Available Spontaneous globe luxation is a rarely reported condition which can lead to complications like optic neuropathy. Common causes are thyroid eye disease, shallow orbit and floppy eyelid syndrome. We report a case of spontaneous globe luxation with the onset and severity associated with chronic obstructive pulmonary disease (COPD. To our knowledge, this is the first case of spontaneous globe luxation associated with COPD.

  10. Parton distributions with threshold resummation

    CERN Document Server

    Bonvini, Marco; Rojo, Juan; Rottoli, Luca; Ubiali, Maria; Ball, Richard D.; Bertone, Valerio; Carrazza, Stefano; Hartland, Nathan P.

    2015-01-01

    We construct a set of parton distribution functions (PDFs) in which fixed-order NLO and NNLO calculations are supplemented with soft-gluon (threshold) resummation up to NLL and NNLL accuracy respectively, suitable for use in conjunction with any QCD calculation in which threshold resummation is included at the level of partonic cross sections. These resummed PDF sets, based on the NNPDF3.0 analysis, are extracted from deep-inelastic scattering, Drell-Yan, and top quark pair production data, for which resummed calculations can be consistently used. We find that, close to threshold, the inclusion of resummed PDFs can partially compensate the enhancement in resummed matrix elements, leading to resummed hadronic cross-sections closer to the fixed-order calculation. On the other hand, far from threshold, resummed PDFs reduce to their fixed-order counterparts. Our results demonstrate the need for a consistent use of resummed PDFs in resummed calculations.

  11. Effect of threshold quantization in opportunistic splitting algorithm

    KAUST Repository

    Nam, Haewoon

    2011-12-01

    This paper discusses algorithms to find the optimal threshold and also investigates the impact of threshold quantization on the scheduling outage performance of the opportunistic splitting scheduling algorithm. Since this algorithm aims at finding the user with the highest channel quality within the minimal number of mini-slots by adjusting the threshold every mini-slot, optimizing the threshold is of paramount importance. Hence, in this paper we first discuss how to compute the optimal threshold along with two tight approximations for the optimal threshold. Closed-form expressions are provided for those approximations for simple calculations. Then, we consider linear quantization of the threshold to take the limited number of bits for signaling messages in practical systems into consideration. Due to the limited granularity for the quantized threshold value, an irreducible scheduling outage floor is observed. The numerical results show that the two approximations offer lower scheduling outage probability floors compared to the conventional algorithm when the threshold is quantized. © 2006 IEEE.

  12. Surgical management of spontaneous hypertensive brainstem hemorrhage

    Directory of Open Access Journals (Sweden)

    Bal Krishna Shrestha

    2015-09-01

    Full Text Available Spontaneous hypertensive brainstem hemorrhage is the spontaneous brainstem hemorrhage associated with long term hypertension but not having definite focal or objective lesion. It is a catastrophic event which has a poor prognosis and usually managed conservatively. It is not uncommon, especially in eastern Asian populations, accounting approximately for 10% of the intracerebral hemorrhage. Before the advent of computed tomography, the diagnosis of brainstem hemorrhage was usually based on the clinical picture or by autopsy and believed to be untreatable via surgery. The introduction of computed tomography permitted to categorize the subtypes of brainstem hemorrhage with more predicted outcome. Continuous ongoing developments in the stereotactic surgery and microsurgery have added more specific surgical management in these patients. However, whether to manage conservatively or promptly with surgical evacuation of hematoma is still a controversy. Studies have shown that an accurate prognostic assessment based on clinical and radiological features on admission is critical for establishing a reasonable therapeutic approach. Some authors have advocate conservative management, whereas others have suggested the efficacy of surgical treatment in brainstem hemorrhage. With the widening knowledge in microsurgical techniques as well as neuroimaging technology, there seems to have more optimistic hope of surgical management of spontaneous hypertensive brainstem hemorrhage for better prognosis. Here we present five cases of severe spontaneous hypertensive brainstem hemorrhage patients who had undergone surgery; and explore the possibilities of surgical management in patients with the spontaneous hypertensive brainstem hemorrhage.

