Exploring the Use of Discrete Gestures for Authentication
NASA Astrophysics Data System (ADS)
Chong, Ming Ki; Marsden, Gary
Research in user authentication has been a growing field in HCI. Previous studies have shown that peoples’ graphical memory can be used to increase password memorability. On the other hand, with the increasing number of devices with built-in motion sensors, kinesthetic memory (or muscle memory) can also be exploited for authentication. This paper presents a novel knowledge-based authentication scheme, called gesture password, which uses discrete gestures as password elements. The research presents a study of multiple password retention using PINs and gesture passwords. The study reports that although participants could use kinesthetic memory to remember gesture passwords, retention of PINs is far superior to retention of gesture passwords.
Pre-Employment Testing on the Internet: Put Candidates a Click Away and Hire at Modem Speed.
ERIC Educational Resources Information Center
Mooney, John
2002-01-01
The experience of a county government illustrates factors to consider in implementing online employment testing for job candidates: (1) selection of the appropriate Internet-based test; (2) passwords, timing, security, and technical difficulties; and (3) provisions for applicants who lack Internet access. (SK)
A Password System Based on Sketches
2016-07-12
than traditional passwords. Biometrics include biological properties such as fingerprints, voices, faces, and even handwriting . Fingerprints have been...perturbation of the sketch495 results in a corresponding change in the model, which is exactly what we imply when we say that model is (locally...Conf. on Frontiers in Handwriting Recognition (2010) 339–344.690 [29] M. Martinez-Diaz, J. Fierrez, J. Galbally, The DooDB Graphical Password Database: Data Analysis and Benchmark Results, IEEE Access 1 (2013) 596–605. 32 33
Apple OS X VPN Set Up | High-Performance Computing | NREL
software using that conf file and your UserID Start the connection using your password plus the 6-digit OTP . Configure the Client Software Start the Endian Connect App (It should have installed into Applications in an password" link, and add your UserID. Start the app, and begin configuring the connection by clicking
Decryption-decompression of AES protected ZIP files on GPUs
NASA Astrophysics Data System (ADS)
Duong, Tan Nhat; Pham, Phong Hong; Nguyen, Duc Huu; Nguyen, Thuy Thanh; Le, Hung Duc
2011-10-01
AES is a strong encryption system, so decryption-decompression of AES encrypted ZIP files requires very large computing power and techniques of reducing the password space. This makes implementations of techniques on common computing system not practical. In [1], we reduced the original very large password search space to a much smaller one which surely containing the correct password. Based on reduced set of passwords, in this paper, we parallel decryption, decompression and plain text recognition for encrypted ZIP files by using CUDA computing technology on graphics cards GeForce GTX295 of NVIDIA, to find out the correct password. The experimental results have shown that the speed of decrypting, decompressing, recognizing plain text and finding out the original password increases about from 45 to 180 times (depends on the number of GPUs) compared to sequential execution on the Intel Core 2 Quad Q8400 2.66 GHz. These results have demonstrated the potential applicability of GPUs in this cryptanalysis field.
Domain (One password used for computer logins, e-mail logins, VPN, and many other internal Argonne web see this page.). NEW!! Click here for instructions on how to setup publickey (passwordless) logins to
Sleeping Pills for Insomnia: Which Ones Work Best?
... Student Debt Special Report All Money More on Money Best & Worst Banks According to Consumer Reports Members ... 333-0663 Join Consumer Reports Basic Membership is FREE. Show Password By clicking "Become a Member" you ...
Nutritional and Exercise Aspects of Prader-Willi Syndrome and Childhood Obesity
2013-02-01
materials. Participants who returned the completed survey received a $10 gift card by mail. Survey responses were entered into a password-protected...Contact Us Choose Month and Year Monday, April 30, 2012 For a link to our Diabetes Seminars, click below! Subscribe to our iTunes U page for free
Evaluating authentication options for mobile health applications in younger and older adults
Khan, Hassan; Hengartner, Urs; Ong, Stephanie; Logan, Alexander G.; Vogel, Daniel; Gebotys, Robert; Yang, Jilan
2018-01-01
Objective Apps promoting patient self-management may improve health outcomes. However, methods to secure stored information on mobile devices may adversely affect usability. We tested the reliability and usability of common user authentication techniques in younger and older adults. Methodology Usability testing was conducted in two age groups, 18 to 30 years and 50 years and older. After completing a demographic questionnaire, each participant tested four authentication options in random order: four-digit personal identification number (PIN), graphical password (GRAPHICAL), Android pattern-lock (PATTERN), and a swipe-style Android fingerprint scanner (FINGERPRINT). Participants rated each option using the Systems Usability Scale (SUS). Results A total of 59 older and 43 younger participants completed the study. Overall, PATTERN was the fastest option (3.44s), and PIN had the fewest errors per attempt (0.02). Participants were able to login using PIN, PATTERN, and GRAPHICAL at least 98% of the time. FINGERPRINT was the slowest (26.97s), had an average of 1.46 errors per attempt, and had a successful login rate of 85%. Overall, PIN and PATTERN had higher SUS scores than FINGERPRINT and GRAPHICAL. Compared to younger participants, older participants were also less likely to find PATTERN to be tiring, annoying or time consuming and less likely to consider PIN to be time consuming. Younger participants were more likely to rate GRAPHICAL as annoying, time consuming and tiring than older participants. Conclusions On mobile devices, PIN and pattern-lock outperformed graphical passwords and swipe-style fingerprints. All participants took longer to authenticate using the swipe-style fingerprint compared to other options. Older participants also took two to three seconds longer to authenticate using the PIN, pattern and graphical passwords though this did not appear to affect perceived usability. PMID:29300736
Evaluating authentication options for mobile health applications in younger and older adults.
Grindrod, Kelly; Khan, Hassan; Hengartner, Urs; Ong, Stephanie; Logan, Alexander G; Vogel, Daniel; Gebotys, Robert; Yang, Jilan
2018-01-01
Apps promoting patient self-management may improve health outcomes. However, methods to secure stored information on mobile devices may adversely affect usability. We tested the reliability and usability of common user authentication techniques in younger and older adults. Usability testing was conducted in two age groups, 18 to 30 years and 50 years and older. After completing a demographic questionnaire, each participant tested four authentication options in random order: four-digit personal identification number (PIN), graphical password (GRAPHICAL), Android pattern-lock (PATTERN), and a swipe-style Android fingerprint scanner (FINGERPRINT). Participants rated each option using the Systems Usability Scale (SUS). A total of 59 older and 43 younger participants completed the study. Overall, PATTERN was the fastest option (3.44s), and PIN had the fewest errors per attempt (0.02). Participants were able to login using PIN, PATTERN, and GRAPHICAL at least 98% of the time. FINGERPRINT was the slowest (26.97s), had an average of 1.46 errors per attempt, and had a successful login rate of 85%. Overall, PIN and PATTERN had higher SUS scores than FINGERPRINT and GRAPHICAL. Compared to younger participants, older participants were also less likely to find PATTERN to be tiring, annoying or time consuming and less likely to consider PIN to be time consuming. Younger participants were more likely to rate GRAPHICAL as annoying, time consuming and tiring than older participants. On mobile devices, PIN and pattern-lock outperformed graphical passwords and swipe-style fingerprints. All participants took longer to authenticate using the swipe-style fingerprint compared to other options. Older participants also took two to three seconds longer to authenticate using the PIN, pattern and graphical passwords though this did not appear to affect perceived usability.
National Centers for Environmental Prediction
; at the NOAA/ESRL Rapid Refresh Page [<--click here] See "Current and Forecast Graphics" ; at the NOAA/ESRL High-Resolution Rapid Refresh Page [<--click here] NOAA / National Weather
On-Line Database of Vibration-Based Damage Detection Experiments
NASA Technical Reports Server (NTRS)
Pappa, Richard S.; Doebling, Scott W.; Kholwad, Tina D.
2000-01-01
This paper describes a new, on-line bibliographic database of vibration-based damage detection experiments. Publications in the database discuss experiments conducted on actual structures as well as those conducted with simulated data. The database can be searched and sorted in many ways, and it provides photographs of test structures when available. It currently contains 100 publications, which is estimated to be about 5-10% of the number of papers written to date on this subject. Additional entries are forthcoming. This database is available for public use on the Internet at the following address: http://sdbpappa-mac.larc.nasa.gov. Click on the link named "dd_experiments.fp3" and then type "guest" as the password. No user name is required.
Effects of game-like interactive graphics on risk perceptions and decisions.
Ancker, Jessica S; Weber, Elke U; Kukafka, Rita
2011-01-01
Many patients have difficulty interpreting risks described in statistical terms as percentages. Computer game technology offers the opportunity to experience how often an event occurs, rather than simply read about its frequency. . To assess effects of interactive graphics on risk perceptions and decisions. . Electronic questionnaire. Participants and setting. Respondents (n = 165) recruited online or at an urban hospital. Intervention. Health risks were illustrated by either static graphics or interactive game-like graphics. The interactive search graphic was a grid of squares, which, when clicked, revealed stick figures underneath. Respondents had to click until they found a figure affected by the disease. Measurements. Risk feelings, risk estimates, intention to take preventive action. . Different graphics did not affect mean risk estimates, risk feelings, or intention. Low-numeracy participants reported significantly higher risk feelings than high-numeracy ones except with the interactive search graphic. Unexpectedly, respondents reported stronger intentions to take preventive action when the intention question followed questions about efficacy and disease severity than when it followed perceived risk questions (65% v. 34%; P < 0.001). When respondents reported risk feelings immediately after using the search graphic, the interaction affected perceived risk (the longer the search to find affected stick figures, the higher the risk feeling: ρ = 0.57; P = 0.009). Limitations. The authors used hypothetical decisions. . A game-like graphic that allowed consumers to search for stick figures affected by disease had no main effect on risk perception but reduced differences based on numeracy. In one condition, the game-like graphic increased concern about rare risks. Intentions for preventive action were stronger with a question order that focused first on efficacy and disease severity than with one that focused first on perceived risk.
Kawano, Tomonori
2013-03-01
There have been a wide variety of approaches for handling the pieces of DNA as the "unplugged" tools for digital information storage and processing, including a series of studies applied to the security-related area, such as DNA-based digital barcodes, water marks and cryptography. In the present article, novel designs of artificial genes as the media for storing the digitally compressed data for images are proposed for bio-computing purpose while natural genes principally encode for proteins. Furthermore, the proposed system allows cryptographical application of DNA through biochemically editable designs with capacity for steganographical numeric data embedment. As a model case of image-coding DNA technique application, numerically and biochemically combined protocols are employed for ciphering the given "passwords" and/or secret numbers using DNA sequences. The "passwords" of interest were decomposed into single letters and translated into the font image coded on the separate DNA chains with both the coding regions in which the images are encoded based on the novel run-length encoding rule, and the non-coding regions designed for biochemical editing and the remodeling processes revealing the hidden orientation of letters composing the original "passwords." The latter processes require the molecular biological tools for digestion and ligation of the fragmented DNA molecules targeting at the polymerase chain reaction-engineered termini of the chains. Lastly, additional protocols for steganographical overwriting of the numeric data of interests over the image-coding DNA are also discussed.
Evaluation of a graphic interface to control a robotic grasping arm: a multicenter study.
Laffont, Isabelle; Biard, Nicolas; Chalubert, Gérard; Delahoche, Laurent; Marhic, Bruno; Boyer, François C; Leroux, Christophe
2009-10-01
Laffont I, Biard N, Chalubert G, Delahoche L, Marhic B, Boyer FC, Leroux C. Evaluation of a graphic interface to control a robotic grasping arm: a multicenter study. Grasping robots are still difficult to use for persons with disabilities because of inadequate human-machine interfaces (HMIs). Our purpose was to evaluate the efficacy of a graphic interface enhanced by a panoramic camera to detect out-of-view objects and control a commercialized robotic grasping arm. Multicenter, open-label trial. Four French departments of physical and rehabilitation medicine. Control subjects (N=24; mean age, 33y) and 20 severely impaired patients (mean age, 44y; 5 with muscular dystrophies, 13 with traumatic tetraplegia, and 2 others) completed the study. None of these patients was able to grasp a 50-cL bottle without the robot. Participants were asked to grasp 6 objects scattered around their wheelchair using the robotic arm. They were able to select the desired object through the graphic interface available on their computer screen. Global success rate, time needed to select the object on the screen of the computer, number of clicks on the HMI, and satisfaction among users. We found a significantly lower success rate in patients (81.1% vs 88.7%; chi(2)P=.017). The duration of the task was significantly higher in patients (71.6s vs 39.1s; P<.001). We set a cut-off for the maximum duration at 79 seconds, representing twice the amount of time needed by the control subjects to complete the task. In these conditions, the success rate for the impaired participants was 65% versus 85.4% for control subjects. The mean number of clicks necessary to select the object with the HMI was very close in both groups: patients used (mean +/- SD) 7.99+/-6.07 clicks, whereas controls used 7.04+/-2.87 clicks. Considering the severity of patients' impairment, all these differences were considered tiny. Furthermore, a high satisfaction rate was reported for this population concerning the use of the graphic interface. The graphic interface is of interest in controlling robotic arms for disabled people, with numerous potential applications in daily life.
EAGLEView: A surface and grid generation program and its data management
NASA Technical Reports Server (NTRS)
Remotigue, M. G.; Hart, E. T.; Stokes, M. L.
1992-01-01
An old and proven grid generation code, the EAGLE grid generation package, is given an added dimension of a graphical interface and a real time data base manager. The Numerical Aerodynamic Simulation (NAS) Panel Library is used for the graphical user interface. Through the panels, EAGLEView constructs the EAGLE script command and sends it to EAGLE to be processed. After the object is created, the script is saved in a mini-buffer which can be edited and/or saved and reinterpreted. The graphical objects are set-up in a linked-list and can be selected or queried by pointing and clicking the mouse. The added graphical enhancement to the EAGLE system emphasizes the unique capability to construct field points around complex geometry and visualize the construction every step of the way.
Schwartze, J; Haarbrandt, B; Fortmeier, D; Haux, R; Seidel, C
2014-01-01
Integration of electronic signatures embedded in health care processes in Germany challenges health care service and supply facilities. The suitability of the signature level of an eligible authentication procedure is confirmed for a large part of documents in clinical practice. However, the concrete design of such a procedure remains unclear. To create a summary of usable user authentication systems suitable for clinical workflows. A Systematic literature review based on nine online bibliographic databases. Search keywords included authentication, access control, information systems, information security and biometrics with terms user authentication, user identification and login in title or abstract. Searches were run between 7 and 12 September 2011. Relevant conference proceedings were searched manually in February 2013. Backward reference search of selected results was done. Only publications fully describing authentication systems used or usable were included. Algorithms or purely theoretical concepts were excluded. Three authors did selection independently. DATA EXTRACTION AND ASSESSMENT: Semi-structured extraction of system characteristics was done by the main author. Identified procedures were assessed for security and fulfillment of relevant laws and guidelines as well as for applicability. Suitability for clinical workflows was derived from the assessments using a weighted sum proposed by Bonneau. Of 7575 citations retrieved, 55 publications meet our inclusion criteria. They describe 48 different authentication systems; 39 were biometric and nine graphical password systems. Assessment of authentication systems showed high error rates above European CENELEC standards and a lack of applicability of biometric systems. Graphical passwords did not add overall value compared to conventional passwords. Continuous authentication can add an additional layer of safety. Only few systems are suitable partially or entirely for use in clinical processes. Suitability strongly depends on national or institutional requirements. Four authentication systems seem to fulfill requirements of authentication procedures for clinical workflows. Research is needed in the area of continuous authentication with biometric methods. A proper authentication system should combine all factors of authentication implementing and connecting secure individual measures.
Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information
Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin
2014-01-01
Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack. PMID:24991649
Semantically Grounded Briefings
2005-12-01
cascading interface, mirroring the class inheritance of the ontologies. Clicking on one of these tools, like PowerPoint’s native autoshape tools...connections are their graphic templates. This determines the appearance of an instance of that concept. Any of PowerPoint’s native autoshapes , formatted...which can be any PowerPoint autoshape , group shape, or image • Identification of a modulated component of C’s graphic template. If C’s graphic
Design and validation of an improved graphical user interface with the 'Tool ball'.
Lee, Kuo-Wei; Lee, Ying-Chu
2012-01-01
The purpose of this research is introduce the design of an improved graphical user interface (GUI) and verifies the operational efficiency of the proposed interface. Until now, clicking the toolbar with the mouse is the usual way to operate software functions. In our research, we designed an improved graphical user interface - a tool ball that is operated by a mouse wheel to perform software functions. Several experiments are conducted to measure the time needed to operate certain software functions with the traditional combination of "mouse click + tool button" and the proposed integration of "mouse wheel + tool ball". The results indicate that the tool ball design can accelerate the speed of operating software functions, decrease the number of icons on the screen, and enlarge the applications of the mouse wheel. Copyright © 2011 Elsevier Ltd and The Ergonomics Society. All rights reserved.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601
SSC San Diego Biennial Review 2003. Command and Control
2003-01-01
systems. IMAT systems use scientific visualizations, three- dimensional graphics, and animations to illustrate com- plex physical interactions in mission...Again, interactive animations are used to explain underlying concepts. For exam- ple, for principles of beamforming using a phased array, a three...solve complex problems. Experts type natural language text, use mouse clicks to provide hints for explanation generation, and use mouse clicks to
Running GUI Applications on Peregrine from OSX | High-Performance Computing
Learn how to use Virtual Network Computing to access a Linux graphical desktop environment on Peregrine local port (on, e.g., your laptop), starts a VNC server process that manages a virtual desktop on your virtual desktop. This is persistent, so remember it-you will use this password whenever accessing
The Complex Dynamics of Sponsored Search Markets
NASA Astrophysics Data System (ADS)
Robu, Valentin; La Poutré, Han; Bohte, Sander
This paper provides a comprehensive study of the structure and dynamics of online advertising markets, mostly based on techniques from the emergent discipline of complex systems analysis. First, we look at how the display rank of a URL link influences its click frequency, for both sponsored search and organic search. Second, we study the market structure that emerges from these queries, especially the market share distribution of different advertisers. We show that the sponsored search market is highly concentrated, with less than 5% of all advertisers receiving over 2/3 of the clicks in the market. Furthermore, we show that both the number of ad impressions and the number of clicks follow power law distributions of approximately the same coefficient. However, we find this result does not hold when studying the same distribution of clicks per rank position, which shows considerable variance, most likely due to the way advertisers divide their budget on different keywords. Finally, we turn our attention to how such sponsored search data could be used to provide decision support tools for bidding for combinations of keywords. We provide a method to visualize keywords of interest in graphical form, as well as a method to partition these graphs to obtain desirable subsets of search terms.
Innovative methods for knowledge transfer
NASA Astrophysics Data System (ADS)
Goanta, A. M.
2015-11-01
At this time, learning takes place, either with classic books on paper support or using books scanned or drawn and further converted into PDF or PPT files that are printed on type support CD / DVD. The latter modern means of learning, the study adds live on the Internet using search engines and not least e-learning method, which allows the study of bibliographic related materials in PDF or PPT, stacked and grouped on the basis of a curriculum imposed which can be accessed on a website via a user name and password. Innovative methods come to successfully use other file types than those mentioned above. The graphics in teaching technical subjects such as descriptive geometry can be achieved using animated PowerPoint files, allowing for visualization of steps to be taken, in the case of solving by drawing a descriptive geometry. Another innovative method relies on the use of HTML files, inspired by related sites help design software packages that can be used when teaching descriptive geometry that the technical design. Through this work, the author has proposed to present a new innovative method, which is inspired by the methods listed above, but involves using AVI files to teaching of computer-assisted type graphics or info graphics. In general this new author's method lends itself particularly well to the teaching of the use of software packages because the student actually see the place from where the delivered command is accessed and contextual options of right button of the mouse. These laboratory courses or mentoring can be freestanding cards support CD / DVD or can be posted on websites with restricted access based on user name and password. Practically paper presents the methodology of creating courses and tutorials in AVI format, and how to monitor the degree of accessing the website, on which there were posted mentioned teaching materials, using the tools offered by Google Analytics. The results consist of graphical work, about the degree of access to educational materials, made on the basis of various criteria, such as the: time of access, access location, age of those who accessed, chapters accessed, etc. Finally the author presents his findings on the benefits of this method.
Building Computer-Based Experiments in Psychology without Programming Skills.
Ruisoto, Pablo; Bellido, Alberto; Ruiz, Javier; Juanes, Juan A
2016-06-01
Research in Psychology usually requires to build and run experiments. However, although this task has required scripting, recent computer tools based on graphical interfaces offer new opportunities in this field for researchers with non-programming skills. The purpose of this study is to illustrate and provide a comparative overview of two of the main free open source "point and click" software packages for building and running experiments in Psychology: PsychoPy and OpenSesame. Recommendations for their potential use are further discussed.
Web-based computational chemistry education with CHARMMing I: Lessons and tutorial.
Miller, Benjamin T; Singh, Rishi P; Schalk, Vinushka; Pevzner, Yuri; Sun, Jingjun; Miller, Carrie S; Boresch, Stefan; Ichiye, Toshiko; Brooks, Bernard R; Woodcock, H Lee
2014-07-01
This article describes the development, implementation, and use of web-based "lessons" to introduce students and other newcomers to computer simulations of biological macromolecules. These lessons, i.e., interactive step-by-step instructions for performing common molecular simulation tasks, are integrated into the collaboratively developed CHARMM INterface and Graphics (CHARMMing) web user interface (http://www.charmming.org). Several lessons have already been developed with new ones easily added via a provided Python script. In addition to CHARMMing's new lessons functionality, web-based graphical capabilities have been overhauled and are fully compatible with modern mobile web browsers (e.g., phones and tablets), allowing easy integration of these advanced simulation techniques into coursework. Finally, one of the primary objections to web-based systems like CHARMMing has been that "point and click" simulation set-up does little to teach the user about the underlying physics, biology, and computational methods being applied. In response to this criticism, we have developed a freely available tutorial to bridge the gap between graphical simulation setup and the technical knowledge necessary to perform simulations without user interface assistance.
NASA Astrophysics Data System (ADS)
Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao
2015-11-01
In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).
Provably Secure Password-based Authentication in TLS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier
2005-12-20
In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised tomore » the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.« less
MPI Enhancements in John the Ripper
NASA Astrophysics Data System (ADS)
Sykes, Edward R.; Lin, Michael; Skoczen, Wesley
2010-11-01
John the Ripper (JtR) is an open source software package commonly used by system administrators to enforce password policy. JtR is designed to attack (i.e., crack) passwords encrypted in a wide variety of commonly used formats. While parallel implementations of JtR exist, there are several limitations to them. This research reports on two distinct algorithms that enhance this password cracking tool using the Message Passing Interface. The first algorithm is a novel approach that uses numerous processors to crack one password by using an innovative approach to workload distribution. In this algorithm the candidate password is distributed to all participating processors and the word list is divided based on probability so that each processor has the same likelihood of cracking the password while eliminating overlapping operations. The second algorithm developed in this research involves dividing the passwords within a password file equally amongst available processors while ensuring load-balanced and fault-tolerant behavior. This paper describes John the Ripper, the design of these two algorithms and preliminary results. Given the same amount of time, the original JtR can crack 29 passwords, whereas our algorithms 1 and 2 can crack an additional 35 and 45 passwords respectively.
Dynamic allocation of attention to metrical and grouping accents in rhythmic sequences.
Kung, Shu-Jen; Tzeng, Ovid J L; Hung, Daisy L; Wu, Denise H
2011-04-01
Most people find it easy to perform rhythmic movements in synchrony with music, which reflects their ability to perceive the temporal periodicity and to allocate attention in time accordingly. Musicians and non-musicians were tested in a click localization paradigm in order to investigate how grouping and metrical accents in metrical rhythms influence attention allocation, and to reveal the effect of musical expertise on such processing. We performed two experiments in which the participants were required to listen to isochronous metrical rhythms containing superimposed clicks and then to localize the click on graphical and ruler-like representations with and without grouping structure information, respectively. Both experiments revealed metrical and grouping influences on click localization. Musical expertise improved the precision of click localization, especially when the click coincided with a metrically strong beat. Critically, although all participants located the click accurately at the beginning of an intensity group, only musicians located it precisely when it coincided with a strong beat at the end of the group. Removal of the visual cue of grouping structures enhanced these effects in musicians and reduced them in non-musicians. These results indicate that musical expertise not only enhances attention to metrical accents but also heightens sensitivity to perceptual grouping.
An integrated set of UNIX based system tools at control room level
NASA Astrophysics Data System (ADS)
Potepan, F.; Scafuri, C.; Bortolotto, C.; Surace, G.
1994-12-01
The design effort of providing a simple point-and-click approach to the equipment access has led to the definition and realization of a modular set of software tools to be used at the ELETTRA control room level. Point-to-point equipment access requires neither programming nor specific knowledge of the control system architecture. The development and integration of communication, graphic, editing and global database modules are described in depth, followed by a report of their use in the first commissioning period.
The Effect of Password Management Procedures on the Entropy of User Selected Passwords
ERIC Educational Resources Information Center
Enamait, John D.
2012-01-01
Maintaining the security of information contained within computer systems poses challenges for users and administrators. Attacks on information systems continue to rise. Specifically, attacks that target user authentication are increasingly popular. These attacks are based on the common perception that traditional alphanumeric passwords are weak…
Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chevassut, Olivier; Milner, Joseph; Pointcheval, David
2008-04-21
The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on anmore » analysis of relevant patents in the area.« less
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps.
Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han; Lin, Tsung-Hung
2017-01-01
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes.
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps
Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han
2017-01-01
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes. PMID:28759615
27 CFR 73.12 - What security controls must I use for identification codes and passwords?
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false What security controls... controls must I use for identification codes and passwords? If you use electronic signatures based upon use of identification codes in combination with passwords, you must employ controls to ensure their...
Implications of What Children Know about Computer Passwords
ERIC Educational Resources Information Center
Coggins, Porter E.
2013-01-01
The purpose of this article is to present several implications and recommendations regarding what elementary school children, aged 9-12 years, know about computer passwords and what they know about why computer passwords are important. Student knowledge can then be used to make relevant curriculum decisions based in conjunction with applicable…
Brennan, Jennifer Sousa
2010-01-01
This chapter is an introductory reference guide highlighting some of the most common statistical topics, broken down into both command-line syntax and graphical interface point-and-click commands. This chapter serves to supplement more formal statistics lessons and expedite using Stata to compute basic analyses.
Enabling Disabled Persons to Gain Access to Digital Media
NASA Technical Reports Server (NTRS)
Beach, Glenn; OGrady, Ryan
2011-01-01
A report describes the first phase in an effort to enhance the NaviGaze software to enable profoundly disabled persons to operate computers. (Running on a Windows-based computer equipped with a video camera aimed at the user s head, the original NaviGaze software processes the user's head movements and eye blinks into cursor movements and mouse clicks to enable hands-free control of the computer.) To accommodate large variations in movement capabilities among disabled individuals, one of the enhancements was the addition of a graphical user interface for selection of parameters that affect the way the software interacts with the computer and tracks the user s movements. Tracking algorithms were improved to reduce sensitivity to rotations and reduce the likelihood of tracking the wrong features. Visual feedback to the user was improved to provide an indication of the state of the computer system. It was found that users can quickly learn to use the enhanced software, performing single clicks, double clicks, and drags within minutes of first use. Available programs that could increase the usability of NaviGaze were identified. One of these enables entry of text by using NaviGaze as a mouse to select keys on a virtual keyboard.
Password-free network security through joint use of audio and video
NASA Astrophysics Data System (ADS)
Civanlar, Mehmet R.; Chen, Tsuhan
1997-01-01
REmote authentication is vital for many network based applications. As the number of such applications increases, user friendliness of the authentication process, particularly as it relates to password management, becomes as important as its reliability. The multimedia capabilities of the modern terminal equipment can provide the basis for a dependable and easy to use authentication system which does not require the user to memorize passwords. This paper outlines our implementation of an authentication system based on the joint use of the speech and facial video of a user. Our implementation shows that the voice and the video of the associated lip movements, when used together, can be very effective for password free authentication.
Password-only authenticated three-party key exchange with provable security in the standard model.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon; Won, Dongho
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.
Graphical User Interface for a Remote Medical Monitoring System: U.S. Army Medic Recommendations
2009-11-01
screens. The majority of medics (70%) also wanted a name lis! screen that, when tapped , would go to an individual patient screen. In the name list...button has been pushed. Tapping on thaI button would prompt the user to enter the password. Tapping on the light button would illuminate the screen...a summary of current local weather conditions would be dis- played in the lower ! eft of the screen. In the lower right of this map screen is
Encryption Characteristics of Two USB-based Personal Health Record Devices
Wright, Adam; Sittig, Dean F.
2007-01-01
Personal health records (PHRs) hold great promise for empowering patients and increasing the accuracy and completeness of health information. We reviewed two small USB-based PHR devices that allow a patient to easily store and transport their personal health information. Both devices offer password protection and encryption features. Analysis of the devices shows that they store their data in a Microsoft Access database. Due to a flaw in the encryption of this database, recovering the user’s password can be accomplished with minimal effort. Our analysis also showed that, rather than encrypting health information with the password chosen by the user, the devices stored the user’s password as a string in the database and then encrypted that database with a common password set by the manufacturer. This is another serious vulnerability. This article describes the weaknesses we discovered, outlines three critical flaws with the security model used by the devices, and recommends four guidelines for improving the security of similar devices. PMID:17460132
2009-12-01
other services for early UNIX systems at Bell labs. In many UNIX based systems, the field added to ‘etc/ passwd ’ file to carry GCOS ID information was...charset, and external. struct options_main { /* Option flags */ opt_flags flags; /* Password files */ struct list_main * passwd ; /* Password file...object PASSWD . It is part of several other data structures. struct PASSWD { int id; char *login; char *passwd_hash; int UID
Security analysis and improvements to the PsychoPass method.
Brumen, Bostjan; Heričko, Marjan; Rozman, Ivan; Hölbl, Marko
2013-08-13
In a recent paper, Pietro Cipresso et al proposed the PsychoPass method, a simple way to create strong passwords that are easy to remember. However, the method has some security issues that need to be addressed. To perform a security analysis on the PsychoPass method and outline the limitations of and possible improvements to the method. We used the brute force analysis and dictionary attack analysis of the PsychoPass method to outline its weaknesses. The first issue with the Psychopass method is that it requires the password reproduction on the same keyboard layout as was used to generate the password. The second issue is a security weakness: although the produced password is 24 characters long, the password is still weak. We elaborate on the weakness and propose a solution that produces strong passwords. The proposed version first requires the use of the SHIFT and ALT-GR keys in combination with other keys, and second, the keys need to be 1-2 distances apart. The proposed improved PsychoPass method yields passwords that can be broken only in hundreds of years based on current computing powers. The proposed PsychoPass method requires 10 keys, as opposed to 20 keys in the original method, for comparable password strength.
Security Analysis and Improvements to the PsychoPass Method
2013-01-01
Background In a recent paper, Pietro Cipresso et al proposed the PsychoPass method, a simple way to create strong passwords that are easy to remember. However, the method has some security issues that need to be addressed. Objective To perform a security analysis on the PsychoPass method and outline the limitations of and possible improvements to the method. Methods We used the brute force analysis and dictionary attack analysis of the PsychoPass method to outline its weaknesses. Results The first issue with the Psychopass method is that it requires the password reproduction on the same keyboard layout as was used to generate the password. The second issue is a security weakness: although the produced password is 24 characters long, the password is still weak. We elaborate on the weakness and propose a solution that produces strong passwords. The proposed version first requires the use of the SHIFT and ALT-GR keys in combination with other keys, and second, the keys need to be 1-2 distances apart. Conclusions The proposed improved PsychoPass method yields passwords that can be broken only in hundreds of years based on current computing powers. The proposed PsychoPass method requires 10 keys, as opposed to 20 keys in the original method, for comparable password strength. PMID:23942458
Mishra, Raghavendra; Barnwal, Amit Kumar
2015-05-01
The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.
Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model
Nam, Junghyun; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks. PMID:24977229
Secure Biometric Multi-Logon System Based on Current Authentication Technologies
NASA Astrophysics Data System (ADS)
Tait, Bobby L.
The need for accurate authentication in the current IT world is of utmost importance. Users rely on current IT technologies to facilitate in day to day interactions with nearly all environments. Strong authentication technologies like the various biometric technologies have been in existence for many years. Many of these technologies, for instance fingerprint biometrics, have reached maturity. However, passwords and pins are still the most commonly used authentication mechanisms at this stage. An average user has to be authenticated in various situations during daily interaction with his or her environment, by means of a pin or a password. This results in many different passwords and pins that the user has to remember. The user will eventually either start documenting these passwords and pins, or often, simply use the same password and pin for all authentication situations.
MeV+R: using MeV as a graphical user interface for Bioconductor applications in microarray analysis
Chu, Vu T; Gottardo, Raphael; Raftery, Adrian E; Bumgarner, Roger E; Yeung, Ka Yee
2008-01-01
We present MeV+R, an integration of the JAVA MultiExperiment Viewer program with Bioconductor packages. This integration of MultiExperiment Viewer and R is easily extensible to other R packages and provides users with point and click access to traditionally command line driven tools written in R. We demonstrate the ability to use MultiExperiment Viewer as a graphical user interface for Bioconductor applications in microarray data analysis by incorporating three Bioconductor packages, RAMA, BRIDGE and iterativeBMA. PMID:18652698
Architecture with GIDEON, A Program for Design in Structural DNA Nanotechnology
Birac, Jeffrey J.; Sherman, William B.; Kopatsch, Jens; Constantinou, Pamela E.; Seeman, Nadrian C.
2012-01-01
We present geometry based design strategies for DNA nanostructures. The strategies have been implemented with GIDEON – a Graphical Integrated Development Environment for OligoNucleotides. GIDEON has a highly flexible graphical user interface that facilitates the development of simple yet precise models, and the evaluation of strains therein. Models are built on a simple model of undistorted B-DNA double-helical domains. Simple point and click manipulations of the model allow the minimization of strain in the phosphate-backbone linkages between these domains and the identification of any steric clashes that might occur as a result. Detailed analysis of 3D triangles yields clear predictions of the strains associated with triangles of different sizes. We have carried out experiments that confirm that 3D triangles form well only when their geometrical strain is less than 4% deviation from the estimated relaxed structure. Thus geometry-based techniques alone, without energetic considerations, can be used to explain general trends in DNA structure formation. We have used GIDEON to build detailed models of double crossover and triple crossover molecules, evaluating the non-planarity associated with base tilt and junction mis-alignments. Computer modeling using a graphical user interface overcomes the limited precision of physical models for larger systems, and the limited interaction rate associated with earlier, command-line driven software. PMID:16630733
NASA Technical Reports Server (NTRS)
Collins, Earl R., Jr.
1990-01-01
Authorized users respond to changing challenges with changing passwords. Scheme for controlling access to computers defeats eavesdroppers and "hackers". Based on password system of challenge and password or sign, challenge, and countersign correlated with random alphanumeric codes in matrices of two or more dimensions. Codes stored on floppy disk or plug-in card and changed frequently. For even higher security, matrices of four or more dimensions used, just as cubes compounded into hypercubes in concurrent processing.
Granatum: a graphical single-cell RNA-Seq analysis pipeline for genomics scientists.
Zhu, Xun; Wolfgruber, Thomas K; Tasato, Austin; Arisdakessian, Cédric; Garmire, David G; Garmire, Lana X
2017-12-05
Single-cell RNA sequencing (scRNA-Seq) is an increasingly popular platform to study heterogeneity at the single-cell level. Computational methods to process scRNA-Seq data are not very accessible to bench scientists as they require a significant amount of bioinformatic skills. We have developed Granatum, a web-based scRNA-Seq analysis pipeline to make analysis more broadly accessible to researchers. Without a single line of programming code, users can click through the pipeline, setting parameters and visualizing results via the interactive graphical interface. Granatum conveniently walks users through various steps of scRNA-Seq analysis. It has a comprehensive list of modules, including plate merging and batch-effect removal, outlier-sample removal, gene-expression normalization, imputation, gene filtering, cell clustering, differential gene expression analysis, pathway/ontology enrichment analysis, protein network interaction visualization, and pseudo-time cell series construction. Granatum enables broad adoption of scRNA-Seq technology by empowering bench scientists with an easy-to-use graphical interface for scRNA-Seq data analysis. The package is freely available for research use at http://garmiregroup.org/granatum/app.
Storage-based Intrusion Detection: Watching storage activity for suspicious behavior
2002-10-01
password management involves a pair of inter-related files (/etc/ passwd and /etc/shadow). The corresponding access pat- terns seen at the storage...example, consider a UNIX system password file (/etc/ passwd ), which con- sists of a set of well-defined records. Records are delimited by a line-break, and...etc/ passwd and verify that they conform to a set of basic integrity rules: 7-field records, non-empty password field, legal default shell, legal home
Smartphone-based secure authenticated session sharing in Internet of Personal Things
NASA Astrophysics Data System (ADS)
Krishnan, Ram; Ninglekhu, Jiwan
2015-03-01
In the context of password-based authentication, a user can only memorize limited number of usernames and passwords. They are generally referred to as user-credentials. Longer character length of passwords further adds complication in mastering them. The expansion of the Internet and our growing dependency on it, has made it almost impossible for us to handle the big pool of user-credentials. Using simple, same or similar passwords is considered a poor practice, as it can easily be compromised by password cracking tools and social engineering attacks. Therefore, a robust and painless technique to manage personal credentials for websites is desirable. In this paper, a novel technique for user-credentials management via a smart mobile device such as a smartphone in a local network is proposed. We present a secure user-credential management scheme in which user's account login (username) and password associated with websites domain name is saved into the mobile device's database using a mobile application. We develop a custom browser extension application for client and use it to import user's credentials linked with the corresponding website from the mobile device via the local Wi-Fi network connection. The browser extension imports and identifies the authentication credentials and pushes them into the target TextBox locations in the webpage, ready for the user to execute. This scheme is suitably demonstrated between two personal devices in a local network.
NWS Marine, Tropical, and Tsunami Services Branch Feedback
Service NWS logo - Click to go to the NWS homepage Marine Forecasts Marine Forecasts Home News Organization Search Landlubber's forecast: "City, St" or zip code (Pan/Zoom for Marine) Search by Office Marine, Tropical, and Tsunami Services Branch Items of Interest Marine Forecasts Text, Graphic
The effects of platform motion and target orientation on the performance of trackball manipulation.
Yau, Yi-Jan; Chao, Chin-Jung; Feng, Wen-Yang; Hwang, Sheue-Ling
2011-08-01
The trackball has been widely employed as a control/command input device on moving vehicles, but few studies have explored the effects of platform motion on its manipulation. Fewer still have considered this issue in designing the user interface and the arrangement of console location and orientation simultaneously. This work describes an experiment carried out to investigate the performance of trackball users on a simple point-and-click task in a motion simulator. By varying the orientation of onscreen targets, the effect of cursor movement direction on performance is investigated. The results indicate that the platform motion and target orientation both significantly affect the time required to point and click, but not the accuracy of target selection. The movement times were considerably longer under rolling and pitching motions and for targets located along the diagonal axes of the interface. Subjective evaluations carried out by the participants agree with these objective results. These findings could be used to optimise console and graphical menu design for use on maritime vessels. STATEMENT OF RELEVANCE: In military situations, matters of life or death may be decided in milliseconds. Any delay or error in classification and identification will thus affect the safety of the ship and its crew. This study demonstrates that performance of manipulating a trackball is affected by the platform motion and target orientation. The results of the present study can guide the arrangement of consoles and the design of trackball-based graphical user interfaces on maritime vessels.
User Account Passwords | High-Performance Computing | NREL
Account Passwords User Account Passwords For NREL's high-performance computing (HPC) systems, learn about user account password requirements and how to set up, log in, and change passwords. Password Logging In the First Time After you request an HPC user account, you'll receive a temporary password. Set
Multi-step EMG Classification Algorithm for Human-Computer Interaction
NASA Astrophysics Data System (ADS)
Ren, Peng; Barreto, Armando; Adjouadi, Malek
A three-electrode human-computer interaction system, based on digital processing of the Electromyogram (EMG) signal, is presented. This system can effectively help disabled individuals paralyzed from the neck down to interact with computers or communicate with people through computers using point-and-click graphic interfaces. The three electrodes are placed on the right frontalis, the left temporalis and the right temporalis muscles in the head, respectively. The signal processing algorithm used translates the EMG signals during five kinds of facial movements (left jaw clenching, right jaw clenching, eyebrows up, eyebrows down, simultaneous left & right jaw clenching) into five corresponding types of cursor movements (left, right, up, down and left-click), to provide basic mouse control. The classification strategy is based on three principles: the EMG energy of one channel is typically larger than the others during one specific muscle contraction; the spectral characteristics of the EMG signals produced by the frontalis and temporalis muscles during different movements are different; the EMG signals from adjacent channels typically have correlated energy profiles. The algorithm is evaluated on 20 pre-recorded EMG signal sets, using Matlab simulations. The results show that this method provides improvements and is more robust than other previous approaches.