  13. Active hippocampal networks undergo spontaneous synaptic modification.

    Directory of Open Access Journals (Sweden)

    Masako Tsukamoto-Yasui

    Full Text Available The brain is self-writable; as the brain voluntarily adapts itself to a changing environment, the neural circuitry rearranges its functional connectivity by referring to its own activity. How the internal activity modifies synaptic weights is largely unknown, however. Here we report that spontaneous activity causes complex reorganization of synaptic connectivity without any external (or artificial stimuli. Under physiologically relevant ionic conditions, CA3 pyramidal cells in hippocampal slices displayed spontaneous spikes with bistable slow oscillations of membrane potential, alternating between the so-called UP and DOWN states. The generation of slow oscillations did not require fast synaptic transmission, but their patterns were coordinated by local circuit activity. In the course of generating spontaneous activity, individual neurons acquired bidirectional long-lasting synaptic modification. The spontaneous synaptic plasticity depended on a rise in intracellular calcium concentrations of postsynaptic cells, but not on NMDA receptor activity. The direction and amount of the plasticity varied depending on slow oscillation patterns and synapse locations, and thus, they were diverse in a network. Once this global synaptic refinement occurred, the same neurons now displayed different patterns of spontaneous activity, which in turn exhibited different levels of synaptic plasticity. Thus, active networks continuously update their internal states through ongoing synaptic plasticity. With computational simulations, we suggest that with this slow oscillation-induced plasticity, a recurrent network converges on a more specific state, compared to that with spike timing-dependent plasticity alone.

  14. Shared risk aversion in spontaneous and induced abortion

    DEFF Research Database (Denmark)

    Catalano, Ralph; Bruckner, Tim A.; Karasek, Deborah

    2016-01-01

    spontaneous and non-clinically indicated induced abortions. This suggests, consistent with our theory, that mothers of conception cohorts that yielded more spontaneous abortions than expected opted more frequently than expected for non-clinically indicated induced abortion. LIMITATIONS, REASONS FOR CAUTION...

  15. Spontaneous passage of long, sharp gastrointestinal foreign body in a child.

    Science.gov (United States)

    Karthikeyan, Vilvapathy Senguttuvan; Ansari, Mohammed Gaffoor; Suresh, Ramasamy; Easwaran, Bettaiyagowder

    2015-01-19

    Foreign body (FB) ingestion is a common problem in children. Up to 90% of these FBs pass spontaneously. FBs reaching the stomach usually pass out spontaneously. Exceptions to this spontaneous passage include a long FB that cannot cross the pylorus, duodenum or ileocaecal junction. We present a case of a 9-year boy who accidentally ingested a long paper pin, which spontaneously passed in 26 h. This case is being reported to highlight the successful spontaneous passage of a 4 cm long sharp foreign body in a child. 2015 BMJ Publishing Group Ltd.

  16. Detection of target phonemes in spontaneous and read speech

    OpenAIRE

    Mehta, G.; Cutler, A.

    1988-01-01

    Although spontaneous speech occurs more frequently in most listeners’ experience than read speech, laboratory studies of human speech recognition typically use carefully controlled materials read from a script. The phonological and prosodic characteristics of spontaneous and read speech differ considerably, however, which suggests that laboratory results may not generalize to the recognition of spontaneous and read speech materials, and their response time to detect word-initial target phonem...

  17. Spontaneous Splenic Rupture in Melanoma

    Directory of Open Access Journals (Sweden)

    Hadi Mirfazaelian

    2014-01-01

    Full Text Available Spontaneous rupture of spleen due to malignant melanoma is a rare situation, with only a few case reports in the literature. This study reports a previously healthy, 30-year-old man who came with chief complaint of acute abdominal pain to emergency room. On physical examination, abdominal tenderness and guarding were detected to be coincident with hypotension. Ultrasonography revealed mild splenomegaly with moderate free fluid in abdominopelvic cavity. Considering acute abdominal pain and hemodynamic instability, he underwent splenectomy with splenic rupture as the source of bleeding. Histologic examination showed diffuse infiltration by tumor. Immunohistochemical study (positive for S100, HMB45, and vimentin and negative for CK, CD10, CK20, CK7, CD30, LCA, EMA, and chromogranin confirmed metastatic malignant melanoma. On further questioning, there was a past history of a nasal dark skin lesion which was removed two years ago with no pathologic examination. Spontaneous (nontraumatic rupture of spleen is an uncommon situation and it happens very rarely due to neoplastic metastasis. Metastasis of malignant melanoma is one of the rare causes of the spontaneous rupture of spleen.

  18. Finding God through the Spirituality of the 12 Steps of Alcoholics Anonymous

    Directory of Open Access Journals (Sweden)

    Jeff Sandoz

    2014-09-01

    Full Text Available The 12 Step program of Alcoholics Anonymous has provided relief for individuals recovering from alcoholism for over 75 years. The key to the recovery process is a spiritual experience as the result of practicing the daily discipline of the 12 Steps, a process which evokes a psychic change sufficient to recover from this disease. Although a relatively new spiritual discipline, the 12 Step program is built upon a foundation of much older and more traditional paths to God including devotion, understanding, service and meditation. Recent research provides insights into the 12 Step program. Specifically, the path of recovery is highlighted by the reduction of resentment and the promotion of forgiveness which are key factors of recovery.

  19. On the Anonymity Risk of Time-Varying User Profiles

    Directory of Open Access Journals (Sweden)

    Silvia Puglisi

    2017-04-01

    Full Text Available Websites and applications use personalisation services to profile their users, collect their patterns and activities and eventually use this data to provide tailored suggestions. User preferences and social interactions are therefore aggregated and analysed. Every time a user publishes a new post or creates a link with another entity, either another user, or some online resource, new information is added to the user profile. Exposing private data does not only reveal information about single users’ preferences, increasing their privacy risk, but can expose more about their network that single actors intended. This mechanism is self-evident in social networks where users receive suggestions based on their friends’ activities. We propose an information-theoretic approach to measure the differential update of the anonymity risk of time-varying user profiles. This expresses how privacy is affected when new content is posted and how much third-party services get to know about the users when a new activity is shared. We use actual Facebook data to show how our model can be applied to a real-world scenario.

  20. Q-feber som årsag til spontan abort

    DEFF Research Database (Denmark)

    Nielsen, Stine Yde; Mølbak, Kåre; Hjøllund, Niels Henrik

    2011-01-01

    Q-fever is a zoonotic infection. Pregnant women constitute a specific risk group as the infection may cause spontaneous abortion, intrauterine death, growth retardation, oligohydramnios and premature birth. A 39 year-old veterinarian had a spontaneous abortion in pregnancy week seven. During the ...

  1. Log canonical thresholds of smooth Fano threefolds

    International Nuclear Information System (INIS)

    Cheltsov, Ivan A; Shramov, Konstantin A

    2008-01-01

    The complex singularity exponent is a local invariant of a holomorphic function determined by the integrability of fractional powers of the function. The log canonical thresholds of effective Q-divisors on normal algebraic varieties are algebraic counterparts of complex singularity exponents. For a Fano variety, these invariants have global analogues. In the former case, it is the so-called α-invariant of Tian; in the latter case, it is the global log canonical threshold of the Fano variety, which is the infimum of log canonical thresholds of all effective Q-divisors numerically equivalent to the anticanonical divisor. An appendix to this paper contains a proof that the global log canonical threshold of a smooth Fano variety coincides with its α-invariant of Tian. The purpose of the paper is to compute the global log canonical thresholds of smooth Fano threefolds (altogether, there are 105 deformation families of such threefolds). The global log canonical thresholds are computed for every smooth threefold in 64 deformation families, and the global log canonical thresholds are computed for a general threefold in 20 deformation families. Some bounds for the global log canonical thresholds are computed for 14 deformation families. Appendix A is due to J.-P. Demailly.

  2. Spontaneously broken global symmetries and cosmology

    International Nuclear Information System (INIS)

    Shafi, Q.; Vilenkin, A.