Advancing satellite operations with intelligent graphical monitoring systems
NASA Technical Reports Server (NTRS)
Hughes, Peter M.; Shirah, Gregory W.; Luczak, Edward C.
1993-01-01
For nearly twenty-five years, spacecraft missions have been operated in essentially the same manner: human operators monitor displays filled with alphanumeric text watching for limit violations or other indicators that signal a problem. The task is performed predominately by humans. Only in recent years have graphical user interfaces and expert systems been accepted within the control center environment to help reduce operator workloads. Unfortunately, the development of these systems is often time consuming and costly. At the NASA Goddard Space Flight Center (GSFC), a new domain specific expert system development tool called the Generic Spacecraft Analyst Assistant (GenSAA) has been developed. Through the use of a highly graphical user interface and point-and-click operation, GenSAA facilitates the rapid, 'programming-free' construction of intelligent graphical monitoring systems to serve as real-time, fault-isolation assistants for spacecraft analysts. Although specifically developed to support real-time satellite monitoring, GenSAA can support the development of intelligent graphical monitoring systems in a variety of space and commercial applications.
Prevalence of Sharing Access Credentials in Electronic Medical Records
Korach, Tzfania; Shreberk-Hassidim, Rony; Thomaidou, Elena; Uzefovsky, Florina; Ayal, Shahar; Ariely, Dan
2017-01-01
Objectives Confidentiality of health information is an important aspect of the physician patient relationship. The use of digital medical records has made data much more accessible. To prevent data leakage, many countries have created regulations regarding medical data accessibility. These regulations require a unique user ID for each medical staff member, and this must be protected by a password, which should be kept undisclosed by all means. Methods We performed a four-question Google Forms-based survey of medical staff. In the survey, each participant was asked if he/she ever obtained the password of another medical staff member. Then, we asked how many times such an episode occurred and the reason for it. Results A total of 299 surveys were gathered. The responses showed that 220 (73.6%) participants reported that they had obtained the password of another medical staff member. Only 171 (57.2%) estimated how many time it happened, with an average estimation of 4.75 episodes. All the residents that took part in the study (45, 15%) had obtained the password of another medical staff member, while only 57.5% (38/66) of the nurses reported this. Conclusions The use of unique user IDs and passwords to defend the privacy of medical data is a common requirement in medical organizations. Unfortunately, the use of passwords is doomed because medical staff members share their passwords with one another. Strict regulations requiring each staff member to have it's a unique user ID might lead to password sharing and to a decrease in data safety. PMID:28875052
Simple group password-based authenticated key agreements for the integrated EPR information system.
Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng
2013-04-01
The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.
Social Media in a Content Course for the Digital Natives
ERIC Educational Resources Information Center
Lie, Anita
2013-01-01
Digital technologies and the Internet have revolutionized the way people gather information and acquire new knowledge. With a click of a button or a touch on the screen, any person who is wired to the internet can access a wealth of information, ranging from books, poems, articles, graphics, animations and so much more. It is imperative that…
2011-08-31
2011 4 . TITLE AND SUBTITLE Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms 5a. CONTRACT...large numbers of hashed passwords (Booz Allen Hamilton, HBGary, Gawker, Sony Playstation , etc.), coupled with the availability of botnets that offer...when evaluating the strength of different password-composition policies. 4 . We investigate the effectiveness of entropy as a measure of password
A resettable and reprogrammable DNA-based security system to identify multiple users with hierarchy.
Li, Hailong; Hong, Wei; Dong, Shaojun; Liu, Yaqing; Wang, Erkang
2014-03-25
Molecular-level security devices have raised ever-increasing interest in recent years to protect data and information from illegal invasion. Prior molecular keypad locks have an output signal dependent upon not only the appropriate combination but also the exact sequence of inputs, but it cannot be reset or reprogrammed. Here, a DNA-based security system with reset and never-reported reprogram function is successfully developed in proof-of-principle, with which one can change the password in case that the system is cracked. The previous password becomes invalid in the reprogrammed security system. Interestingly, more than one password is designed to permit multiple users to access. By harnessing the intrinsic merit of the different passwords, the system can distinguish different user who is endowed with prior authority. The intelligent device is addressed on solid support and facilitates electronic processes, avoiding chemical accumulation in the system by simple removal of the electrode from the input solution and indicating a main avenue for its further development.
Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho
2016-03-01
Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties.
NASA Astrophysics Data System (ADS)
Bonneau, Joseph; Just, Mike; Matthews, Greg
We study the efficiency of statistical attacks on human authentication systems relying on personal knowledge questions. We adapt techniques from guessing theory to measure security against a trawling attacker attempting to compromise a large number of strangers' accounts. We then examine a diverse corpus of real-world statistical distributions for likely answer categories such as the names of people, pets, and places and find that personal knowledge questions are significantly less secure than graphical or textual passwords. We also demonstrate that statistics can be used to increase security by proactively shaping the answer distribution to lower the prevalence of common responses.
Ramo, Danielle E.; Rodriguez, Theresa M.S.; Chavez, Kathryn; Sommer, Markus J.; Prochaska, Judith J.
2014-01-01
Further understanding is needed of the functionalities and efficiency of social media for health intervention research recruitment. Facebook was examined as a mechanism to recruit young adults for a smoking cessation intervention. An ad campaign targeting young adult smokers tested specific messaging based on market theory and successful strategies used to recruit smokers in previous clinical trials (i.e. informative, call to action, scarcity, social norms), previously successful ads, and general messaging. Images were selected to target smokers (e.g., lit cigarette), appeal to the target age, vary demographically, and vary graphically (cartoon, photo, logo). Facebook’s Ads Manager was used over 7 weeks (6/10/13 – 7/29/13), targeted by age (18–25), location (U.S.), and language (English), and employed multiple ad types (newsfeed, standard, promoted posts, sponsored stories) and keywords. Ads linked to the online screening survey or study Facebook page. The 36 different ads generated 3,198,373 impressions, 5,895 unique clicks, at an overall cost of $2,024 ($0.34/click). Images of smoking and newsfeed ads had the greatest reach and clicks at the lowest cost. Of 5,895 unique clicks, 586 (10%) were study eligible and 230 (39%) consented. Advertising costs averaged $8.80 per eligible, consented participant. The final study sample (n=79) was largely Caucasian (77%) and male (69%), averaging 11 cigarettes/day (SD=8.3) and 2.7 years smoking (SD=0.7). Facebook is a useful, cost-effective recruitment source for young adult smokers. Ads posted via newsfeed posts were particularly successful, likely because they were viewable via mobile phone. Efforts to engage more ethnic minorities, young women, and smokers motivated to quit are needed. PMID:25045624
Ramo, Danielle E; Rodriguez, Theresa M S; Chavez, Kathryn; Sommer, Markus J; Prochaska, Judith J
2014-04-01
Further understanding is needed of the functionalities and efficiency of social media for health intervention research recruitment. Facebook was examined as a mechanism to recruit young adults for a smoking cessation intervention. An ad campaign targeting young adult smokers tested specific messaging based on market theory and successful strategies used to recruit smokers in previous clinical trials (i.e. informative, call to action, scarcity, social norms), previously successful ads, and general messaging. Images were selected to target smokers (e.g., lit cigarette), appeal to the target age, vary demographically, and vary graphically (cartoon, photo, logo). Facebook's Ads Manager was used over 7 weeks (6/10/13 - 7/29/13), targeted by age (18-25), location (U.S.), and language (English), and employed multiple ad types (newsfeed, standard, promoted posts, sponsored stories) and keywords. Ads linked to the online screening survey or study Facebook page. The 36 different ads generated 3,198,373 impressions, 5,895 unique clicks, at an overall cost of $2,024 ($0.34/click). Images of smoking and newsfeed ads had the greatest reach and clicks at the lowest cost. Of 5,895 unique clicks, 586 (10%) were study eligible and 230 (39%) consented. Advertising costs averaged $8.80 per eligible, consented participant. The final study sample (n=79) was largely Caucasian (77%) and male (69%), averaging 11 cigarettes/day (SD=8.3) and 2.7 years smoking (SD=0.7). Facebook is a useful, cost-effective recruitment source for young adult smokers. Ads posted via newsfeed posts were particularly successful, likely because they were viewable via mobile phone. Efforts to engage more ethnic minorities, young women, and smokers motivated to quit are needed.
Are Password Management Applications Viable? An Analysis of User Training and Reactions
ERIC Educational Resources Information Center
Ciampa, Mark
2011-01-01
Passwords have the distinction of being the most widely-used form of authentication--and the most vulnerable. With the dramatic increase today in the number of accounts that require passwords, overwhelmed users usually resort to creating weak passwords or reusing the same password for multiple accounts, thus making passwords the weakest link in…
Interactive graphics to demonstrate health risks: formative development and qualitative evaluation
Ancker, Jessica S.; Chan, Connie; Kukafka, Rita
2015-01-01
Background Recent findings suggest that interactive game-like graphics might be useful in communicating probabilities. We developed a prototype for a risk communication module, focusing on eliciting users’ preferences for different interactive graphics and assessing usability and user interpretations. Methods Focus groups and iterative design methods. Results Feedback from five focus groups was used to design the graphics. The final version displayed a matrix of square buttons; clicking on any button allowed the user to see whether the stick figure underneath was affected by the health outcome. When participants used this interaction to learn about a risk, they expressed more emotional responses, both positive and negative, than when viewing any static graphic or numerical description of a risk. Their responses included relief about small risks and concern about large risks. The groups also commented on static graphics: arranging the figures affected by disease randomly throughout a group of figures made it more difficult to judge the proportion affected but was described as more realistic. Conclusions Interactive graphics appear to have potential for expressing risk magnitude as well as the affective feeling of risk. Quantitative studies are planned to assess the effect on perceived risks and estimated risk magnitudes. PMID:19657926
NASA Technical Reports Server (NTRS)
Arnold, Steven M.; Bednarcyk, Brett A.; Hussain, Aquila; Katiyar, Vivek
2010-01-01
A unified framework is presented that enables coupled multiscale analysis of composite structures and associated graphical pre- and postprocessing within the Abaqus/CAE environment. The recently developed, free, Finite Element Analysis--Micromechanics Analysis Code (FEAMAC) software couples NASA's Micromechanics Analysis Code with Generalized Method of Cells (MAC/GMC) with Abaqus/Standard and Abaqus/Explicit to perform micromechanics based FEA such that the nonlinear composite material response at each integration point is modeled at each increment by MAC/GMC. The Graphical User Interfaces (FEAMAC-Pre and FEAMAC-Post), developed through collaboration between SIMULIA Erie and the NASA Glenn Research Center, enable users to employ a new FEAMAC module within Abaqus/CAE that provides access to the composite microscale. FEA IAC-Pre is used to define and store constituent material properties, set-up and store composite repeating unit cells, and assign composite materials as sections with all data being stored within the CAE database. Likewise FEAMAC-Post enables multiscale field quantity visualization (contour plots, X-Y plots), with point and click access to the microscale i.e., fiber and matrix fields).
Internet Address Space Management in Digital
1992-09-01
password: % passwd Changing password for wade Old password: New password: Retype new password: 3. Log out of the cluster center machine by typing...that on some machine, you can use the " passwd " command on the machine where the change is needed. 16
Keystroke Dynamics-Based Credential Hardening Systems
NASA Astrophysics Data System (ADS)
Bartlow, Nick; Cukic, Bojan
abstract Keystroke dynamics are becoming a well-known method for strengthening username- and password-based credential sets. The familiarity and ease of use of these traditional authentication schemes combined with the increased trustworthiness associated with biometrics makes them prime candidates for application in many web-based scenarios. Our keystroke dynamics system uses Breiman’s random forests algorithm to classify keystroke input sequences as genuine or imposter. The system is capable of operating at various points on a traditional ROC curve depending on application-specific security needs. As a username/password authentication scheme, our approach decreases the system penetration rate associated with compromised passwords up to 99.15%. Beyond presenting results demonstrating the credential hardening effect of our scheme, we look into the notion that a user’s familiarity to components of a credential set can non-trivially impact error rates.
Secure password-based authenticated key exchange for web services
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liang, Fang; Meder, Samuel; Chevassut, Olivier
This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options inmore » the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.« less
On the security of a simple three-party key exchange protocol without server's public keys.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho
2014-01-01
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.
On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys
Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho
2014-01-01
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723
Mishra, Dheerendra
2015-01-01
Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.
Strong Password-Based Authentication in TLS Using the Three-PartyGroup Diffie-Hellman Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abdalla, Michel; Bresson, Emmanuel; Chevassut, Olivier
2006-08-26
The Internet has evolved into a very hostile ecosystem where"phishing'' attacks are common practice. This paper shows that thethree-party group Diffie-Hellman key exchange can help protect againstthese attacks. We have developed a suite of password-based cipher suitesfor the Transport Layer Security (TLS) protocol that are not onlyprovably secure but also assumed to be free from patent and licensingrestrictions based on an analysis of relevant patents in thearea.
Biometrics based authentication scheme for session initiation protocol.
Xie, Qi; Tang, Zhixiong
2016-01-01
Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.
Facelock: familiarity-based graphical authentication.
Jenkins, Rob; McLachlan, Jane L; Renaud, Karen
2014-01-01
Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised 'facelock', in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (<1% success rate). Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems.
2008-09-01
Behavioural Point Process Data 234 Appendix B: Matlab Code 258 Matlab Code Used in Chapter 2 (Porpoise Prey Capture Analysis) 258 Click Extraction and...Measurement of Click Properties 258 Envelope-based Click Detector 262 Matlab Code Used in Chapter 3 (Transmission Loss in Porpoise Habitats) ..267...Click Extraction from Data Wavefiles 267 Click Level Determination (Grand Manan Datasets) 270 Click Level Determination (Danish Datasets) 287 Matlab
Alternative Fuels Data Center: Forgot Your Password?
AFDC Printable Version Share this resource Send a link to Alternative Fuels Data Center: Forgot Your Password? to someone by E-mail Share Alternative Fuels Data Center: Forgot Your Password? on to share Alternative Fuels Data Center: Forgot Your Password? on AddThis.com... Forgot Your Password
NASA Technical Reports Server (NTRS)
Bishop, Matt
1990-01-01
Password selection has long been a difficult issue; traditionally, passwords are either assigned by the computer or chosen by the user. When the computer does the assignment, the passwords are often hard to remember; when the user makes the selection, the passwords are often easy to guess. This paper describes a technique, and a mechanism, to allow users to select passwords which to them are easy to remember but to others would be very difficult to guess. The technique is site, user, and group compatible, and allows rapid changing of constraints imposed upon the password. Although experience with this technique is limited, it appears to have much promise.
Virtual Frog Dissection: Interactive 3D Graphics Via the Web
Kit''. A student using this kit has the ability to view various parts of a frog from many different angles, and with the different anatomical structures visible or invisible. For example, the student can up to 60 kilobytes for high quality. Clicking on the image yields different results depending on how
Interactive graphics for expressing health risks: development and qualitative evaluation.
Ancker, Jessica S; Chan, Connie; Kukafka, Rita
2009-01-01
Recent findings suggest that interactive game-like graphics might be useful in communicating probabilities. We developed a prototype for a risk communication module, focusing on eliciting users' preferences for different interactive graphics and assessing usability and user interpretations. Feedback from five focus groups was used to design the graphics. The final version displayed a matrix of square buttons; clicking on any button allowed the user to see whether the stick figure underneath was affected by the health outcome. When participants used this interaction to learn about a risk, they expressed more emotional responses, both positive and negative, than when viewing any static graphic or numerical description of a risk. Their responses included relief about small risks and concern about large risks. The groups also commented on static graphics: arranging the figures affected by disease randomly throughout a group of figures made it more difficult to judge the proportion affected but often was described as more realistic. Interactive graphics appear to have potential for expressing risk magnitude as well as the feeling of risk. This affective impact could be useful in increasing perceived threat of high risks, calming fears about low risks, or comparing risks. Quantitative studies are planned to assess the effect on perceived risks and estimated risk magnitudes.
Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho
2017-01-01
Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.
Kang, Dongwoo; Lee, Donghoon; Won, Dongho
2017-01-01
Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075
Click rates and silences of sperm whales at Kaikoura, New Zealand
NASA Astrophysics Data System (ADS)
Douglas, Lesley A.; Dawson, Stephen M.; Jaquet, Nathalie
2005-07-01
Analysis of the usual click rates of sperm whales (Physeter macrocephalus) at Kaikoura, New Zealand, confirms the potential for assessing abundance via ``click counting.'' Usual click rates over three dive cycles each of three photographically identified whales showed that 5 min averages of usual click rate did not differ significantly within dives, among dives of the same whale or among whales. Over the nine dives (n=13 728 clicks) mean usual click rate was 1.272 clicks s-1 (95% CI=0.151). On average, individual sperm whales at Kaikoura spent 60% of their time usual clicking in winter and in summer. There was no evidence that whale identity or stage of the dive recorded affects significantly the percentage of time spent usual clicking. Differences in vocal behavior among sperm whale populations worldwide indicate that estimates of abundance that are based on click rates need to based on data from the population of interest, rather than from another population or some global average.
NASA Astrophysics Data System (ADS)
Imamah; Djunaidy, A.; Rachmad, A.; Damayanti, F.
2018-01-01
Password is needed to access the computing services. Text password is a combination between characters, numbers and symbols. One of issues is users will often choose guessable passwords, e.g. date of birth, name of pet, or anniversary date. To address this issue, we proposed password generator using Coupled Congruential method (CLCG). CLCG is a method to solve the weakness of Linear Congruential generator (LCG). In this research, we want to prove that CLCG is really good to generate random password compared to LCG method. The result of this research proves that the highest password strength is obtained by CLCG with score 77.4%. Besides of those things, we had proved that term of LCG is also applicable to CLCG.
[Application of password manager software in health care].
Ködmön, József
2016-12-01
When using multiple IT systems, handling of passwords in a secure manner means a potential source of problem. The most frequent issues are choosing the appropriate length and complexity, and then remembering the strong passwords. Password manager software provides a good solution for this problem, while greatly increasing the security of sensitive medical data. This article introduces a password manager software and provides basic information of the application. It also discusses how to select a really secure password manager software and suggests a practical application to efficient, safe and comfortable use for health care. Orv. Hetil., 2016, 157(52), 2066-2073.
Cazier, Joseph A; Medlin, B Dawn
2006-09-27
For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed.
Cazier, Joseph A; Medlin, B. Dawn
2006-01-01
For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed. PMID:18066366
NASA Astrophysics Data System (ADS)
Coggins, Porter E.
2015-04-01
The purpose of this paper is (1) to present how general education elementary school age students constructed computer passwords using digital root sums and second-order arithmetic sequences, (2) argue that computer password construction can be used as an engaging introduction to generate interest in elementary school students to study mathematics related to computer science, and (3) share additional mathematical ideas accessible to elementary school students that can be used to create computer passwords. This paper serves to fill a current gap in the literature regarding the integration of mathematical content accessible to upper elementary school students and aspects of computer science in general, and computer password construction in particular. In addition, the protocols presented here can serve as a hook to generate further interest in mathematics and computer science. Students learned to create a random-looking computer password by using biometric measurements of their shoe size, height, and age in months and to create a second-order arithmetic sequence, then converted the resulting numbers into characters that become their computer passwords. This password protocol can be used to introduce students to good computer password habits that can serve a foundation for a life-long awareness of data security. A refinement of the password protocol is also presented.
Proctor, Robert W; Lien, Mei-Ching; Vu, Kim-Phuong L; Schultz, E Eugene; Salvendy, Gavriel
2002-05-01
Entering a username-password combination is a widely used procedure for identification and authentication in computer systems. However, it is a notoriously weak method, in that the passwords adopted by many users are easy to crack. In an attempt to improve security, proactive password checking may be used, in which passwords must meet several criteria to be more resistant to cracking. In two experiments, we examined the influence of proactive password restrictions on the time that it took to generate an acceptable password and to use it subsequently to long in. The required length was a minimum of five characters in Experiment 1 and eight characters in Experiment 2. In both experiments, one condition had only the length restriction, and the other had additional restrictions. The additional restrictions greatly increased the time it took to generate the password but had only a small effect on the time it took to use it subsequently to long in. For the five-character passwords, 75% were cracked when no other restrictions were imposed, and this was reduced to 33% with the additional restrictions. For the eight-character passwords, 17% were cracked with no other restrictions, and 12.5% with restrictions. The results indicate that increasing the minimum character length reduces crackability and increases security, regardless of whether additional restrictions are imposed.
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers
2014-07-07
POST re- quest, LastPass will store h’ as authenticating Alice. Mallory can then use otp’ to log-in to LastPass us- ing otp’. Of course , decrypting the...everywhere. [36] M. Rochkind. Security, forms, and error handling. In Expert PHP and MySQL , pages 191–247. Springer, 2013. [37] D. Silver, S. Jana, E
Privacy Enhancements for Inexact Biometric Templates
NASA Astrophysics Data System (ADS)
Ratha, Nalini; Chikkerur, Sharat; Connell, Jonathan; Bolle, Ruud
Traditional authentication schemes utilize tokens or depend on some secret knowledge possessed by the user for verifying his or her identity. Although these techniques are widely used, they have several limitations. Both tokenand knowledge-based approaches cannot differentiate between an authorized user and an impersonator having access to the tokens or passwords. Biometrics-based authentication schemes overcome these limitations while offering usability advantages in the area of password management. However, despite its obvious advantages, the use of biometrics raises several security and privacy concerns.
JaxoDraw: A graphical user interface for drawing Feynman diagrams
NASA Astrophysics Data System (ADS)
Binosi, D.; Theußl, L.
2004-08-01
JaxoDraw is a Feynman graph plotting tool written in Java. It has a complete graphical user interface that allows all actions to be carried out via mouse click-and-drag operations in a WYSIWYG fashion. Graphs may be exported to postscript/EPS format and can be saved in XML files to be used for later sessions. One of JaxoDraw's main features is the possibility to create ? code that may be used to generate graphics output, thus combining the powers of ? with those of a modern day drawing program. With JaxoDraw it becomes possible to draw even complicated Feynman diagrams with just a few mouse clicks, without the knowledge of any programming language. Program summaryTitle of program: JaxoDraw Catalogue identifier: ADUA Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADUA Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Distribution format: tar gzip file Operating system: Any Java-enabled platform, tested on Linux, Windows ME, XP, Mac OS X Programming language used: Java License: GPL Nature of problem: Existing methods for drawing Feynman diagrams usually require some 'hard-coding' in one or the other programming or scripting language. It is not very convenient and often time consuming, to generate relatively simple diagrams. Method of solution: A program is provided that allows for the interactive drawing of Feynman diagrams with a graphical user interface. The program is easy to learn and use, produces high quality output in several formats and runs on any operating system where a Java Runtime Environment is available. Number of bytes in distributed program, including test data: 2 117 863 Number of lines in distributed program, including test data: 60 000 Restrictions: Certain operations (like internal latex compilation, Postscript preview) require the execution of external commands that might not work on untested operating systems. Typical running time: As an interactive program, the running time depends on the complexity of the diagram to be drawn.
Multi-agent integrated password management (MIPM) application secured with encryption
NASA Astrophysics Data System (ADS)
Awang, Norkhushaini; Zukri, Nurul Hidayah Ahmad; Rashid, Nor Aimuni Md; Zulkifli, Zuhri Arafah; Nazri, Nor Afifah Mohd
2017-10-01
Users use weak passwords and reuse them on different websites and applications. Password managers are a solution to store login information for websites and help users log in automatically. This project developed a system that acts as an agent managing passwords. Multi-Agent Integrated Password Management (MIPM) is an application using encryption that provides users with secure storage of their login account information such as their username, emails and passwords. This project was developed on an Android platform with an encryption agent using Java Agent Development Environment (JADE). The purpose of the embedded agents is to act as a third-party software to ease the encryption process, and in the future, the developed encryption agents can form part of the security system. This application can be used by the computer and mobile users. Currently, users log into many applications causing them to use unique passwords to prevent password leaking. The crypto agent handles the encryption process using an Advanced Encryption Standard (AES) 128-bit encryption algorithm. As a whole, MIPM is developed on the Android application to provide a secure platform to store passwords and has high potential to be commercialised for public use.
[Sem: a suitable statistical software adaptated for research in oncology].
Kwiatkowski, F; Girard, M; Hacene, K; Berlie, J
2000-10-01
Many softwares have been adapted for medical use; they rarely enable conveniently both data management and statistics. A recent cooperative work ended up in a new software, Sem (Statistics Epidemiology Medicine), which allows data management of trials and, as well, statistical treatments on them. Very convenient, it can be used by non professional in statistics (biologists, doctors, researchers, data managers), since usually (excepted with multivariate models), the software performs by itself the most adequate test, after what complementary tests can be requested if needed. Sem data base manager (DBM) is not compatible with usual DBM: this constitutes a first protection against loss of privacy. Other shields (passwords, cryptage...) strengthen data security, all the more necessary today since Sem can be run on computers nets. Data organization enables multiplicity: forms can be duplicated by patient. Dates are treated in a special but transparent manner (sorting, date and delay calculations...). Sem communicates with common desktop softwares, often with a simple copy/paste. So, statistics can be easily performed on data stored in external calculation sheets, and slides by pasting graphs with a single mouse click (survival curves...). Already used over fifty places in different hospitals for daily work, this product, combining data management and statistics, appears to be a convenient and innovative solution.
Facelock: familiarity-based graphical authentication
McLachlan, Jane L.; Renaud, Karen
2014-01-01
Authentication codes such as passwords and PIN numbers are widely used to control access to resources. One major drawback of these codes is that they are difficult to remember. Account holders are often faced with a choice between forgetting a code, which can be inconvenient, or writing it down, which compromises security. In two studies, we test a new knowledge-based authentication method that does not impose memory load on the user. Psychological research on face recognition has revealed an important distinction between familiar and unfamiliar face perception: When a face is familiar to the observer, it can be identified across a wide range of images. However, when the face is unfamiliar, generalisation across images is poor. This contrast can be used as the basis for a personalised ‘facelock’, in which authentication succeeds or fails based on image-invariant recognition of faces that are familiar to the account holder. In Study 1, account holders authenticated easily by detecting familiar targets among other faces (97.5% success rate), even after a one-year delay (86.1% success rate). Zero-acquaintance attackers were reduced to guessing (<1% success rate). Even personal attackers who knew the account holder well were rarely able to authenticate (6.6% success rate). In Study 2, we found that shoulder-surfing attacks by strangers could be defeated by presenting different photos of the same target faces in observed and attacked grids (1.9% success rate). Our findings suggest that the contrast between familiar and unfamiliar face recognition may be useful for developers of graphical authentication systems. PMID:25024913
Mishra, Dheerendra; Mukhopadhyay, Sourav; Chaturvedi, Ankita; Kumari, Saru; Khan, Muhammad Khurram
2014-06-01
Remote user authentication is desirable for a Telecare Medicine Information System (TMIS) for the safety, security and integrity of transmitted data over the public channel. In 2013, Tan presented a biometric based remote user authentication scheme and claimed that his scheme is secure. Recently, Yan et al. demonstrated some drawbacks in Tan's scheme and proposed an improved scheme to erase the drawbacks of Tan's scheme. We analyze Yan et al.'s scheme and identify that their scheme is vulnerable to off-line password guessing attack, and does not protect anonymity. Moreover, in their scheme, login and password change phases are inefficient to identify the correctness of input where inefficiency in password change phase can cause denial of service attack. Further, we design an improved scheme for TMIS with the aim to eliminate the drawbacks of Yan et al.'s scheme.
Johnson, Z. P.; Eady, R. D.; Ahmad, S. F.; Agravat, S.; Morris, T; Else, J; Lank, S. M.; Wiseman, R. W.; O’Connor, D. H.; Penedo, M. C. T.; Larsen, C. P.
2012-01-01
Here we describe the Immunogenetic Management Software (IMS) system, a novel web-based application that permitsmultiplexed analysis of complex immunogenetic traits that are necessary for the accurate planning and execution of experiments involving large animal models, including nonhuman primates. IMS is capable of housing complex pedigree relationships, microsatellite-based MHC typing data, as well as MHC pyrosequencing expression analysis of class I alleles. It includes a novel, automated MHC haplotype naming algorithm and has accomplished an innovative visualization protocol that allows users to view multiple familial and MHC haplotype relationships through a single, interactive graphical interface. Detailed DNA and RNA-based data can also be queried and analyzed in a highly accessible fashion, and flexible search capabilities allow experimental choices to be made based on multiple, individualized and expandable immunogenetic factors. This web application is implemented in Java, MySQL, Tomcat, and Apache, with supported browsers including Internet Explorer and Firefox onWindows and Safari on Mac OS. The software is freely available for distribution to noncommercial users by contacting Leslie. kean@emory.edu. A demonstration site for the software is available at http://typing.emory.edu/typing_demo, user name: imsdemo7@gmail.com and password: imsdemo. PMID:22080300
Johnson, Z P; Eady, R D; Ahmad, S F; Agravat, S; Morris, T; Else, J; Lank, S M; Wiseman, R W; O'Connor, D H; Penedo, M C T; Larsen, C P; Kean, L S
2012-04-01
Here we describe the Immunogenetic Management Software (IMS) system, a novel web-based application that permits multiplexed analysis of complex immunogenetic traits that are necessary for the accurate planning and execution of experiments involving large animal models, including nonhuman primates. IMS is capable of housing complex pedigree relationships, microsatellite-based MHC typing data, as well as MHC pyrosequencing expression analysis of class I alleles. It includes a novel, automated MHC haplotype naming algorithm and has accomplished an innovative visualization protocol that allows users to view multiple familial and MHC haplotype relationships through a single, interactive graphical interface. Detailed DNA and RNA-based data can also be queried and analyzed in a highly accessible fashion, and flexible search capabilities allow experimental choices to be made based on multiple, individualized and expandable immunogenetic factors. This web application is implemented in Java, MySQL, Tomcat, and Apache, with supported browsers including Internet Explorer and Firefox on Windows and Safari on Mac OS. The software is freely available for distribution to noncommercial users by contacting Leslie.kean@emory.edu. A demonstration site for the software is available at http://typing.emory.edu/typing_demo , user name: imsdemo7@gmail.com and password: imsdemo.
NASA Technical Reports Server (NTRS)
Nguyen, Lac; Kenney, Patrick J.
1993-01-01
Development of interactive virtual environments (VE) has typically consisted of three primary activities: model (object) development, model relationship tree development, and environment behavior definition and coding. The model and relationship tree development activities are accomplished with a variety of well-established graphic library (GL) based programs - most utilizing graphical user interfaces (GUI) with point-and-click interactions. Because of this GUI format, little programming expertise on the part of the developer is necessary to create the 3D graphical models or to establish interrelationships between the models. However, the third VE development activity, environment behavior definition and coding, has generally required the greatest amount of time and programmer expertise. Behaviors, characteristics, and interactions between objects and the user within a VE must be defined via command line C coding prior to rendering the environment scenes. In an effort to simplify this environment behavior definition phase for non-programmers, and to provide easy access to model and tree tools, a graphical interface and development tool has been created. The principal thrust of this research is to effect rapid development and prototyping of virtual environments. This presentation will discuss the 'Visual Interface for Virtual Interaction Development' (VIVID) tool; an X-Windows based system employing drop-down menus for user selection of program access, models, and trees, behavior editing, and code generation. Examples of these selection will be highlighted in this presentation, as will the currently available program interfaces. The functionality of this tool allows non-programming users access to all facets of VE development while providing experienced programmers with a collection of pre-coded behaviors. In conjunction with its existing, interfaces and predefined suite of behaviors, future development plans for VIVID will be described. These include incorporation of dual user virtual environment enhancements, tool expansion, and additional behaviors.
Automated classification of dolphin echolocation click types from the Gulf of Mexico.
Frasier, Kaitlin E; Roch, Marie A; Soldevilla, Melissa S; Wiggins, Sean M; Garrison, Lance P; Hildebrand, John A
2017-12-01
Delphinids produce large numbers of short duration, broadband echolocation clicks which may be useful for species classification in passive acoustic monitoring efforts. A challenge in echolocation click classification is to overcome the many sources of variability to recognize underlying patterns across many detections. An automated unsupervised network-based classification method was developed to simulate the approach a human analyst uses when categorizing click types: Clusters of similar clicks were identified by incorporating multiple click characteristics (spectral shape and inter-click interval distributions) to distinguish within-type from between-type variation, and identify distinct, persistent click types. Once click types were established, an algorithm for classifying novel detections using existing clusters was tested. The automated classification method was applied to a dataset of 52 million clicks detected across five monitoring sites over two years in the Gulf of Mexico (GOM). Seven distinct click types were identified, one of which is known to be associated with an acoustically identifiable delphinid (Risso's dolphin) and six of which are not yet identified. All types occurred at multiple monitoring locations, but the relative occurrence of types varied, particularly between continental shelf and slope locations. Automatically-identified click types from autonomous seafloor recorders without verifiable species identification were compared with clicks detected on sea-surface towed hydrophone arrays in the presence of visually identified delphinid species. These comparisons suggest potential species identities for the animals producing some echolocation click types. The network-based classification method presented here is effective for rapid, unsupervised delphinid click classification across large datasets in which the click types may not be known a priori.
Automated classification of dolphin echolocation click types from the Gulf of Mexico
Roch, Marie A.; Soldevilla, Melissa S.; Wiggins, Sean M.; Garrison, Lance P.; Hildebrand, John A.
2017-01-01
Delphinids produce large numbers of short duration, broadband echolocation clicks which may be useful for species classification in passive acoustic monitoring efforts. A challenge in echolocation click classification is to overcome the many sources of variability to recognize underlying patterns across many detections. An automated unsupervised network-based classification method was developed to simulate the approach a human analyst uses when categorizing click types: Clusters of similar clicks were identified by incorporating multiple click characteristics (spectral shape and inter-click interval distributions) to distinguish within-type from between-type variation, and identify distinct, persistent click types. Once click types were established, an algorithm for classifying novel detections using existing clusters was tested. The automated classification method was applied to a dataset of 52 million clicks detected across five monitoring sites over two years in the Gulf of Mexico (GOM). Seven distinct click types were identified, one of which is known to be associated with an acoustically identifiable delphinid (Risso’s dolphin) and six of which are not yet identified. All types occurred at multiple monitoring locations, but the relative occurrence of types varied, particularly between continental shelf and slope locations. Automatically-identified click types from autonomous seafloor recorders without verifiable species identification were compared with clicks detected on sea-surface towed hydrophone arrays in the presence of visually identified delphinid species. These comparisons suggest potential species identities for the animals producing some echolocation click types. The network-based classification method presented here is effective for rapid, unsupervised delphinid click classification across large datasets in which the click types may not be known a priori. PMID:29216184
Voice Biometrics as a Way to Self-service Password Reset
NASA Astrophysics Data System (ADS)
Hohgräfe, Bernd; Jacobi, Sebastian
Password resets are time consuming. Especially when urgent jobs need to be done, it is cumbersome to inform the user helpdesk, to identify oneself and then to wait for response. It is easy to enter a wrong password multiple times, which leads to the blocking of the application. Voice biometrics is an easy and secure way for individuals to reset their own password. Read more about how you can ease the burden of your user helpdesk and how voice biometric password resets benefit your expense situation without harming your security.
BACTrack: A Surveillance Technique for Detecting and Locating Bioagent Attacks
2003-06-10
Implementation • Location History – Location tracking/storage using cell - phone network (geo-location mandated by 2006) • Subscription Services...Reporting – User reports symptoms through automated cell - phone interface using password Individual reports only releasable with password Summary...Earlier detection and location relative to medical surveillance • The cell - phone location based service market can offer a means to implement BACTrack and to distribute its costs
A Secure Mobile-Based Authentication System for e-Banking
NASA Astrophysics Data System (ADS)
Rifà-Pous, Helena
Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable. We propose a challenge-response based one-time password (OTP) scheme that uses symmetric cryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks. Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their own trusted computers.
Klinck, Holger; Mellinger, David K
2011-04-01
The energy ratio mapping algorithm (ERMA) was developed to improve the performance of energy-based detection of odontocete echolocation clicks, especially for application in environments with limited computational power and energy such as acoustic gliders. ERMA systematically evaluates many frequency bands for energy ratio-based detection of echolocation clicks produced by a target species in the presence of the species mix in a given geographic area. To evaluate the performance of ERMA, a Teager-Kaiser energy operator was applied to the series of energy ratios as derived by ERMA. A noise-adaptive threshold was then applied to the Teager-Kaiser function to identify clicks in data sets. The method was tested for detecting clicks of Blainville's beaked whales while rejecting echolocation clicks of Risso's dolphins and pilot whales. Results showed that the ERMA-based detector correctly identified 81.6% of the beaked whale clicks in an extended evaluation data set. Average false-positive detection rate was 6.3% (3.4% for Risso's dolphins and 2.9% for pilot whales).
How strong are passwords used to protect personal health information in clinical trials?
El Emam, Khaled; Moreau, Katherine; Jonker, Elizabeth
2011-02-11
Findings and statements about how securely personal health information is managed in clinical research are mixed. The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices.
How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?
Moreau, Katherine; Jonker, Elizabeth
2011-01-01
Background Findings and statements about how securely personal health information is managed in clinical research are mixed. Objective The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Methods Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. Results We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. Conclusion If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices. PMID:21317106
Code of Federal Regulations, 2010 CFR
2010-07-01
... that my password or other form of authentication has become compromised? 363.19 Section 363.19 Money... that my password or other form of authentication has become compromised? If you become aware that your password has become compromised, that any other form of authentication has been compromised, lost, stolen...
One-Time Password Tokens | High-Performance Computing | NREL
One-Time Password Tokens One-Time Password Tokens For connecting to NREL's high-performance computing (HPC) systems, learn how to set up a one-time password (OTP) token for remote and privileged a one-time pass code from the HPC Operations team. At the sign-in screen Enter your HPC Username in
Simpler and Safer: One Password Opens Many Online Doors
ERIC Educational Resources Information Center
Carnevale, Dan
2007-01-01
Going online nowadays often requires more log-ins and passwords than most people can remember. Faculty and staff members will sometimes write their various passwords on yellow sticky notes and post them on their computer monitors--leaving confidential data wide open to any passer-by. What if there were just one password? A single log-on for e-mail…
Click-based echolocation in bats: not so primitive after all.
Yovel, Yossi; Geva-Sagiv, Maya; Ulanovsky, Nachum
2011-05-01
Echolocating bats of the genus Rousettus produce click sonar signals, using their tongue (lingual echolocation). These signals are often considered rudimentary and are believed to enable only crude performance. However, the main argument supporting this belief, namely the click's reported long duration, was recently shown to be an artifact. In fact, the sonar clicks of Rousettus bats are extremely short, ~50-100 μs, similar to dolphin vocalizations. Here, we present a comparison between the sonar systems of the 'model species' of laryngeal echolocation, the big brown bat (Eptesicus fuscus), and that of lingual echolocation, the Egyptian fruit bat (Rousettus aegyptiacus). We show experimentally that in tasks, such as accurate landing or detection of medium-sized objects, click-based echolocation enables performance similar to laryngeal echolocators. Further, we describe a sophisticated behavioral strategy for biosonar beam steering in clicking bats. Finally, theoretical analyses of the signal design--focusing on their autocorrelations and wideband ambiguity functions--predict that in some aspects, such as target ranging and Doppler-tolerance, click-based echolocation might outperform laryngeal echolocation. Therefore, we suggest that click-based echolocation in bats should be regarded as a viable echolocation strategy, which is in fact similar to the biosonar used by most echolocating animals, including whales and dolphins.
2011-07-25
testing, the EFTR must be keyed with the same key used to encrypt the Enhanced Flight Termination Systems ( EFTS ) message. To ensure identical keys...required to verify the proper state. e. Procedure. (1) Pull up EFTS graphic user interface (GUI) (Figure 3). (2) Click “Receiver Power On...commanded mode steady state input currents will not exceed their specified values. TOP 05-2-543 25 July 2011 19 Figure 3. EFTS GUIa
Dennerlein, J T; Yang, M C
2001-01-01
Pointing devices, essential input tools for the graphical user interface (GUI) of desktop computers, require precise motor control and dexterity to use. Haptic force-feedback devices provide the human operator with tactile cues, adding the sense of touch to existing visual and auditory interfaces. However, the performance enhancements, comfort, and possible musculoskeletal loading of using a force-feedback device in an office environment are unknown. Hypothesizing that the time to perform a task and the self-reported pain and discomfort of the task improve with the addition of force feedback, 26 people ranging in age from 22 to 44 years performed a point-and-click task 540 times with and without an attractive force field surrounding the desired target. The point-and-click movements were approximately 25% faster with the addition of force feedback (paired t-tests, p < 0.001). Perceived user discomfort and pain, as measured through a questionnaire, were also smaller with the addition of force feedback (p < 0.001). However, this difference decreased as additional distracting force fields were added to the task environment, simulating a more realistic work situation. These results suggest that for a given task, use of a force-feedback device improves performance, and potentially reduces musculoskeletal loading during mouse use. Actual or potential applications of this research include human-computer interface design, specifically that of the pointing device extensively used for the graphical user interface.