    1984-01-01

    Phase transitions associated with spontaneously broken global symmetries, in case these occur in nature, can have important cosmological implications. This is illustrated through two examples. The first one shows how the spontaneous breaking of a global U(1) symmetry, present, for instance, in the minimal SU(5) model, can lead to an inflationary phase. The second example illustrates how topologically stable strings associated with the breaking of U(1) symmetry make an appearance at (or near) the end of the inflationary era

  3. Flow Friction or Spontaneous Ignition?

    Science.gov (United States)

    Stoltzfus, Joel M.; Gallus, Timothy D.; Sparks, Kyle

    2012-01-01

    "Flow friction," a proposed ignition mechanism in oxygen systems, has proved elusive in attempts at experimental verification. In this paper, the literature regarding flow friction is reviewed and the experimental verification attempts are briefly discussed. Another ignition mechanism, a form of spontaneous combustion, is proposed as an explanation for at least some of the fire events that have been attributed to flow friction in the literature. In addition, the results of a failure analysis performed at NASA Johnson Space Center White Sands Test Facility are presented, and the observations indicate that spontaneous combustion was the most likely cause of the fire in this 2000 psig (14 MPa) oxygen-enriched system.

  4. Spontaneously broken abelian gauge invariant supersymmetric model

    International Nuclear Information System (INIS)

    Mainland, G.B.; Tanaka, K.

    A model is presented that is invariant under an Abelian gauge transformation and a modified supersymmetry transformation. This model is broken spontaneously, and the interplay between symmetry breaking, Goldstone particles, and mass breaking is studied. In the present model, spontaneously breaking the Abelian symmetry of the vacuum restores the invariance of the vacuum under a modified supersymmetry transformation. (U.S.)

  5. Spontaneous Perforation of Pyometra: A Case Report

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Pyometra is the accumulation of purulent material in the uterine cavity. Its reported incidence is 0.01–0.5% in gynecologic patients; however, as far as elderly patients are concerned, its incidence is 13.6% [3]. The most common cause of pyometra is malignant diseases of genital tract and the consequences of their treatment (radiotherapy. Other causes are benign tumors like leiomyoma, endometrial polyps, senile cervicitis, cervical occlusion after surgery, puerperal infections, and congenital cervical anomalies. Spontaneous rupture of the uterus is an extremely rare complication of pyometra. To our knowledge, only 21 cases of spontaneous perforation of pyometra have been reported in English literature since 1980. This paper reports an additional case of spontaneous uterine rupture.

  6. Serotonin inhibits low-threshold spike interneurons in the striatum

    Science.gov (United States)

    Cains, Sarah; Blomeley, Craig P; Bracci, Enrico

    2012-01-01

    Low-threshold spike interneurons (LTSIs) are important elements of the striatal architecture and the only known source of nitric oxide in this nucleus, but their rarity has so far prevented systematic studies. Here, we used transgenic mice in which green fluorescent protein is expressed under control of the neuropeptide Y (NPY) promoter and striatal NPY-expressing LTSIs can be easily identified, to investigate the effects of serotonin on these neurons. In sharp contrast with its excitatory action on other striatal interneurons, serotonin (30 μm) strongly inhibited LTSIs, reducing or abolishing their spontaneous firing activity and causing membrane hyperpolarisations. These hyperpolarisations persisted in the presence of tetrodotoxin, were mimicked by 5-HT2C receptor agonists and reversed by 5-HT2C antagonists. Voltage-clamp slow-ramp experiments showed that serotonin caused a strong increase in an outward current activated by depolarisations that was blocked by the specific M current blocker XE 991. In current-clamp experiments, XE 991 per se caused membrane depolarisations in LTSIs and subsequent application of serotonin (in the presence of XE 991) failed to affect these neurons. We concluded that serotonin strongly inhibits striatal LTSIs acting through postsynaptic 5-HT2C receptors and increasing an M type current. PMID:22495583

  7. Spontaneous regression of metastases from malignant melanoma: a case report

    DEFF Research Database (Denmark)

    Kalialis, Louise V; Drzewiecki, Krzysztof T; Mohammadi, Mahin

    2008-01-01

    A case of a 61-year-old male with widespread metastatic melanoma is presented 5 years after complete spontaneous cure. Spontaneous regression occurred in cutaneous, pulmonary, hepatic and cerebral metastases. A review of the literature reveals seven cases of regression of cerebral metastases......; this report is the first to document complete spontaneous regression of cerebral metastases from malignant melanoma by means of computed tomography scans. Spontaneous regression is defined as the partial or complete disappearance of a malignant tumour in the absence of all treatment or in the presence...

  8. Novel folliculin (FLCN) mutation and familial spontaneous pneumothorax.

    Science.gov (United States)

    Zhu, J-F; Shen, X-Q; Zhu, F; Tian, L

    2017-01-01

    Familial spontaneous pneumothorax is one of the characteristics of Birt-Hogg-Dubé syndrome (BHDS), which is an autosomal dominant disease caused by the mutation of folliculin (FLCN). To investigate the mutation of FLCN gene in a familial spontaneous pneumothorax. Prospective case study. Clinical and genetic data of a Chinese family with four patients who presented spontaneous pneumothorax in the absence of skin lesions or renal tumors were collected. CT scan of patient's lung was applied for observation of pneumothorax. DNA sequencing of the coding exons (4-14 exons) of FLCN was performed for all 11 members of the family and 100 unrelated healthy controls. CT scan of patient's lung showed spontaneous pneumothorax. A mutation (c. 510C > G) that leads to a premature stop codon (p. Y170X) was found in the proband using DNA sequencing of coding exons (4-14 exons) of FLCN. This mutation was also observed in the other affected members of the family. A nonsense mutation of FLCN was found in a spontaneous pneumothorax family. Our results expand the mutational spectrum of FLCN in patients with BHDS. © The Author 2016. Published by Oxford University Press on behalf of the Association of Physicians. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  9. Threshold Concepts and Information Literacy

    Science.gov (United States)

    Townsend, Lori; Brunetti, Korey; Hofer, Amy R.

    2011-01-01

    What do we teach when we teach information literacy in higher education? This paper describes a pedagogical approach to information literacy that helps instructors focus content around transformative learning thresholds. The threshold concept framework holds promise for librarians because it grounds the instructor in the big ideas and underlying…

  10. Long-Term Influence of Duration and Frequency of Participation in Alcoholics Anonymous on Individuals With Alcohol Use Disorders.

    Science.gov (United States)

    Moos, Rudolf H.; Moos, Bernice S.

    2004-01-01

    This study examined the influence of the duration and frequency of a baseline episode of participation in Alcoholics Anonymous (AA) among 473 individuals with alcohol use disorders on 1-year and 8-year outcomes and the effect of additional participation and delayed participation on outcomes. Compared with individuals who did not participate,…

  11. A Threshold Continuum for Aeolian Sand Transport

    Science.gov (United States)

    Swann, C.; Ewing, R. C.; Sherman, D. J.

    2015-12-01

    The threshold of motion for aeolian sand transport marks the initial entrainment of sand particles by the force of the wind. This is typically defined and modeled as a singular wind speed for a given grain size and is based on field and laboratory experimental data. However, the definition of threshold varies significantly between these empirical models, largely because the definition is based on visual-observations of initial grain movement. For example, in his seminal experiments, Bagnold defined threshold of motion when he observed that 100% of the bed was in motion. Others have used 50% and lesser values. Differences in threshold models, in turn, result is large errors in predicting the fluxes associated with sand and dust transport. Here we use a wind tunnel and novel sediment trap to capture the fractions of sand in creep, reptation and saltation at Earth and Mars pressures and show that the threshold of motion for aeolian sand transport is best defined as a continuum in which grains progress through stages defined by the proportion of grains in creep and saltation. We propose the use of scale dependent thresholds modeled by distinct probability distribution functions that differentiate the threshold based on micro to macro scale applications. For example, a geologic timescale application corresponds to a threshold when 100% of the bed in motion whereas a sub-second application corresponds to a threshold when a single particle is set in motion. We provide quantitative measurements (number and mode of particle movement) corresponding to visual observations, percent of bed in motion and degrees of transport intermittency for Earth and Mars. Understanding transport as a continuum provides a basis for revaluating sand transport thresholds on Earth, Mars and Titan.