Design and implementation of face recognition system based on Windows
NASA Astrophysics Data System (ADS)
Zhang, Min; Liu, Ting; Li, Ailan
2015-07-01
In view of the basic Windows login password input way lacking of safety and convenient operation, we will introduce the biometrics technology, face recognition, into the computer to login system. Not only can it encrypt the computer system, also according to the level to identify administrators at all levels. With the enhancement of the system security, user input can neither be a cumbersome nor worry about being stolen password confidential.
Li, Xiong; Niu, Jianwei; Karuppiah, Marimuthu; Kumari, Saru; Wu, Fan
2016-12-01
Benefited from the development of network and communication technologies, E-health care systems and telemedicine have got the fast development. By using the E-health care systems, patient can enjoy the remote medical service provided by the medical server. Medical data are important privacy information for patient, so it is an important issue to ensure the secure of transmitted medical data through public network. Authentication scheme can thwart unauthorized users from accessing services via insecure network environments, so user authentication with privacy protection is an important mechanism for the security of E-health care systems. Recently, based on three factors (password, biometric and smart card), an user authentication scheme for E-health care systems was been proposed by Amin et al., and they claimed that their scheme can withstand most of common attacks. Unfortunate, we find that their scheme cannot achieve the untraceability feature of the patient. Besides, their scheme lacks a password check mechanism such that it is inefficient to find the unauthorized login by the mistake of input a wrong password. Due to the same reason, their scheme is vulnerable to Denial of Service (DoS) attack if the patient updates the password mistakenly by using a wrong password. In order improve the security level of authentication scheme for E-health care application, a robust user authentication scheme with privacy protection is proposed for E-health care systems. Then, security prove of our scheme are analysed. Security and performance analyses show that our scheme is more powerful and secure for E-health care systems when compared with other related schemes.
One-Time Password Registration Key Code Request | High-Performance
Computing | NREL One-Time Password Registration Key Code Request One-Time Password Registration Key Code Request Use this form to request a one-time password (OTP) registration key code for using . Alternate Email In case there is a second email where we might contact you Phone In case we need to contact
Code of Federal Regulations, 2010 CFR
2010-07-01
..., password, and any other form(s) of authentication we may require. We will treat any transactions conducted using your password as having been authorized by you. We are not liable for any loss, liability, cost, or expense that you may incur as a result of transactions made using your password. [72 FR 30978...
Leveraging Social Media to Promote Evidence-Based Continuing Medical Education.
Flynn, Simone; Hebert, Paul; Korenstein, Deborah; Ryan, Mark; Jordan, William B; Keyhani, Salomeh
2017-01-01
New dissemination methods are needed to engage physicians in evidence-based continuing medical education (CME). To examine the effectiveness of social media in engaging physicians in non-industry-sponsored CME. We tested the effect of different media platforms (e-mail, Facebook, paid Facebook and Twitter), CME topics, and different "hooks" (e.g., Q&A, clinical pearl and best evidence) on driving clicks to a landing site featuring non-industry sponsored CME. We modelled the effects of social media platform, CME topic, and hook using negative binomial regression on clicks to a single landing site. We used clicks to landing site adjusted for exposure and message number to calculate rate ratios. To understand how physicians interact with CME content on social media, we also conducted interviews with 10 physicians. The National Physicians Alliance (NPA) membership. NPA e-mail recipients, Facebook followers and friends, and Twitter followers. Clicks to the NPA's CME landing site. On average, 4,544 recipients received each message. Messages generated a total of 592 clicks to the landing site, for a rate of 5.4 clicks per 1000 recipients exposed. There were 5.4 clicks from e-mail, 11.9 clicks from Facebook, 5.5 clicks from paid Facebook, and 6.9 clicks from Twitter to the landing site for 1000 physicians exposed to each of 4 selected CME modules. A Facebook post generated 2.3x as many clicks to the landing site as did an e-mail after controlling for participant exposure, hook type and CME topic (p<0.001). Twitter posts (p = 0.13) and paid Facebook posts (p = 0.06) were not statistically different from e-mail in generating clicks to the landing site. Use of different hooks to engage physicians had no impact on clicks to the landing site. Interviews with physicians suggested that social media might not be a preferred vehicle for disseminating CME. Social media has a modest impact on driving traffic to evidence-based CME options. Facebook had a superior effect on driving physician web traffic to evidence-based CME compared to other social media platforms and email.
Leveraging Social Media to Promote Evidence-Based Continuing Medical Education
Flynn, Simone; Hebert, Paul; Korenstein, Deborah; Ryan, Mark; Jordan, William B.
2017-01-01
Importance New dissemination methods are needed to engage physicians in evidence-based continuing medical education (CME). Objective To examine the effectiveness of social media in engaging physicians in non-industry-sponsored CME. Design We tested the effect of different media platforms (e-mail, Facebook, paid Facebook and Twitter), CME topics, and different “hooks” (e.g., Q&A, clinical pearl and best evidence) on driving clicks to a landing site featuring non-industry sponsored CME. We modelled the effects of social media platform, CME topic, and hook using negative binomial regression on clicks to a single landing site. We used clicks to landing site adjusted for exposure and message number to calculate rate ratios. To understand how physicians interact with CME content on social media, we also conducted interviews with 10 physicians. Setting The National Physicians Alliance (NPA) membership. Participants NPA e-mail recipients, Facebook followers and friends, and Twitter followers. Main Outcomes and Measures Clicks to the NPA’s CME landing site. Results On average, 4,544 recipients received each message. Messages generated a total of 592 clicks to the landing site, for a rate of 5.4 clicks per 1000 recipients exposed. There were 5.4 clicks from e-mail, 11.9 clicks from Facebook, 5.5 clicks from paid Facebook, and 6.9 clicks from Twitter to the landing site for 1000 physicians exposed to each of 4 selected CME modules. A Facebook post generated 2.3x as many clicks to the landing site as did an e-mail after controlling for participant exposure, hook type and CME topic (p<0.001). Twitter posts (p = 0.13) and paid Facebook posts (p = 0.06) were not statistically different from e-mail in generating clicks to the landing site. Use of different hooks to engage physicians had no impact on clicks to the landing site. Interviews with physicians suggested that social media might not be a preferred vehicle for disseminating CME. Conclusions Social media has a modest impact on driving traffic to evidence-based CME options. Facebook had a superior effect on driving physician web traffic to evidence-based CME compared to other social media platforms and email. PMID:28060854
Meter, Diana J; Bauman, Sheri
2015-08-01
Every day, children and adolescents communicate online via social networking sites (SNSs). They also report sharing passwords with peers and friends, a potentially risky behavior in regard to cyber safety. This longitudinal study tested the hypotheses that social network engagement in multiple settings would predict more cyberbullying involvement over time, and that youth who reported sharing passwords would also experience an increase in cyberbullying involvement. Data were collected at two time points one year apart from 1,272 third through eighth grade students. In line with the first study hypothesis, participating in more online SNSs was associated with increased cyberbullying involvement over time, as well as sharing passwords over time. Cyberbullying involvement at T1 predicted decreases in sharing passwords over time, suggesting that youth become aware of the dangers of sharing passwords as a result of their experience. Sharing passwords at T1 was unrelated to cyberbullying involvement at T2. Although it seems that youth may be learning from their previous mistakes, due to the widespread use of social media and normality of sharing passwords among young people, it is important to continue to educate youth about cyber safety and risky online behavior.
Graphical User Interface for the NASA FLOPS Aircraft Performance and Sizing Code
NASA Technical Reports Server (NTRS)
Lavelle, Thomas M.; Curlett, Brian P.
1994-01-01
XFLOPS is an X-Windows/Motif graphical user interface for the aircraft performance and sizing code FLOPS. This new interface simplifies entering data and analyzing results, thereby reducing analysis time and errors. Data entry is simpler because input windows are used for each of the FLOPS namelists. These windows contain fields to input the variable's values along with help information describing the variable's function. Analyzing results is simpler because output data are displayed rapidly. This is accomplished in two ways. First, because the output file has been indexed, users can view particular sections with the click of a mouse button. Second, because menu picks have been created, users can plot engine and aircraft performance data. In addition, XFLOPS has a built-in help system and complete on-line documentation for FLOPS.
Learning to rank using user clicks and visual features for image retrieval.
Yu, Jun; Tao, Dacheng; Wang, Meng; Rui, Yong
2015-04-01
The inconsistency between textual features and visual contents can cause poor image search results. To solve this problem, click features, which are more reliable than textual information in justifying the relevance between a query and clicked images, are adopted in image ranking model. However, the existing ranking model cannot integrate visual features, which are efficient in refining the click-based search results. In this paper, we propose a novel ranking model based on the learning to rank framework. Visual features and click features are simultaneously utilized to obtain the ranking model. Specifically, the proposed approach is based on large margin structured output learning and the visual consistency is integrated with the click features through a hypergraph regularizer term. In accordance with the fast alternating linearization method, we design a novel algorithm to optimize the objective function. This algorithm alternately minimizes two different approximations of the original objective function by keeping one function unchanged and linearizing the other. We conduct experiments on a large-scale dataset collected from the Microsoft Bing image search engine, and the results demonstrate that the proposed learning to rank models based on visual features and user clicks outperforms state-of-the-art algorithms.
An Interative Grahical User Interface for Maritime Security Services
NASA Astrophysics Data System (ADS)
Reize, T.; Müller, R.; Kiefl, R.
2013-10-01
In order to analyse optical satellite images for maritime security issues in Near-Real-Time (NRT) an interactive graphical user interface (GUI) based on NASA World Wind was developed and is presented in this article. Targets or activities can be detected, measured and classified with this tool simply and quickly. The service uses optical satellite images, currently taken from 6 sensors: Worldview-1 and Worldview-2, Ikonos, Quickbird, GeoEye-1 and EROS-B. The GUI can also handle SAR-images, air-borne images or UAV images. Software configurations are provided in a job-order file and thus all preparation tasks, such as image installation are performed fully automatically. The imagery can be overlaid with vessels derived by an automatic detection processor. These potential vessel layers can be zoomed in by a single click and sorted with an adapted method. Further object properties, such as vessel type or confidence level of identification, can be added by the operator manually. The heading angle can be refined by dragging the vessel's head or switching it to 180° with a single click. Further vessels or other relevant objects can be added. The objects length, width, heading and position are calculated automatically from three clicks on top, bottom and an arbitrary point at one of the object's longer side. In case of an Activity Detection, the detected objects can be grouped in area of interests (AOI) and classified, according to the ordered activities. All relevant information is finally written to an exchange file, after quality control and necessary correction procedures are performed. If required, image thumbnails can be cut around objects or around whole areas of interest and saved as separated, geo-referenced images.
Web Image Search Re-ranking with Click-based Similarity and Typicality.
Yang, Xiaopeng; Mei, Tao; Zhang, Yong Dong; Liu, Jie; Satoh, Shin'ichi
2016-07-20
In image search re-ranking, besides the well known semantic gap, intent gap, which is the gap between the representation of users' query/demand and the real intent of the users, is becoming a major problem restricting the development of image retrieval. To reduce human effects, in this paper, we use image click-through data, which can be viewed as the "implicit feedback" from users, to help overcome the intention gap, and further improve the image search performance. Generally, the hypothesis visually similar images should be close in a ranking list and the strategy images with higher relevance should be ranked higher than others are widely accepted. To obtain satisfying search results, thus, image similarity and the level of relevance typicality are determinate factors correspondingly. However, when measuring image similarity and typicality, conventional re-ranking approaches only consider visual information and initial ranks of images, while overlooking the influence of click-through data. This paper presents a novel re-ranking approach, named spectral clustering re-ranking with click-based similarity and typicality (SCCST). First, to learn an appropriate similarity measurement, we propose click-based multi-feature similarity learning algorithm (CMSL), which conducts metric learning based on clickbased triplets selection, and integrates multiple features into a unified similarity space via multiple kernel learning. Then based on the learnt click-based image similarity measure, we conduct spectral clustering to group visually and semantically similar images into same clusters, and get the final re-rank list by calculating click-based clusters typicality and withinclusters click-based image typicality in descending order. Our experiments conducted on two real-world query-image datasets with diverse representative queries show that our proposed reranking approach can significantly improve initial search results, and outperform several existing re-ranking approaches.
AutoClickChem: click chemistry in silico.
Durrant, Jacob D; McCammon, J Andrew
2012-01-01
Academic researchers and many in industry often lack the financial resources available to scientists working in "big pharma." High costs include those associated with high-throughput screening and chemical synthesis. In order to address these challenges, many researchers have in part turned to alternate methodologies. Virtual screening, for example, often substitutes for high-throughput screening, and click chemistry ensures that chemical synthesis is fast, cheap, and comparatively easy. Though both in silico screening and click chemistry seek to make drug discovery more feasible, it is not yet routine to couple these two methodologies. We here present a novel computer algorithm, called AutoClickChem, capable of performing many click-chemistry reactions in silico. AutoClickChem can be used to produce large combinatorial libraries of compound models for use in virtual screens. As the compounds of these libraries are constructed according to the reactions of click chemistry, they can be easily synthesized for subsequent testing in biochemical assays. Additionally, in silico modeling of click-chemistry products may prove useful in rational drug design and drug optimization. AutoClickChem is based on the pymolecule toolbox, a framework that may facilitate the development of future python-based programs that require the manipulation of molecular models. Both the pymolecule toolbox and AutoClickChem are released under the GNU General Public License version 3 and are available for download from http://autoclickchem.ucsd.edu.
AutoClickChem: Click Chemistry in Silico
Durrant, Jacob D.; McCammon, J. Andrew
2012-01-01
Academic researchers and many in industry often lack the financial resources available to scientists working in “big pharma.” High costs include those associated with high-throughput screening and chemical synthesis. In order to address these challenges, many researchers have in part turned to alternate methodologies. Virtual screening, for example, often substitutes for high-throughput screening, and click chemistry ensures that chemical synthesis is fast, cheap, and comparatively easy. Though both in silico screening and click chemistry seek to make drug discovery more feasible, it is not yet routine to couple these two methodologies. We here present a novel computer algorithm, called AutoClickChem, capable of performing many click-chemistry reactions in silico. AutoClickChem can be used to produce large combinatorial libraries of compound models for use in virtual screens. As the compounds of these libraries are constructed according to the reactions of click chemistry, they can be easily synthesized for subsequent testing in biochemical assays. Additionally, in silico modeling of click-chemistry products may prove useful in rational drug design and drug optimization. AutoClickChem is based on the pymolecule toolbox, a framework that may facilitate the development of future python-based programs that require the manipulation of molecular models. Both the pymolecule toolbox and AutoClickChem are released under the GNU General Public License version 3 and are available for download from http://autoclickchem.ucsd.edu. PMID:22438795
The BiolAD-DB system : an informatics system for clinical and genetic data.
Nielsen, David A; Leidner, Marty; Haynes, Chad; Krauthammer, Michael; Kreek, Mary Jeanne
2007-01-01
The Biology of Addictive Diseases-Database (BiolAD-DB) system is a research bioinformatics system for archiving, analyzing, and processing of complex clinical and genetic data. The database schema employs design principles for handling complex clinical information, such as response items in genetic questionnaires. Data access and validation is provided by the BiolAD-DB client application, which features a data validation engine tightly coupled to a graphical user interface. Data integrity is provided by the password-protected BiolAD-DB SQL compliant server and database. BiolAD-DB tools further provide functionalities for generating customized reports and views. The BiolAD-DB system schema, client, and installation instructions are freely available at http://www.rockefeller.edu/biolad-db/.
Cyber-Attack Methods, Why They Work on Us, and What to Do
NASA Technical Reports Server (NTRS)
Byrne, DJ
2015-01-01
Basic cyber-attack methods are well documented, and even automated with user-friendly GUIs (Graphical User Interfaces). Entire suites of attack tools are legal, conveniently packaged, and freely downloadable to anyone; more polished versions are sold with vendor support. Our team ran some of these against a selected set of projects within our organization to understand what the attacks do so that we can design and validate defenses against them. Some existing defenses were effective against the attacks, some less so. On average, every machine had twelve easily identifiable vulnerabilities, two of them "critical". Roughly 5% of passwords in use were easily crack-able. We identified a clear set of recommendations for each project, and some common patterns that emerged among them all.
Entity Resolution Workflow Installation Process and User Guide
2013-07-01
Program Files\\PostgreSQL\\9.1\\data superuser ( postgres ), service account ( postgres ) password : "password" Port #: 5432 Add an environment variable...in this report. • Run the script found in <GG_HOME>\\ globalgraph-dist-1.4.6-final\\schema- ddl\\postgresSetup.bat. This script will set up Postgres ...Username: postgres DB Admin PWD: password GlobalGraph App User: gguser GlobalGraph App PWD: password • Restart the Postgres service using the Windows
Individual differences in cyber security behaviors: an examination of who is sharing passwords.
Whitty, Monica; Doodson, James; Creese, Sadie; Hodges, Duncan
2015-01-01
In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found younger [corrected] people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns.
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords
Doodson, James; Creese, Sadie; Hodges, Duncan
2015-01-01
Abstract In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found older people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns. PMID:25517697
Launching the Next Generation IODP Site Survey Data Bank
NASA Astrophysics Data System (ADS)
Miller, S. P.; Helly, J.; Clark, D.; Eakins, B.; Sutton, D.; Weatherford, J.; Thatch, G.; Miville, B.; Zelt, B.
2005-12-01
The next generation all-digital Site Survey Data Bank (SSDB) became operational on August 15, 2005 as an online resource for Integrated Ocean Drilling Program (IODP) proponents, reviewers, panels and operations, worldwide. There are currently 123 active proposals for drilling at sites distributed across the globe, involving nearly 1000 proponents from more than 40 countries. The goal is to provide an authoritative, persistent, secure, password-controlled and easily-used home for contributed data objects, as proposals evolve through their life cycle from preliminary phases to planned drilling expeditions. Proposal status can be monitored graphically by proposal number, data type or date. A Java SSDBviewer allows discovery of all proposal data objects, displayed over a basemap of global topography, crustal age or other custom maps. Data can be viewed or downloaded under password control. Webform interfaces assist with the uploading of data and metadata. Thirty four different standard data types are currently supported. The system was designed as a fully functioning digital library, not just a database or a web archive, drawing upon the resources of the SIOExplorer Digital Library project. Blocks of metadata are organized to support discovery and use, as appropriate for each data type. The SSDB has been developed by a UCSD team of researchers and computer scientists at the Scripps Institution of Oceanography and the San Diego Supercomputer Center, under contract with IODP Management International Inc., supported by NSF OCE 0432224.
2014-09-30
initially on beaked whales (Blainville’s or Cuvier’s), for which high quality click recordings of clicks are available from DTAG data, as these are known...will be applied also to other species such as sperm whale (Physeter macrocephalus) (whose high source level assures long range detection and amplifies...REFERENCES Gillespie, D. and Leaper, R. (1996). Detection of sperm whale Physeter macrocephalus clicks and discrimination of individual vocalizations
2014-09-30
research will focus initially on beaked whales (Blainville’s or Cuvier’s), for which high quality click recordings of clicks are available from DTAG...The same methodology will be applied also to other species such as sperm whale (Physeter macrocephalus) (whose high source level assures long range...Thomas, University of St. Andrews). REFERENCES Gillespie, D. and Leaper, R. (1996). Detection of sperm whale Physeter macrocephalus clicks and
1989-09-27
a run is always the @RUN statement, which can specify user-id, account number, and project-id. The @ PASSWD statement specifies password and security...Every-Page-Label Options PASSWD password for batch; F36 User-id validation chang for demand; comp, nent set for batch LEV change Clearance Level F33...clearance level @@PASS Change password F36 Current valid password must @@ PASSWD be specified @@SEND Display a print file F16 Sym to user-id or site-id that is
Conjugating folate on superparamagnetic Fe{sub 3}O{sub 4}@Au nanoparticles using click chemistry
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shen, Xiaofang, E-mail: xfshen@jiangnan.edu.cn; Ge, Zhaoqiang; Pang, Yuehong
2015-02-15
Gold-coated magnetic core@shell nanoparticles, which exhibit magneto-optical properties, not only enhance the chemical stability of core and biocompatibility of surface, but also provide a combination of multimodal imaging and therapeutics. The conjugation of these tiny nanoparticles with specific biomolecules allows researchers to target the desired location. In this paper, superparamagnetic Fe{sub 3}O{sub 4}@Au nanoparticles were synthesized and functionalized with the azide group on the surface by formation of self-assembled monolayers. Folate (FA) molecules, non-immunogenic target ligands for cancer cells, are conjugated with alkyne and then immobilized on the azide-terminated Fe{sub 3}O{sub 4}@Au nanoparticles through copper(I)-catalyzed azide-alkyne cycloaddition (click reaction). Myelogenousmore » leukemia K562 cells were used as a folate receptor (FR) model, which can be targeted and extracted by magnetic field after interaction with the Fe{sub 3}O{sub 4}@Au–FA nanoparticles. - Graphical abstract: Self-assembled azide-terminated group on superparamagnetic Fe{sub 3}O{sub 4}@Au nanoparticles followed by click reaction with alkyne-functionalized folate, allowing the nanoparticles target folate receptor of cancer cells. - Highlights: • Azidoundecanethiol was coated on the superparamagnetic Fe{sub 3}O{sub 4}@Au nanoparticles by forming self-assembled monolayers. • Alkyne-terminated folate was synthesized from a reaction between the amine and the carboxylic acid. • Conjugation of Fe{sub 3}O{sub 4}@Au nanoparticles with folate was made by copper-catalyzed azide-alkyne cycloaddition click chemistry.« less
NASA Technical Reports Server (NTRS)
Bishop, Matt
1988-01-01
The organization of some tools to help improve passwork security at a UNIX-based site is described along with how to install and use them. These tools and their associated library enable a site to force users to pick reasonably safe passwords (safe being site configurable) and to enable site management to try to crack existing passworks. The library contains various versions of a very fast implementation of the Data Encryption Standard and of the one-way encryption functions used to encryp the password.
Software For Computer-Security Audits
NASA Technical Reports Server (NTRS)
Arndt, Kate; Lonsford, Emily
1994-01-01
Information relevant to potential breaches of security gathered efficiently. Automated Auditing Tools for VAX/VMS program includes following automated software tools performing noted tasks: Privileged ID Identification, program identifies users and their privileges to circumvent existing computer security measures; Critical File Protection, critical files not properly protected identified; Inactive ID Identification, identifications of users no longer in use found; Password Lifetime Review, maximum lifetimes of passwords of all identifications determined; and Password Length Review, minimum allowed length of passwords of all identifications determined. Written in DEC VAX DCL language.
Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
NASA Astrophysics Data System (ADS)
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.
Runs [ Open Access : Password Protected ] CESM Development CESM Runs [ Open Access : Password Protected ] WRF Development WRF Runs [ Open Access : Password Protected ] Climate Modeling Home Projects Links Literature Manuscripts Publications Polar Group Meeting (2012) ASGC Home ASGC Jobs Web Calendar Wiki Internal
The Characteristics of User-Generated Passwords
1990-03-01
electronic keys), user interface tokens (pocket devices that can generate one-time passwords) and fixed password devices ( plastic cards that contain...APPENDIX B-7 DIFFREM DIFFICULTY REMfEIBERING by PASSCHAR PASSORD CARACTERISTICS PASSCHAR Pate I of 1 Count 1 Row Pet IALPHAVET NUMERIC ALPHANUM ASCII Cal Pet
Majumdar, Tapas; Haldar, Basudeb; Mallick, Arabinda
2017-02-20
A simple strategy is proposed to design and develop an intelligent device based on dual channel ion responsive spectral properties of a commercially available molecule, harmine (HM). The system can process different sets of opto-chemical inputs generating different patterns as fluorescence outputs at specific wavelengths which can provide an additional level of protection exploiting both password and pattern recognitions. The proposed system could have the potential to come up with highly secured combinatorial locks at the molecular level that could pose valuable real time and on-site applications for user authentication.
NASA Astrophysics Data System (ADS)
Majumdar, Tapas; Haldar, Basudeb; Mallick, Arabinda
2017-02-01
A simple strategy is proposed to design and develop an intelligent device based on dual channel ion responsive spectral properties of a commercially available molecule, harmine (HM). The system can process different sets of opto-chemical inputs generating different patterns as fluorescence outputs at specific wavelengths which can provide an additional level of protection exploiting both password and pattern recognitions. The proposed system could have the potential to come up with highly secured combinatorial locks at the molecular level that could pose valuable real time and on-site applications for user authentication.
Zhang, Ruisheng; Liu, Qidong
2017-01-01
Wireless sensor networks (WSNs), which consist of a large number of sensor nodes, have become among the most important technologies in numerous fields, such as environmental monitoring, military surveillance, control systems in nuclear reactors, vehicle safety systems, and medical monitoring. The most serious drawback for the widespread application of WSNs is the lack of security. Given the resource limitation of WSNs, traditional security schemes are unsuitable. Approaches toward withstanding related attacks with small overhead have thus recently been studied by many researchers. Numerous studies have focused on the authentication scheme for WSNs, but most of these works cannot achieve the security performance and overhead perfectly. Nam et al. proposed a two-factor authentication scheme with lightweight sensor computation for WSNs. In this paper, we review this scheme, emphasize its drawbacks, and propose a temporal credential-based mutual authentication with a multiple-password scheme for WSNs. Our scheme uses multiple passwords to achieve three-factor security performance and generate a session key between user and sensor nodes. The security analysis phase shows that our scheme can withstand related attacks, including a lost password threat, and the comparison phase shows that our scheme involves a relatively small overhead. In the comparison of the overhead phase, the result indicates that more than 95% of the overhead is composed of communication and not computation overhead. Therefore, the result motivates us to pay further attention to communication overhead than computation overhead in future research. PMID:28135288
Liu, Xin; Zhang, Ruisheng; Liu, Qidong
2017-01-01
Wireless sensor networks (WSNs), which consist of a large number of sensor nodes, have become among the most important technologies in numerous fields, such as environmental monitoring, military surveillance, control systems in nuclear reactors, vehicle safety systems, and medical monitoring. The most serious drawback for the widespread application of WSNs is the lack of security. Given the resource limitation of WSNs, traditional security schemes are unsuitable. Approaches toward withstanding related attacks with small overhead have thus recently been studied by many researchers. Numerous studies have focused on the authentication scheme for WSNs, but most of these works cannot achieve the security performance and overhead perfectly. Nam et al. proposed a two-factor authentication scheme with lightweight sensor computation for WSNs. In this paper, we review this scheme, emphasize its drawbacks, and propose a temporal credential-based mutual authentication with a multiple-password scheme for WSNs. Our scheme uses multiple passwords to achieve three-factor security performance and generate a session key between user and sensor nodes. The security analysis phase shows that our scheme can withstand related attacks, including a lost password threat, and the comparison phase shows that our scheme involves a relatively small overhead. In the comparison of the overhead phase, the result indicates that more than 95% of the overhead is composed of communication and not computation overhead. Therefore, the result motivates us to pay further attention to communication overhead than computation overhead in future research.
Das, Ashok Kumar; Bruhadeshwar, Bezawada
2013-10-01
Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Walkup, Elizabeth
Passwords are an ubiquitous, established part of the Internet today, but they are also a huge security headache. Single sign-on, OAuth, and password managers are some of the solutions to this problem. OAuth is a new, popular method that allows people to use large, common authentication providers for many web applications. However, it comes at the expense of some privacy: OAuth makes users easy to track across websites, applications, and devices. Password managers put the power in the hands of the users, but this vulnerability survey reveals that you have to be extremely careful which program you choose. All inmore » all, password managers are the solution of choice for home users and small organizations, but large companies will probably want to invest in their own SSO solutions.« less
xiSPEC: web-based visualization, analysis and sharing of proteomics data.
Kolbowski, Lars; Combe, Colin; Rappsilber, Juri
2018-05-08
We present xiSPEC, a standard compliant, next-generation web-based spectrum viewer for visualizing, analyzing and sharing mass spectrometry data. Peptide-spectrum matches from standard proteomics and cross-linking experiments are supported. xiSPEC is to date the only browser-based tool supporting the standardized file formats mzML and mzIdentML defined by the proteomics standards initiative. Users can either upload data directly or select files from the PRIDE data repository as input. xiSPEC allows users to save and share their datasets publicly or password protected for providing access to collaborators or readers and reviewers of manuscripts. The identification table features advanced interaction controls and spectra are presented in three interconnected views: (i) annotated mass spectrum, (ii) peptide sequence fragmentation key and (iii) quality control error plots of matched fragments. Highlighting or selecting data points in any view is represented in all other views. Views are interactive scalable vector graphic elements, which can be exported, e.g. for use in publication. xiSPEC allows for re-annotation of spectra for easy hypothesis testing by modifying input data. xiSPEC is freely accessible at http://spectrumviewer.org and the source code is openly available on https://github.com/Rappsilber-Laboratory/xiSPEC.
DDN Trusted Guard Gateway. Trusted Guard Gateway (TGG) Technology Assessment. Phase 2
1989-02-02
strengthened via removal of the encrypted passwords from the password/group files, and imposition of limits on root, login, passwd , and super users. For...amongst these are the removal of the list of encoded passwords from the etc/ passwd file, and the removal of any special privileges from the root ID
Secure Server Login by Using Third Party and Chaotic System
NASA Astrophysics Data System (ADS)
Abdulatif, Firas A.; zuhiar, Maan
2018-05-01
Server is popular among all companies and it used by most of them but due to the security threat on the server make this companies are concerned when using it so that in this paper we will design a secure system based on one time password and third parity authentication (smart phone). The proposed system make security to the login process of server by using one time password to authenticate person how have permission to login and third parity device (smart phone) as other level of security.
Computerised patient record with distributed objects.
Gornik, T; Orel, A; Roblek, D; Verhovsek, R
1999-01-01
The vast spectrum of information and functionality requirements imposed on a Computerised Patient Record (CPR), fueled by an ever changing and expanding business model demands information system interoperability. The management of information, created across the continuum of care, and associated information system functionality, can not be provided by data interchange to and from monolithic applications. WebDoctor is a Computerised Patient Record (CPR) which is fully used at the Institute of Oncology in Ljubljana, Slovenia--a hospital with 500 beds and more than 200 users, all of them medical professionals. The data are stored in an underlying Oracle hospital data base. For logging the username and password security is used. WebDoctor uses Internationalization APIs. Currently GUI is currently written in Slovenian language, but can be easily adapted to any other language. It is available in either Metal or Windows look. Search for patients is based on CPR No. or partial data from demographics. All the available patients data can be found on a single screen divided into several tab sections. The tab sections cover general and speciality data. The general data include demographics, admissions and diagnoses, meanwhile the speciality data are divided into Labs where data are represented numerically by date or by type and graphically with the ability of detailed view in separate window, Radiology where results are represented in textual form as well as pictures together with a special viewer to provide detailed analyses and Radioisotopes where results are also being represented in textual form together with a graphical representation. WebDoctor is running on virtually any platform. It achieved the 100% Java Certification which places the application among the firsts if not the first of this kind in the healthcare industry. It excels with a small and light client which doesn't exceed the 150K.
Li, Daxiu; Xie, Jiaqing; Zhou, Wenjiao; Jiang, Bingying; Yuan, Ruo; Xiang, Yun
2017-11-01
The determination of the level of Cu 2+ plays important roles in disease diagnosis and environmental monitoring. By coupling Cu + -catalyzed click chemistry and metal ion-dependent DNAzyme cyclic amplification, we have developed a convenient and sensitive colorimetric sensing method for the detection of Cu 2+ in human serums. The target Cu 2+ can be reduced by ascorbate to form Cu + , which catalyzes the azide-alkyne cycloaddition between the azide- and alkyne-modified DNAs to form Mg 2+ -dependent DNAzymes. Subsequently, the Mg 2+ ions catalyze the cleavage of the hairpin DNA substrate sequences of the DNAzymes and trigger cyclic generation of a large number of free G-quadruplex sequences, which bind hemin to form the G-quadruplex/hemin artificial peroxidase to cause significant color transition of the sensing solution for sensitive colorimetric detection of Cu 2+ . This method shows a dynamic range of 5 to 500 nM and a detection limit of 2 nM for Cu 2+ detection. Besides, the level of Cu 2+ in human serums can also be determined by using this sensing approach. With the advantages of simplicity and high sensitivity, such sensing method thus holds great potential for on-site determination of Cu 2+ in different samples. Graphical abstract Sensitive colorimetric detection of copper (II) by coupling click chemistry with metal ion-dependentDNAzymes.
NASA Astrophysics Data System (ADS)
Gaik Tay, Kim; Cheong, Tau Han; Foong Lee, Ming; Kek, Sie Long; Abdul-Kahar, Rosmila
2017-08-01
In the previous work on Euler’s spreadsheet calculator for solving an ordinary differential equation, the Visual Basic for Application (VBA) programming was used, however, a graphical user interface was not developed to capture users input. This weakness may make users confuse on the input and output since those input and output are displayed in the same worksheet. Besides, the existing Euler’s spreadsheet calculator is not interactive as there is no prompt message if there is a mistake in inputting the parameters. On top of that, there are no users’ instructions to guide users to input the derivative function. Hence, in this paper, we improved previous limitations by developing a user-friendly and interactive graphical user interface. This improvement is aimed to capture users’ input with users’ instructions and interactive prompt error messages by using VBA programming. This Euler’s graphical user interface spreadsheet calculator is not acted as a black box as users can click on any cells in the worksheet to see the formula used to implement the numerical scheme. In this way, it could enhance self-learning and life-long learning in implementing the numerical scheme in a spreadsheet and later in any programming language.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-03
... Contracts and Non-Vessel-Operating Service Arrangements; Transmission of Approved Log-In ID and Passwords... advise applicants for log-in IDs and passwords. DATES: The Final Rule is effective March 3, 2011. FOR... the U.S. Mail to transmit approved log-on IDs and password to registrants in the Commission's...
Password Complexity Recommendations: xezandpAxat8Um or P4$$w0rd!!!!
2014-10-01
have we seen the computer screen with fast- scrolling characters, with good answers being indicated one by one? This is not a MasterMind game ! Password...security/2013/ 05/how-crackers-make-minced- meat -out-of-your-passwords (Access Date: 2014-04-02). 18 DRDC-RDDC-2014-R27 DOCUMENT CONTROL DATA (Security
Using cloud models of heartbeats as the entity identifier to secure mobile devices.
Fu, Donglai; Liu, Yanhua
2017-01-01
Mobile devices are extensively used to store more private and often sensitive information. Therefore, it is important to protect them against unauthorised access. Authentication ensures that authorised users can use mobile devices. However, traditional authentication methods, such as numerical or graphic passwords, are vulnerable to passive attacks. For example, an adversary can steal the password by snooping from a shorter distance. To avoid these problems, this study presents a biometric approach that uses cloud models of heartbeats as the entity identifier to secure mobile devices. Here, it is identified that these concepts including cloud model or cloud have nothing to do with cloud computing. The cloud model appearing in the study is the cognitive model. In the proposed method, heartbeats are collected by two ECG electrodes that are connected to one mobile device. The backward normal cloud generator is used to generate ECG standard cloud models characterising the heartbeat template. When a user tries to have access to their mobile device, cloud models regenerated by fresh heartbeats will be compared with ECG standard cloud models to determine if the current user can use this mobile device. This authentication method was evaluated from three aspects including accuracy, authentication time and energy consumption. The proposed method gives 86.04% of true acceptance rate with 2.73% of false acceptance rate. One authentication can be done in 6s, and this processing consumes about 2000 mW of power.
NASA Astrophysics Data System (ADS)
Giorgino, Toni; Laio, Alessandro; Rodriguez, Alex
2017-08-01
Molecular dynamics (MD) simulations allow the exploration of the phase space of biopolymers through the integration of equations of motion of their constituent atoms. The analysis of MD trajectories often relies on the choice of collective variables (CVs) along which the dynamics of the system is projected. We developed a graphical user interface (GUI) for facilitating the interactive choice of the appropriate CVs. The GUI allows: defining interactively new CVs; partitioning the configurations into microstates characterized by similar values of the CVs; calculating the free energies of the microstates for both unbiased and biased (metadynamics) simulations; clustering the microstates in kinetic basins; visualizing the free energy landscape as a function of a subset of the CVs used for the analysis. A simple mouse click allows one to quickly inspect structures corresponding to specific points in the landscape.
Thoth: Software for data visualization & statistics
NASA Astrophysics Data System (ADS)
Laher, R. R.
2016-10-01
Thoth is a standalone software application with a graphical user interface for making it easy to query, display, visualize, and analyze tabular data stored in relational databases and data files. From imported data tables, it can create pie charts, bar charts, scatter plots, and many other kinds of data graphs with simple menus and mouse clicks (no programming required), by leveraging the open-source JFreeChart library. It also computes useful table-column data statistics. A mature tool, having underwent development and testing over several years, it is written in the Java computer language, and hence can be run on any computing platform that has a Java Virtual Machine and graphical-display capability. It can be downloaded and used by anyone free of charge, and has general applicability in science, engineering, medical, business, and other fields. Special tools and features for common tasks in astronomy and astrophysical research are included in the software.
Giguere, Rebecca; Brown, William; Balán, Ivan C; Dolezal, Curtis; Ho, Titcha; Sheinfil, Alan; Ibitoye, Mobolaji; Lama, Javier R; McGowan, Ian; Cranston, Ross D; Carballo-Diéguez, Alex
2018-04-01
During a Phase 2 rectal microbicide trial, men who have sex with men and transgender women (n = 187) in 4 countries (Peru, South Africa, Thailand, United States) reported product use daily via short message service (SMS). To prevent disclosure of study participation, the SMS system program included privacy and security features. We evaluated participants' perceptions of privacy while using the system and acceptability of privacy/security features. To protect privacy, the SMS system: (1) confirmed participant availability before sending the study questions, (2) required a password, and (3) did not reveal product name or study participation. To ensure security, the system reminded participants to lock phone/delete messages. A computer-assisted self-interview (CASI), administered at the final visit, measured burden of privacy and security features and SMS privacy concerns. A subsample of 33 participants underwent an in-depth interview (IDI). Based on CASI, 85% had no privacy concerns; only 5% were very concerned. Most were not bothered by the need for a password (73%) or instructions to delete messages (82%). Based on IDI, reasons for low privacy concerns included sending SMS in private or feeling that texting would not draw attention. A few IDI participants found the password unnecessary and more than half did not delete messages. Most participants were not concerned that the SMS system would compromise their confidentiality. SMS privacy and security features were effective and not burdensome. Short ID-related passwords, ambiguous language, and reminders to implement privacy and security-enhancing behaviors are recommended for SMS systems.
Juang, Kevin; Greenstein, Joel
2018-04-01
We developed a new authentication system based on passphrases instead of passwords. Our new system incorporates a user-generated mnemonic picture displayed during login, definition tooltips, error correction to reduce typographical errors, a decoy-based input masking technique, and random passphrase generation using either a specialized wordlist or a sentence template. Passphrases exhibit a greater level of security than traditional passwords, but their wider adoption has been hindered by human factors issues. Our assertion is that the added features of our system work particularly well with passphrases and help address these shortcomings. We conducted a study to evaluate our new system with a customized 1,450-word list and our new system with a 6-word sentence structure against the control conditions of a user-created passphrase of at least 24 characters and a system-generated passphrase using a 10,326-word list. Fifty participants completed two sessions so that we could measure the usability and security of the authentication schemes. With the new system conditions, memorability was improved, and security was equivalent to or better than the control conditions. Usability and overall ratings also favored the new system conditions over the control conditions. Our research presents a new authentication system using innovative techniques that improve on the usability and security of existing password and passphrase authentication systems. In computer security, drastic changes should never happen overnight, but we recommend that our contributions be incorporated into current authentication systems to help facilitate a transition from passwords to usable passphrases.
Nonecholocating fruit bats produce biosonar clicks with their wings.
Boonman, Arjan; Bumrungsri, Sara; Yovel, Yossi
2014-12-15
Because evolution mostly acts over millions of years, the intermediate steps leading to a functional sensory system remain enigmatic. Accordingly, there is an ongoing debate regarding the evolution of bat echolocation. In search of the origin of bat echolocation, we studied how Old World fruit bats, which have always been classified as nonecholocating, orient in complete darkness. We found that two of these nonecholocating species used click-like sounds to detect and discriminate objects in complete darkness. However, we discovered that this click-based echo sensing is rudimentary and does not allow these bats to estimate distance accurately as all other echolocating bats can. Moreover, unlike all other echolocating bats, which generate pulses using the larynx or the tongue, these bats generated clicks with their wings. We provide evidence suggesting that all Old World fruit bats can click with their wings. Although this click-based echo sensing used by Old World fruit bats may not represent the ancestral form of current (laryngeal) bat echolocation, we argue that clicking fruit bats could be considered behavioral fossils, opening a window to study the evolution of echolocation. Copyright © 2014 Elsevier Ltd. All rights reserved.
Jürgens, Clemens; Grossjohann, Rico; Czepita, Damian; Tost, Frank
2009-01-01
Graphic documentation of retinal examination results in clinical ophthalmological practice is often depicted using pictures or in handwritten form. Popular software products used to describe changes in the fundus do not vary much from simple graphic programs that enable to insert, scale and edit basic graphic elements such as: a circle, rectangle, arrow or text. Displaying the results of retinal examinations in a unified way is difficult to achieve. Therefore, we devised and implemented modern software tools for this purpose. A computer program enabling to quickly and intuitively form graphs of the fundus, that can be digitally archived or printed was created. Especially for the needs of ophthalmological clinics, a set of standard digital symbols used to document the results of retinal examinations was developed and installed in a library of graphic symbols. These symbols are divided into the following categories: preoperative, postoperative, neovascularization, retinopathy of prematurity. The appropriate symbol can be selected with a click of the mouse and dragged-and-dropped on the canvas of the fundus. Current forms of documenting results of retinal examinations are unsatisfactory, due to the fact that they are time consuming and imprecise. Unequivocal interpretation is difficult or in some cases impossible. Using the developed computer program a sketch of the fundus can be created much more quickly than by hand drawing. Additionally the quality of the medica documentation using a system of well described and standardized symbols will be enhanced. (1) Graphic symbols used to document the results of retinal examinations are a part of everyday clinical practice. (2) The designed computer program will allow quick and intuitive graphical creation of fundus sketches that can be either digitally archived or printed.
Group Management Method of RFID Passwords for Privacy Protection
NASA Astrophysics Data System (ADS)
Kobayashi, Yuichi; Kuwana, Toshiyuki; Taniguchi, Yoji; Komoda, Norihisa
When RFID tag is used in the whole item lifecycle including a consumer scene or a recycle scene, we have to protect consumer privacy in the state that RFID tag is stuck on an item. We use the low cost RFID tag that has the access control function using a password, and we propose a method which manages RFID tags by passwords identical to each group of RFID tags. This proposal improves safety of RFID system because the proposal method is able to reduce the traceability for a RFID tag, and hold down the influence for disclosure of RFID passwords in the both scenes.
CuAAC-Based Click Chemistry in Self-Healing Polymers.
Döhler, Diana; Michael, Philipp; Binder, Wolfgang H
2017-10-17
Click chemistry has emerged as a significant tool for materials science, organic chemistry, and bioscience. Based on the initial concept of Barry Sharpless in 2001, the copper(I)-catalyzed azide/alkyne cycloaddition (CuAAC) reaction has triggered a plethora of chemical concepts for linking molecules and building blocks under ambient conditions, forming the basis for applications in autonomous cross-linking materials. Self-healing systems on the other hand are often based on mild cross-linking chemistries that are able to react either autonomously or upon an external trigger. In the ideal case, self-healing takes place efficiently at low temperatures, independent of the substrate(s) used, by forming strong and stable networks, binding to the newly generated (cracked) interfaces to restore the original material properties. The use of the CuAAC in self-healing systems, most of all the careful design of copper-based catalysts linked to additives as well as the chemical diversity of substrates, has led to an enormous potential of applications of this singular reaction. The implementation of click-based strategies in self-healing systems therefore is highly attractive, as here chemical (and physical) concepts of molecular reactivity, molecular design, and even metal catalysis are connected to aspects of materials science. In this Account, we will show how CuAAC reactions of multivalent components can be used as a tool for self-healing materials, achieving cross-linking at low temperatures (exploiting concepts of autocatalysis or internal chelation within the bulk CuAAC and systematic optimization of the efficiency of the used Cu(I) catalysts). Encapsulation strategies to separate the click components by micro- and nanoencapsulation are required in this context. Consequently, the examples reported here describe chemical concepts to realize more efficient and faster click reactions in self-healing polymeric materials. Thus, enhanced chain diffusion in (hyper)branched polymers, autocatalysis, or internal chelation concepts enable efficient click cross-linking already at 5 °C with a simultaneously reduced amount of Cu(I) catalyst and increased reaction rates, culminating in the first reported self-healing system based on click cycloaddition reactions. Via tailor-made nanocarbon/Cu(I) catalysts we can further improve the click cross-linking reaction in view of efficiency and kinetics, leading to the generation of self-healing graphene-based epoxy nanocomposites. Additionally, we have designed special CuAAC click methods for chemical reporting and visualization systems based on the detection of ruptured capsules via a fluorogenic click reaction, which can be combined with CuAAC cross-linking reactions to obtain simultaneous stress detection and self-healing within polymeric materials. In a similar concept, we have prepared polymeric Cu(I)-biscarbene complexes to detect (mechanical) stress within self-healing polymeric materials via a triggered fluorogenic reaction, thus using a destructive force for a constructive chemical response.
Advanced Terrain Representation for the Microticcit Workstation: System Maintenance Manual
1986-02-01
enter the */ /* password. */ /* Inputs: passwd - password to compare userfs entry to */ /* Outputs: TRUE - if password entered correctly...include "atrdefs.h" #include "ctype.h" extern char window[]; /* useable portion of screen */ 1 i getpw( passwd ) char passwd []; { int c...blank input window */ pcvgcp(&row,*col); curs_off(); nchars - ntries - 0; len « strlen( passwd ); pcvwca(len,• *,REVIDEO); /* process keys till user
Thaler, Lore; Castillo-Serrano, Josefina
2016-01-01
Echolocation is the ability to use reflected sound to obtain information about the spatial environment. Echolocation is an active process that requires both the production of the emission as well as the sensory processing of the resultant sound. Appreciating the general usefulness of echo-acoustic cues for people, in particular those with vision impairments, various devices have been built that exploit the principle of echolocation to obtain and provide information about the environment. It is common to all these devices that they do not require the person to make a sound. Instead, the device produces the emission autonomously and feeds a resultant sound back to the user. Here we tested if echolocation performance in a simple object detection task was affected by the use of a head-mounted loudspeaker as compared to active clicking. We found that 27 sighted participants new to echolocation did generally better when they used a loudspeaker as compared to mouth-clicks, and that two blind participants with experience in echolocation did equally well with mouth clicks and the speaker. Importantly, performance of sighted participants' was not statistically different from performance of blind experts when they used the speaker. Based on acoustic click data collected from a subset of our participants, those participants whose mouth clicks were more similar to the speaker clicks, and thus had higher peak frequencies and sound intensity, did better. We conclude that our results are encouraging for the consideration and development of assistive devices that exploit the principle of echolocation.
Thaler, Lore; Castillo-Serrano, Josefina
2016-01-01
Echolocation is the ability to use reflected sound to obtain information about the spatial environment. Echolocation is an active process that requires both the production of the emission as well as the sensory processing of the resultant sound. Appreciating the general usefulness of echo-acoustic cues for people, in particular those with vision impairments, various devices have been built that exploit the principle of echolocation to obtain and provide information about the environment. It is common to all these devices that they do not require the person to make a sound. Instead, the device produces the emission autonomously and feeds a resultant sound back to the user. Here we tested if echolocation performance in a simple object detection task was affected by the use of a head-mounted loudspeaker as compared to active clicking. We found that 27 sighted participants new to echolocation did generally better when they used a loudspeaker as compared to mouth-clicks, and that two blind participants with experience in echolocation did equally well with mouth clicks and the speaker. Importantly, performance of sighted participants’ was not statistically different from performance of blind experts when they used the speaker. Based on acoustic click data collected from a subset of our participants, those participants whose mouth clicks were more similar to the speaker clicks, and thus had higher peak frequencies and sound intensity, did better. We conclude that our results are encouraging for the consideration and development of assistive devices that exploit the principle of echolocation. PMID:27135407
Towards high conductivity in anion-exchange membranes for alkaline fuel cells.
Li, Nanwen; Guiver, Michael D; Binder, Wolfgang H
2013-08-01
Quaternized poly(2,6-dimethylphenylene oxide) materials (PPOs) containing clicked 1,2,3-triazoles were first prepared through Cu(I) -catalyzed "click chemistry" to improve the anion transport in anion-exchange membranes (AEMs). Clicked 1,2,3-triazoles incorporated into AEMs provided more sites to form efficient and continuous hydrogen-bond networks between the water/hydroxide and the triazole for anion transport. Higher water uptake was observed for these triazole membranes. Thus, the membranes showed an impressive enhancement of the hydroxide diffusion coefficient and, therefore, the anion conductivities. The recorded hydroxide conductivity was 27.8-62 mS cm(-1) at 20 °C in water, which was several times higher than that of a typical PPO-based AEM (TMA-20) derived from trimethylamine (5 mS cm(-1) ). Even at reduced relative humidity, the clicked membrane showed superior conductivity to a trimethylamine-based membrane. Moreover, similar alkaline stabilities at 80 °C in 1 M NaOH were observed for the clicked and non-clicked membranes. The performance of a H2 /O2 single cell assembled with a clicked AEM was much improved compared to that of a non-clicked TMA-20 membrane. The peak power density achieved for an alkaline fuel cell with the synthesized membrane 1a(20) was 188.7 mW cm(-2) at 50 °C. These results indicated that clicked AEM could be a viable strategy for improving the performance of alkaline fuel cells. Copyright © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Using Cloud Computing infrastructure with CloudBioLinux, CloudMan and Galaxy
Afgan, Enis; Chapman, Brad; Jadan, Margita; Franke, Vedran; Taylor, James
2012-01-01
Cloud computing has revolutionized availability and access to computing and storage resources; making it possible to provision a large computational infrastructure with only a few clicks in a web browser. However, those resources are typically provided in the form of low-level infrastructure components that need to be procured and configured before use. In this protocol, we demonstrate how to utilize cloud computing resources to perform open-ended bioinformatics analyses, with fully automated management of the underlying cloud infrastructure. By combining three projects, CloudBioLinux, CloudMan, and Galaxy into a cohesive unit, we have enabled researchers to gain access to more than 100 preconfigured bioinformatics tools and gigabytes of reference genomes on top of the flexible cloud computing infrastructure. The protocol demonstrates how to setup the available infrastructure and how to use the tools via a graphical desktop interface, a parallel command line interface, and the web-based Galaxy interface. PMID:22700313
Using cloud computing infrastructure with CloudBioLinux, CloudMan, and Galaxy.
Afgan, Enis; Chapman, Brad; Jadan, Margita; Franke, Vedran; Taylor, James
2012-06-01
Cloud computing has revolutionized availability and access to computing and storage resources, making it possible to provision a large computational infrastructure with only a few clicks in a Web browser. However, those resources are typically provided in the form of low-level infrastructure components that need to be procured and configured before use. In this unit, we demonstrate how to utilize cloud computing resources to perform open-ended bioinformatic analyses, with fully automated management of the underlying cloud infrastructure. By combining three projects, CloudBioLinux, CloudMan, and Galaxy, into a cohesive unit, we have enabled researchers to gain access to more than 100 preconfigured bioinformatics tools and gigabytes of reference genomes on top of the flexible cloud computing infrastructure. The protocol demonstrates how to set up the available infrastructure and how to use the tools via a graphical desktop interface, a parallel command-line interface, and the Web-based Galaxy interface.
Privacy-Preserving Authentication of Users with Smart Cards Using One-Time Credentials
NASA Astrophysics Data System (ADS)
Park, Jun-Cheol
User privacy preservation is critical to prevent many sophisticated attacks that are based on the user's server access patterns and ID-related information. We propose a password-based user authentication scheme that provides strong privacy protection using one-time credentials. It eliminates the possibility of tracing a user's authentication history and hides the user's ID and password even from servers. In addition, it is resistant against user impersonation even if both a server's verification database and a user's smart card storage are disclosed. We also provide a revocation scheme for a user to promptly invalidate the user's credentials on a server when the user's smart card is compromised. The schemes use lightweight operations only such as computing hashes and bitwise XORs.
Arranz, P; DeRuiter, S L; Stimpert, A K; Neves, S; Friedlaender, A S; Goldbogen, J A; Visser, F; Calambokidis, J; Southall, B L; Tyack, P L
2016-09-15
Early studies that categorized odontocete pulsed sounds had few means of discriminating signals used for biosonar-based foraging from those used for communication. This capability to identify the function of sounds is important for understanding and interpreting behavior; it is also essential for monitoring and mitigating potential disturbance from human activities. Archival tags were placed on free-ranging Grampus griseus to quantify and discriminate between pulsed sounds used for echolocation-based foraging and those used for communication. Two types of rapid click-series pulsed sounds, buzzes and burst pulses, were identified as produced by the tagged dolphins and classified using a Gaussian mixture model based on their duration, association with jerk (i.e. rapid change of acceleration) and temporal association with click trains. Buzzes followed regular echolocation clicks and coincided with a strong jerk signal from accelerometers on the tag. They consisted of series averaging 359±210 clicks (mean±s.d.) with an increasing repetition rate and relatively low amplitude. Burst pulses consisted of relatively short click series averaging 45±54 clicks with decreasing repetition rate and longer inter-click interval that were less likely to be associated with regular echolocation and the jerk signal. These results suggest that the longer, relatively lower amplitude, jerk-associated buzzes are used in this species to capture prey, mostly during the bottom phase of foraging dives, as seen in other odontocetes. In contrast, the shorter, isolated burst pulses that are generally emitted by the dolphins while at or near the surface are used outside of a direct, known foraging context. © 2016. Published by The Company of Biologists Ltd.
Study on a Biometric Authentication Model based on ECG using a Fuzzy Neural Network
NASA Astrophysics Data System (ADS)
Kim, Ho J.; Lim, Joon S.
2018-03-01
Traditional authentication methods use numbers or graphic passwords and thus involve the risk of loss or theft. Various studies are underway regarding biometric authentication because it uses the unique biometric data of a human being. Biometric authentication technology using ECG from biometric data involves signals that record electrical stimuli from the heart. It is difficult to manipulate and is advantageous in that it enables unrestrained measurements from sensors that are attached to the skin. This study is on biometric authentication methods using the neural network with weighted fuzzy membership functions (NEWFM). In the biometric authentication process, normalization and the ensemble average is applied during preprocessing, characteristics are extracted using Haar-wavelets, and a registration process called “training” is performed in the fuzzy neural network. In the experiment, biometric authentication was performed on 73 subjects in the Physionet Database. 10-40 ECG waveforms were tested for use in the registration process, and 15 ECG waveforms were deemed the appropriate number for registering ECG waveforms. 1 ECG waveforms were used during the authentication stage to conduct the biometric authentication test. Upon testing the proposed biometric authentication method based on 73 subjects from the Physionet Database, the TAR was 98.32% and FAR was 5.84%.
Paint and Click: Unified Interactions for Image Boundaries
DOE Office of Scientific and Technical Information (OSTI.GOV)
Summa, B.; Gooch, A. A.; Scorzelli, G.
Image boundaries are a fundamental component of many interactive digital photography techniques, enabling applications such as segmentation, panoramas, and seamless image composition. Interactions for image boundaries often rely on two complementary but separate approaches: editing via painting or clicking constraints. In this work, we provide a novel, unified approach for interactive editing of pairwise image boundaries that combines the ease of painting with the direct control of constraints. Rather than a sequential coupling, this new formulation allows full use of both interactions simultaneously, giving users unprecedented flexibility for fast boundary editing. To enable this new approach, we provide technical advancements.more » In particular, we detail a reformulation of image boundaries as a problem of finding cycles, expanding and correcting limitations of the previous work. Our new formulation provides boundary solutions for painted regions with performance on par with state-of-the-art specialized, paint-only techniques. In addition, we provide instantaneous exploration of the boundary solution space with user constraints. Finally, we provide examples of common graphics applications impacted by our new approach.« less
An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity
Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian
2016-01-01
User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.’s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.’s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance. PMID:27101305
Das, Ashok Kumar
2015-03-01
An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.
TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
NASA Astrophysics Data System (ADS)
Nauman, Mohammad; Ali, Tamleek
Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to mitigate the risks associated with naïve username/password based authentication. However, these approaches have two major limitations: they are not applicable to services where authentication occurs outside the domain of the mobile device - such as web-based services; and they often overly tax the limited computational capabilities of mobile devices. In this paper, we propose a protocol for keystroke dynamics analysis which allows web-based applications to make use of remote attestation and delegated keystroke analysis. The end result is an efficient keystroke-based user identification mechanism that strengthens traditional password protected services while mitigating the risks of user profiling by collaborating malicious web services.
A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function
Odelu, Vanga; Goswami, Adrijit
2014-01-01
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme. PMID:24892078
A robust and effective smart-card-based remote user authentication mechanism using hash function.
Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit
2014-01-01
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Comparisons of transient evoked otoacoustic emissions using chirp and click stimuli
Keefe, Douglas H.; Feeney, M. Patrick; Hunter, Lisa L.; Fitzpatrick, Denis F.
2016-01-01
Transient-evoked otoacoustic emission (TEOAE) responses (0.7–8 kHz) were measured in normal-hearing adult ears using click stimuli and chirps whose local frequency increased or decreased linearly with time over the stimulus duration. Chirp stimuli were created by allpass filtering a click with relatively constant incident pressure level over frequency. Chirp TEOAEs were analyzed as a nonlinear residual signal by inverse allpass filtering each chirp response into an equivalent click response. Multi-window spectral and temporal averaging reduced noise levels compared to a single-window average. Mean TEOAE levels using click and chirp stimuli were similar with respect to their standard errors in adult ears. TEOAE group delay, group spread, instantaneous frequency, and instantaneous bandwidth were similar overall for chirp and click conditions, except for small differences showing nonlinear interactions differing across stimulus conditions. These results support the theory of a similar generation mechanism on the basilar membrane for both click and chirp conditions based on coherent reflection within the tonotopic region. TEOAE temporal fine structure was invariant across changes in stimulus level, which is analogous to the intensity invariance of click-evoked basilar-membrane displacement data. PMID:27914441
Comparisons of transient evoked otoacoustic emissions using chirp and click stimuli.
Keefe, Douglas H; Feeney, M Patrick; Hunter, Lisa L; Fitzpatrick, Denis F
2016-09-01
Transient-evoked otoacoustic emission (TEOAE) responses (0.7-8 kHz) were measured in normal-hearing adult ears using click stimuli and chirps whose local frequency increased or decreased linearly with time over the stimulus duration. Chirp stimuli were created by allpass filtering a click with relatively constant incident pressure level over frequency. Chirp TEOAEs were analyzed as a nonlinear residual signal by inverse allpass filtering each chirp response into an equivalent click response. Multi-window spectral and temporal averaging reduced noise levels compared to a single-window average. Mean TEOAE levels using click and chirp stimuli were similar with respect to their standard errors in adult ears. TEOAE group delay, group spread, instantaneous frequency, and instantaneous bandwidth were similar overall for chirp and click conditions, except for small differences showing nonlinear interactions differing across stimulus conditions. These results support the theory of a similar generation mechanism on the basilar membrane for both click and chirp conditions based on coherent reflection within the tonotopic region. TEOAE temporal fine structure was invariant across changes in stimulus level, which is analogous to the intensity invariance of click-evoked basilar-membrane displacement data.
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
NASA Technical Reports Server (NTRS)
Luo, Victor; Khanampornpan, Teerapat; Boehmer, Rudy A.; Kim, Rachel Y.
2011-01-01
This software graphically displays all pertinent information from a Predicted Events File (PEF) using the Java Swing framework, which allows for multi-platform support. The PEF is hard to weed through when looking for specific information and it is a desire for the MRO (Mars Reconn aissance Orbiter) Mission Planning & Sequencing Team (MPST) to have a different way to visualize the data. This tool will provide the team with a visual way of reviewing and error-checking the sequence product. The front end of the tool contains much of the aesthetically appealing material for viewing. The time stamp is displayed in the top left corner, and highlighted details are displayed in the bottom left corner. The time bar stretches along the top of the window, and the rest of the space is allotted for blocks and step functions. A preferences window is used to control the layout of the sections along with the ability to choose color and size of the blocks. Double-clicking on a block will show information contained within the block. Zooming into a certain level will graphically display that information as an overlay on the block itself. Other functions include using hotkeys to navigate, an option to jump to a specific time, enabling a vertical line, and double-clicking to zoom in/out. The back end involves a configuration file that allows a more experienced user to pre-define the structure of a block, a single event, or a step function. The individual will have to determine what information is important within each block and what actually defines the beginning and end of a block. This gives the user much more flexibility in terms of what the tool is searching for. In addition to the configurability, all the settings in the preferences window are saved in the configuration file as well
Islam, S K Hafizul; Khan, Muhammad Khurram; Li, Xiong
2015-01-01
Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.'s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen's scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature.
Islam, SK Hafizul; Khan, Muhammad Khurram; Li, Xiong
2015-01-01
Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.’s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen’s scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature. PMID:26263401
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, T.
SPI/U3.1 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Inspector Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, Tony
SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
SPI/U3.2. Security Profile Inspector for UNIX Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, A.
1994-08-01
SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Adamson, Ryan M.
Password management solutions exist, but few are designed for enterprise systems administrators sharing oncall rotations. Due to the Multi-Factor Level of Assurance 4 effort, DOE is now distributing PIV cards with cryptographically signed certificate and private key pairs to administrators and other security-significant users. We utilize this public key infrastructure (PKI) to encrypt passwords for other recipients in a secure way. This is cross platform (works on OSX and Linux systems), and has already been adopted internally by the NCCS systems administration staff to replace their old password book system.
Magnetic Nanoparticle-Based Imaging of RNA Transcripts in Breast Cancer Cells
2009-06-01
iron oxide NPs via thermal decomposition. - Prepared gold-coated iron oxide NPs. - Developed a click chemistry protocol (i.e. Cu-catalyzed terminal...D.L.J., Elias, D.R., Tsourkas, A. (2009) Comparative analysis of nanoparticle-antibody conjugations: carbodiimide versus click chemistry . Submitted...carbodiimide versus click chemistry . Submitted. APPENDICES: 1) Thorek, D.L.J., Tsourkas, A. (2008) Size, charge, and concentration dependent
Lamy, Jean-Baptiste; Venot, Alain; Bar-Hen, Avner; Ouvrard, Patrick; Duclos, Catherine
2008-01-01
Background Drug iatrogeny is important but could be decreased if contraindications, cautions for use, drug interactions and adverse effects of drugs described in drug monographs were taken into account. However, the physician's time is limited during consultations, and this information is often not consulted. We describe here the design of "Mister VCM", a graphical interface based on the VCM graphical language, facilitating access to drug monographs. We also provide an assessment of the usability of this interface. Methods The "Mister VCM" interface was designed by dividing the screen into two parts: a graphical interactive one including VCM icons and synthetizing drug properties, a textual one presenting on demand drug monograph excerpts. The interface was evaluated over 11 volunteer general practitioners, trained in the use of "Mister VCM". They were asked to answer clinical questions related to fictitious randomly generated drug monographs, using a textual interface or "Mister VCM". When answering the questions, correctness of the responses and response time were recorded. Results "Mister VCM" is an interactive interface that displays VCM icons organized around an anatomical diagram of the human body with additional mental, etiological and physiological areas. Textual excerpts of the drug monograph can be displayed by clicking on the VCM icons. The interface can explicitly represent information implicit in the drug monograph, such as the absence of a given contraindication. Physicians made fewer errors with "Mister VCM" than with text (factor of 1.7; p = 0.034) and responded to questions 2.2 times faster (p < 0.001). The time gain with "Mister VCM" was greater for long monographs and questions with implicit replies. Conclusion "Mister VCM" seems to be a promising interface for accessing drug monographs. Similar interfaces could be developed for other medical domains, such as electronic patient records. PMID:18518945
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Genetics and Rheumatic Disease
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Pregnancy and Rheumatic Disease
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
American College of Rheumatology
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Granulomatosis with Polyangiitis (Wegener's)
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Calcium Pyrophosphate Deposition (CPPD)
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
MollDE: a homology modeling framework you can click with.
Canutescu, Adrian A; Dunbrack, Roland L
2005-06-15
Molecular Integrated Development Environment (MolIDE) is an integrated application designed to provide homology modeling tools and protocols under a uniform, user-friendly graphical interface. Its main purpose is to combine the most frequent modeling steps in a semi-automatic, interactive way, guiding the user from the target protein sequence to the final three-dimensional protein structure. The typical basic homology modeling process is composed of building sequence profiles of the target sequence family, secondary structure prediction, sequence alignment with PDB structures, assisted alignment editing, side-chain prediction and loop building. All of these steps are available through a graphical user interface. MolIDE's user-friendly and streamlined interactive modeling protocol allows the user to focus on the important modeling questions, hiding from the user the raw data generation and conversion steps. MolIDE was designed from the ground up as an open-source, cross-platform, extensible framework. This allows developers to integrate additional third-party programs to MolIDE. http://dunbrack.fccc.edu/molide/molide.php rl_dunbrack@fccc.edu.
NSAIDs (Nonsteroidal Anti-inflammatory Drugs)
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Osteonecrosis of the Jaw (ONJ)
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Cryopyrin-Associated Autoinflammatory Syndromes (CAPS) - Juvenile
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schaffner, Christian
2010-09-15
We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters.more » Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hagans, K.G.; Clough, R.E.
2000-04-25
An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam ofmore » light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.« less
Hagans, Karla G.; Clough, Robert E.
2000-01-01
An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.
Immune System and Its Link to Rheumatic Diseases
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Periodic Fever, Aphthous Stomatitis, Pharyngitis, Adenitis Syndrome (PFAPA)
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
LFSTAT - An R-Package for Low-Flow Analysis
NASA Astrophysics Data System (ADS)
Koffler, D.; Laaha, G.
2012-04-01
When analysing daily streamflow data focusing on low flow and drought, the state of the art is well documented in the Manual on Low-Flow Estimation and Prediction [1] published by the WMO. While it is clear what has to be done, it is not so clear how to preform the analysis and make the calculation as reproducible as possible. Our software solution expands the high preforming statistical open source software package R to analyse daily stream flow data focusing on low-flows. As command-line based programs are not everyone's preference, we also offer a plug-in for the R-Commander, an easy to use graphical user interface (GUI) to analyse data in R. Functionality includes estimation of the most important low-flow indices. Beside standardly used flow indices also BFI and Recession constants can be computed. The main applications of L-moment based Extreme value analysis and regional frequency analysis (RFA) are available. Calculation of streamflow deficits is another important feature. The most common graphics are prepared and can easily be modified according to the users preferences. Graphics include hydrographs for different periods, flexible streamflow deficit plots, baseflow visualisation, flow duration curves as well as double mass curves just to name a few. The package uses a S3-class called lfobj (low-flow objects). Once this objects are created, analysis can be preformed by mouse-click, and a script can be saved to make the analysis easy reproducible. At the moment we are offering implementation of all major methods proposed in the WMO manual on Low-flow Estimation and Predictions. Future plans include e.g. report export in odt-file using odf-weave. We hope to offer a tool to ease and structure the analysis of stream flow data focusing on low-flows and to make analysis transparent and communicable. The package is designed for hydrological research and water management practice, but can also be used in teaching students the first steps in low-flow hydrology.
Nimmo, Chelsea M; Shoichet, Molly S
2011-11-16
The click chemistry era has generated a library of versatile "spring-loaded" reactions that offer high yields, regio- and stereospecificity, and outstanding functional group tolerance. These powerful transformations are particularly advantageous for the design of sophisticated biomaterials that require high levels of precision and control, namely, materials that promote tissue regeneration such as hydrogels, 2D functionalized substrates, and 3D biomimetic scaffolds. In this review, the synthesis and application of regenerative biomaterials via click chemistry are summarized. Particular emphasis is placed on the copper(I)-catalyzed alkyne-azide cycloaddition, Diels-Alder cycloadditions, and thiol-click coupling.
SraTailor: graphical user interface software for processing and visualizing ChIP-seq data.
Oki, Shinya; Maehara, Kazumitsu; Ohkawa, Yasuyuki; Meno, Chikara
2014-12-01
Raw data from ChIP-seq (chromatin immunoprecipitation combined with massively parallel DNA sequencing) experiments are deposited in public databases as SRAs (Sequence Read Archives) that are publically available to all researchers. However, to graphically visualize ChIP-seq data of interest, the corresponding SRAs must be downloaded and converted into BigWig format, a process that involves complicated command-line processing. This task requires users to possess skill with script languages and sequence data processing, a requirement that prevents a wide range of biologists from exploiting SRAs. To address these challenges, we developed SraTailor, a GUI (Graphical User Interface) software package that automatically converts an SRA into a BigWig-formatted file. Simplicity of use is one of the most notable features of SraTailor: entering an accession number of an SRA and clicking the mouse are the only steps required to obtain BigWig-formatted files and to graphically visualize the extents of reads at given loci. SraTailor is also able to make peak calls, generate files of other formats, process users' own data, and accept various command-line-like options. Therefore, this software makes ChIP-seq data fully exploitable by a wide range of biologists. SraTailor is freely available at http://www.devbio.med.kyushu-u.ac.jp/sra_tailor/, and runs on both Mac and Windows machines. © 2014 The Authors Genes to Cells © 2014 by the Molecular Biology Society of Japan and Wiley Publishing Asia Pty Ltd.
76 FR 30408 - Agency Forms Submitted for OMB Review, Request for Comments
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-25
... conduct business with the agency electronically. As part of the system, the RRB collects information..., the requestor can apply for a PIN/ Password online. Once the PIN/Password has been established, the...
Cryptanalysis of Password Protection of Oracle Database Management System (DBMS)
NASA Astrophysics Data System (ADS)
Koishibayev, Timur; Umarova, Zhanat
2016-04-01
This article discusses the currently available encryption algorithms in the Oracle database, also the proposed upgraded encryption algorithm, which consists of 4 steps. In conclusion we make an analysis of password encryption of Oracle Database.
Advanced display object selection methods for enhancing user-computer productivity
NASA Technical Reports Server (NTRS)
Osga, Glenn A.
1993-01-01
The User-Interface Technology Branch at NCCOSC RDT&E Division has been conducting a series of studies to address the suitability of commercial off-the-shelf (COTS) graphic user-interface (GUI) methods for efficiency and performance in critical naval combat systems. This paper presents an advanced selection algorithm and method developed to increase user performance when making selections on tactical displays. The method has also been applied with considerable success to a variety of cursor and pointing tasks. Typical GUI's allow user selection by: (1) moving a cursor with a pointing device such as a mouse, trackball, joystick, touchscreen; and (2) placing the cursor on the object. Examples of GUI objects are the buttons, icons, folders, scroll bars, etc. used in many personal computer and workstation applications. This paper presents an improved method of selection and the theoretical basis for the significant performance gains achieved with various input devices tested. The method is applicable to all GUI styles and display sizes, and is particularly useful for selections on small screens such as notebook computers. Considering the amount of work-hours spent pointing and clicking across all styles of available graphic user-interfaces, the cost/benefit in applying this method to graphic user-interfaces is substantial, with the potential for increasing productivity across thousands of users and applications.
Click-MS: Tagless Protein Enrichment Using Bioorthogonal Chemistry for Quantitative Proteomics.
Smits, Arne H; Borrmann, Annika; Roosjen, Mark; van Hest, Jan C M; Vermeulen, Michiel
2016-12-16
Epitope-tagging is an effective tool to facilitate protein enrichment from crude cell extracts. Traditionally, N- or C-terminal fused tags are employed, which, however, can perturb protein function. Unnatural amino acids (UAAs) harboring small reactive handles can be site-specifically incorporated into proteins, thus serving as a potential alternative for conventional protein tags. Here, we introduce Click-MS, which combines the power of site-specific UAA incorporation, bioorthogonal chemistry, and quantitative mass spectrometry-based proteomics to specifically enrich a single protein of interest from crude mammalian cell extracts. By genetic encoding of p-azido-l-phenylalanine, the protein of interest can be selectively captured using copper-free click chemistry. We use Click-MS to enrich proteins that function in different cellular compartments, and we identify protein-protein interactions, showing the great potential of Click-MS for interaction proteomics workflows.
Rethinking Defensive Information Warfare
2004-06-01
Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion
User Manual for SAHM package for VisTrails
Talbert, C.B.; Talbert, M.K.
2012-01-01
The Software for Assisted Habitat I\\•1odeling (SAHM) has been created to both expedite habitat modeling and help maintain a record of the various input data, pre-and post-processing steps and modeling options incorporated in the construction of a species distribution model. The four main advantages to using the combined VisTrail: SAHM package for species distribution modeling are: 1. formalization and tractable recording of the entire modeling process 2. easier collaboration through a common modeling framework 3. a user-friendly graphical interface to manage file input, model runs, and output 4. extensibility to incorporate future and additional modeling routines and tools. This user manual provides detailed information on each module within the SAHM package, their input, output, common connections, optional arguments, and default settings. This information can also be accessed for individual modules by right clicking on the documentation button for any module in VisTrail or by right clicking on any input or output for a module and selecting view documentation. This user manual is intended to accompany the user guide which provides detailed instructions on how to install the SAHM package within VisTrails and then presents information on the use of the package.
van Baal, Sjozef; Kaimakis, Polynikis; Phommarinh, Manyphong; Koumbi, Daphne; Cuppens, Harry; Riccardino, Francesca; Macek, Milan; Scriver, Charles R; Patrinos, George P
2007-01-01
Frequency of INherited Disorders database (FINDbase) (http://www.findbase.org) is a relational database, derived from the ETHNOS software, recording frequencies of causative mutations leading to inherited disorders worldwide. Database records include the population and ethnic group, the disorder name and the related gene, accompanied by links to any corresponding locus-specific mutation database, to the respective Online Mendelian Inheritance in Man entries and the mutation together with its frequency in that population. The initial information is derived from the published literature, locus-specific databases and genetic disease consortia. FINDbase offers a user-friendly query interface, providing instant access to the list and frequencies of the different mutations. Query outputs can be either in a table or graphical format, accompanied by reference(s) on the data source. Registered users from three different groups, namely administrator, national coordinator and curator, are responsible for database curation and/or data entry/correction online via a password-protected interface. Databaseaccess is free of charge and there are no registration requirements for data querying. FINDbase provides a simple, web-based system for population-based mutation data collection and retrieval and can serve not only as a valuable online tool for molecular genetic testing of inherited disorders but also as a non-profit model for sustainable database funding, in the form of a 'database-journal'.
What Is the PE Password? Incorporating Vocabulary in Your Elementary PE Program
ERIC Educational Resources Information Center
Robelee, Margaret E.
2016-01-01
This article describes a novel program for third through fifth grade called "What is the PE Password?" that teaches vocabulary words and concepts without sacrificing activity time in order to support Common Core learning.
Chang, I-Pin; Lee, Tian-Fu; Lin, Tsung-Hung; Liu, Chuan-Ming
2015-11-30
Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost.
2015-09-30
sonar sound and therefore of high relevance to the US Navy, and sperm whale (Physeter macrocephalus) clicks, whose high source level assures long...beaked whale, and Zimmer (2011) for the sperm whale. 5 For background noise we used measurements obtained with the Delphinus towed array at the US...Atlantic Undersea Test and Evaluation Center (AUTEC), where both Blainville’s beaked whales and sperm whales are commonly present. Analysis of the
Hirose, Tomoyasu; Maita, Nobuo; Gouda, Hiroaki; Koseki, Jun; Yamamoto, Tsuyoshi; Sugawara, Akihiro; Nakano, Hirofumi; Hirono, Shuichi; Shiomi, Kazuro; Watanabe, Takeshi; Taniguchi, Hisaaki; Sharpless, K. Barry; Ōmura, Satoshi; Sunazuka, Toshiaki
2013-01-01
The Huisgen cycloaddition of azides and alkynes, accelerated by target biomolecules, termed “in situ click chemistry,” has been successfully exploited to discover highly potent enzyme inhibitors. We have previously reported a specific Serratia marcescens chitinase B (SmChiB)-templated syn-triazole inhibitor generated in situ from an azide-bearing inhibitor and an alkyne fragment. Several in situ click chemistry studies have been reported. Although some mechanistic evidence has been obtained, such as X-ray analysis of [protein]–[“click ligand”] complexes, indicating that proteins act as both mold and template between unique pairs of azide and alkyne fragments, to date, observations have been based solely on “postclick” structural information. Here, we describe crystal structures of SmChiB complexed with an azide ligand and an O-allyl oxime fragment as a mimic of a click partner, revealing a mechanism for accelerating syn-triazole formation, which allows generation of its own distinct inhibitor. We have also performed density functional theory calculations based on the X-ray structure to explore the acceleration of the Huisgen cycloaddition by SmChiB. The density functional theory calculations reasonably support that SmChiB plays a role by the cage effect during the pretranslation and posttranslation states of selective syn-triazole click formation. PMID:24043811
Connecting to HPC VPN | High-Performance Computing | NREL
and password will match your NREL network account login/password. From OS X or Linux, open a terminal finalized. Open a Remote Desktop connection using server name WINHPC02 (this is the login node). Mac Mac
Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng
2013-06-01
The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.
Password Cracking Using Sony Playstations
NASA Astrophysics Data System (ADS)
Kleinhans, Hugo; Butts, Jonathan; Shenoi, Sujeet
Law enforcement agencies frequently encounter encrypted digital evidence for which the cryptographic keys are unknown or unavailable. Password cracking - whether it employs brute force or sophisticated cryptanalytic techniques - requires massive computational resources. This paper evaluates the benefits of using the Sony PlayStation 3 (PS3) to crack passwords. The PS3 offers massive computational power at relatively low cost. Moreover, multiple PS3 systems can be introduced easily to expand parallel processing when additional power is needed. This paper also describes a distributed framework designed to enable law enforcement agents to crack encrypted archives and applications in an efficient and cost-effective manner.
Backup key generation model for one-time password security protocol
NASA Astrophysics Data System (ADS)
Jeyanthi, N.; Kundu, Sourav
2017-11-01
The use of one-time password (OTP) has ushered new life into the existing authentication protocols used by the software industry. It introduced a second layer of security to the traditional username-password authentication, thus coining the term, two-factor authentication. One of the drawbacks of this protocol is the unreliability of the hardware token at the time of authentication. This paper proposes a simple backup key model that can be associated with the real world applications’user database, which would allow a user to circumvent the second authentication stage, in the event of unavailability of the hardware token.
Design of the biosonar simulator for dolphin's clicks waveform reproduction
NASA Astrophysics Data System (ADS)
Ishii, Ken; Akamatsu, Tomonari; Hatakeyama, Yoshimi
1992-03-01
The emitted clicks of Dall's porpoises consist of a pulse train of burst signals with an ultrasonic carrier frequency. The authors have designed a biosonar simulator to reproduce the waveforms associated with a dolphin's clicks underwater. The total reproduction system consists of a click signal acquisition block, a waveform analysis block, a memory unit, a click simulator, and a underwater, ultrasonic wave transmitter. In operation, data stored in an EPROM (Erasable Programmable Read Only Memory) are read out sequentially by a fast clock and converted to analog output signals. Then an ultrasonic power amplifier reproduces these signals through a transmitter. The click signal replaying block is referred to as the BSS (Biosonar Simulator). This is what simulates the clicks. The details of the BSS are described in this report. A unit waveform is defined. The waveform is divided into a burst period and a waiting period. Clicks are a sequence based on a unit waveform, and digital data are sequentially read out from an EPROM of waveform data. The basic parameters of the BSS are as follows: (1) reading clock, 100 ns to 25.4 microseconds; (2) number of reading clock, 34 to 1024 times; (3) counter clock in a waiting period, 100 ns to 25.4 microseconds; (4) number of counter clock, zero to 16,777,215 times; (5) number of burst/waiting repetition cycle, one to 128 times; and (6) transmission level adjustment by a programmable attenuator, zero to 86.5 dB. These basic functions enable the BSS to replay clicks of Dall's porpoise precisely.
Gao, Ping; Sun, Lin; Zhou, Junsu; Li, Xiao; Zhan, Peng; Liu, Xinyong
2016-09-01
In recent years, a variety of new synthetic methodologies and concepts have been proposed in the search for new pharmaceutical lead structures and optimization. Notably, the Cu(I)-catalyzed azide-alkyne cycloaddition (CuAAC) click chemistry approach has drawn great attention and has become a powerful tool for the generation of privileged medicinal skeletons in the discovery of anti-HIV agents. This is due to the high degree of reliability, complete specificity (chemoselectivity and regioselectivity), mild conditions, and the biocompatibility of the reactants. Herein, the authors describe the progress thus far on the discovery of novel anti-HIV agents via the CuAAC click chemistry-based approach. CuAAC click chemistry is a proven protocol for synthesizing triazole products which could serve as basic pharmacophores, act as replacements of traditional scaffold or substituent modification, be a linker of dual-target or dual-site inhibitors and more for the discovery of novel anti-HIV agents. What's more, it also provides convenience and feasibility for dynamic combinatorial chemistry and in situ screening. It is envisioned that click chemistry will draw more attention and make more contributions in anti-HIV drug discovery in the future.