  12. Imaging of early spontaneous osteonecrosis and osteoarthritis of the knee

    International Nuclear Information System (INIS)

    Kusayama, Takeshi; Tomatsu, Taisuke

    1999-01-01

    In this paper, the available of MRI in diagnosis on early spontaneous osteonecrosis and osteoarthritis was investigated. Subjects were 5 cases (5 knees) with spontaneous osteonecrosis (stage 1 in Koshino's classification) and 96 cases (104 knees) in osteoarthritis who were more than 50 years old. Patients with an early spontaneous osteonecrosis were elderly females and had night pain and severe spontaneous pain. On MRI, lesions of all cases were clearly detected in early stage. On the other hand, only 47 of 104 knees (45%) were detected in patients with osteoarthritis, and mirror lesions at shank sides were detected in 45 of 47 knees. These results suggest that it is possible to diagnose early spontaneous osteonecrosis from osteoarthritis by MRI image with the clue to mirror lesion at shank sides, incidence, stage, etc. On the diagnosis of early spontaneous osteonecrosis, MRI image should be performed as soon as possible if a patient was older, had no anamnesis of lesions, and no changes by the X-ray radiography in spite of severe pain of the knee joints. (K.H.)

  13. Spontaneous infected biloma: case report | Kimani | East African ...

    African Journals Online (AJOL)

    Biloma is defined as any collection of bile outside the biliary tree. It mainly results from surgical complications and abdominal trauma. Spontaneous biloma is extremely rare and is occasionally associated with choledocholithiasis. This report describes a case of spontaneous biloma diagnosed radiologically and confirmed at ...

  14. Spontaneous resolution of post-traumatic chronic subdural hematoma

    African Journals Online (AJOL)

    Here, we present a case of spontaneously resolved post-traumatic bilateral chronic subdural hematoma within a period of one month in a 55-year-old male and we discuss the probable mechanisms of pathophysiology in the spontaneous resolution of chronic subdural hematoma. Keywords: Antiaggregation therapy, chronic ...

  15. Spontaneous symmetry breaking in N=3 supergravity

    International Nuclear Information System (INIS)

    Zinov'ev, Yu.M.

    1986-01-01

    The possibility of the spontaneous symmetry breaking without a cosmological term in N=3 supergravity is investigated. A new, dual version of N=3 supergravity - U(3)-supergravity is constructed. Such a theory is shown to admit a spontaneous supersymmetry breaking without a cosmological term and with three arbitrary scales, including partial super-Higgs effect N=3 → N=2 and N=3 → N=1

  16. Symmetry restoration in spontaneously broken induced gravity

    International Nuclear Information System (INIS)

    Amati, D.; Russo, J.

    1990-01-01

    We investigate the recuperation of expected invariant behaviours in a non-metric gravity theory in which the full general relativistic invariance is broken spontaneously. We show how dangerous increasing energy behaviours of physical amplitudes cancel in a highly non-trivial way. This evidences the expected loss of the vacuum generated scale in the UV regime and gives support for the consistency of spontaneously broken gravity theories. (orig.)

  17. Iran: the next nuclear threshold state?

    OpenAIRE

    Maurer, Christopher L.

    2014-01-01

    Approved for public release; distribution is unlimited A nuclear threshold state is one that could quickly operationalize its peaceful nuclear program into one capable of producing a nuclear weapon. This thesis compares two known threshold states, Japan and Brazil, with Iran to determine if the Islamic Republic could also be labeled a threshold state. Furthermore, it highlights the implications such a status could have on U.S. nonproliferation policy. Although Iran's nuclear program is mir...

  18. The Problem of Anonymity in Archives: A Literature Review=Arşivlerde Anonimlik Sorunu: Bir Literatür Değerlendirmesi

    Directory of Open Access Journals (Sweden)

    Emily Ross

    2013-12-01

    Full Text Available Archivists processing documents rely on factors such as authorship and provenance to contextualize their materials and render them searchable. But in my past experience as an archives user, I repeatedly came across instances of anonymity: letters and diaries by unnamed authors or to unknown recipients, photographs of unknown subjects. In some cases this anonymity is a loss of information that was once there, but in other case it enabled the material to come into existence in the first place: such as in the case of satirical political poetry, for which a writer might face legal censure. In this literature review, the issue of anonymity in the archives is explored, both in a pragmatic sense (recommended strategies for managing it, and a philosophical sense (according anonymous documents the same status as documents with known authors./Arşivcilikte belgelerin işlenmesi, materyallerin kavramsallaştırılması ve aranabilir hale gelmesinde önemli olan yazarlık ve kaynak (menşe gibi faktörlere dayanmaktadır. Ancak bir arşiv kullanıcısı olarak deneyimlerimizde defalarca isimsiz yazarlar tarafından bilinmeyen kişilere atfedilmiş mektuplar ve günlükler, bilinmeyen konuların fotoğrafları gibi anonim eserlerle karşılaşmaktayız. Bir zamanlar bu anonimlik bazen bir bilgi kaybı olarak görülürken bazen de belgenin yazarının yasal kınamaya maruz kalabildiği hicivli siyasi bir şiir örneğinde olduğu gibi eserin ilk etapta ortaya çıkmasını sağlamaktaydı. Bu literatür taramasında arşivlerde anonimlik sorunu hem pragmatik anlamda (konunun yönetimi için önerilen stratejiler hem de felsefi anlamda (anonim belgelere uygun olarak bilinen yazarlı belgelerle aynı statüde ele alınmaktadır.

  19. Analytic neutrality, anonymity, abstinence, and elective self-disclosure.

    Science.gov (United States)

    Shill, Merton A

    2004-01-01

    Recent contributions to the psychoanalytic literature propose new ways of understanding analytic neutrality, anonymity, abstinence, and self-disclosure. They advocate elective self-disclosure by the analyst as an antidote to the allegedly game-playing quality of transference and resistance analysis. The analytic relationship, they assert, becomes unreal when attempts are made to observe the principles of neutrality and abstinence. Both are seen as ill-conceived because of the irreducible subjectivity and unwarranted authority of the analyst. These relational and interactional views are criticized because (1) they ignore the fact that transference and resistance analysis have from Freud onward been accepted as minimal criteria qualifying a clinical process as psychoanalytic; (2) elective self-disclosure carries metapsychological implications dismissing not only Freud's theory of motivation but motivation as a basic feature of human personality; (3) they do not recognize interpersonal relations as mental events and so do not consider the ego's ability to create intrapsychic representations of object relations; (4) elective self-disclosures within the empathic parameters of the analytic situation are themselves unreal compared to the reality of the patient's experience with other objects. Abstinence and neutrality as ideals facilitate maintenance of an internal holding environment or container for the analyst's countertransference.

  20. Thoracoscopic modified pleural tent for spontaneous pneumothorax.

    Science.gov (United States)

    Kawachi, Riken; Matsuwaki, Rie; Tachibana, Keisei; Karita, Shin; Nakazato, Yoko; Tanaka, Ryota; Nagashima, Yasushi; Takei, Hidefumi; Kondo, Haruhiko

    2016-08-01

    We developed a modified pleural tent (m-tent) procedure and used it in our hospital in almost 30 consecutive patients with spontaneous pneumothorax. The objective of this study was to clarify the feasibility and effectiveness of a thoracoscopic m-tent for the treatment of spontaneous pneumothorax. From July 2013 to November 2014, 107 patients with spontaneous pneumothorax were treated in our institution. Eighty-nine of these patients were analysed retrospectively. The inclusion criteria for thoracoscopic m-tent for spontaneous pneumothorax were multiple and widespread bullae, postoperative relapse and secondary spontaneous pneumothorax. The surgical procedures were usually performed through three ports. After bullectomy, an m-tent is made to strip the parietal pleura off the chest wall from about the level of the fourth or fifth rib to the apex, and two or three ligations are then applied to fix the pleural tent and lung parenchyma. Patients in whom an m-tent was not indicated underwent bullectomy plus coverage using absorbable materials. Twenty-seven patients underwent bullectomy plus m-tent (m-tent group) and 62 underwent bullectomy plus coverage over a staple line using an absorbable material such as a polyglycolic acid sheet or nitrocellulose sheet (coverage group). No severe postoperative complications were observed in either group. The m-tent and coverage groups showed significant differences in operation time (129 vs 86 min, mean), haemorrhage (12.8 vs 7.2 ml), postoperative hospital stay (3.7 vs 2.9 days) and postoperative painkiller intake (8.6 vs 6.8 days). Recurrence was observed in 1 (3.7%) and 2 patients (3.2%), respectively. The thoracoscopic m-tent procedure requires a longer operation, a longer hospital stay and greater painkiller intake. However, these differences are acceptable, and an m-tent should be considered as an option for pleural reinforcement in spontaneous pneumothorax, especially in patients who are complicated with severe pulmonary