Alternative Fuels Data Center: Petroleum and Emission Reduction Planning
Add Goal à Log In You need an account to save your plans. If you already have an account, log in below. Otherwise, create an account. Email address: Password: Confirm password: LOG IN Cancel Forgot
Johnson, M; Hickmott, L.S; Aguilar Soto, N; Madsen, P.T
2007-01-01
Toothed whales echolocating in the wild generate clicks with low repetition rates to locate prey but then produce rapid sequences of clicks, called buzzes, when attempting to capture prey. However, little is known about the factors that determine clicking rates or how prey type and behaviour influence echolocation-based foraging. Here we study Blainville's beaked whales foraging in deep water using a multi-sensor DTAG that records both outgoing echolocation clicks and echoes returning from mesopelagic prey. We demonstrate that the clicking rate at the beginning of buzzes is related to the distance between whale and prey, supporting the presumption that whales focus on a specific prey target during the buzz. One whale showed a bimodal relationship between target range and clicking rate producing abnormally slow buzz clicks while attempting to capture large echoic targets, probably schooling prey, with echo duration indicating a school diameter of up to 4.3 m. These targets were only found when the whale performed tight circling manoeuvres spending up to five times longer in water volumes with large targets than with small targets. The result indicates that toothed whales in the wild can adjust their echolocation behaviour and movement for capture of different prey on the basis of structural echo information. PMID:17986434
Click nucleic acid ligation: applications in biology and nanotechnology.
El-Sagheer, Afaf H; Brown, Tom
2012-08-21
Biochemical strategies that use a combination of synthetic oligonucleotides, thermostable DNA polymerases, and DNA ligases can produce large DNA constructs up to 1 megabase in length. Although these ambitious targets are feasible biochemically, comparable technologies for the chemical synthesis of long DNA strands lag far behind. The best available chemical approach is the solid-phase phosphoramidite method, which can be used to assemble DNA strands up to 150 bases in length. Beyond this point, deficiencies in the chemistry make it impossible to produce pure DNA. A possible alternative approach to the chemical synthesis of large DNA strands is to join together carefully purified synthetic oligonucleotides by chemical methods. Click ligation by the copper-catalyzed azide-alkyne (CuAAC) reaction could facilitate this process. In this Account, we describe the synthesis, characterization, and applications of oligonucleotides prepared by click ligation. The alkyne and azide oligonucleotide strands can be prepared by standard protocols, and the ligation reaction is compatible with a wide range of chemical modifications to DNA and RNA. We have employed click ligation to synthesize DNA constructs up to 300 bases in length and much longer sequences are feasible. When the resulting triazole linkage is placed in a PCR template, various DNA polymerases correctly copy the entire base sequence. We have also successfully demonstrated both in vitro transcription and rolling circle amplification through the modified linkage. This linkage has shown in vivo biocompatibility: an antibiotic resistance gene containing triazole linkages functions in E. coli . Using click ligation, we have synthesized hairpin ribozymes up to 100 nucleotides in length and a hammerhead ribozyme with the triazole linkage located at the substrate cleavage site. At the opposite end of the length scale, click-ligated, cyclic mini-DNA duplexes have been used as models to study base pairing. Cyclic duplexes have potential therapeutic applications. They have extremely high thermodynamic stability, have increased resistance to enzymatic degradation, and have been investigated as decoys for regulatory proteins. For potential nanotechnology applications, we have synthesized double stranded DNA catenanes by click ligation. Other researchers have studied covalently fixed multistranded DNA constructs including triplexes and quadruplexes.
Fast degradable citrate-based bone scaffold promotes spinal fusion.
Tang, Jiajun; Guo, Jinshan; Li, Zhen; Yang, Cheng; Xie, Denghui; Chen, Jian; Li, Shengfa; Li, Shaolin; Kim, Gloria B; Bai, Xiaochun; Zhang, Zhongmin; Yang, Jian
2015-07-21
It is well known that high rates of fusion failure and pseudoarthrosis development (5~35%) are concomitant in spinal fusion surgery, which was ascribed to the shortage of suitable materials for bone regeneration. Citrate was recently recognized to play an indispensable role in enhancing osteconductivity and osteoinductivity, and promoting bone formation. To address the material challenges in spinal fusion surgery, we have synthesized mechanically robust and fast degrading citrate-based polymers by incorporating N-methyldiethanolamine (MDEA) into clickable poly(1, 8-octanediol citrates) (POC-click), referred to as POC-M-click. The obtained POC-M-click were fabricated into POC-M-click-HA matchstick scaffolds by compositing with hydroxyapatite (HA) for interbody spinal fusion in a rabbit model. Spinal fusion was analyzed by radiography, manual palpation, biomechanical testing, and histological evaluation. At 4 and 8 weeks post surgery, POC-M-click-HA scaffolds presented optimal degradation rates that facilitated faster new bone formation and higher spinal fusion rates (11.2±3.7, 80±4.5 at week 4 and 8, respectively) than the poly(L-lactic acid)-HA (PLLA-HA) control group (9.3±2.4 and 71.1±4.4) (p<0.05). The POC-M-click-HA scaffold-fused vertebrates possessed a maximum load and stiffness of 880.8±14.5 N and 843.2±22.4 N/mm, respectively, which were also much higher than those of the PLLA-HA group (maximum: 712.0±37.5 N, stiffness: 622.5±28.4 N/mm, p<0.05). Overall, the results suggest that POC-M-click-HA scaffolds could potentially serve as promising bone grafts for spinal fusion applications.
Fast degradable citrate-based bone scaffold promotes spinal fusion
Tang, Jiajun; Guo, Jinshan; Li, Zhen; Yang, Cheng; Xie, Denghui; Chen, Jian; Li, Shengfa; Li, Shaolin; Kim, Gloria B.; Bai, Xiaochun; Zhang, Zhongmin; Yang, Jian
2015-01-01
It is well known that high rates of fusion failure and pseudoarthrosis development (5~35%) are concomitant in spinal fusion surgery, which was ascribed to the shortage of suitable materials for bone regeneration. Citrate was recently recognized to play an indispensable role in enhancing osteconductivity and osteoinductivity, and promoting bone formation. To address the material challenges in spinal fusion surgery, we have synthesized mechanically robust and fast degrading citrate-based polymers by incorporating N-methyldiethanolamine (MDEA) into clickable poly(1, 8-octanediol citrates) (POC-click), referred to as POC-M-click. The obtained POC-M-click were fabricated into POC-M-click-HA matchstick scaffolds by compositing with hydroxyapatite (HA) for interbody spinal fusion in a rabbit model. Spinal fusion was analyzed by radiography, manual palpation, biomechanical testing, and histological evaluation. At 4 and 8 weeks post surgery, POC-M-click-HA scaffolds presented optimal degradation rates that facilitated faster new bone formation and higher spinal fusion rates (11.2±3.7, 80±4.5 at week 4 and 8, respectively) than the poly(L-lactic acid)-HA (PLLA-HA) control group (9.3±2.4 and 71.1±4.4) (p<0.05). The POC-M-click-HA scaffold-fused vertebrates possessed a maximum load and stiffness of 880.8±14.5 N and 843.2±22.4 N/mm, respectively, which were also much higher than those of the PLLA-HA group (maximum: 712.0±37.5 N, stiffness: 622.5±28.4 N/mm, p<0.05). Overall, the results suggest that POC-M-click-HA scaffolds could potentially serve as promising bone grafts for spinal fusion applications. PMID:26213625
75 FR 5579 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-03
... with re-entry controlled by passwords. The DLA Enterprise Hotline Program Database is also password...: * * * * * System location: Delete entry and replace with ``Director, DLA Accountability Office (DA), Headquarters....'' * * * * * Retention and disposal: Delete entry and replace with ``Records are destroyed/deleted 10 years after...
NASA Technical Reports Server (NTRS)
Adams, Richard J.
2015-01-01
The patent-pending Glove-Enabled Computer Operations (GECO) design leverages extravehicular activity (EVA) glove design features as platforms for instrumentation and tactile feedback, enabling the gloves to function as human-computer interface devices. Flexible sensors in each finger enable control inputs that can be mapped to any number of functions (e.g., a mouse click, a keyboard strike, or a button press). Tracking of hand motion is interpreted alternatively as movement of a mouse (change in cursor position on a graphical user interface) or a change in hand position on a virtual keyboard. Programmable vibro-tactile actuators aligned with each finger enrich the interface by creating the haptic sensations associated with control inputs, such as recoil of a button press.
Deep Space Network (DSN), Network Operations Control Center (NOCC) computer-human interfaces
NASA Technical Reports Server (NTRS)
Ellman, Alvin; Carlton, Magdi
1993-01-01
The technical challenges, engineering solutions, and results of the NOCC computer-human interface design are presented. The use-centered design process was as follows: determine the design criteria for user concerns; assess the impact of design decisions on the users; and determine the technical aspects of the implementation (tools, platforms, etc.). The NOCC hardware architecture is illustrated. A graphical model of the DSN that represented the hierarchical structure of the data was constructed. The DSN spacecraft summary display is shown. Navigation from top to bottom is accomplished by clicking the appropriate button for the element about which the user desires more detail. The telemetry summary display and the antenna color decision table are also shown.
ERIC Educational Resources Information Center
Mattord, Herbert J.
2012-01-01
Organizations continue to rely on password-based authentication methods to control access to many Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS). It developed an Authentication Method System Index (AMSI) to analyze collected data from…
2015-03-01
In the January 2015 issue of Cyberpsychology, Behavior, and Social Networking (vol. 18, no. 1, pp. 3–7), the article "Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords." by Prof. Monica Whitty et al., has an error in wording in the abstract. The sentence in question was originally printed as: Contrary to our hypotheses, we found older people and individuals who score high on self-monitoring were more likely to share passwords. It should read: Contrary to our hypotheses, we found younger people and individuals who score high on self-monitoring were more likely to share passwords. The authors wish to apologize for the error.
A Risk-based, Practice-centered Approach to Project Management for HPCMP CREATE
2015-10-05
form of videoconferencing. These impediments have been mitigated to some extent by using browser-based Software as a Service ( SaaS ) access to CREATE...one-time password (OTP), and OpenID. Security is managed within the DREN, as opposed to every desktop. As a “Software as a Service” ( SaaS
ERIC Educational Resources Information Center
Shimizu, Hirofumi; Yoon, Soyoung; McDonough, Christopher S.
2010-01-01
We taught seven preschoolers with developmental disabilities to point-and-click with a computer mouse. The computer-based training program consisted of three parts, based on a task analysis of the behavioral prerequisites to point-and-click. Training 1 was designed to shape moving the mouse. Training 2 was designed to build eye-hand coordination…
50 CFR 679.91 - Amendment 80 Program annual harvester privileges.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) Hand delivery or carrier: NMFS, Room 713, 709 West 9th Street, Juneau, AK 99801. (iv) Electronic: http... using the transferor's NMFS ID, password, and Transfer Key and submitting the transfer request, the... on the computer screen. By using the transferee's NMFS ID, password and Transfer Key, the designated...
50 CFR 679.91 - Amendment 80 Program annual harvester privileges.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., Room 713, 709 West 9th Street, Juneau, AK 99801. (iv) Electronic: http://alaskafisheries.noaa.gov. (2... using the transferor's NMFS ID, password, and Transfer Key and submitting the transfer request, the... on the computer screen. By using the transferee's NMFS ID, password and Transfer Key, the designated...
50 CFR 679.91 - Amendment 80 Program annual harvester privileges.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) Hand delivery or carrier: NMFS, Room 713, 709 West 9th Street, Juneau, AK 99801. (iv) Electronic: http... using the transferor's NMFS ID, password, and Transfer Key and submitting the transfer request, the... on the computer screen. By using the transferee's NMFS ID, password and Transfer Key, the designated...
50 CFR 679.91 - Amendment 80 Program annual harvester privileges.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) Hand delivery or carrier: NMFS, Room 713, 709 West 9th Street, Juneau, AK 99801. (iv) Electronic: http... using the transferor's NMFS ID, password, and Transfer Key and submitting the transfer request, the... on the computer screen. By using the transferee's NMFS ID, password and Transfer Key, the designated...
50 CFR 679.91 - Amendment 80 Program annual harvester privileges.
Code of Federal Regulations, 2013 CFR
2013-10-01
...) Hand delivery or carrier: NMFS, Room 713, 709 West 9th Street, Juneau, AK 99801. (iv) Electronic: http... using the transferor's NMFS ID, password, and Transfer Key and submitting the transfer request, the... on the computer screen. By using the transferee's NMFS ID, password and Transfer Key, the designated...
21 CFR 11.300 - Controls for identification codes/passwords.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 1 2011-04-01 2011-04-01 false Controls for identification codes/passwords. 11.300 Section 11.300 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN... attempts at their unauthorized use to the system security unit, and, as appropriate, to organizational...
21 CFR 11.300 - Controls for identification codes/passwords.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Controls for identification codes/passwords. 11.300 Section 11.300 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN... attempts at their unauthorized use to the system security unit, and, as appropriate, to organizational...
Beyond Passwords: Usage and Policy Transformation
2007-03-01
case scenario for lost productivity due to users leaving their CAC at work, in their computer, is costing 261 work years per year with an estimated ...one for your CAC) are you currently using? ..................................................................................................... 43...PASSWORDS: USAGE AND POLICY TRANSFORMATION I. Introduction Background Currently , the primary method for network authentication on the
21 CFR 11.300 - Controls for identification codes/passwords.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 21 Food and Drugs 1 2012-04-01 2012-04-01 false Controls for identification codes/passwords. 11.300 Section 11.300 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Signatures § 11.300 Controls for...
Xie, Qi; Liu, Wenhao; Wang, Shengbao; Han, Lidong; Hu, Bin; Wu, Ting
2014-09-01
Patient's privacy-preserving, security and mutual authentication between patient and the medical server are the important mechanism in connected health care applications, such as telecare medical information systems and personally controlled health records systems. In 2013, Wen showed that Das et al.'s scheme is vulnerable to the replay attack, user impersonation attacks and off-line guessing attacks, and then proposed an improved scheme using biometrics, password and smart card to overcome these weaknesses. However, we show that Wen's scheme is still vulnerable to off-line password guessing attacks, does not provide user's anonymity and perfect forward secrecy. Further, we propose an improved scheme to fix these weaknesses, and use the applied pi calculus based formal verification tool ProVerif to prove the security and authentication.
Kim, Younghoon; Kim, Sung Hoon; Ferracane, Dean; Katzenellenbogen, John A; Schroeder, Charles M
2012-09-19
Zinc finger proteins (ZFPs) play a key role in transcriptional regulation and serve as invaluable tools for gene modification and genetic engineering. Development of efficient strategies for labeling metalloproteins such as ZFPs is essential for understanding and controlling biological processes. In this work, we engineered ZFPs containing cysteine-histidine (Cys2-His2) motifs by metabolic incorporation of the unnatural amino acid azidohomoalanine (AHA), followed by specific protein labeling via click chemistry. We show that cyclooctyne promoted [3 + 2] dipolar cycloaddition with azides, known as copper-free click chemistry, provides rapid and specific labeling of ZFPs at high yields as determined by mass spectrometry analysis. We observe that the DNA-binding activity of ZFPs labeled by conventional copper-mediated click chemistry was completely abolished, whereas ZFPs labeled by copper-free click chemistry retain their sequence-specific DNA-binding activity under native conditions, as determined by electrophoretic mobility shift assays, protein microarrays, and kinetic binding assays based on Förster resonance energy transfer (FRET). Our work provides a general framework to label metalloproteins such as ZFPs by metabolic incorporation of unnatural amino acids followed by copper-free click chemistry.
Kim, Younghoon; Kim, Sung Hoon; Ferracane, Dean; Katzenellenbogen, John A.
2012-01-01
Zinc finger proteins (ZFPs) play a key role in transcriptional regulation and serve as invaluable tools for gene modification and genetic engineering. Development of efficient strategies for labeling metalloproteins such as ZFPs is essential for understanding and controlling biological processes. In this work, we engineered ZFPs containing cysteine-histidine (Cys2-His2) motifs by metabolic incorporation of the unnatural amino acid azidohomoalanine (AHA), followed by specific protein labeling via click chemistry. We show that cyclooctyne promoted [3 + 2] dipolar cycloaddition with azides, known as copper-free click chemistry, provides rapid and specific labeling of ZFPs at high yields as determined by mass spectrometry analysis. We observe that the DNA-binding activity of ZFPs labeled by conventional copper-mediated click chemistry was completely abolished, whereas ZFPs labeled by copper-free click chemistry retain their sequence-specific DNA-binding activity under native conditions, as determined by electrophoretic mobility shift assays, protein microarrays and kinetic binding assays based on Förster resonance energy transfer (FRET). Our work provides a general framework to label metalloproteins such as ZFPs by metabolic incorporation of unnatural amino acids followed by copper-free click chemistry. PMID:22871171
Forward-masking based gain control in odontocete biosonar: an evoked-potential study.
Supin, Alexander Ya; Nachtigall, Paul E; Breese, Marlee
2009-04-01
Auditory evoked potentials (AEPs) were recorded during echolocation in a false killer whale Pseudorca crassidens. An electronically synthesized and played-back ("phantom") echo was used. Each electronic echo was triggered by an emitted biosonar pulse. The echo had a spectrum similar to that of the emitted biosonar clicks, and its intensity was proportional to that of the emitted click. The attenuation of the echo relative to the emitted click and its delay was controlled by the experimenter. Four combinations of echo attenuation and delay were tested (-31 dB, 2 ms), (-40 dB, 4 ms), (-49 dB, 8 ms), and (-58 dB, 16 ms); thus, attenuation and delay were associated with a rate of 9 dB of increased attenuation per delay doubling. AEPs related to emitted clicks displayed a regular amplitude dependence on the click level. Echo-related AEPs did not feature amplitude dependence on echo attenuation or emitted click levels, except in a few combinations of the lowest values of these two variables. The results are explained by a hypothesis that partial forward masking of the echoes by the preceding emitted sonar pulses serves as a kind of automatic gain control in the auditory system of echolocating odontocetes.
RSA-Based Password-Authenticated Key Exchange, Revisited
NASA Astrophysics Data System (ADS)
Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki
The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.
Chang, I-Pin; Lee, Tian-Fu; Lin, Tsung-Hung; Liu, Chuan-Ming
2015-01-01
Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost. PMID:26633396
Design and Evaluation of Perceptual-based Object Group Selection Techniques
NASA Astrophysics Data System (ADS)
Dehmeshki, Hoda
Selecting groups of objects is a frequent task in graphical user interfaces. It is required prior to many standard operations such as deletion, movement, or modification. Conventional selection techniques are lasso, rectangle selection, and the selection and de-selection of items through the use of modifier keys. These techniques may become time-consuming and error-prone when target objects are densely distributed or when the distances between target objects are large. Perceptual-based selection techniques can considerably improve selection tasks when targets have a perceptual structure, for example when arranged along a line. Current methods to detect such groups use ad hoc grouping algorithms that are not based on results from perception science. Moreover, these techniques do not allow selecting groups with arbitrary arrangements or permit modifying a selection. This dissertation presents two domain-independent perceptual-based systems that address these issues. Based on established group detection models from perception research, the proposed systems detect perceptual groups formed by the Gestalt principles of good continuation and proximity. The new systems provide gesture-based or click-based interaction techniques for selecting groups with curvilinear or arbitrary structures as well as clusters. Moreover, the gesture-based system is adapted for the graph domain to facilitate path selection. This dissertation includes several user studies that show the proposed systems outperform conventional selection techniques when targets form salient perceptual groups and are still competitive when targets are semi-structured.
A Quantitative Analysis of Pulsed Signals Emitted by Wild Bottlenose Dolphins.
Luís, Ana Rita; Couchinho, Miguel N; Dos Santos, Manuel E
2016-01-01
Common bottlenose dolphins (Tursiops truncatus), produce a wide variety of vocal emissions for communication and echolocation, of which the pulsed repertoire has been the most difficult to categorize. Packets of high repetition, broadband pulses are still largely reported under a general designation of burst-pulses, and traditional attempts to classify these emissions rely mainly in their aural characteristics and in graphical aspects of spectrograms. Here, we present a quantitative analysis of pulsed signals emitted by wild bottlenose dolphins, in the Sado estuary, Portugal (2011-2014), and test the reliability of a traditional classification approach. Acoustic parameters (minimum frequency, maximum frequency, peak frequency, duration, repetition rate and inter-click-interval) were extracted from 930 pulsed signals, previously categorized using a traditional approach. Discriminant function analysis revealed a high reliability of the traditional classification approach (93.5% of pulsed signals were consistently assigned to their aurally based categories). According to the discriminant function analysis (Wilk's Λ = 0.11, F3, 2.41 = 282.75, P < 0.001), repetition rate is the feature that best enables the discrimination of different pulsed signals (structure coefficient = 0.98). Classification using hierarchical cluster analysis led to a similar categorization pattern: two main signal types with distinct magnitudes of repetition rate were clustered into five groups. The pulsed signals, here described, present significant differences in their time-frequency features, especially repetition rate (P < 0.001), inter-click-interval (P < 0.001) and duration (P < 0.001). We document the occurrence of a distinct signal type-short burst-pulses, and highlight the existence of a diverse repertoire of pulsed vocalizations emitted in graded sequences. The use of quantitative analysis of pulsed signals is essential to improve classifications and to better assess the contexts of emission, geographic variation and the functional significance of pulsed signals.
En Route Air Traffic Control Input Devices for the Next Generation
NASA Technical Reports Server (NTRS)
Mainini, Matthew J.
2010-01-01
The purpose of this study was to investigate the usefulness of different input device configurations when trial planning new routes for aircraft in an advanced simulation of the en route workstation. The task of trial planning is one of the futuristic tools that is performed by the graphical manipulation of an aircraft's trajectory to reroute the aircraft without voice communication. In this study with two input devices, the FAA's current trackball and a basic optical computer mouse were evaluated with "pick" button in a click-and-hold state and a click-and-release state while the participant dragged the trial plan line. The trial plan was used for three different conflict types: Aircraft Conflicts, Weather Conflicts, and Aircraft + Weather Conflicts. Speed and accuracy were the primary dependent variables. Results indicate that the mouse conditions were significantly faster than the trackball conditions overall with no significant loss of accuracy. Several performance ratings and preference ratings were analyzed from post-run and post-simulation questionnaires. The release conditions were significantly more useful and likable than the hold conditions. The results suggest that the mouse in the release button state was the fastest and most well liked device configuration for trial planning in the en route workstation. Keywords-input devices, en route, controller, workstation, mouse, trackball, NextGen
Alternative Fuels Data Center: Plug-In Electric Vehicle Readiness Scorecard
track progress toward PEV readiness. Get started evaluating your community. Create Account Log in to your account. Email Password Forgot your password? LOG IN Public reporting burden for this collection of information is estimated to average (20.5 hours) per response, including the time for reviewing
A Comparison of Password Techniques for Multilevel Authentication Mechanisms
1990-06-01
an individual user’s perceptions, personal interests and personal history . This information is unique to the individual and is neither commonly...a user may associative passwords profile around the Beatles . In this case, cues may include "abbey", "john", "yellow" and "george" and have responses
General Framework for Evaluating Password Complexity and Strength
2015-11-15
stronger password requirements: User attitudes and behaviors,” in Pro- ceedings of the Sixth Symposium on Usable Privacy and Security, ser. SOUPS ’10. New...Proceedings of the Eighth Symposium on Usable Privacy and Security, ser. SOUPS ’12. New York, NY, USA: ACM, 2012, pp. 1–20. [22] P. Kelley, S. Komanduri
Metabolomic Analysis and Visualization Engine for LC–MS Data
Melamud, Eugene; Vastag, Livia; Rabinowitz, Joshua D.
2017-01-01
Metabolomic analysis by liquid chromatography–high-resolution mass spectrometry results in data sets with thousands of features arising from metabolites, fragments, isotopes, and adducts. Here we describe a software package, Metabolomic Analysis and Visualization ENgine (MAVEN), designed for efficient interactive analysis of LC–MS data, including in the presence of isotope labeling. The software contains tools for all aspects of the data analysis process, from feature extraction to pathway-based graphical data display. To facilitate data validation, a machine learning algorithm automatically assesses peak quality. Users interact with raw data primarily in the form of extracted ion chromatograms, which are displayed with overlaid circles indicating peak quality, and bar graphs of peak intensities for both unlabeled and isotope-labeled metabolite forms. Click-based navigation leads to additional information, such as raw data for specific isotopic forms or for metabolites changing significantly between conditions. Fast data processing algorithms result in nearly delay-free browsing. Drop-down menus provide tools for the overlay of data onto pathway maps. These tools enable animating series of pathway graphs, e.g., to show propagation of labeled forms through a metabolic network. MAVEN is released under an open source license at http://maven.princeton.edu. PMID:21049934
75 FR 6339 - California Public Utilities Commission Petition for Rulemaking
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-09
... (NORS). The CPUC also requests password-protected access to California- specific disruption and outage... ``limited to California-specific disruption and outage data.'' NORS is the Web-based filing system through which certain communications providers submit reports to the Commission of disruptions to communications...
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian
2015-06-01
The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.
Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.
KA-SB: from data integration to large scale reasoning
Roldán-García, María del Mar; Navas-Delgado, Ismael; Kerzazi, Amine; Chniber, Othmane; Molina-Castro, Joaquín; Aldana-Montes, José F
2009-01-01
Background The analysis of information in the biological domain is usually focused on the analysis of data from single on-line data sources. Unfortunately, studying a biological process requires having access to disperse, heterogeneous, autonomous data sources. In this context, an analysis of the information is not possible without the integration of such data. Methods KA-SB is a querying and analysis system for final users based on combining a data integration solution with a reasoner. Thus, the tool has been created with a process divided into two steps: 1) KOMF, the Khaos Ontology-based Mediator Framework, is used to retrieve information from heterogeneous and distributed databases; 2) the integrated information is crystallized in a (persistent and high performance) reasoner (DBOWL). This information could be further analyzed later (by means of querying and reasoning). Results In this paper we present a novel system that combines the use of a mediation system with the reasoning capabilities of a large scale reasoner to provide a way of finding new knowledge and of analyzing the integrated information from different databases, which is retrieved as a set of ontology instances. This tool uses a graphical query interface to build user queries easily, which shows a graphical representation of the ontology and allows users o build queries by clicking on the ontology concepts. Conclusion These kinds of systems (based on KOMF) will provide users with very large amounts of information (interpreted as ontology instances once retrieved), which cannot be managed using traditional main memory-based reasoners. We propose a process for creating persistent and scalable knowledgebases from sets of OWL instances obtained by integrating heterogeneous data sources with KOMF. This process has been applied to develop a demo tool , which uses the BioPax Level 3 ontology as the integration schema, and integrates UNIPROT, KEGG, CHEBI, BRENDA and SABIORK databases. PMID:19796402
Structure-Based Design of Inhibitors to the Cytotoxin Ricin
2006-07-01
markers for the receptor may be predicted by these programs. To follow up on this experiment, we began to screen a large commercial data base, the...of the Huisgen thermal [3+2] cycloaddition reaction (Table 1). The advantages of this click chemistry approach include the potential for favorable...41, 2113-2116. Hartmuth C. Kolb, M. G. F. K. B. S. (2001). Click Chemistry: Diverse Chemical Function from a Few Good Reactions . Angewandte
User Authentication: A State-of-the-Art Review
1991-09-01
etc/ passwd , is publicly readable. Although the passwords in the file are encrypted, the encryption routine is read:.ly accessible. Encrypting a guess...version 4.0, and AT&T’s System V release 3.2 and System V/MLS, have addressed the problem by moving the passwords from /etc/ passwd into a shadow file that
17 CFR 269.7 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2010 CFR
2010-04-01
... on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification Authorization Code (PMAC)—allows a filer, filing agent or training agent to change its Password. [69 FR 22710, Apr... Sections Affected, which appears in the Finding Aids section of the printed volume and on GPO Access. ...
17 CFR 249.446 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2010 CFR
2010-04-01
... log on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification Authorization Code (PMAC)—allows a filer, filing agent or training agent to change its Password. [69 FR 22710... Sections Affected, which appears in the Finding Aids section of the printed volume and on GPO Access. ...
Wang, Xiaoyu; Li, Zihan; Shi, Ting; Zhao, Peng; An, Kangkang; Lin, Chao; Liu, Hongwei
2017-04-01
Injectable dextran-based hydrogels were prepared for the first time by bioorthogonal click chemistry for cartilage tissue engineering. Click-crosslinked injectable hydrogels based on cyto-compatible dextran (Mw=10kDa) were successfully fabricated under physiological conditions by metal-free alkyne-azide cycloaddition (click) reaction between azadibenzocyclooctyne-modified dextran (Dex-ADIBO) and azide-modified dextran (Dex-N 3 ). Gelation time of these dextran hydrogels could be regulated in the range of approximately 1.1 to 10.2min, depending on the polymer concentrations (5% or 10%) and ADIBO substitution degree (DS, 5 or 10) of Dex-ADIBO. Rheological analysis indicated that the dextran hydrogels were elastic and had storage moduli from 2.1 to 6.0kPa with increasing DS of ADIBO from 5 to 10. The in vitro tests revealed that the dextran hydrogel crosslinked from Dex-ADIBO DS 10 and Dex-N 3 DS 10 at a polymer concentration of 10% could support high viability of individual rabbit chondrocytes and the chondrocyte spheroids encapsulated in the hydrogel over 21days. Individual chondrocytes and chondrocyte spheroids in the hydrogel could produce cartilage matrices such as collagen and glycosaminoglycans. However, the chondrocyte spheroids produced a higher content of matrices than individual chondrocytes. This study indicates that metal-free click chemistry is effective to produce injectable dextran hydrogels for cartilage tissue engineering. Copyright © 2016 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Huang, Hongye; Liu, Meiying; Tuo, Xun; Chen, Junyu; Mao, Liucheng; Wen, Yuanqing; Tian, Jianwen; Zhou, Naigen; Zhang, Xiaoyong; Wei, Yen
2018-05-01
Over the past years, fluorescent carbon nanoparticles have got growing interest for biological imaging. Fluorescent nanodiamonds (FNDs) are novel fluorescent carbon nanoparticles with multitudinous useful properties, including remarkable fluorescence properties, extremely low toxicity and high refractive index. However, facile preparation of FNDs with designable properties and functions from non-fluorescent detonation nanodiamonds (DNDs) has demonstrated to be challengeable. In this work, we reported for the first time that preparation of Polyethylene glycol (PEG) functionalized FNDs through a one-step thiol-ene click reaction using thiol containing PEG (PEG-SH) as the coating agent. Based on the characterization results, we demonstrated that PEG-SH could be efficiently introduced on DNDs to obtain FNDs through the thiol-ene click chemistry. The resultant FND-PEG composites showed high water dispersibility, strong fluorescence and low cytotoxicity. Moreover, FND-PEG composites could be internalized by cells and displayed good cell dyeing performance. All of these features implied that FND-PEG composites are of great potential for biological imaging. Taken together, a facile one-step strategy based on the one-step thiol-ene click reaction has been developed for efficient preparation of FND-PEG composites from non-fluorescent DNDs. The strategy should be also useful for fabrication of many other functional FNDs via using different thiol containing compounds for the universality of thiol-ene click reaction.
Kawano, Tomonori
2013-01-01
There have been a wide variety of approaches for handling the pieces of DNA as the “unplugged” tools for digital information storage and processing, including a series of studies applied to the security-related area, such as DNA-based digital barcodes, water marks and cryptography. In the present article, novel designs of artificial genes as the media for storing the digitally compressed data for images are proposed for bio-computing purpose while natural genes principally encode for proteins. Furthermore, the proposed system allows cryptographical application of DNA through biochemically editable designs with capacity for steganographical numeric data embedment. As a model case of image-coding DNA technique application, numerically and biochemically combined protocols are employed for ciphering the given “passwords” and/or secret numbers using DNA sequences. The “passwords” of interest were decomposed into single letters and translated into the font image coded on the separate DNA chains with both the coding regions in which the images are encoded based on the novel run-length encoding rule, and the non-coding regions designed for biochemical editing and the remodeling processes revealing the hidden orientation of letters composing the original “passwords.” The latter processes require the molecular biological tools for digestion and ligation of the fragmented DNA molecules targeting at the polymerase chain reaction-engineered termini of the chains. Lastly, additional protocols for steganographical overwriting of the numeric data of interests over the image-coding DNA are also discussed. PMID:23750303
Disruption of the auditory response to a regular click train by a single, extra click.
Lütkenhöner, Bernd; Patterson, Roy D
2015-06-01
It has been hypothesized that the steady-state response to a periodic sequence of clicks can be modeled as the superposition of responses to single clicks. Here, this hypothesis is challenged by presenting an extra click halfway between two consecutive clicks of a regular series, while measuring the auditory evoked field. After a solitary click at time zero, the click series sounded from 100 to 900 ms, with the extra click presented around 500 ms. The silent period between two stimulus sequences was 310-390 ms (uniformly distributed) so that one stimulation cycle lasted, on average, 1250 ms. Five different click rates between 20 and 60 Hz were examined. The disturbance caused by the extra click was revealed by subtracting the estimated steady-state response from the joint response to the click series and the extra click. The early peaks of the single-click response effectively coincide with same-polarity peaks of the 20-Hz steady-state response. Nevertheless, prediction of the latter from the former proved impossible. However, the 40-Hz steady-state response can be predicted reasonably well from the 20-Hz steady-state response. Somewhat surprisingly, the amplitude of the evoked response to the extra click grew when the click rate of the train was increased from 20 to 30 Hz; the opposite effect would have been expected from research on adaptation. The smaller amplitude at lower click rates might be explained by forward suppression. In this case, the apparent escape from suppression at higher rates might indicate that the clicks belonging to the periodic train are being integrated into an auditory stream, possibly in much the same manner as in classical stream segregation experiments.
ARC SDK: A toolbox for distributed computing and data applications
NASA Astrophysics Data System (ADS)
Skou Andersen, M.; Cameron, D.; Lindemann, J.
2014-06-01
Grid middleware suites provide tools to perform the basic tasks of job submission and retrieval and data access, however these tools tend to be low-level, operating on individual jobs or files and lacking in higher-level concepts. User communities therefore generally develop their own application-layer software catering to their specific communities' needs on top of the Grid middleware. It is thus important for the Grid middleware to provide a friendly, well documented and simple to use interface for the applications to build upon. The Advanced Resource Connector (ARC), developed by NorduGrid, provides a Software Development Kit (SDK) which enables applications to use the middleware for job and data management. This paper presents the architecture and functionality of the ARC SDK along with an example graphical application developed with the SDK. The SDK consists of a set of libraries accessible through Application Programming Interfaces (API) in several languages. It contains extensive documentation and example code and is available on multiple platforms. The libraries provide generic interfaces and rely on plugins to support a given technology or protocol and this modular design makes it easy to add a new plugin if the application requires supporting additional technologies.The ARC Graphical Clients package is a graphical user interface built on top of the ARC SDK and the Qt toolkit and it is presented here as a fully functional example of an application. It provides a graphical interface to enable job submission and management at the click of a button, and allows data on any Grid storage system to be manipulated using a visual file system hierarchy, as if it were a regular file system.
Bayesian inference for psychology. Part II: Example applications with JASP.
Wagenmakers, Eric-Jan; Love, Jonathon; Marsman, Maarten; Jamil, Tahira; Ly, Alexander; Verhagen, Josine; Selker, Ravi; Gronau, Quentin F; Dropmann, Damian; Boutin, Bruno; Meerhoff, Frans; Knight, Patrick; Raj, Akash; van Kesteren, Erik-Jan; van Doorn, Johnny; Šmíra, Martin; Epskamp, Sacha; Etz, Alexander; Matzke, Dora; de Jong, Tim; van den Bergh, Don; Sarafoglou, Alexandra; Steingroever, Helen; Derks, Koen; Rouder, Jeffrey N; Morey, Richard D
2018-02-01
Bayesian hypothesis testing presents an attractive alternative to p value hypothesis testing. Part I of this series outlined several advantages of Bayesian hypothesis testing, including the ability to quantify evidence and the ability to monitor and update this evidence as data come in, without the need to know the intention with which the data were collected. Despite these and other practical advantages, Bayesian hypothesis tests are still reported relatively rarely. An important impediment to the widespread adoption of Bayesian tests is arguably the lack of user-friendly software for the run-of-the-mill statistical problems that confront psychologists for the analysis of almost every experiment: the t-test, ANOVA, correlation, regression, and contingency tables. In Part II of this series we introduce JASP ( http://www.jasp-stats.org ), an open-source, cross-platform, user-friendly graphical software package that allows users to carry out Bayesian hypothesis tests for standard statistical problems. JASP is based in part on the Bayesian analyses implemented in Morey and Rouder's BayesFactor package for R. Armed with JASP, the practical advantages of Bayesian hypothesis testing are only a mouse click away.
Alvarsson, Jonathan; Andersson, Claes; Spjuth, Ola; Larsson, Rolf; Wikberg, Jarl E S
2011-05-20
Compound profiling and drug screening generates large amounts of data and is generally based on microplate assays. Current information systems used for handling this are mainly commercial, closed source, expensive, and heavyweight and there is a need for a flexible lightweight open system for handling plate design, and validation and preparation of data. A Bioclipse plugin consisting of a client part and a relational database was constructed. A multiple-step plate layout point-and-click interface was implemented inside Bioclipse. The system contains a data validation step, where outliers can be removed, and finally a plate report with all relevant calculated data, including dose-response curves. Brunn is capable of handling the data from microplate assays. It can create dose-response curves and calculate IC50 values. Using a system of this sort facilitates work in the laboratory. Being able to reuse already constructed plates and plate layouts by starting out from an earlier step in the plate layout design process saves time and cuts down on error sources.
Generalized Fluid System Simulation Program (GFSSP) - Version 6
NASA Technical Reports Server (NTRS)
Majumdar, Alok; LeClair, Andre; Moore, Ric; Schallhorn, Paul
2015-01-01
The Generalized Fluid System Simulation Program (GFSSP) is a finite-volume based general-purpose computer program for analyzing steady state and time-dependent flow rates, pressures, temperatures, and concentrations in a complex flow network. The program is capable of modeling real fluids with phase changes, compressibility, mixture thermodynamics, conjugate heat transfer between solid and fluid, fluid transients, pumps, compressors, flow control valves and external body forces such as gravity and centrifugal. The thermo-fluid system to be analyzed is discretized into nodes, branches, and conductors. The scalar properties such as pressure, temperature, and concentrations are calculated at nodes. Mass flow rates and heat transfer rates are computed in branches and conductors. The graphical user interface allows users to build their models using the 'point, drag, and click' method; the users can also run their models and post-process the results in the same environment. The integrated fluid library supplies thermodynamic and thermo-physical properties of 36 fluids, and 24 different resistance/source options are provided for modeling momentum sources or sinks in the branches. Users can introduce new physics, non-linear and time-dependent boundary conditions through user-subroutine.
Generalized Fluid System Simulation Program, Version 6.0
NASA Technical Reports Server (NTRS)
Majumdar, A. K.; LeClair, A. C.; Moore, A.; Schallhorn, P. A.
2013-01-01
The Generalized Fluid System Simulation Program (GFSSP) is a finite-volume based general-purpose computer program for analyzing steady state and time-dependant flow rates, pressures, temperatures, and concentrations in a complex flow network. The program is capable of modeling real fluids with phase changes, compressibility, mixture thermodynamics, conjugate heat transfer between solid and fluid, fluid transients, pumps, compressors and external body forces such as gravity and centrifugal. The thermo-fluid system to be analyzed is discretized into nodes, branches, and conductors. The scalar properties such as pressure, temperature, and concentrations are calculated at nodes. Mass flow rates and heat transfer rates are computed in branches and conductors. The graphical user interface allows users to build their models using the 'point, drag, and click' method; the users can also run their models and post-process the results in the same environment. The integrated fluid library supplies thermodynamic and thermo-physical properties of 36 fluids, and 24 different resistance/source options are provided for modeling momentum sources or sinks in the branches. This Technical Memorandum illustrates the application and verification of the code through 25 demonstrated example problems.
Generalized Fluid System Simulation Program, Version 5.0-Educational
NASA Technical Reports Server (NTRS)
Majumdar, A. K.
2011-01-01
The Generalized Fluid System Simulation Program (GFSSP) is a finite-volume based general-purpose computer program for analyzing steady state and time-dependent flow rates, pressures, temperatures, and concentrations in a complex flow network. The program is capable of modeling real fluids with phase changes, compressibility, mixture thermodynamics, conjugate heat transfer between solid and fluid, fluid transients, pumps, compressors and external body forces such as gravity and centrifugal. The thermofluid system to be analyzed is discretized into nodes, branches, and conductors. The scalar properties such as pressure, temperature, and concentrations are calculated at nodes. Mass flow rates and heat transfer rates are computed in branches and conductors. The graphical user interface allows users to build their models using the point, drag and click method; the users can also run their models and post-process the results in the same environment. The integrated fluid library supplies thermodynamic and thermo-physical properties of 36 fluids and 21 different resistance/source options are provided for modeling momentum sources or sinks in the branches. This Technical Memorandum illustrates the application and verification of the code through 12 demonstrated example problems.
Practical security and privacy attacks against biometric hashing using sparse recovery
NASA Astrophysics Data System (ADS)
Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan
2016-12-01
Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.
46 CFR Appendix A to Part 530 - Instructions for the Filing of Service Contracts
Code of Federal Regulations, 2011 CFR
2011-10-01
... file service contracts. BTCL will direct OIRM to provide approved filers with a log-on ID and password. Filers who wish a third party (publisher) to file their service contracts must so indicate on Form FMC-83... home page, http://www.fmc.gov. A. Registration, Log-on ID and Password To register for filing, a...
46 CFR Appendix A to Part 530 - Instructions for the Filing of Service Contracts
Code of Federal Regulations, 2010 CFR
2010-10-01
... file service contracts. BTCL will direct OIRM to provide approved filers with a log-on ID and password. Filers who wish a third party (publisher) to file their service contracts must so indicate on Form FMC-83... home page, http://www.fmc.gov. A. Registration, Log-on ID and Password To register for filing, a...
17 CFR 249.446 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2011 CFR
2011-04-01
... log on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification Authorization Code (PMAC)—allows a filer, filing agent or training agent to change its Password. [69 FR 22710... Sections Affected, which appears in the Finding Aids section of the printed volume and at at www.fdsys.gov. ...
17 CFR 269.7 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2011 CFR
2011-04-01
... on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification Authorization Code (PMAC)—allows a filer, filing agent or training agent to change its Password. [69 FR 22710, Apr... Sections Affected, which appears in the Finding Aids section of the printed volume and at at www.fdsys.gov. ...
Dual-Color Click Beetle Luciferase Heteroprotein Fragment Complementation Assays
Villalobos, Victor; Naik, Snehal; Bruinsma, Monique; Dothager, Robin S.; Pan, Mei-Hsiu; Samrakandi, Mustapha; Moss, Britney; Elhammali, Adnan; Piwnica-Worms, David
2010-01-01
Summary Understanding the functional complexity of protein interactions requires mapping biomolecular complexes within the cellular environment over biologically-relevant time scales. Herein we describe a novel set of reversible, multicolored heteroprotein complementation fragments based on various firefly and click beetle luciferases that utilize the same substrate, D-luciferin. Luciferase heteroprotein fragment complementation systems enabled dual-color quantification of two discreet pairs of interacting proteins simultaneously or two distinct proteins interacting with a third shared protein in live cells. Using real-time analysis of click beetle green and click beetle red luciferase heteroprotein fragment complementation applied to β-TrCP, an E3-ligase common to the regulation of both β-catenin and IκBα, GSK3β was identified as a novel candidate kinase regulating IκBα processing. These dual-color protein interaction switches may enable directed dynamic analysis of a variety of protein interactions in living cells. PMID:20851351
Fluorescence imaging of chromosomal DNA using click chemistry
NASA Astrophysics Data System (ADS)
Ishizuka, Takumi; Liu, Hong Shan; Ito, Kenichiro; Xu, Yan
2016-09-01
Chromosome visualization is essential for chromosome analysis and genetic diagnostics. Here, we developed a click chemistry approach for multicolor imaging of chromosomal DNA instead of the traditional dye method. We first demonstrated that the commercially available reagents allow for the multicolor staining of chromosomes. We then prepared two pro-fluorophore moieties that served as light-up reporters to stain chromosomal DNA based on click reaction and visualized the clear chromosomes in multicolor. We applied this strategy in fluorescence in situ hybridization (FISH) and identified, with high sensitivity and specificity, telomere DNA at the end of the chromosome. We further extended this approach to observe several basic stages of cell division. We found that the click reaction enables direct visualization of the chromosome behavior in cell division. These results suggest that the technique can be broadly used for imaging chromosomes and may serve as a new approach for chromosome analysis and genetic diagnostics.
Fang, Ye; Moreno, Jose L; Streiff, Shawn L; Villegas, Jorge; Muñoz, Ricardo F; Tercyak, Kenneth P; Mandelblatt, Jeanne S; Vallone, Donna M
2012-01-01
Background Tobacco cessation among Latinos is a public health priority in the United States, particularly given the relatively high growth of this population segment. Although a substantial percentage of American Latinos use the Internet, they have not engaged in Web-based cessation programs as readily as other racial/ethnic subgroups. A lack of culturally specific advertising efforts may partly explain this disparity. Objective Phase I of this study focused on the development of four Spanish-language online banner advertisements to promote a free Spanish-language smoking cessation website (es.BecomeAnEX.org). Phase II examined the relative effectiveness of the four banner ads in reaching and recruiting Latino smokers to the cessation website. Methods In Phase I, 200 Spanish-speaking Latino smokers completed an online survey to indicate their preference for Spanish-language banner ads that incorporated either the cultural value of family (familismo) or fatalism (fatalismo). Ads included variations on message framing (gain vs loss) and depth of cultural targeting (surface vs deep). In Phase II, a Latin square design evaluated the effectiveness of the four preferred ads from Phase I. Ads were systematically rotated across four popular Latino websites (MySpace Latino, MSN Latino, MiGente, and Yahoo! en Español) over four months from August to November 2009. Tracking software recorded ad clicks and registrants on the cessation website. Negative binomial regression and general linear modeling examined the main and interacting effects of message framing and depth of cultural targeting for four outcomes: number of clicks, click-through rate, number of registrants, and cost per registrant. Results In Phase I, smokers preferred the four ads featuring familismo. In Phase II, 24,829,007 impressions were placed, yielding 24,822 clicks, an overall click-through rate of 0.10%, and 500 registrants (2.77% conversion rate). Advertising costs totaled US $104,669.49, resulting in an overall cost per click of US $4.22 and cost per registrant of US $209.34. Website placement predicted all four outcomes (all P values < .01). Yahoo! en Español yielded the highest click-through rate (0.167%) and number of registrants (n = 267). The message framing and cultural targeting interaction was not significant. Contrary to hypotheses, loss-framed ads yielded a higher click-through rate than gain-framed ads (point estimate = 1.08, 95% CI 1.03 1.14, P = 0.004), and surface-targeted ads outperformed deep-targeted ads for clicks (point estimate = 1.20, 95% CI 1.13 1.28, P < .001), click-through rate (point estimate = 1.22, 95% CI 1.16 1.29, P < .001), and number of registrants (point estimate = 2.73, 95% CI 2.14 3.48, P < .001). Conclusions Online advertising can be an effective and cost-efficient strategy to reach and engage Spanish-speaking Latino smokers in an evidence-based Internet cessation program. Cultural targeting and smoking-relevant images may be important factors for banner ad design. Online advertising holds potential for Web-based cessation program implementation and research. PMID:22954502
Graham, Amanda L; Fang, Ye; Moreno, Jose L; Streiff, Shawn L; Villegas, Jorge; Muñoz, Ricardo F; Tercyak, Kenneth P; Mandelblatt, Jeanne S; Vallone, Donna M
2012-08-27
Tobacco cessation among Latinos is a public health priority in the United States, particularly given the relatively high growth of this population segment. Although a substantial percentage of American Latinos use the Internet, they have not engaged in Web-based cessation programs as readily as other racial/ethnic subgroups. A lack of culturally specific advertising efforts may partly explain this disparity. Phase I of this study focused on the development of four Spanish-language online banner advertisements to promote a free Spanish-language smoking cessation website (es.BecomeAnEX.org). Phase II examined the relative effectiveness of the four banner ads in reaching and recruiting Latino smokers to the cessation website. In Phase I, 200 Spanish-speaking Latino smokers completed an online survey to indicate their preference for Spanish-language banner ads that incorporated either the cultural value of family (familismo) or fatalism (fatalismo). Ads included variations on message framing (gain vs loss) and depth of cultural targeting (surface vs deep). In Phase II, a Latin square design evaluated the effectiveness of the four preferred ads from Phase I. Ads were systematically rotated across four popular Latino websites (MySpace Latino, MSN Latino, MiGente, and Yahoo! en Español) over four months from August to November 2009. Tracking software recorded ad clicks and registrants on the cessation website. Negative binomial regression and general linear modeling examined the main and interacting effects of message framing and depth of cultural targeting for four outcomes: number of clicks, click-through rate, number of registrants, and cost per registrant. In Phase I, smokers preferred the four ads featuring familismo. In Phase II, 24,829,007 impressions were placed, yielding 24,822 clicks, an overall click-through rate of 0.10%, and 500 registrants (2.77% conversion rate). Advertising costs totaled US $104,669.49, resulting in an overall cost per click of US $4.22 and cost per registrant of US $209.34. Website placement predicted all four outcomes (all P values < .01). Yahoo! en Español yielded the highest click-through rate (0.167%) and number of registrants (n = 267). The message framing and cultural targeting interaction was not significant. Contrary to hypotheses, loss-framed ads yielded a higher click-through rate than gain-framed ads (point estimate = 1.08, 95% CI 1.03 1.14, P = 0.004), and surface-targeted ads outperformed deep-targeted ads for clicks (point estimate = 1.20, 95% CI 1.13 1.28, P < .001), click-through rate (point estimate = 1.22, 95% CI 1.16 1.29, P < .001), and number of registrants (point estimate = 2.73, 95% CI 2.14 3.48, P < .001). Online advertising can be an effective and cost-efficient strategy to reach and engage Spanish-speaking Latino smokers in an evidence-based Internet cessation program. Cultural targeting and smoking-relevant images may be important factors for banner ad design. Online advertising holds potential for Web-based cessation program implementation and research.
User's Guide for the Commercial Modular Aero-Propulsion System Simulation (C-MAPSS)
NASA Technical Reports Server (NTRS)
Frederick, Dean K.; DeCastro, Jonathan A.; Litt, Jonathan S.
2007-01-01
This report is a Users Guide for the NASA-developed Commercial Modular Aero-Propulsion System Simulation (C-MAPSS) software, which is a transient simulation of a large commercial turbofan engine (up to 90,000-lb thrust) with a realistic engine control system. The software supports easy access to health, control, and engine parameters through a graphical user interface (GUI). C-MAPSS provides the user with a graphical turbofan engine simulation environment in which advanced algorithms can be implemented and tested. C-MAPSS can run user-specified transient simulations, and it can generate state-space linear models of the nonlinear engine model at an operating point. The code has a number of GUI screens that allow point-and-click operation, and have editable fields for user-specified input. The software includes an atmospheric model which allows simulation of engine operation at altitudes from sea level to 40,000 ft, Mach numbers from 0 to 0.90, and ambient temperatures from -60 to 103 F. The package also includes a power-management system that allows the engine to be operated over a wide range of thrust levels throughout the full range of flight conditions.
Reyes Reyes, M Vanesa; Iñíguez, Miguel A; Hevia, Marta; Hildebrand, John A; Melcón, Mariana L
2015-10-01
Commerson's dolphins (Cephalorhynchus commersonii) inhabit coastal waters of Southern South America and Kerguelen Islands. Limited information exists about the acoustic repertoire of this species in the wild. Here, echolocation signals from free-ranging Commerson's dolphins were recorded in Bahía San Julián, Argentina. Signal parameters were calculated and a cluster analysis was made on 3180 regular clicks. Three clusters were obtained based on peak frequency (129, 137, and 173 kHz) and 3 dB bandwidth (8, 6, and 5 kHz). The 428 buzz clicks were analyzed separately. They consisted of clicks emitted with a median inter-click interval of 3.5 ms, peak frequency at 131 kHz, 3 dB bandwidth of 9 kHz, 10 dB bandwidth of 18 kHz, and duration of 56 μs. Buzz clicks were significantly shorter and with a lower peak frequency and a broader bandwidth than most of the regular clicks. This study provided the first description of different echolocation signals, including on- and off-axis signals, recorded from Commerson's dolphins in the wild, most likely as a result of animals at several distances and orientations to the recording device. This information could be useful while doing passive acoustic monitoring.
System of end-to-end symmetric database encryption
NASA Astrophysics Data System (ADS)
Galushka, V. V.; Aydinyan, A. R.; Tsvetkova, O. L.; Fathi, V. A.; Fathi, D. V.
2018-05-01
The article is devoted to the actual problem of protecting databases from information leakage, which is performed while bypassing access control mechanisms. To solve this problem, it is proposed to use end-to-end data encryption, implemented at the end nodes of an interaction of the information system components using one of the symmetric cryptographic algorithms. For this purpose, a key management method designed for use in a multi-user system based on the distributed key representation model, part of which is stored in the database, and the other part is obtained by converting the user's password, has been developed and described. In this case, the key is calculated immediately before the cryptographic transformations and is not stored in the memory after the completion of these transformations. Algorithms for registering and authorizing a user, as well as changing his password, have been described, and the methods for calculating parts of a key when performing these operations have been provided.
Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad
2015-01-01
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.
Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad
2015-01-01
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963
Fast and flexible selection with a single switch.
Broderick, Tamara; MacKay, David J C
2009-10-22
Selection methods that require only a single-switch input, such as a button click or blink, are potentially useful for individuals with motor impairments, mobile technology users, and individuals wishing to transmit information securely. We present a single-switch selection method, "Nomon," that is general and efficient. Existing single-switch selection methods require selectable options to be arranged in ways that limit potential applications. By contrast, traditional operating systems, web browsers, and free-form applications (such as drawing) place options at arbitrary points on the screen. Nomon, however, has the flexibility to select any point on a screen. Nomon adapts automatically to an individual's clicking ability; it allows a person who clicks precisely to make a selection quickly and allows a person who clicks imprecisely more time to make a selection without error. Nomon reaps gains in information rate by allowing the specification of beliefs (priors) about option selection probabilities and by avoiding tree-based selection schemes in favor of direct (posterior) inference. We have developed both a Nomon-based writing application and a drawing application. To evaluate Nomon's performance, we compared the writing application with a popular existing method for single-switch writing (row-column scanning). Novice users wrote 35% faster with the Nomon interface than with the scanning interface. An experienced user (author TB, with 10 hours practice) wrote at speeds of 9.3 words per minute with Nomon, using 1.2 clicks per character and making no errors in the final text.
ERIC Educational Resources Information Center
Minne, Brigitte
1977-01-01
An analysis of rhythm in French. The research project concentrated on two points: the perception of a "click" superimposed on an utterance and the reproduction of the click by a knock simultaneous with the stimulus. Conclusions based on linguistic and non-linguistic aspects are drawn. (Text is in French.) (AMH)
Bias in online recruitment and retention of racial and ethnic minority men who have sex with men.
Sullivan, Patrick S; Khosropour, Christine M; Luisi, Nicole; Amsden, Matthew; Coggia, Tom; Wingood, Gina M; DiClemente, Ralph J
2011-05-13
The Internet has become an increasingly popular venue for men who have sex with men (MSM) to meet potential sex partners. Given this rapid increase in online sex-seeking among MSM, Internet-based interventions represent an important HIV (human immunodeficiency virus) prevention strategy. Unfortunately, black and Hispanic MSM, who are disproportionately impacted by the HIV epidemic in the United States, have been underrepresented in online research studies. Our objective was to examine and quantify factors associated with underrecruitment and underretention of MSM of color in an online HIV behavioral risk research study of MSM recruited from an online social networking site. Internet-using MSM were recruited through banner advertisements on MySpace.com targeted at men who reported in their MySpace profile their age as at least 18 and their sexual orientation as gay, bisexual, or unsure. Multivariable logistic regression models were used to estimate the odds stratified by race and ethnicity of the MySpace user clicking through the banner advertisement. To characterize survey retention, Kaplan-Meier survival curves and multivariable Cox proportional hazards models identified factors associated with survey dropout. Over 30,000 MySpace users clicked on the study banner advertisements (click-through rate of 0.37%, or 30,599 clicks from 8,257,271 impressions). Black (0.36% or 6474 clicks from 1,785,088 impressions) and Hispanic (0.35% or 8873 clicks from 2,510,434 impressions) MySpace users had a lower click-through rate compared with white (0.48% or 6995 clicks from 1,464,262 impressions) MySpace users. However, black men had increased odds of click-through for advertisements displaying a black model versus a white model (adjusted odds ratio [OR] = 1.83, 95% confidence interval [CI] 1.72 - 1.95), and Hispanic participants had increased odds of click-through when shown an advertisement displaying an Asian model versus a white model (adjusted OR = 1.70, 95% CI 1.62 - 1.79). Of the 9005 men who consented to participate, 6258 (69%) completed the entire survey. Among participants reporting only male sex partners, black non-Hispanic and Hispanic participants were significantly more likely to drop out of the survey relative to white non-Hispanic participants (hazard ratio [HR] = 1.6, 95% CI 1.4 - 1.8 and HR = 1.3, 95% CI 1.1 - 1.4, respectively). Men with a college-level of education were more likely to complete the survey than those with a high-school level of education (HR = 0.8, 95% CI 0.7 - 0.9), while men who self-identified as heterosexual were more likely to drop out of the survey compared with men who self-identified as gay (HR = 2.1, 95% CI 1.1 - 3.7). This analysis identified several factors associated with recruitment and retention of MSM in an online survey. Differential click-through rates and increased survey dropout by MSM of color indicate that methods to recruit and retain black and Hispanic MSM in Internet-based research studies are paramount. Although targeting banner advertisements to MSM of color by changing the racial/ethnic composition of the advertisements may increase click-through, decreasing attrition of these study participants once they are engaged in the survey remains a challenge.
NASA Technical Reports Server (NTRS)
Raible, E.
1994-01-01
The Panel Library and Editor is a graphical user interface (GUI) builder for the Silicon Graphics IRIS workstation family. The toolkit creates "widgets" which can be manipulated by the user. Its appearance is similar to that of the X-Windows System. The Panel Library is written in C and is used by programmers writing user-friendly mouse-driven applications for the IRIS. GUIs built using the Panel Library consist of "actuators" and "panels." Actuators are buttons, dials, sliders, or other mouse-driven symbols. Panels are groups of actuators that occupy separate windows on the IRIS workstation. The application user can alter variables in the graphics program, or fire off functions with a click on a button. The evolution of data values can be tracked with meters and strip charts, and dialog boxes with text processing can be built. Panels can be stored as icons when not in use. The Panel Editor is a program used to interactively create and test panel library interfaces in a simple and efficient way. The Panel Editor itself uses a panel library interface, so all actions are mouse driven. Extensive context-sensitive on-line help is provided. Programmers can graphically create and test the user interface without writing a single line of code. Once an interface is judged satisfactory, the Panel Editor will dump it out as a file of C code that can be used in an application. The Panel Library (v9.8) and Editor (v1.1) are written in C-Language (63%) and Scheme, a dialect of LISP, (37%) for Silicon Graphics 4D series workstations running IRIX 3.2 or higher. Approximately 10Mb of disk space is required once compiled. 1.5Mb of main memory is required to execute the panel editor. This program is available on a .25 inch streaming magnetic tape cartridge in UNIX tar format for an IRIS, and includes a copy of XScheme, the public-domain Scheme interpreter used by the Panel Editor. The Panel Library Programmer's Manual is included on the distribution media. The Panel Library and Editor were released to COSMIC in 1991. Silicon Graphics, IRIS, and IRIX are trademarks of Silicon Graphics, Inc. X-Window System is a trademark of Massachusetts Institute of Technology.
Hearing Sensation Levels of Emitted Biosonar Clicks in an Echolocating Atlantic Bottlenose Dolphin
Li, Songhai; Nachtigall, Paul E.; Breese, Marlee; Supin, Alexander Ya.
2012-01-01
Emitted biosonar clicks and auditory evoked potential (AEP) responses triggered by the clicks were synchronously recorded during echolocation in an Atlantic bottlenose dolphin (Tursiops truncatus) trained to wear suction-cup EEG electrodes and to detect targets by echolocation. Three targets with target strengths of −34, −28, and −22 dB were used at distances of 2 to 6.5 m for each target. The AEP responses were sorted according to the corresponding emitted click source levels in 5-dB bins and averaged within each bin to extract biosonar click-related AEPs from noise. The AEP amplitudes were measured peak-to-peak and plotted as a function of click source levels for each target type, distance, and target-present or target-absent condition. Hearing sensation levels of the biosonar clicks were evaluated by comparing the functions of the biosonar click-related AEP amplitude-versus-click source level to a function of external (in free field) click-related AEP amplitude-versus-click sound pressure level. The results indicated that the dolphin's hearing sensation levels to her own biosonar clicks were equal to that of external clicks with sound pressure levels 16 to 36 dB lower than the biosonar click source levels, varying with target type, distance, and condition. These data may be assumed to indicate that the bottlenose dolphin possesses effective protection mechanisms to isolate the self-produced intense biosonar beam from the animal's ears during echolocation. PMID:22238654
Hearing sensation levels of emitted biosonar clicks in an echolocating Atlantic bottlenose dolphin.
Li, Songhai; Nachtigall, Paul E; Breese, Marlee; Supin, Alexander Ya
2012-01-01
Emitted biosonar clicks and auditory evoked potential (AEP) responses triggered by the clicks were synchronously recorded during echolocation in an Atlantic bottlenose dolphin (Tursiops truncatus) trained to wear suction-cup EEG electrodes and to detect targets by echolocation. Three targets with target strengths of -34, -28, and -22 dB were used at distances of 2 to 6.5 m for each target. The AEP responses were sorted according to the corresponding emitted click source levels in 5-dB bins and averaged within each bin to extract biosonar click-related AEPs from noise. The AEP amplitudes were measured peak-to-peak and plotted as a function of click source levels for each target type, distance, and target-present or target-absent condition. Hearing sensation levels of the biosonar clicks were evaluated by comparing the functions of the biosonar click-related AEP amplitude-versus-click source level to a function of external (in free field) click-related AEP amplitude-versus-click sound pressure level. The results indicated that the dolphin's hearing sensation levels to her own biosonar clicks were equal to that of external clicks with sound pressure levels 16 to 36 dB lower than the biosonar click source levels, varying with target type, distance, and condition. These data may be assumed to indicate that the bottlenose dolphin possesses effective protection mechanisms to isolate the self-produced intense biosonar beam from the animal's ears during echolocation.
Kline, Jeffrey A; Johnson, Charles L; Webb, William B; Runyon, Michael S
2004-01-01
Background Design and test the reliability of a web-based system for multicenter, real-time collection of data in the emergency department (ED), under waiver of authorization, in compliance with HIPAA. Methods This was a phase I, two-hospital study of patients undergoing evaluation for possible pulmonary embolism. Data were collected by on-duty clinicians on an HTML data collection form (prospective e-form), populated using either a personal digital assistant (PDA) or personal computer (PC). Data forms were uploaded to a central, offsite server using secure socket protocol transfer. Each form was assigned a unique identifier, and all PHI data were encrypted, but were password-accessible by authorized research personnel to complete a follow-up e-form. Results From April 15, 2003-April 15 2004, 1022 prospective e-forms and 605 follow-up e-forms were uploaded. Complexities of PDA use compelled clinicians to use PCs in the ED for data entry for most forms. No data were lost and server log query revealed no unauthorized entry. Prospectively obtained PHI data, encrypted upon server upload, were successfully decrypted using password-protected access to allow follow-up without difficulty in 605 cases. Non-PHI data from prospective and follow-up forms were available to the study investigators via standard file transfer protocol. Conclusions Data can be accurately collected from on-duty clinicians in the ED using real-time, PC-Internet data entry in compliance with the Privacy Rule. Deidentification-reidentification of PHI was successfully accomplished by a password-protected encryption-deencryption mechanism to permit follow-up by approved research personnel. PMID:15479471
Zaugg, Serge; van der Schaar, Mike; Houégnigan, Ludwig; André, Michel
2013-02-01
The analysis of acoustic data from the ocean is a valuable tool to study free ranging cetaceans and anthropogenic noise. Due to the typically large volume of acquired data, there is a demand for automated analysis techniques. Many cetaceans produce acoustic pulses (echolocation clicks) with a pulse repetition interval (PRI) remaining nearly constant over several pulses. Analyzing these pulse trains is challenging because they are often interleaved. This article presents an algorithm that estimates a pulse's PRI with respect to neighboring pulses. It includes a deinterleaving step that operates via a spectral dissimilarity metric. The sperm whale (SW) produces trains with PRIs between 0.5 and 2 s. As a validation, the algorithm was used for the PRI-based identification of SW click trains with data from the NEMO-ONDE observatory that contained other pulsed sounds, mainly from ship propellers. Separation of files containing SW clicks with a medium and high signal to noise ratio from files containing other pulsed sounds gave an area under the receiver operating characteristic curve value of 0.96. This study demonstrates that PRI can be used for the automated identification of SW clicks and that deinterleaving via spectral dissimilarity contributes to algorithm performance.
Testing the odontocete acoustic prey debilitation hypothesis: no stunning results.
Benoit-Bird, Kelly J; Au, Whitlow W L; Kastelein, Ronald
2006-08-01
The hypothesis that sounds produced by odontocetes can debilitate fish was examined. The effects of simulated odontocete pulsed signals on three species of fish commonly preyed on by odontocetes were examined, exposing three individuals of each species as well as groups of four fish to a high-frequency click of a bottlenose dolphin [peak frequency (PF) 120 kHz, 213-dB peak-to-peak exposure level (EL)], a midfrequency click modeled after a killer whale's signal (PF 55 kHz, 208-dB EL), and a low-frequency click (PF 18 kHz, 193-dB EL). Fish were held in a 50-cm diameter net enclosure immediately in front of a transducer where their swimming behavior, orientation, and balance were observed with two video cameras. Clicks were presented at constant rates and in graded sweeps simulating a foraging dolphin's "terminal buzz." No measurable change in behavior was observed in any of the fish for any signal type or pulse modulation rate, despite the fact that clicks were at or near the maximum source levels recorded for odontocetes. Based on the results, the hypothesis that acoustic signals of odontocetes alone can disorient or "stun" prey cannot be supported.
Satellite-based virtual buoy system to monitor coastal water quality
NASA Astrophysics Data System (ADS)
Hu, Chuanmin; Barnes, Brian B.; Murch, Brock; Carlson, Paul
2014-05-01
There is a pressing need to assess coastal and estuarine water quality state and anomaly events to facilitate coastal management, but such a need is hindered by lack of resources to conduct frequent ship-based or buoy-based measurements. Here, we established a virtual buoy system (VBS) to facilitate satellite data visualization and interpretation of water quality assessment. The VBS is based on a virtual antenna system (VAS) that obtains low-level satellite data and generates higher-level data products using both National Aeronautics and Space Administration standard algorithms and regionally customized algorithms in near real time. The VB stations are predefined and carefully chosen to cover water quality gradients in estuaries and coastal waters, where multiyear time series at monthly and weekly intervals are extracted for the following parameters: sea surface temperature (°C), chlorophyll-a concentration (mg m-3), turbidity (NTU), diffuse light attenuation at 490 nm [Kd(490), m-1] or secchi disk depth (m), absorption coefficient of colored dissolved organic matter (m-1), and bottom available light (%). The time-series data are updated routinely and provided in both ASCII and graphical formats via a user-friendly web interface where all information is available to the user through a simple click. The VAS and VBS also provide necessary infrastructure to implement peer-reviewed regional algorithms to generate and share improved water quality data products with the user community.
Circling motion and screen edges as an alternative input method for on-screen target manipulation.
Ka, Hyun W; Simpson, Richard C
2017-04-01
To investigate a new alternative interaction method, called circling interface, for manipulating on-screen objects. To specify a target, the user makes a circling motion around the target. To specify a desired pointing command with the circling interface, each edge of the screen is used. The user selects a command before circling the target. To evaluate the circling interface, we conducted an experiment with 16 participants, comparing the performance on pointing tasks with different combinations of selection method (circling interface, physical mouse and dwelling interface) and input device (normal computer mouse, head pointer and joystick mouse emulator). A circling interface is compatible with many types of pointing devices, not requiring physical activation of mouse buttons, and is more efficient than dwell-clicking. Across all common pointing operations, the circling interface had a tendency to produce faster performance with a head-mounted mouse emulator than with a joystick mouse. The performance accuracy of the circling interface outperformed the dwelling interface. It was demonstrated that the circling interface has the potential as another alternative pointing method for selecting and manipulating objects in a graphical user interface. Implications for Rehabilitation A circling interface will improve clinical practice by providing an alternative pointing method that does not require physically activating mouse buttons and is more efficient than dwell-clicking. The Circling interface can also work with AAC devices.
Supin, Alexander Ya; Nachtigall, Paul E; Breese, Marlee
2007-01-01
False killer whale Pseudorca crassidens auditory brainstem responses (ABR) were recorded using a double-click stimulation paradigm specifically measuring the recovery of the second response (to the test click) as a function of the inter-click interval (ICI) at various levels of the conditioning and test click. At all click intensities, the slopes of recovery functions were almost constant: 0.6-0.8 microV per ICI decade. Therefore, even when the conditioning-to-test-click level ratio was kept constant, the duration of recovery was intensity-dependent: The higher intensity the longer the recovery. The conditioning-to-test-click level ratio strongly influenced the recovery time: The higher the ratio, the longer the recovery. The dependence was almost linear using a logarithmic ICI scale with a rate of 25-30 dB per ICI decade. These data were used for modeling the interaction between the emitted click and the echo during echolocation, assuming that the two clicks simulated the transmitted and echo clicks. This simulation showed that partial masking of the echo by the preceding emitted click may explain the independence of echo-response amplitude of target distance. However, the distance range where this mechanism is effective depends on the emitted click level: The higher the level, the greater the range. @ 2007 Acoustical Society of America.
Pushpalatha, Zeena Venkatacheluvaiah; Konadath, Sreeraj
2016-01-01
Introduction: Encoding of CE-chirp and click stimuli in auditory system was studied using auditory brainstem responses (ABRs) among individuals with and without noise exposure. Materials and Methods: The study consisted of two groups. Group 1 (experimental group) consisted of 20 (40 ears) individuals exposed to occupational noise with hearing thresholds within 25 dB HL. They were further divided into three subgroups based on duration of noise exposure (0–5 years of exposure-T1, 5–10 years of exposure-T2, and >10 years of exposure-T3). Group 2 (control group) consisted of 20 individuals (40 ears). Absolute latency and amplitude of waves I, III, and V were compared between the two groups for both click and CE-chirp stimuli. T1, T2, and T3 groups were compared for the same parameters to see the effect of noise exposure duration on CE-chirp and click ABR. Result: In Click ABR, while both the parameters for wave III were significantly poorer for the experimental group, wave V showed a significant decline in terms of amplitude only. There was no significant difference obtained for any of the parameters for wave I. In CE-Chirp ABR, the latencies for all three waves were significantly prolonged in the experimental group. However, there was a significant decrease in terms of amplitude in only wave V for the same group. Discussion: Compared to click evoked ABR, CE-Chirp ABR was found to be more sensitive in comparison of latency parameters in individuals with occupational noise exposure. Monitoring of early pathological changes at the brainstem level can be studied effectively by using CE-Chirp stimulus in comparison to click stimulus. Conclusion: This study indicates that ABR's obtained with CE-chirp stimuli serves as an effective tool to identify the early pathological changes due to occupational noise exposure when compared to click evoked ABR. PMID:27762255
Kent, Alexander Dale [Los Alamos, NM
2008-09-02
Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.
NASA Astrophysics Data System (ADS)
Juels, Ari
The purpose of this chapter is to introduce fuzzy commitment, one of the earliest and simplest constructions geared toward cryptography over noisy data. The chapter also explores applications of fuzzy commitment to two problems in data security: (1) secure management of biometrics, with a focus on iriscodes, and (2) use of knowledge-based authentication (i.e., personal questions) for password recovery.
Verifying Secrets and Relative Secrecy
2000-01-01
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given...value. For example, an ATM machine allows one to ask whether a string is the secret PIN of a (lost or stolen) ATM card. Yet such queries are prohibited
Yau, Wei-Chuen; Phan, Raphael C-W
2013-12-01
Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.
A more secure anonymous user authentication scheme for the integrated EPR information system.
Wen, Fengtong
2014-05-01
Secure and efficient user mutual authentication is an essential task for integrated electronic patient record (EPR) information system. Recently, several authentication schemes have been proposed to meet this requirement. In a recent paper, Lee et al. proposed an efficient and secure password-based authentication scheme used smart cards for the integrated EPR information system. This scheme is believed to have many abilities to resist a range of network attacks. Especially, they claimed that their scheme could resist lost smart card attack. However, we reanalyze the security of Lee et al.'s scheme, and show that it fails to protect off-line password guessing attack if the secret information stored in the smart card is compromised. This also renders that their scheme is insecure against user impersonation attacks. Then, we propose a new user authentication scheme for integrated EPR information systems based on the quadratic residues. The new scheme not only resists a range of network attacks but also provides user anonymity. We show that our proposed scheme can provide stronger security.
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619
Neural representation of the self-heard biosonar click in bottlenose dolphins (Tursiops truncatus).
Finneran, James J; Mulsow, Jason; Houser, Dorian S; Schlundt, Carolyn E
2017-05-01
The neural representation of the dolphin broadband biosonar click was investigated by measuring auditory brainstem responses (ABRs) to "self-heard" clicks masked with noise bursts having various high-pass cutoff frequencies. Narrowband ABRs were obtained by sequentially subtracting responses obtained with noise having lower high-pass cutoff frequencies from those obtained with noise having higher cutoff frequencies. For comparison to the biosonar data, ABRs were also measured in a passive listening experiment, where external clicks and masking noise were presented to the dolphins and narrowband ABRs were again derived using the subtractive high-pass noise technique. The results showed little change in the peak latencies of the ABR to the self-heard click from 28 to 113 kHz; i.e., the high-frequency neural responses to the self-heard click were delayed relative to those of an external, spectrally "pink" click. The neural representation of the self-heard click is thus highly synchronous across the echolocation frequencies and does not strongly resemble that of a frequency modulated downsweep (i.e., decreasing-frequency chirp). Longer ABR latencies at higher frequencies are hypothesized to arise from spectral differences between self-heard clicks and external clicks, forward masking from previously emitted biosonar clicks, or neural inhibition accompanying the emission of clicks.
Neural representation of the self-heard biosonar click in bottlenose dolphins (Tursiops truncatus)
Finneran, James J.; Mulsow, Jason; Houser, Dorian S.; Schlundt, Carolyn E.
2017-01-01
The neural representation of the dolphin broadband biosonar click was investigated by measuring auditory brainstem responses (ABRs) to “self-heard” clicks masked with noise bursts having various high-pass cutoff frequencies. Narrowband ABRs were obtained by sequentially subtracting responses obtained with noise having lower high-pass cutoff frequencies from those obtained with noise having higher cutoff frequencies. For comparison to the biosonar data, ABRs were also measured in a passive listening experiment, where external clicks and masking noise were presented to the dolphins and narrowband ABRs were again derived using the subtractive high-pass noise technique. The results showed little change in the peak latencies of the ABR to the self-heard click from 28 to 113 kHz; i.e., the high-frequency neural responses to the self-heard click were delayed relative to those of an external, spectrally “pink” click. The neural representation of the self-heard click is thus highly synchronous across the echolocation frequencies and does not strongly resemble that of a frequency modulated downsweep (i.e., decreasing-frequency chirp). Longer ABR latencies at higher frequencies are hypothesized to arise from spectral differences between self-heard clicks and external clicks, forward masking from previously emitted biosonar clicks, or neural inhibition accompanying the emission of clicks. PMID:28599518
From Legion to Avaki: The Persistence of Vision
2006-01-01
person, but what component, is requesting an action. 5.3.1 Authentication Users authenticate themselves to a Legion grid with the login paradigm...password supplied during login is compared to the password in the state of the authentication object in order to permit or deny subsequent access to...In either case, the credential is protected by the security of the underlying operating system. Although login is the most commonly used method
Cybersecurity Education for Military Officers
2017-12-01
lecture showed the math behind the possible combinations of passwords of different lengths, and made the recommendation to increase your password to...2. Math the system to the real world: Use of effective metaphors and real world language wherever possible. 3. User Control: Try to give the user...given any training on this topic outside of annual NKO courses. I was a math major for my undergraduate degree, so I have no computer science
ERIC Educational Resources Information Center
Svetcov, Eric
2004-01-01
When it comes to security, many people do not know what they do not know. Consider for example, an administrator who leaves her password taped under her keyboard, or a teacher who doesn't change his password (ever!) or can't be bothered to log out or lock the computer, all the firewalls and antivirus programs in the world will not protect a…
General Dialdehyde Click Chemistry for Amine Bioconjugation.
Elahipanah, Sina; O'Brien, Paul J; Rogozhnikov, Dmitry; Yousaf, Muhammad N
2017-05-17
The development of methods for conjugating a range of molecules to primary amine functional groups has revolutionized the fields of chemistry, biology, and material science. The primary amine is a key functional group and one of the most important nucleophiles and bases used in all of synthetic chemistry. Therefore, tremendous interest in the synthesis of molecules containing primary amines and strategies to devise chemical reactions to react with primary amines has been at the core of chemical research. In particular, primary amines are a ubiquitous functional group found in biological systems as free amino acids, as key side chain lysines in proteins, and in signaling molecules and metabolites and are also present in many natural product classes. Due to its abundance, the primary amine is the most convenient functional group handle in molecules for ligation to other molecules for a broad range of applications that impact all scientific fields. Because of the primary amine's central importance in synthetic chemistry, acid-base chemistry, redox chemistry, and biology, many methods have been developed to efficiently react with primary amines, including activated carboxylic acids, isothiocyanates, Michael addition type systems, and reaction with ketones or aldehydes followed by in situ reductive amination. Herein, we introduce a new traceless, high-yield, fast click-chemistry method based on the rapid and efficient trapping of amine groups via a functionalized dialdehyde group. The click reaction occurs in mild conditions in organic solvents or aqueous media and proceeds in high yield, and the starting dialdehyde reagent and resulting dialdehyde click conjugates are stable. Moreover, no catalyst or dialdehyde-activating group is required, and the only byproduct is water. The initial dialdehyde and the resulting conjugate are both straightforward to characterize, and the reaction proceeds with high atom economy. To demonstrate the broad scope of this new click-conjugation strategy, we designed a straightforward scheme to synthesize a suite of dialdehyde reagents. The dialdehyde molecules were used for applications in cell-surface engineering and for tailoring surfaces for material science applications. We anticipate the broad utility of the general dialdehyde click chemistry to primary amines in all areas of chemical research, ranging from polymers and bioconjugation to material science and nanoscience.
The ZeroAccess Auto-Clicking and Search-Hijacking Click Fraud Modules
2013-12-16
payloads and instead began distributing Bitcoin miners and click fraud modules.3 From a technical perspective, the primary click fraud malware used in...this era operated in the indiscriminate “auto-clicking” fashion we describe in Section 5. Alongside the click fraud and Bitcoin payloads, ZeroAccess
National Centers for Environmental Prediction
NAM Specifications/References [<--click here] Rapid Refresh (RAP) [<--click here] High -Resolution Rapid Refresh (HRRR) [<--click here] Short-range Ensemble Forecast (SREF) system [<--click
US Astronomers Access to SIMBAD in Strasbourg
NASA Technical Reports Server (NTRS)
Oliversen, Ronald (Technical Monitor); Eichhorn, Guenther
2004-01-01
During the last year the US SIMBAD Gateway Project continued to provide services like user registration to the US users of the SIMBAD database in France. Currently there are over 4500 US users registered. We also provided user support by answering questions from users and handling requests for lost passwords when still necessary. Even though almost all users now access SIMBAD without a password, based on hostnames/IP addresses, there are still some users that need individual passwords. We continued to maintain the mirror copy of the SIMBAD database on a server at SAO. This allows much faster access for the US users. During the past year we again moved this mirror to a faster server to improve access for the US users. We again supported a demonstration of the SIMBAD database at the meeting of the American Astronomical Society in January. We provided support for the demonstration activities at the SIMBAD booth. We paid part of the fee for the SIMBAD demonstration. We continued to improve the cross-linking between the SIMBAD project and the Astrophysics Data System. This cross-linking between these systems is very much appreciated by the users of both the SIMBAD database and the ADS Abstract Service. The mirror of the SIMBAD database at SA0 makes this connection faster for the US astronomers. We exchange information between the ADS and SIMBAD on a daily basis. During the last year we also installed a mirror copy of the Vizier system from the CDS, in addition to the SIMBAD mirror.
Stereotypical rapid source level regulation in the harbour porpoise biosonar
NASA Astrophysics Data System (ADS)
Linnenschmidt, Meike; Kloepper, Laura N.; Wahlberg, Magnus; Nachtigall, Paul E.
2012-09-01
Some odontocetes and bats vary both click intensity and receiver sensitivity during echolocation, depending on target range. It is not known how this so-called automatic gain control is regulated by the animal. The source level of consecutive echolocation clicks from a harbour porpoise was measured with a hydrophone array while the animal detected an aluminium cylinder at 2, 4 or 8 m distance in a go/no-go paradigm. On-axis clicks had source levels of 145-174 dB re 1 μPa peak-to-peak. During target-present trials the click trains reached comparable source levels independent of the range to the target after three clicks. After an additional click, the source level was reduced for the 2 and 4 m trials until it equalled the one-way transmission loss. During target-absent trials, the source level remained high throughout the entire click train. Given typical values of harbour porpoise inter-click intervals, the source level reduction commenced within a few 100 ms from the first click in the click train. This may indicate a sub-cortically regulated source level regulation in the harbour porpoise.
AF-GEOSpace Version 2.0: Space Environment Software Products for 2002
NASA Astrophysics Data System (ADS)
Hilmer, R. V.; Ginet, G. P.; Hall, T.; Holeman, E.; Tautz, M.
2002-05-01
AF-GEOSpace Version 2.0 (release 2002 on WindowsNT/2000/XP) is a graphics-intensive software program developed by AFRL with space environment models and applications. It has grown steadily to become a development tool for automated space weather visualization products and helps with a variety of tasks: orbit specification for radiation hazard avoidance; satellite design assessment and post-event analysis; solar disturbance effects forecasting; frequency and antenna management for radar and HF communications; determination of link outage regions for active ionospheric conditions; and physics research and education. The object-oriented C++ code is divided into five module classes. Science Modules control science models to give output data on user-specified grids. Application Modules manipulate these data and provide orbit generation and magnetic field line tracing capabilities. Data Modules read and assist with the analysis of user-generated data sets. Graphics Modules enable the display of features such as plane slices, magnetic field lines, line plots, axes, the Earth, stars, and satellites. Worksheet Modules provide commonly requested coordinate transformations and calendar conversion tools. Common input data archive sets, application modules, and 1-, 2-, and 3-D visualization tools are provided to all models. The code documentation includes detailed examples with click-by-click instructions for investigating phenomena that have well known effects on communications and spacecraft systems. AF-GEOSpace Version 2.0 builds on the success of its predecessors. The first release (Version 1.21, 1996/IRIX on SGI) contained radiation belt particle flux and dose models derived from CRRES satellite data, an aurora model, an ionosphere model, and ionospheric HF ray tracing capabilities. Next (Version 1.4, 1999/IRIX on SGI) science modules were added related to cosmic rays and solar protons, low-Earth orbit radiation dosages, single event effects probability maps, ionospheric scintillation, and shock propagation models. New application modules for estimating linear energy transfer (LET) and single event upset (SEU) rates in solid-state devices, and graphic modules for visualizing radar fans, communication domes, and satellite detector cones and links were added. Automated FTP scripts permitted users to update their global input parameter set directly from NOAA/SEC. What?s New? Version 2.0 includes the first true dynamic run capabilities and offers new and enhanced graphical and data visualization tools such as 3-D volume rendering and eclipse umbra and penumbra determination. Animations of all model results can now be displayed together in all dimensions. There is a new realistic day-to-day ionospheric scintillation simulation generator (IONSCINT), an upgrade to the WBMOD scintillation code, a simplified HF ionospheric ray tracing module, and applications built on the NASA AE-8 and AP-8 radiation belt models. User-generated satellite data sets can now be visualized along with their orbital ephemeris. A prototype tool for visualizing MHD model results stored in structured grids provides a hint of where future space weather model development efforts are headed. A new graphical user interface (GUI) with improved module tracking and renaming features greatly simplifies software operation. AF-GEOSpace is distributed by the Space Weather Center of Excellence in the Space Vehicles Directorate of AFRL. Recently released for WindowsNT/2000/XP, versions for UNIX and LINUX operating systems will follow shortly. To obtain AF-GEOSpace Version 2.0, please send an e-mail request to the first author.
Dual mechanisms in the perceptual processing of click train temporal regularity.
Phillips, Dennis P; Dingle, Rachel N; Hall, Susan E; Jang, Moragh
2012-07-01
Two experiments measured human sensitivity to temporal jitter in 25-click trains with inter-click intervals (ICIs) between 5 and 100 ms. In a naturalistic experiment using wideband clicks, jitter thresholds were a nonmonotonic function of ICI, peaking for ICIs near 40-60 ms. In a subsequent experiment, clicks were high-passed and presented against a low-frequency noise masker. Jitter threshold vs ICI functions lost the positive slope over short ICIs but retained the negative slope at long ICIs. The same behavior was seen in click rate discrimination tasks. Different processes mediate regularity analysis for click trains with ICIs above and below 40-60 ms.
System Connection via SSH Gateway | High-Performance Computing | NREL
;@peregrine.hpc.nrel.gov First time logging in? If this is the first time you've logged in with your new account, you will password. You will be prompted to enter it a second time, then you will be logged off. Just reconnect with your HPC password at any time, you can simply use the passwd command. Remote Users If you're connecting
One Time Passwords in Everything (OPIE): Experiences with Building and Using Stringer Authentication
1995-01-01
opiepasswd(1). The name change brings it more in line with its UNIX counterpart passwd (1), which should make both programs easier to remember for users. This...char * passwd ) int opiehash(char *x, unsigned algorithm) The one-time password schemes implemented in OPIE, as rst described in [Hal94], compute a...seed, passwd ); while (sequence-- != 0) opiehash(result, algorithm); opiebtoe(result,words); Send words. : : : 6 Deployment Every machine that has
WPC Maximum Heat Index Forecasts
Forecasts for Western US CLICK ON MAPS FOR MAXIMUM HEAT INDEX AND PROBABILITY FORECASTS FROM SUN MAY 27 2018 02 CLICK to view SAT JUN 02 forecast SUN JUN 03 CLICK to view SUN JUN 03 forecast SUN JUN 03 CLICK to view SUN JUN 03 forecast SUN JUN 03 CLICK to view SUN JUN 03 forecast SUN JUN 03 CLICK to view SUN JUN
Teoh, Andrew B J; Goh, Alwyn; Ngo, David C L
2006-12-01
Biometric analysis for identity verification is becoming a widespread reality. Such implementations necessitate large-scale capture and storage of biometric data, which raises serious issues in terms of data privacy and (if such data is compromised) identity theft. These problems stem from the essential permanence of biometric data, which (unlike secret passwords or physical tokens) cannot be refreshed or reissued if compromised. Our previously presented biometric-hash framework prescribes the integration of external (password or token-derived) randomness with user-specific biometrics, resulting in bitstring outputs with security characteristics (i.e., noninvertibility) comparable to cryptographic ciphers or hashes. The resultant BioHashes are hence cancellable, i.e., straightforwardly revoked and reissued (via refreshed password or reissued token) if compromised. BioHashing furthermore enhances recognition effectiveness, which is explained in this paper as arising from the Random Multispace Quantization (RMQ) of biometric and external random inputs.
Assessing the biocompatibility of click-linked DNA in Escherichia coli
Sanzone, A. Pia; El-Sagheer, Afaf H.; Brown, Tom; Tavassoli, Ali
2012-01-01
The biocompatibility of a triazole mimic of the DNA phosphodiester linkage in Escherichia coli has been evaluated. The requirement for selective pressure on the click-containing gene was probed via a plasmid containing click DNA backbone linkages in each strand of the gene encoding the fluorescent protein mCherry. The effect of proximity of the click linkers on their biocompatibility was also probed by placing two click DNA linkers 4-bp apart at the region encoding the fluorophore of the fluorescent protein. The resulting click-containing plasmid was found to encode mCherry in E. coli at a similar level to the canonical equivalent. The ability of the cellular machinery to read through click-linked DNA was further probed by using the above click-linked plasmid to express mCherry using an in vitro transcription/translation system, and found to also be similar to that from canonical DNA. The yield and fluorescence of recombinant mCherry expressed from the click-linked plasmid was also compared to that from the canonical equivalent, and found to be the same. The biocompatibility of click DNA ligation sites at close proximity in a non-essential gene demonstrated in E. coli suggests the possibility of using click DNA ligation for the enzyme-free assembly of chemically modified genes and genomes. PMID:22904087
Andrews, Judy A.; Gordon, Judith S.; Hampson, Sarah H.; Christiansen, Steven M.; Gunn, Barbara; Slovic, Paul; Severson, Herbert H.
2011-01-01
This paper described the short-term results from an ongoing randomized controlled efficacy study of Click City®: Tobacco, a tobacco prevention program designed for 5th graders, with a booster in sixth grade. Click City®: Tobacco is an innovative school-based prevention program delivered via an intranet, a series of linked computers with a single server. The components of the program target theoretically based and empirically supported etiological mechanisms predictive of future willingness and intentions to use tobacco and initiation of tobacco use. Each component was designed to change one or more etiological mechanisms and was empirically evaluated in the laboratory prior to inclusion in the program. Short-term results from 47 elementary schools (24 schools who used Click City®: Tobacco, and 23 who continued with their usual curriculum) showed change in intentions and willingness to use tobacco from baseline to one-week following the completion of the 5th grade sessions. The results demonstrate the short-term efficacy of this program and suggest that experimentally evaluating components prior to including them in the program contributed to the efficacy of the program. The program was most efficacious for students who were most at risk. PMID:21286810
Oishi, Motoi
2015-05-01
An enzyme-free and isothermal microRNA (miRNA) detection method has been developed based on click-chemical ligation-assisted hybridization coupled with hybridization chain reaction (HCR) on magnetic beads (MBs). The click-chemical ligation between an azide-modified probe DNA and a dibenzocyclooctyne-modified probe DNA occurred through the hybridization of target miRNA (miR-141). HCR on MBs was performed by the addition of DNA hairpin monomers (H1 and H2). After magnetic separation and denaturation/rehybridization of HCR products ([H1/H2] n ), the resulting HCR products were analyzed by the fluorescence emitted from an intercalative dye, allowing amplification of the fluorescent signal. The proposed assay had a limit of detection of 0.55 fmol, which was 230-fold more sensitive than that of the HCR on the MBs coupled with a conventional sandwich hybridization assay (without click-chemical ligation) (limit of detection 127 fmol). Additionally, the proposed assay could discriminate between miR-141 and other miR-200 family members. In contrast to quantitative reverse transcription polymerase chain reaction techniques using enzymes and thermal cycling, this is an enzyme-free assay that can be conducted under isothermal conditions and can specifically detect miR-141 in fetal bovine serum.
What clicks actually mean: Exploring digital news user practices.
Kormelink, Tim Groot; Meijer, Irene Costera
2018-05-01
This article problematizes the relationship between clicks and audience interests. Clicking patterns are often seen as evidence that news users are mostly interested in junk news, leading to concerns about the state of journalism and the implications for society. Asking and observing how 56 users actually browse news and what clicking and not clicking mean to them, we identified 30 distinct considerations for (not) clicking and classified them into three categories: cognitive, affective and pragmatic. The results suggest, first, that interest is too crude a term to account for the variety of people's considerations for (not) clicking. Second, even if one aims for roughly estimating people's news interests, clicks are a flawed instrument because a lack of clicking does not measure people's lack of interest in news. Third, taking users' browsing patterns seriously could help bridge the gap between what people need as citizens and what they actually consume. Finally, we argue that all metrics should be critically assessed from a user perspective rather than taken at face value.
What clicks actually mean: Exploring digital news user practices
Kormelink, Tim Groot; Meijer, Irene Costera
2017-01-01
This article problematizes the relationship between clicks and audience interests. Clicking patterns are often seen as evidence that news users are mostly interested in junk news, leading to concerns about the state of journalism and the implications for society. Asking and observing how 56 users actually browse news and what clicking and not clicking mean to them, we identified 30 distinct considerations for (not) clicking and classified them into three categories: cognitive, affective and pragmatic. The results suggest, first, that interest is too crude a term to account for the variety of people’s considerations for (not) clicking. Second, even if one aims for roughly estimating people’s news interests, clicks are a flawed instrument because a lack of clicking does not measure people’s lack of interest in news. Third, taking users’ browsing patterns seriously could help bridge the gap between what people need as citizens and what they actually consume. Finally, we argue that all metrics should be critically assessed from a user perspective rather than taken at face value. PMID:29782573
Roch, Marie A; Stinner-Sloan, Johanna; Baumann-Pickering, Simone; Wiggins, Sean M
2015-01-01
A concern for applications of machine learning techniques to bioacoustics is whether or not classifiers learn the categories for which they were trained. Unfortunately, information such as characteristics of specific recording equipment or noise environments can also be learned. This question is examined in the context of identifying delphinid species by their echolocation clicks. To reduce the ambiguity between species classification performance and other confounding factors, species whose clicks can be readily distinguished were used in this study: Pacific white-sided and Risso's dolphins. A subset of data from autonomous acoustic recorders located at seven sites in the Southern California Bight collected between 2006 and 2012 was selected. Cepstral-based features were extracted for each echolocation click and Gaussian mixture models were used to classify groups of 100 clicks. One hundred Monte-Carlo three-fold experiments were conducted to examine classification performance where fold composition was determined by acoustic encounter, recorder characteristics, or recording site. The error rate increased from 6.1% when grouped by acoustic encounter to 18.1%, 46.2%, and 33.2% for grouping by equipment, equipment category, and site, respectively. A noise compensation technique reduced error for these grouping schemes to 2.7%, 4.4%, 6.7%, and 11.4%, respectively, a reduction in error rate of 56%-86%.
Mathematical Modelling and the Learning Trajectory: Tools to Support the Teaching of Linear Algebra
ERIC Educational Resources Information Center
Cárcamo Bahamonde, Andrea Dorila; Fortuny Aymemí, Josep Maria; Gómez i Urgellés, Joan Vicenç
2017-01-01
In this article we present a didactic proposal for teaching linear algebra based on two compatible theoretical models: emergent models and mathematical modelling. This proposal begins with a problematic situation related to the creation and use of secure passwords, which leads students toward the construction of the concepts of spanning set and…
ERIC Educational Resources Information Center
Gale, Doug
2006-01-01
Authentication is based on something one knows (e.g., a password), something one has (e.g., a driver's license), or something one is (e.g., a fingerprint). The last of these refers to the use of biometrics for authentication. With the blink of an eye, the touch of a finger, or the uttering of a pass-phrase, colleges and schools can now get deadly…
Ungan, Pekcan; Yagcioglu, Suha
2014-01-01
It is a common psychophysical experience that a train of clicks faster than ca. 30/s is heard as one steady sound, whereas temporal patterns occurring on a slower time scale are perceptually resolved as individual auditory events. This phenomenon suggests the existence of two different neural mechanisms for processing of auditory sequences with fast and slow repetition rates. To test this hypothesis we used Weber's law, which is known to be valid for perception of time intervals. Discrimination thresholds and Weber fractions (WFs) for 12 base inter-click intervals (ICIs) between 5 and 300 ms were measured from 10 normal hearing subjects by using an "up-down staircase" algorithm. The mean WF, which is supposed to be constant for any perceptual mechanism according to Weber's law, displayed significant variation with click rate. WFs decreased sharply from an average value of around 5% at repetition rates below 20 Hz to about 0.5% at rates above 67 Hz. Parallel to this steep transition, subjects reported that at rates below 20 Hz they perceived periodicity as a fast tapping rhythm, whereas at rates above 50 Hz the perceived quality was a pitch. Such a dramatic change in WF indicated the existence of two separate mechanisms for processing the click rate for long and short ICIs, based on temporal and spectral features, respectively. A range of rates between 20 and 33 Hz, in which the rate discrimination threshold was maximum, appears to be a region where both of the presumed time and pitch mechanisms are relatively insensitive to rate alterations. Based on this finding, we speculate that the interval-based perception mechanism ceases to function at around 20 Hz and the spectrum-based mechanism takes over at around 33 Hz; leaving a transitional gap in between, where neither of the two mechanisms is as sensitive. Another notable finding was a significant drop in WF for ICI = 100 ms, suggesting a connection of time perception to the electroencephalography alpha rhythm.
Stereotypical rapid source level regulation in the harbour porpoise biosonar.
Linnenschmidt, Meike; Kloepper, Laura N; Wahlberg, Magnus; Nachtigall, Paul E
2012-09-01
Some odontocetes and bats vary both click intensity and receiver sensitivity during echolocation, depending on target range. It is not known how this so-called automatic gain control is regulated by the animal. The source level of consecutive echolocation clicks from a harbour porpoise was measured with a hydrophone array while the animal detected an aluminium cylinder at 2, 4 or 8 m distance in a go/no-go paradigm. On-axis clicks had source levels of 145-174 dB re 1 μPa peak-to-peak. During target-present trials the click trains reached comparable source levels independent of the range to the target after three clicks. After an additional click, the source level was reduced for the 2 and 4 m trials until it equalled the one-way transmission loss. During target-absent trials, the source level remained high throughout the entire click train. Given typical values of harbour porpoise inter-click intervals, the source level reduction commenced within a few 100 ms from the first click in the click train. This may indicate a sub-cortically regulated source level regulation in the harbour porpoise.
How to Prevent Type-Flaw Guessing Attacks on Password Protocols
2003-01-01
How to prevent type-flaw guessing attacks on password protocols∗ Sreekanth Malladi , Jim Alves-Foss Center for Secure and Dependable Systems...respectively. R Retagging 〈−(t, f),+(t′, f)〉. The retagging strand captures the concept of receiving a message of one type and sending it, with a claim of a...referrees for insightful comments. Thanks are also due to Ricardo Corin for many helpful technical discus- sions. References [AN94] M. Abadi and R
2007-01-15
it can detect specifically proscribed content changes to critical files (e.g., illegal shells inserted into /etc/ passwd ). Fourth, it can detect the...UNIX password management involves a pair of inter-related files (/etc/ passwd and /etc/shadow). The corresponding access patterns seen at the storage...content integrity verification is utilized. As a concrete example, consider a UNIX system password file (/etc/ passwd ), which consists of a set of well
Implementing an Intrusion Detection System in the Mysea Architecture
2008-06-01
password for each user passwd <username> then follow the prompts 2. PostgreSQL 7.4.18 Installation Perform the following steps as root: 1. Copy...password changed Repeat for user snort. exit After making the groups and users the group and passwd file needs to be updated. Set security and...untrusted/bin/xtsmkgroup > /etc/group chmod 644 /etc/group /xts/untrusted/bin/xtsmkpasswd > /etc/ passwd chmod 644 /etc/ passwd 3. PostgreSQL 7.4.18
Security enhanced multi-factor biometric authentication scheme using bio-hash function.
Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho
2017-01-01
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.
LFSTAT - Low-Flow Analysis in R
NASA Astrophysics Data System (ADS)
Koffler, Daniel; Laaha, Gregor
2013-04-01
The calculation of characteristic stream flow during dry conditions is a basic requirement for many problems in hydrology, ecohydrology and water resources management. As opposed to floods, a number of different indices are used to characterise low flows and streamflow droughts. Although these indices and methods of calculation have been well documented in the WMO Manual on Low-flow Estimation and Prediction [1], a comprehensive software was missing which enables a fast and standardized calculation of low flow statistics. We present the new software package lfstat to fill in this obvious gap. Our software package is based on the statistical open source software R, and expands it to analyse daily stream flow data records focusing on low-flows. As command-line based programs are not everyone's preference, we also offer a plug-in for the R-Commander, an easy to use graphical user interface (GUI) provided for R which is based on tcl/tk. The functionality of lfstat includes estimation methods for low-flow indices, extreme value statistics, deficit characteristics, and additional graphical methods to control the computation of complex indices and to illustrate the data. Beside the basic low flow indices, the baseflow index and recession constants can be computed. For extreme value statistics, state-of-the-art methods for L-moment based local and regional frequency analysis (RFA) are available. The tools for deficit characteristics include various pooling and threshold selection methods to support the calculation of drought duration and deficit indices. The most common graphics for low flow analysis are available, and the plots can be modified according to the user preferences. Graphics include hydrographs for different periods, flexible streamflow deficit plots, baseflow visualisation, recession diagnostic, flow duration curves as well as double mass curves, and many more. From a technical point of view, the package uses a S3-class called lfobj (low-flow objects). This objects are usual R-data-frames including date, flow, hydrological year and possibly baseflow information. Once these objects are created, analysis can be performed by mouse-click and a script can be saved to make the analysis easily reproducible. At the moment we are offering implementation of all major methods proposed in the WMO manual on Low-flow Estimation and Predictions [1]. Future plans include a dynamic low flow report in odt-file format using odf-weave which allows automatic updates if data or analysis change. We hope to offer a tool to ease and structure the analysis of stream flow data focusing on low-flows and to make analysis transparent and communicable. The package can also be used in teaching students the first steps in low-flow hydrology. The software packages can be installed from CRAN (latest stable) and R-Forge: http://r-forge.r-project.org (development version). References: [1] Gustard, Alan; Demuth, Siegfried, (eds.) Manual on Low-flow Estimation and Prediction. Geneva, Switzerland, World Meteorological Organization, (Operational Hydrology Report No. 50, WMO-No. 1029).
Shah, Peer Azmat; Hasbullah, Halabi B; Lawal, Ibrahim A; Aminu Mu'azu, Abubakar; Tang Jung, Low
2014-01-01
Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).
Low-frequency bias tone suppression of auditory-nerve responses to low-level clicks and tones.
Nam, Hui; Guinan, John J
2016-11-01
We used low-frequency "bias" tones (BT's) to explore whether click and tone responses are affected in the same way by cochlear active processes. In nonlinear systems the responses to clicks are not always simply related to the responses to tones. Cochlear amplifier gain depends on the incremental slope of the outer-hair-cell (OHC) stereocilia mechano-electric transduction (MET) function. BTs transiently change the operating-point of OHC MET channels and can suppress cochlear-amplifier gain by pushing OHC METs into low-slope saturation regions. BT effects on single auditory-nerve (AN) fibers have been studied on tone responses but not on click responses. We recorded from AN fibers in anesthetized cats and compared tone and click responses using 50 Hz BTs at 70-120 dB SPL to manipulate OHC stereocilia position. BTs can also excite and thereby obscure the BT suppression. We measured AN-fiber response synchrony to BTs alone so that we could exclude suppression measurements when the BT synchrony might obscure the suppression. BT suppression of low-level tone and click responses followed the traditional pattern of twice-a-BT-cycle suppression with more suppression at one phase than the other. The major suppression phases of most fibers were tightly grouped with little difference between click and tone suppressions, which is consistent with low-level click and tone responses being amplified in the same way. The data are also consistent with the operating point of the OHC MET function varying smoothly from symmetric in the base to offset in the apex, and, in contrast, with the IHC MET function being offset throughout the cochlea. As previously reported, bias-tones presented alone excited AN fibers at one or more phases, a phenomena termed "peak splitting" with most BT excitation phases ∼¼ cycle before or after the major suppression phase. We explain peak splitting as being due to distortion in multiple fluid drives to inner-hair-cell stereocilia. Copyright © 2016 Elsevier B.V. All rights reserved.
Song, Hyuksoon S; Pusic, Martin; Nick, Michael W; Sarpel, Umut; Plass, Jan L; Kalet, Adina L
2014-02-01
To identify the most effective way for medical students to interact with a browser-based learning module on the symptoms and neurological underpinnings of stroke syndromes, this study manipulated the way in which subjects interacted with a graphical model of the brain and examined the impact of functional changes on learning outcomes. It was hypothesized that behavioral interactions that were behaviorally more engaging and which required deeper consideration of the model would result in heightened cognitive interaction and better learning than those whose manipulation required less deliberate behavioral and cognitive processing. One hundred forty four students were randomly assigned to four conditions whose model controls incorporated features that required different levels of behavioral and cognitive interaction: Movie (low behavioral/low cognitive, n = 40), Slider (high behavioral/low cognitive, n = 36), Click (low behavioral/high cognitive, n = 30), and Drag (high behavioral/high cognitive, n = 38). Analysis of Covariates (ANCOVA) showed that students who received the treatments associated with lower cognitive interactivity (Movie and Slider) performed better on a transfer task than those receiving the module associated with high cognitive interactivity (Click and Drag, partial eta squared = .03). In addition, the students in the high cognitive interactivity conditions spent significantly more time on the stroke locator activity than other conditions (partial eta squared = .36). The results suggest that interaction with controls that were tightly coupled with the model and whose manipulation required deliberate consideration of the model's features may have overtaxed subjects' cognitive resources. Cognitive effort that facilitated manipulation of content, though directed at the model, may have resulted in extraneous cognitive load, impeding subjects in recognizing the deeper, global relationships in the materials. Instructional designers must, therefore, keep in mind that the way in which functional affordances are integrated with the content can shape both behavioral and cognitive processing, and has significant cognitive load implications.
Karabatsos, George
2017-02-01
Most of applied statistics involves regression analysis of data. In practice, it is important to specify a regression model that has minimal assumptions which are not violated by data, to ensure that statistical inferences from the model are informative and not misleading. This paper presents a stand-alone and menu-driven software package, Bayesian Regression: Nonparametric and Parametric Models, constructed from MATLAB Compiler. Currently, this package gives the user a choice from 83 Bayesian models for data analysis. They include 47 Bayesian nonparametric (BNP) infinite-mixture regression models; 5 BNP infinite-mixture models for density estimation; and 31 normal random effects models (HLMs), including normal linear models. Each of the 78 regression models handles either a continuous, binary, or ordinal dependent variable, and can handle multi-level (grouped) data. All 83 Bayesian models can handle the analysis of weighted observations (e.g., for meta-analysis), and the analysis of left-censored, right-censored, and/or interval-censored data. Each BNP infinite-mixture model has a mixture distribution assigned one of various BNP prior distributions, including priors defined by either the Dirichlet process, Pitman-Yor process (including the normalized stable process), beta (two-parameter) process, normalized inverse-Gaussian process, geometric weights prior, dependent Dirichlet process, or the dependent infinite-probits prior. The software user can mouse-click to select a Bayesian model and perform data analysis via Markov chain Monte Carlo (MCMC) sampling. After the sampling completes, the software automatically opens text output that reports MCMC-based estimates of the model's posterior distribution and model predictive fit to the data. Additional text and/or graphical output can be generated by mouse-clicking other menu options. This includes output of MCMC convergence analyses, and estimates of the model's posterior predictive distribution, for selected functionals and values of covariates. The software is illustrated through the BNP regression analysis of real data.
NASA Technical Reports Server (NTRS)
Crockett, Thomas M.; Joswig, Joseph C.; Shams, Khawaja S.; Norris, Jeffrey S.; Morris, John R.
2011-01-01
MSLICE Sequencing is a graphical tool for writing sequences and integrating them into RML files, as well as for producing SCMF files for uplink. When operated in a testbed environment, it also supports uplinking these SCMF files to the testbed via Chill. This software features a free-form textural sequence editor featuring syntax coloring, automatic content assistance (including command and argument completion proposals), complete with types, value ranges, unites, and descriptions from the command dictionary that appear as they are typed. The sequence editor also has a "field mode" that allows tabbing between arguments and displays type/range/units/description for each argument as it is edited. Color-coded error and warning annotations on problematic tokens are included, as well as indications of problems that are not visible in the current scroll range. "Quick Fix" suggestions are made for resolving problems, and all the features afforded by modern source editors are also included such as copy/cut/paste, undo/redo, and a sophisticated find-and-replace system optionally using regular expressions. The software offers a full XML editor for RML files, which features syntax coloring, content assistance and problem annotations as above. There is a form-based, "detail view" that allows structured editing of command arguments and sequence parameters when preferred. The "project view" shows the user s "workspace" as a tree of "resources" (projects, folders, and files) that can subsequently be opened in editors by double-clicking. Files can be added, deleted, dragged-dropped/copied-pasted between folders or projects, and these operations are undoable and redoable. A "problems view" contains a tabular list of all problems in the current workspace. Double-clicking on any row in the table opens an editor for the appropriate sequence, scrolling to the specific line with the problem, and highlighting the problematic characters. From there, one can invoke "quick fix" as described above to resolve the issue. Once resolved, saving the file causes the problem to be removed from the problem view.
Trade Space Specification Tool (TSST) for Rapid Mission Architecture (Version 1.2)
NASA Technical Reports Server (NTRS)
Wang, Yeou-Fang; Schrock, Mitchell; Borden, Chester S.; Moeller, Robert C.
2013-01-01
Trade Space Specification Tool (TSST) is designed to capture quickly ideas in the early spacecraft and mission architecture design and categorize them into trade space dimensions and options for later analysis. It is implemented as an Eclipse RCP Application, which can be run as a standalone program. Users rapidly create concept items with single clicks on a graphical canvas, and can organize and create linkages between the ideas using drag-and-drop actions within the same graphical view. Various views such as a trade view, rules view, and architecture view are provided to help users to visualize the trade space. This software can identify, explore, and assess aspects of the mission trade space, as well as capture and organize linkages/dependencies between trade space components. The tool supports a user-in-the-loop preliminary logical examination and filtering of trade space options to help identify which paths in the trade space are feasible (and preferred) and what analyses need to be done later with executable models. This tool provides multiple user views of the trade space to guide the analyst/team to facilitate interpretation and communication of the trade space components and linkages, identify gaps in combining and selecting trade space options, and guide user decision-making for which combinations of architectural options should be pursued for further evaluation. This software provides an environment to capture mission trade space elements rapidly and assist users for their architecture analysis. This is primarily focused on mission and spacecraft architecture design, rather than general-purpose design application. In addition, it provides more flexibility to create concepts and organize the ideas. The software is developed as an Eclipse plug-in and potentially can be integrated with other Eclipse-based tools.
An improved authenticated key agreement protocol for telecare medicine information system.
Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin
2016-01-01
In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.
Tan, Zuowen
2014-03-01
The telecare medicine information system enables the patients gain health monitoring at home and access medical services over internet or mobile networks. In recent years, the schemes based on cryptography have been proposed to address the security and privacy issues in the telecare medicine information systems. However, many schemes are insecure or they have low efficiency. Recently, Awasthi and Srivastava proposed a three-factor authentication scheme for telecare medicine information systems. In this paper, we show that their scheme is vulnerable to the reflection attacks. Furthermore, it fails to provide three-factor security and the user anonymity. We propose a new three-factor authentication scheme for the telecare medicine information systems. Detailed analysis demonstrates that the proposed scheme provides mutual authentication, server not knowing password and freedom of password, biometric update and three-factor security. Moreover, the new scheme provides the user anonymity. As compared with the previous three-factor authentication schemes, the proposed scheme is more secure and practical.
A Study on the Secure User Profiling Structure and Procedure for Home Healthcare Systems.
Ko, Hoon; Song, MoonBae
2016-01-01
Despite of various benefits such as a convenience and efficiency, home healthcare systems have some inherent security risks that may cause a serious leak on personal health information. This work presents a Secure User Profiling Structure which has the patient information including their health information. A patient and a hospital keep it at that same time, they share the updated data. While they share the data and communicate, the data can be leaked. To solve the security problems, a secure communication channel with a hash function and an One-Time Password between a client and a hospital should be established and to generate an input value to an OTP, it uses a dual hash-function. This work presents a dual hash function-based approach to generate the One-Time Password ensuring a secure communication channel with the secured key. In result, attackers are unable to decrypt the leaked information because of the secured key; in addition, the proposed method outperforms the existing methods in terms of computation cost.
J-PAKE: Authenticated Key Exchange without PKI
NASA Astrophysics Data System (ADS)
Hao, Feng; Ryan, Peter
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication between two parties solely based on a shared password without requiring a Public Key Infrastructure (PKI). After more than a decade of extensive research in this field, there have been several PAKE protocols available. The EKE and SPEKE schemes are perhaps the two most notable examples. Both techniques are however patented. In this paper, we review these techniques in detail and summarize various theoretical and practical weaknesses. In addition, we present a new PAKE solution called J-PAKE. Our strategy is to depend on well-established primitives such as the Zero-Knowledge Proof (ZKP). So far, almost all of the past solutions have avoided using ZKP for the concern on efficiency. We demonstrate how to effectively integrate the ZKP into the protocol design and meanwhile achieve good efficiency. Our protocol has comparable computational efficiency to the EKE and SPEKE schemes with clear advantages on security.
e-Bitter: Bitterant Prediction by the Consensus Voting From the Machine-Learning Methods
Zheng, Suqing; Jiang, Mengying; Zhao, Chengwei; Zhu, Rui; Hu, Zhicheng; Xu, Yong; Lin, Fu
2018-01-01
In-silico bitterant prediction received the considerable attention due to the expensive and laborious experimental-screening of the bitterant. In this work, we collect the fully experimental dataset containing 707 bitterants and 592 non-bitterants, which is distinct from the fully or partially hypothetical non-bitterant dataset used in the previous works. Based on this experimental dataset, we harness the consensus votes from the multiple machine-learning methods (e.g., deep learning etc.) combined with the molecular fingerprint to build the bitter/bitterless classification models with five-fold cross-validation, which are further inspected by the Y-randomization test and applicability domain analysis. One of the best consensus models affords the accuracy, precision, specificity, sensitivity, F1-score, and Matthews correlation coefficient (MCC) of 0.929, 0.918, 0.898, 0.954, 0.936, and 0.856 respectively on our test set. For the automatic prediction of bitterant, a graphic program “e-Bitter” is developed for the convenience of users via the simple mouse click. To our best knowledge, it is for the first time to adopt the consensus model for the bitterant prediction and develop the first free stand-alone software for the experimental food scientist. PMID:29651416
NASA Technical Reports Server (NTRS)
Majumdar, A. K.
2011-01-01
The Generalized Fluid System Simulation Program (GFSSP) is a finite-volume based general-purpose computer program for analyzing steady state and time-dependent flow rates, pressures, temperatures, and concentrations in a complex flow network. The program is capable of modeling real fluids with phase changes, compressibility, mixture thermodynamics, conjugate heat transfer between solid and fluid, fluid transients, pumps, compressors and external body forces such as gravity and centrifugal. The thermofluid system to be analyzed is discretized into nodes, branches, and conductors. The scalar properties such as pressure, temperature, and concentrations are calculated at nodes. Mass flow rates and heat transfer rates are computed in branches and conductors. The graphical user interface allows users to build their models using the point, drag and click method; the users can also run their models and post-process the results in the same environment. The integrated fluid library supplies thermodynamic and thermo-physical properties of 36 fluids and 21 different resistance/source options are provided for modeling momentum sources or sinks in the branches. This Technical Memorandum illustrates the application and verification of the code through 12 demonstrated example problems. This supplement gives the input and output data files for the examples.
ABISM: an interactive image quality assessment tool for adaptive optics instruments
NASA Astrophysics Data System (ADS)
Girard, Julien H.; Tourneboeuf, Martin
2016-07-01
ABISM (Automatic Background Interactive Strehl Meter) is a interactive tool to evaluate the image quality of astronomical images. It works on seeing-limited point spread functions (PSF) but was developed in particular for diffraction-limited PSF produced by adaptive optics (AO) systems. In the VLT service mode (SM) operations framework, ABISM is designed to help support astronomers or telescope and instruments operators (TIOs) to quickly measure the Strehl ratio (SR) during or right after an observing block (OB) to evaluate whether it meets the requirements/predictions or whether is has to be repeated and will remain in the SM queue. It's a Python-based tool with a graphical user interface (GUI) that can be used with little AO knowledge. The night astronomer (NA) or Telescope and Instrument Operator (TIO) can launch ABISM in one click and the program is able to read keywords from the FITS header to avoid mistakes. A significant effort was also put to make ABISM as robust (and forgiven) with a high rate of repeatability. As a matter of fact, ABISM is able to automatically correct for bad pixels, eliminate stellar neighbours and estimate/fit properly the background, etc.
e-Bitter: Bitterant Prediction by the Consensus Voting From the Machine-learning Methods
NASA Astrophysics Data System (ADS)
Zheng, Suqing; Jiang, Mengying; Zhao, Chengwei; Zhu, Rui; Hu, Zhicheng; Xu, Yong; Lin, Fu
2018-03-01
In-silico bitterant prediction received the considerable attention due to the expensive and laborious experimental-screening of the bitterant. In this work, we collect the fully experimental dataset containing 707 bitterants and 592 non-bitterants, which is distinct from the fully or partially hypothetical non-bitterant dataset used in the previous works. Based on this experimental dataset, we harness the consensus votes from the multiple machine-learning methods (e.g., deep learning etc.) combined with the molecular fingerprint to build the bitter/bitterless classification models with five-fold cross-validation, which are further inspected by the Y-randomization test and applicability domain analysis. One of the best consensus models affords the accuracy, precision, specificity, sensitivity, F1-score, and Matthews correlation coefficient (MCC) of 0.929, 0.918, 0.898, 0.954, 0.936, and 0.856 respectively on our test set. For the automatic prediction of bitterant, a graphic program “e-Bitter” is developed for the convenience of users via the simple mouse click. To our best knowledge, it is for the first time to adopt the consensus model for the bitterant prediction and develop the first free stand-alone software for the experimental food scientist.
Improved visibility of character conflicts in quasi-median networks with the EMPOP NETWORK software
Zimmermann, Bettina; Röck, Alexander W.; Dür, Arne; Parson, Walther
2014-01-01
Aim To provide a valuable tool for graphical representation of mitochondrial DNA (mtDNA) data that enables visual emphasis on complex substructures within the network to highlight possible ambiguities and errors. Method We applied the new NETWORK graphical user interface, available via EMPOP (European DNA Profiling Group Mitochondrial DNA Population Database; www.empop.org) by means of two mtDNA data sets that were submitted for quality control. Results The quasi-median network torsi of the two data sets resulted in complex reticulations, suggesting ambiguous data. To check the corresponding raw data, accountable nodes and connecting branches of the network could be identified by highlighting induced subgraphs with concurrent dimming of their complements. This is achieved by accentuating the relevant substructures in the network: mouse clicking on a node displays a list of all mtDNA haplotypes included in that node; the selection of a branch specifies the mutation(s) connecting two nodes. It is indicated to evaluate these mutations by means of the raw data. Conclusion Inspection of the raw data confirmed the presence of phantom mutations due to suboptimal electrophoresis conditions and data misinterpretation. The network software proved to be a powerful tool to highlight problematic data and guide quality control of mtDNA data tables. PMID:24778097
Gorman, C; Looker, J; Fisk, T; Oelke, W; Erickson, D; Smith, S; Zimmerman, B
1996-01-01
We have analysed the deficiencies of paper medical records in facilitating the care of patients with diabetes and have developed an electronic medical record that corrects some of them. The diabetes electronic medical record (DEMR) is designed to facilitate the work of a busy diabetes clinic. Design principles include heavy reliance on graphic displays of laboratory and clinical data, consistent color coding and aggregation of data needed to facilitate the different types of clinical encounter (initial consultation, continuing care visit, insulin adjustment visit, dietitian encounter, nurse educator encounter, obstetric patient, transplant patient, visits for problems unrelated to diabetes). Data input is by autoflow from the institutional laboratories, by desk attendants or on-line by all users. Careful attention has been paid to making data entry a point and click process wherever possible. Opportunity for free text comment is provided on every screen. On completion of the encounter a narrative text summary of the visit is generated by the computer and is annotated by the care giver. Currently there are about 7800 patients in the system. Remaining challenges include the adaptation of the system to accommodate the occasional user, development of portable laptop derivatives that remain compatible with the parent system and improvements in the screen structure and graphic display formats.
van der Wal, Steffen; de Korne, Clarize M; Sand, Laurens L G; van Willigen, Danny M; Hogendoorn, Pancras C W; Szuhai, Karoly; van Leeuwen, Fijs W B; Buckle, Tessa
2018-06-04
Availability of a receptor for theranostic pre-targeting approaches was assessed using a novel "click" chemistry-based de-activatable fluorescence-quenching concept. Efficacy was evaluated in a cell-based model system that exhibits both membranous (available) and internalized (unavailable) receptor-fractions of the clinically relevant receptor chemokine receptor 4 (CXCR4). Proof of concept was based on a de-activatable tracer consisting out of a CXCR4 specific peptide functionalized with a Cy5 dye comprising a chemo-selective azide handle (N3-Cy5-AcTZ14011). Reaction with a Cy7 quencher dye (Cy7-DBCO) resulted in optically silent Cy7-["click"]-Cy5-AcTZ14011. In situ a >90% FRET-based reduction of signal intensity of N3-Cy5-AcTZ14011 (KD 222.4 ± 25.2 nM) was seen within minutes after quencher addition. In cells, discrimination between the membranous and internalized receptor-fraction could be made through quantitative assessment of quenching/internalization kinetics. As such, using this approach screening of membrane receptors and their applicability in receptor-(pre-)targeted theranostics can become straightforward. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Automatic detection of echolocation clicks based on a Gabor model of their waveform.
Madhusudhana, Shyam; Gavrilov, Alexander; Erbe, Christine
2015-06-01
Prior research has shown that echolocation clicks of several species of terrestrial and marine fauna can be modelled as Gabor-like functions. Here, a system is proposed for the automatic detection of a variety of such signals. By means of mathematical formulation, it is shown that the output of the Teager-Kaiser Energy Operator (TKEO) applied to Gabor-like signals can be approximated by a Gaussian function. Based on the inferences, a detection algorithm involving the post-processing of the TKEO outputs is presented. The ratio of the outputs of two moving-average filters, a Gaussian and a rectangular filter, is shown to be an effective detection parameter. Detector performance is assessed using synthetic and real (taken from MobySound database) recordings. The detection method is shown to work readily with a variety of echolocation clicks and in various recording scenarios. The system exhibits low computational complexity and operates several times faster than real-time. Performance comparisons are made to other publicly available detectors including pamguard.
Propagation modeling for sperm whale acoustic clicks in the northern Gulf of Mexico
NASA Astrophysics Data System (ADS)
Sidorovskaia, Natalia A.; Udovydchenkov, Ilya A.; Rypina, Irina I.; Ioup, George E.; Ioup, Juliette W.; Caruthers, Jerald W.; Newcomb, Joal; Fisher, Robert
2004-05-01
Simulations of acoustic broadband (500-6000 Hz) pulse propagation in the northern Gulf of Mexico, based on environmental data collected as a part of the Littoral Acoustic Demonstration Center (LADC) experiments in the summers of 2001 and 2002, are presented. The results of the modeling support the hypothesis that consistent spectrogram interference patterns observed in the LADC marine mammal phonation data cannot be explained by the propagation effects for temporal analysis windows corresponding to the duration of an animal click, and may be due to a uniqueness of an individual animal phonation apparatus. The utilization of simulation data for the development of an animal tracking algorithm based on the acoustic recordings of a single bottom-moored hydrophone is discussed. The identification of the bottom and surface reflected clicks from the same animal is attempted. The critical ranges for listening to a deep-water forging animal by a surface receiving system are estimated. [Research supported by ONR.
One-click scanning of large-size documents using mobile phone camera
NASA Astrophysics Data System (ADS)
Liu, Sijiang; Jiang, Bo; Yang, Yuanjie
2016-07-01
Currently mobile apps for document scanning do not provide convenient operations to tackle large-size documents. In this paper, we present a one-click scanning approach for large-size documents using mobile phone camera. After capturing a continuous video of documents, our approach automatically extracts several key frames by optical flow analysis. Then based on key frames, a mobile GPU based image stitching method is adopted to generate a completed document image with high details. There are no extra manual intervention in the process and experimental results show that our app performs well, showing convenience and practicability for daily life.
Click chemistry in the Development of Contrast Agents for Magnetic Resonance Imaging
Hapuarachchige, Sudath; Artemov, Dmitri
2016-01-01
Click chemistry provides fast, convenient, versatile and reliable chemical reactions that take place between pairs of functional groups of small molecules that can be purified without chromatographic methods. Due to the fast kinetics and low or no elimination of byproducts, click chemistry is a promising approach that is rapidly gaining acceptance in drug discovery, radiochemistry, bioconjugation, and nanoscience applications. Increasing use of click chemistry in synthetic procedures or as a bioconjugation technique in diagnostic imaging is occurring because click reactions are fast, provide a quantitative yield, and produce minimal amount of nontoxic byproducts. This review summarizes the recent application of click chemistry in magnetic resonance imaging and discusses the directions for applying novel click reactions and strategies for further improving MRI performance. PMID:27748712
New operator assistance features in the CMS Run Control System
NASA Astrophysics Data System (ADS)
Andre, J.-M.; Behrens, U.; Branson, J.; Brummer, P.; Chaze, O.; Cittolin, S.; Contescu, C.; Craigs, B. G.; Darlea, G.-L.; Deldicque, C.; Demiragli, Z.; Dobson, M.; Doualot, N.; Erhan, S.; Fulcher, J. R.; Gigi, D.; Gładki, M.; Glege, F.; Gomez-Ceballos, G.; Hegeman, J.; Holzner, A.; Janulis, M.; Jimenez-Estupiñán, R.; Masetti, L.; Meijers, F.; Meschi, E.; Mommsen, R. K.; Morovic, S.; O'Dell, V.; Orsini, L.; Paus, C.; Petrova, P.; Pieri, M.; Racz, A.; Reis, T.; Sakulin, H.; Schwick, C.; Simelevicius, D.; Vougioukas, M.; Zejdl, P.
2017-10-01
During Run-1 of the LHC, many operational procedures have been automated in the run control system of the Compact Muon Solenoid (CMS) experiment. When detector high voltages are ramped up or down or upon certain beam mode changes of the LHC, the DAQ system is automatically partially reconfigured with new parameters. Certain types of errors such as errors caused by single-event upsets may trigger an automatic recovery procedure. Furthermore, the top-level control node continuously performs cross-checks to detect sub-system actions becoming necessary because of changes in configuration keys, changes in the set of included front-end drivers or because of potential clock instabilities. The operator is guided to perform the necessary actions through graphical indicators displayed next to the relevant command buttons in the user interface. Through these indicators, consistent configuration of CMS is ensured. However, manually following the indicators can still be inefficient at times. A new assistant to the operator has therefore been developed that can automatically perform all the necessary actions in a streamlined order. If additional problems arise, the new assistant tries to automatically recover from these. With the new assistant, a run can be started from any state of the sub-systems with a single click. An ongoing run may be recovered with a single click, once the appropriate recovery action has been selected. We review the automation features of CMS Run Control and discuss the new assistant in detail including first operational experience.
New Operator Assistance Features in the CMS Run Control System
DOE Office of Scientific and Technical Information (OSTI.GOV)
Andre, J.M.; et al.
During Run-1 of the LHC, many operational procedures have been automated in the run control system of the Compact Muon Solenoid (CMS) experiment. When detector high voltages are ramped up or down or upon certain beam mode changes of the LHC, the DAQ system is automatically partially reconfigured with new parameters. Certain types of errors such as errors caused by single-event upsets may trigger an automatic recovery procedure. Furthermore, the top-level control node continuously performs cross-checks to detect sub-system actions becoming necessary because of changes in configuration keys, changes in the set of included front-end drivers or because of potentialmore » clock instabilities. The operator is guided to perform the necessary actions through graphical indicators displayed next to the relevant command buttons in the user interface. Through these indicators, consistent configuration of CMS is ensured. However, manually following the indicators can still be inefficient at times. A new assistant to the operator has therefore been developed that can automatically perform all the necessary actions in a streamlined order. If additional problems arise, the new assistant tries to automatically recover from these. With the new assistant, a run can be started from any state of the sub-systems with a single click. An ongoing run may be recovered with a single click, once the appropriate recovery action has been selected. We review the automation features of CMS Run Control and discuss the new assistant in detail including first operational experience.« less
Benkaddour, Abdelhaq; Jradi, Khalil; Robert, Sylvain; Daneault, Claude
2013-01-01
Esterification and click-chemistry were evaluated as surface modification treatments for TEMPO-oxidized nanocelluloses (TONC) using Polycaprolactone-diol (PCL) as modifying compound in order to improve the dispersion of nanofibers in organic media. These two grafting strategies were analyzed and compared. The first consists of grafting directly the PCL onto TONC, and was carried out by esterification between hydroxyl groups of PCL and carboxyl groups of TONC. The second strategy known as click-chemistry is based on the 1,3-dipolar cycloaddition reaction between azides and alkyne terminated moieties to form the triazole ring between PCL and TONC. The grafted samples were characterized by transmission electron microscopy (TEM), Fourier transform infrared spectroscopy (FTIR), X-ray photoelectron spectroscopy (XPS), and Thermogravimetry analysis (TGA). Further, the effects of the two treatments on the surface hydrophobization of TONC were investigated by contact angle measurements. The results show that both methods confirm the success of such a modification and the click reaction was significantly more effective than esterification. PMID:28348357
Ghanian, Mohammad Hossein; Mirzadeh, Hamid; Baharvand, Hossein
2018-05-14
A dual cross-linking strategy was developed to answer the urgent need for fatigue-resistant, cytocompatible, and in situ forming tough hydrogels. Clickable, yet calcium-binding derivatives of alginate were synthesized by partial substitution of its carboxyl functionalities with furan, which could come into Diels-Alder click reaction with maleimide end groups of a four arm poly(ethylene glycol) cross-linker. Tuning the cooperative viscoelastic action of transient ionic and permanent click cross-links within the single network of alginate provided a soft tough hydrogel with a set of interesting features: (i) immediate self-recovery under cyclic loading, (ii) highly efficient and autonomous self-healing upon fracture, (iii) in situ forming ability for molding and minimally invasive injection, (iv) capability for viable cell encapsulation, and (v) reactivity for on-demand biomolecule conjugation. The facile strategy is applicable to a wide range of natural and synthetic polymers by introducing the calcium binding and click reacting functional groups and can broaden the use of tough hydrogels in load-bearing, cell-laden applications such as soft tissue engineering and bioactuators.
2011-12-01
developed to address the two main research questions (see Annex A). Exact wording of the questions varied during interviews to accommodate the...centre at DMS 3rd floor. All electronic files (including digital audio and video recordings) with participant data are being encrypted and password...locked filing cabinet at the University of Ottawa. Electronic files will remain encrypted, password protected and stored on a server to which only the
Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita
2014-05-01
Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.
Carbohydrate CuAAC click chemistry for therapy and diagnosis.
He, Xiao-Peng; Zeng, Ya-Li; Zang, Yi; Li, Jia; Field, Robert A; Chen, Guo-Rong
2016-06-24
Carbohydrates are important as signaling molecules and for cellular recognition events, therefore offering scope for the development of carbohydrate-mimetic diagnostics and drug candidates. As a consequence, the construction of carbohydrate-based bioactive compounds and sensors has become an active research area. While the advent of click chemistry has greatly accelerated the progress of medicinal chemistry and chemical biology, recent literature has seen an extensive use of such approaches to construct functionally diverse carbohydrate derivatives. Here we summarize some of the progress, covering the period 2010 to mid-2015, in Cu(I)-catalyzed azide-alkyne 1,3-dipolar cycloaddition CuAAC "click chemistry" of carbohydrate derivatives, in the context of potential therapeutic and diagnostic tool development. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.
Hariadi, Rizal F.; Yurke, Bernard
2015-01-01
DNA nanotubes provide a programmable architecture for molecular self-assembly and can serve as model systems for one-dimensional biomolecular assemblies. While a variety of DNA nanotubes have been synthesized and employed as models for natural biopolymers, an extensive investigation of DNA nanotube kinetics and thermodynamics has been lacking. Using total internal reflection microscopy, DNA nanotube polymerization was monitored in real time at the single filament level over a wide range of free monomer concentrations and temperatures. The measured polymerization rates were subjected to a global nonlinear fit based on polymerization theory in order to simultaneously extract kinetic and thermodynamic parameters. For the DNA nanotubes used in this study, the association rate constant is (5.99 ± 0.15) × 105 M–1 s–1, the enthalpy is 87.9 ± 2.0 kcal mol–1, and the entropy is 0.252 ± 0.006 kcal mol–1 K–1. The qualitative and quantitative similarities between the kinetics of DNA nanotubes, actin filaments, and microtubules polymerization highlight the prospect of building complex dynamic systems from DNA molecules inspired by biological architecture. PMID:29308139
One-pot reaction for the preparation of biofunctionalized self-assembled monolayers on gold surfaces
NASA Astrophysics Data System (ADS)
Raigoza, Annette F.; Fies, Whitney; Lim, Amber; Onyirioha, Kristeen; Webb, Lauren J.
2017-02-01
The Huisgen cycloaddition reaction (;click; chemistry) has been used extensively to functionalize surfaces with macromolecules in a straightforward manner. We have previously developed a procedure using the copper(I)-catalyzed click reaction to tether synthetic α-helical peptides carrying two alkyne groups to a well-ordered azide-terminated alkanethiol self-assembled monolayer (SAM) on a Au(111) surface. While convenient, click-based strategies potentially pose significant problems from reagents, solvents, and reaction temperatures that may irreversibly damage some molecules or substrates. Tuning click chemistry conditions would allow individual optimization of reaction conditions for a wide variety of biomolecules and substrate materials. Here, we explore the utility of simultaneous SAM formation and peptide-attachment chemistry in a one-pot reaction. We demonstrate that a formerly multistep reaction can be successfully carried out concurrently by mixing azide-terminated alkanethiols, CuCl, and a propargylglycine-containing peptide over a bare gold surface in ethanol and reacting at 70 °C. X-ray photoelectron spectroscopy (XPS), surface infrared spectroscopy, surface circular dichroic (CD) spectroscopy, and scanning tunneling microscopy (STM) were used to determine that this one-pot reaction strategy resulted in a high density of surface-bound α-helices without aggregation. This work demonstrates the simplicity and versatility of a SAM-plus-click chemistry strategy for functionalizing Au surfaces with structured biomolecules.
Comparison Study of Two Differently Clicked 18F-Folates—Lipophilicity Plays a Key Role
Kettenbach, Kathrin; Reffert, Laura M.; Schieferstein, Hanno; Pektor, Stefanie; Eckert, Raphael; Miederer, Matthias; Rösch, Frank
2018-01-01
Within the last decade, several folate-based radiopharmaceuticals for Single Photon Emission Computed Tomography (SPECT) and Positron Emission Tomography (PET) have been evaluated; however, there is still a lack of suitable 18F-folates for clinical PET imaging. Herein, we report the synthesis and evaluation of two novel 18F-folates employing strain-promoted and copper-catalyzed click chemistry. Furthermore, the influence of both click-methods on lipophilicity and pharmacokinetics of the 18F-folates was investigated. 18F-Ala-folate and 18F-DBCO-folate were both stable in human serum albumin. In vitro studies proved their high affinity to the folate receptor (FR). The lipophilic character of the strain-promoted clicked 18F-DBCO-folate (logD = 0.6) contributed to a higher non-specific binding in cell internalization studies. In the following in vivo PET imaging studies, FR-positive tumors could not be visualized in a maximum intensity projection images. Compared with 18F-DBCO-folate, 18F-Ala-folate (logD = −1.4), synthesized by the copper-catalyzed click reaction, exhibited reduced lipophilicity, and as a result an improved in vivo performance and a clear-cut visualization of FR-positive tumors. In view of high radiochemical yield, radiochemical purity and favorable pharmacokinetics, 18F-Ala-folate is expected to be a promising candidate for FR-PET imaging. PMID:29562610
Houck, Hannes A.; De Bruycker, Kevin; Billiet, Stijn; Dhanis, Bastiaan; Goossens, Hannelore; Catak, Saron; Van Speybroeck, Veronique
2017-01-01
The reaction of triazolinediones (TADs) and indoles is of particular interest for polymer chemistry applications, as it is a very fast and irreversible additive-free process at room temperature, but can be turned into a dynamic covalent bond forming process at elevated temperatures, giving a reliable bond exchange or ‘transclick’ reaction. In this paper, we report an in-depth study aimed at controlling the TAD–indole reversible click reactions through rational design of modified indole reaction partners. This has resulted in the identification of a novel class of easily accessible indole derivatives that give dynamic TAD-adduct formation at significantly lower temperatures. We further demonstrate that these new substrates can be used to design a directed cascade of click reactions of a functionalized TAD moiety from an initial indole reaction partner to a second indole, and finally to an irreversible reaction partner. This controlled sequence of click and transclick reactions of a single TAD reagent between three different substrates has been demonstrated both on small molecule and macromolecular level, and the factors that control the reversibility profiles have been rationalized and guided by mechanistic considerations supported by theoretical calculations. PMID:28507685
Oliveira, Cláudia; Wahlberg, Magnus; Johnson, Mark; Miller, Patrick J O; Madsen, Peter T
2013-05-01
Sperm whales produce different click types for echolocation and communication. Usual clicks and buzzes appear to be used primarily in foraging while codas are thought to function in social communication. The function of slow clicks is less clear, but they appear to be produced by males at higher latitudes, where they primarily forage solitarily, and on the breeding grounds, where they roam between groups of females. Here the behavioral context in which these vocalizations are produced and the function they may serve was investigated. Ninety-nine hours of acoustic and diving data were analyzed from sound recording tags on six male sperm whales in Northern Norway. The 755 slow clicks detected were produced by tagged animals at the surface (52%), ascending from a dive (37%), and during the bottom phase (11%), but never during the descent. Slow clicks were not associated with the production of buzzes, other echolocation clicks, or fast maneuvering that would indicate foraging. Some slow clicks were emitted in seemingly repetitive temporal patterns supporting the hypothesis that the function for slow clicks on the feeding grounds is long range communication between males, possibly relaying information about individual identity or behavioral states.
Click chemistry for the conservation of cellular structures and fluorescent proteins: ClickOx.
Löschberger, Anna; Niehörster, Thomas; Sauer, Markus
2014-05-01
Reactive oxygen species (ROS), including hydrogen peroxide, are known to cause structural damage not only in living, but also in fixed, cells. Copper-catalyzed azide-alkyne cycloaddition (click chemistry) is known to produce ROS. Therefore, fluorescence imaging of cellular structures, such as the actin cytoskeleton, remains challenging when combined with click chemistry protocols. In addition, the production of ROS substantially weakens the fluorescence signal of fluorescent proteins. This led us to develop ClickOx, which is a new click chemistry protocol for improved conservation of the actin structure and better conservation of the fluorescence signal of green fluorescent protein (GFP)-fusion proteins. Herein we demonstrate that efficient oxygen removal by addition of an enzymatic oxygen scavenger system (ClickOx) considerably reduces ROS-associated damage during labeling of nascent DNA with ATTO 488 azide by Cu(I)-catalyzed click chemistry. Standard confocal and super-resolution fluorescence images of phalloidin-labeled actin filaments and GFP/yellow fluorescent protein-labeled cells verify the conservation of the cytoskeleton microstructure and fluorescence intensity, respectively. Thus, ClickOx can be used advantageously for structure preservation in conventional and most notably in super-resolution microscopy methods. Copyright © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
A Secure and Privacy-Preserving Targeted Ad-System
NASA Astrophysics Data System (ADS)
Androulaki, Elli; Bellovin, Steven M.
Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods violate consumers' privacy, which has engendered resistance to the ads. However, protecting privacy through anonymity seems to encourage click-fraud. In this paper, we define consumer's privacy and present a privacy-preserving, targeted ad system (PPOAd) which is resistant towards click fraud. Our scheme is structured to provide financial incentives to all entities involved.
Simpson, Tyler; Gauthier, Michel; Prochazka, Arthur
2010-02-01
Computer access can play an important role in employment and leisure activities following spinal cord injury. The authors' prior work has shown that a tooth-click detecting device, when paired with an optical head mouse, may be used by people with tetraplegia for controlling cursor movement and mouse button clicks. To compare the efficacy of tooth clicks to speech recognition and that of an optical head mouse to a gyrometer head mouse for cursor and mouse button control of a computer. Six able-bodied and 3 tetraplegic subjects used the devices listed above to produce cursor movements and mouse clicks in response to a series of prompts displayed on a computer. The time taken to move to and click on each target was recorded. The use of tooth clicks in combination with either an optical head mouse or a gyrometer head mouse can provide hands-free cursor movement and mouse button control at a speed of up to 22% of that of a standard mouse. Tooth clicks were significantly faster at generating mouse button clicks than speech recognition when paired with either type of head mouse device. Tooth-click detection performed better than speech recognition when paired with both the optical head mouse and the gyrometer head mouse. Such a system may improve computer access for people with tetraplegia.
Setting a disordered password on a photonic memory
NASA Astrophysics Data System (ADS)
Su, Shih-Wei; Gou, Shih-Chuan; Chew, Lock Yue; Chang, Yu-Yen; Yu, Ite A.; Kalachev, Alexey; Liao, Wen-Te
2017-06-01
An all-optical method of setting a disordered password on different schemes of photonic memory is theoretically studied. While photons are regarded as ideal information carriers, it is imperative to implement such data protection on all-optical storage. However, we wish to address the intrinsic risk of data breaches in existing schemes of photonic memory. We theoretically demonstrate a protocol using spatially disordered laser fields to encrypt data stored on an optical memory, namely, encrypted photonic memory. To address the broadband storage, we also investigate a scheme of disordered echo memory with a high fidelity approaching unity. The proposed method increases the difficulty for the eavesdropper to retrieve the stored photon without the preset password even when the randomized and stored photon state is nearly perfectly cloned. Our results pave ways to significantly reduce the exposure of memories, required for long-distance communication, to eavesdropping and therefore restrict the optimal attack on communication protocols. The present scheme also increases the sensitivity of detecting any eavesdropper and so raises the security level of photonic information technology.
Villanti, Andrea C; Jacobs, Megan A; Zawistowski, Grace; Brookover, Jody; Stanton, Cassandra A; Graham, Amanda L
2015-07-16
Few studies have addressed enrollment and retention methods in online smoking cessation interventions. Fully automated Web-based trials can yield large numbers of participants rapidly but suffer from high rates of attrition. Personal contact with participants can increase recruitment of smokers into cessation trials and improve participant retention. To compare the impact of Web-based (WEB) and phone (PH) baseline assessments on enrollment and retention metrics in the context of a Facebook smoking cessation study. Participants were recruited via Facebook and Google ads which were randomly displayed to adult smokers in the United States over 27 days from August to September 2013. On each platform, two identical ads were randomly displayed to users who fit the advertising parameters. Clicking on one of the ads resulted in randomization to WEB, and clicking on the other ad resulted in randomization to PH. Following online eligibility screening and informed consent, participants in the WEB arm completed the baseline survey online whereas PH participants completed the baseline survey by phone with a research assistant. All participants were contacted at 30 days to complete a follow-up survey that assessed use of the cessation intervention and smoking outcomes. Participants were paid $15 for follow-up survey completion. A total of 4445 people clicked on the WEB ad and 4001 clicked on the PH ad: 12.04% (n=535) of WEB participants and 8.30% (n=332) of PH participants accepted the online study invitation (P<.001). Among the 726 participants who completed online eligibility screening, an equivalent proportion in both arms was eligible and an equivalent proportion of the eligible participants in both arms provided informed consent. There was significant drop-off between consent and completion of the baseline survey in the PH arm, resulting in enrollment rates of 32.7% (35/107) for the PH arm and 67.9% (114/168) for the WEB arm (P<.001). The overall enrollment rate among everyone who clicked on a study ad was 2%. There were no between group differences in the proportion that installed the Facebook app (66/114, 57.9% WEB vs 17/35, 49% PH) or that completed the 30-day follow-up survey (49/114, 43.0% WEB vs 16/35, 46% PH). A total of $6074 was spent on ads, generating 3,834,289 impressions and resulting in 8446 clicks (average cost $0.72 per click). Per participant enrollment costs for advertising alone were $27 WEB and $87 PH. A more intensive phone baseline assessment protocol yielded a lower rate of enrollment, equivalent follow-up rates, and higher enrollment costs compared to a Web-based assessment protocol. Future research should focus on honing mixed-mode assessment protocols to further optimize enrollment and retention.
Kowarski, Katie; Delarue, Julien; Martin, Bruce; O'Brien, Joanne; Meade, Rossa; Ó Cadhla, Oliver; Berrow, Simon
2018-01-01
Little is known of the spatio-temporal occurrence of beaked whales off western Ireland, limiting the ability of Regulators to implement appropriate management and conservation measures. To address this knowledge gap, static acoustic monitoring was carried out using eight fixed bottom-mounted autonomous acoustic recorders: four from May to December 2015 on Ireland's northern slope and four from March to November 2016 on the western and southern slopes. Recorders ran for 205 to 230 days, resulting in 4.09 TB of data sampled at 250 kHz which could capture beaked whale acoustic signals. Zero-crossing-based automated detectors identified beaked whale clicks. A sample of detections was manually validated to evaluate and optimize detector performance. Analysis confirmed the occurrence of Sowerby's and Cuvier's beaked whales and Northern bottlenose whales. Northern bottlenose whale clicks occurred in late summer and autumn, but were too few to allow further analysis. Cuvier's and Sowerby's clicks occurred at all stations throughout the monitoring period. There was a significant effect of month and station (latitude) on the mean daily number of click detections for both species. Cuvier's clicks were more abundant at lower latitudes while Sowerby's were greater at higher latitudes, particularly in the spring, suggesting a spatial segregation between species, possibly driven by prey preference. Cuvier's occurrence increased in late autumn 2015 off northwest Porcupine Bank, a region of higher relative occurrence for each species. Seismic airgun shots, with daily sound exposure levels as high as 175 dB re 1 μPa2·s, did not appear to impact the mean daily number of Cuvier's or Sowerby's beaked whale click detections. This work provides insight into the significance of Irish waters for beaked whales and highlights the importance of using acoustics for beaked whale monitoring.
Security enhanced multi-factor biometric authentication scheme using bio-hash function
Lee, Youngsook; Moon, Jongho
2017-01-01
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867
Electronic patient data confidentiality practices among surgical trainees: questionnaire study.
Mole, Damian J; Fox, Colin; Napolitano, Giulio
2006-10-01
The objective of this work was to evaluate the safeguards implemented by surgical trainees to protect the confidentiality of electronic patient data through a structured questionnaire sent to Northern Ireland surgical trainees. A group of 32 basic and higher surgical trainees attending a meeting of the Northern Ireland Association of Surgeons-in-Training were invited to complete a questionnaire regarding their computer use, UK Data Protection Act, 1988 registration and electronic data confidentiality practices. Of these 32 trainees, 29 returned completed questionnaires of whom 26 trainees regularly stored sensitive patient data for audit or research purposes on a computer. Only one person was registered under the Data Protection Act, 1988. Of the computers used to store and analyse sensitive data, only 3 of 14 desktops, 8 of 19 laptops and 3 of 14 hand-held computers forced a password logon. Of the 29 trainees, 16 used the same password for all machines, and 25 of 27 passwords were less than 8 characters long. Two respondents declined to reveal details of their secure passwords. Half of all trainees had never adjusted their internet security settings, despite all 14 desktops, 16 of 19 laptops and 5 of 14 hand-helds being routinely connected to the internet. Of the 29 trainees, 28 never encrypted their sensitive data files. Ten trainees had sent unencrypted sensitive patient data over the internet, using a non-secure server. Electronic data confidentiality practices amongst Northern Ireland surgical trainees are unsafe. Simple practical measures to safeguard confidentiality are recommended.
Evaluating and Optimizing Online Advertising: Forget the Click, but There Are Good Proxies.
Dalessandro, Brian; Hook, Rod; Perlich, Claudia; Provost, Foster
2015-06-01
Online systems promise to improve advertisement targeting via the massive and detailed data available. However, there often is too few data on exactly the outcome of interest, such as purchases, for accurate campaign evaluation and optimization (due to low conversion rates, cold start periods, lack of instrumentation of offline purchases, and long purchase cycles). This paper presents a detailed treatment of proxy modeling, which is based on the identification of a suitable alternative (proxy) target variable when data on the true objective is in short supply (or even completely nonexistent). The paper has a two-fold contribution. First, the potential of proxy modeling is demonstrated clearly, based on a massive-scale experiment across 58 real online advertising campaigns. Second, we assess the value of different specific proxies for evaluating and optimizing online display advertising, showing striking results. The results include bad news and good news. The most commonly cited and used proxy is a click on an ad. The bad news is that across a large number of campaigns, clicks are not good proxies for evaluation or for optimization: clickers do not resemble buyers. The good news is that an alternative sort of proxy performs remarkably well: observed visits to the brand's website. Specifically, predictive models built based on brand site visits-which are much more common than purchases-do a remarkably good job of predicting which browsers will make a purchase. The practical bottom line: evaluating and optimizing campaigns using clicks seems wrongheaded; however, there is an easy and attractive alternative-use a well-chosen site-visit proxy instead.
Sound source localization identification accuracy: Envelope dependencies.
Yost, William A
2017-07-01
Sound source localization accuracy as measured in an identification procedure in a front azimuth sound field was studied for click trains, modulated noises, and a modulated tonal carrier. Sound source localization accuracy was determined as a function of the number of clicks in a 64 Hz click train and click rate for a 500 ms duration click train. The clicks were either broadband or high-pass filtered. Sound source localization accuracy was also measured for a single broadband filtered click and compared to a similar broadband filtered, short-duration noise. Sound source localization accuracy was determined as a function of sinusoidal amplitude modulation and the "transposed" process of modulation of filtered noises and a 4 kHz tone. Different rates (16 to 512 Hz) of modulation (including unmodulated conditions) were used. Providing modulation for filtered click stimuli, filtered noises, and the 4 kHz tone had, at most, a very small effect on sound source localization accuracy. These data suggest that amplitude modulation, while providing information about interaural time differences in headphone studies, does not have much influence on sound source localization accuracy in a sound field.
Cloning and characterization of luciferase from a Fijian luminous click beetle.
Mitani, Yasuo; Futahashi, Ryo; Niwa, Kazuki; Ohba, Nobuyoshi; Ohmiya, Yoshihiro
2013-01-01
Luminous click beetle is distributed almost exclusively in Central and South America with a single genus in Melanesia. Among these click beetles, the description of Melanesian species has been fragmentary, and its luciferase gene and phylogenetic relation to other click beetles still remain uncertain. We collected a living luminous click beetle, Photophorus jansonii in Fiji. It emits green-yellow light from two spots on the pronotum and has no ventral luminous organ. Here, we cloned a luciferase gene from this insect by RT-PCR. The deduced amino acid sequence showed high identity of ~85% to the luciferases derived from other click beetle species. The luciferase of the Fijian click beetle was produced as a recombinant protein to characterize its biochemical properties. The Km for D-luciferin and ATP were 173 and 270 μm, respectively. The luciferase was pH-insensitive and the spectrum measured at pH 8.0 showed a peak at 559 nm, which was in the range of green-yellow light as seen in the luminous spot of the living Fijian click beetle. The Fijian click beetle luciferase was assigned to the Elateridae clade by a phylogenetic analysis, but it made a clearly different branch from Pyrophorus group examined in this study. © 2013 The American Society of Photobiology.
'Click chemistry' for diagnosis: a patent review on exploitation of its emerging trends.
Mandhare, Anita; Banerjee, Paromita; Bhutkar, Smita; Hirwani, Rajkumar
2014-12-01
Click chemistry is the novel synthetic approach towards developing reactions with large thermodynamic driving forces to give almost complete conversion of new molecular reagents to a single product. Thus, click chemistry describes the chemistry for making carbon-heteroatom-carbon bonds in benign solvents, especially in water, and having a plethora of chemical and biological applications. This has played an important role in early detection of diseases, real-time monitoring of drug delivery and investigating the biomolecular functions in vivo. This review aims at highlighting the research advancements in click chemistry published in the patent literature and categorizing the patents according to the technological progress. An extensive search was carried out to collect and analyze the patent information claiming the use of click chemistry in biotechnology, especially for diagnosis. The study further concentrates on licensing of the click chemistry patents and defining the recent breakthroughs. Different databases like Espacenet, ISI Web of Science, Patbase and Thomson Innovation are used to compile the relevant literature. In recent years, considerable development in the click concept has encouraged researchers in using click reactions in almost every branch of industry that uses chemistry. Click chemistry for chemical ligation has been immensely explored in the field of biotechnology especially for detection, diagnosis and therapeutics.
Eskesen, Ida G; Wahlberg, Magnus; Simon, Malene; Larsen, Ole Næsbye
2011-07-01
The source characteristics of biosonar signals from sympatric killer whales and long-finned pilot whales in a Norwegian fjord were compared. A total of 137 pilot whale and more than 2000 killer whale echolocation clicks were recorded using a linear four-hydrophone array. Of these, 20 pilot whale clicks and 28 killer whale clicks were categorized as being recorded on-axis. The clicks of pilot whales had a mean apparent source level of 196 dB re 1 μPa pp and those of killer whales 203 dB re 1 μPa pp. The duration of pilot whale clicks was significantly shorter (23 μs, S.E.=1.3) and the centroid frequency significantly higher (55 kHz, S.E.=2.1) than killer whale clicks (duration: 41 μs, S.E.=2.6; centroid frequency: 32 kHz, S.E.=1.5). The rate of increase in the accumulated energy as a function of time also differed between clicks from the two species. The differences in duration, frequency, and energy distribution may have a potential to allow for the distinction between pilot and killer whale clicks when using automated detection routines for acoustic monitoring. © 2011 Acoustical Society of America
Povey, Josie; Mills, Patj Patj Janama Robert; Dingwall, Kylie Maree; Lowell, Anne; Singer, Judy; Rotumah, Darlene; Bennett-Levy, James; Nagel, Tricia
2016-03-11
Aboriginal and Torres Strait Islander Australians experience high rates of mental illness and psychological distress compared to their non-Indigenous counterparts. E-mental health tools offer an opportunity for accessible, effective, and acceptable treatment. The AIMhi Stay Strong app and the ibobbly suicide prevention app are treatment tools designed to combat the disproportionately high levels of mental illness and stress experienced within the Aboriginal and Torres Strait Islander community. This study aimed to explore Aboriginal and Torres Strait Islander community members' experiences of using two culturally responsive e-mental health apps and identify factors that influence the acceptability of these approaches. Using qualitative methods aligned with a phenomenological approach, we explored the acceptability of two culturally responsive e-mental health apps through a series of three 3-hour focus groups with nine Aboriginal and Torres Strait Islander community members. Thematic analysis was conducted and coresearcher and member checking were used to verify findings. Findings suggest strong support for the concept of e-mental health apps and optimism for their potential. Factors that influenced acceptability related to three key themes: personal factors (eg, motivation, severity and awareness of illness, technological competence, and literacy and language differences), environmental factors (eg, community awareness, stigma, and availability of support), and app characteristics (eg, ease of use, content, graphics, access, and security and information sharing). Specific adaptations, such as local production, culturally relevant content and graphics, a purposeful journey, clear navigation, meaningful language, options to assist people with language differences, offline use, and password protection may aid uptake. When designed to meet the needs of Aboriginal and Torres Strait Islander Australians, e-mental health tools add an important element to public health approaches for improving the well-being of Aboriginal and Torres Strait Islander people.
Liquid—liquid interface-mediated Au—ZnO composite membrane using ‘thiol-ene’ click chemistry
NASA Astrophysics Data System (ADS)
Ali, Mohammed; Ghosh, Sujit Kumar
2015-07-01
A nanoparticle-decorated composite membrane has been devised at the water/CCl4 interface based on the self-assembly of ligand-stabilized gold and zinc oxide nanoparticles, exploiting the ‘thiol-ene’ click chemistry between the thiol groups of 11-mercaptoundecanoic acid-stabilized ZnO nanoparticles and the ene functionality of cinnamic acid attached to gold nanoparticles. The interfacial assembly of ultrasmall particles leads to a multilayer film that exhibits charge-dependent permeability of amino acid molecules across the membrane.
Analysis and Modeling of Echolocation Signals Emitted by Mediterranean Bottlenose Dolphins
NASA Astrophysics Data System (ADS)
Greco, Maria; Gini, Fulvio
2006-12-01
We analyzed the echolocation sounds emitted by Mediterranean bottlenose dolphins. We extracted the click trains by visual inspection of the data files recorded along the coast of the Tuscany with the collaboration of the CETUS Research Center. We modeled the extracted sonar clicks as Gaussian or exponential multicomponent signals, we estimated the characteristic parameters and compared the data with the reconstructed signals based on the estimates. Results about the estimation and the data fitting are largely shown in the paper.
2015-09-30
Blainville’s beaked whales (Mesoplodon densirostris), known to be sensitive to sonar sound and therefore of high relevance to the US Navy, and sperm whale...this study were obtained from von Benda-Beckmann et al. (2010) for the beaked whale, and Zimmer (2011) for the sperm whale. 4 For background...Blainville’s beaked whales and sperm whales are commonly present. Analysis of the noise levels on the system indicated that the background noise was system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sullivan, T J; Chino, M; Ehrhardt, J
2003-09-01
This paper discusses a collaborative project whose purpose is (1) to demonstrate the technical feasibility and mutual benefit of a system seeking early review or preview, in a ''quasi peer review'' mode, of nuclear accident plume and dose assessment predictions by four major international nuclear accident emergency response systems before release of their calculations to their respective national authorities followed by (2) sharing these results with responsible international authorities. The extreme sensitivity of the general public to any nuclear accident information has been a strong motivation to seek peer review prior to public release. Another intended objective of this workmore » is (3) the development of an affordable/accessible system for distribution of prediction results to countries having no prediction capabilities and (4) utilization of the link for exercises and collaboration studies. The project exploits the Internet as a ubiquitous communications medium, browser technology as a simple, user friendly interface, and low-cost PC level hardware. The participants are developing a web based dedicated node with ID and password access control, where the four systems can deposit a minimal set of XML-based data and graphics files, which are then displayed in a common identical map format. Side-by-side viewing and televideo conferencing will permit rapid evaluation, correction or elaboration of data, recalculation (if necessary) and should produce a strong level of consensus to assist international decision makers. Successful completion of this work could lead to easy utilization by national and international organizations, such as the IAEA and WHO, as well as by non-nuclear states at risk of a trans-boundary incursion on their territory.« less
Pratt, Hillel; Polyakov, Andrey; Bleich, Naomi; Mittelman, Naomi
2004-07-01
To study effects of forward masking and rapid stimulation on human monaurally- and binaurally-evoked brainstem potentials and suggest their relation to synaptic fatigue and recovery and to neuronal action potential refractoriness. Auditory brainstem evoked potentials (ABEPs) were recorded from 12 normally- and symmetrically hearing adults, in response to each click (50 dB nHL, condensation and rarefaction) in a train of nine, with an inter-click interval of 11 ms, that followed a white noise burst of 100 ms duration (50 dB nHL). Sequences of white noise and click train were repeated at a rate of 2.89 s(-1). The interval between noise and first click in the train was 2, 11, 22, 44, 66 or 88 ms in different runs. ABEPs were averaged (8000 repetitions) using a dwell time of 25 micros/address/channel. The binaural interaction components (BICs) of ABEPs were derived and the single, centrally located equivalent dipoles of ABEP waves I and V and of the BIC major wave were estimated. The latencies of dipoles I and V of ABEP, their inter-dipole interval and the dipole magnitude of component V were significantly affected by the interval between noise and clicks and by the serial position of the click in the train. The latency and dipole magnitude of the major BIC component were significantly affected by the interval between noise and clicks. Interval from noise and the click's serial position in the train interacted to affect dipole V latency, dipole V magnitude, BIC latencies and the V-I inter-dipole latency difference. Most of the effects were fully apparent by the first few clicks in the train, and the trend (increase or decrease) was affected by the interval between noise and clicks. The changes in latency and magnitude of ABEP and BIC components with advancing position in the click train and the interactions of click position in the train with the intervals from noise indicate an interaction of fatigue and recovery, compatible with synaptic depletion and replenishing, respectively. With the 2 ms interval between noise and the first click in the train, neuronal action potential refractoriness may also be involved.
Functionalization of Mechanochemically Passivated Germanium Nanoparticles via "Click" Chemistry
NASA Astrophysics Data System (ADS)
Purkait, Tapas Kumar
Germanium nanoparticles (Ge NPs) may be fascinating for their electronic and optoelectronic properties, as the band gap of Ge NPs can be tuned from the infrared into the visible range of solar spectru. Further functionalization of those nanoparticles may potentially lead to numerous applications ranging from surface attachment, bioimaging, drug delivery and nanoparticles based devices. Blue luminescent germanium nanoparticles were synthesized from a novel top-down mechanochemical process using high energy ball milling (HEBM) of bulk germanium. Various reactive organic molecules (such as, alkynes, nitriles, azides) were used in this process to react with fresh surface and passivate the surface through Ge-C or Ge-N bond. Various purification process, such as gel permeation chromatography (GPC), Soxhlet dailysis etc. were introduced to purify nanoparticles from molecular impurities. A size separation technique was developed using GPC. The size separated Ge NPs were characterize by TEM, small angle X-ray scattering (SAXS), UV-vis absorption and photoluminescence (PL) emission spectroscopy to investigate their size selective properties. Germanium nanoparticles with alkyne termini group were prepared by HEBM of germanium with a mixture of n-alkynes and alpha, o-diynes. Additional functionalization of those nanoparticles was achieved by copper(I) catalyzed azide-alkyne "click" reaction. A variety of organic and organometallic azides including biologically important glucals have been reacted in this manner resulting in nanopartilces adorned with ferrocenyl, trimethylsilyl, and glucal groups. Additional functionalization of those nanoparticles was achieved by reactions with various azides via a Cu(I) catalyzed azide-alkyne "click" reaction. Various azides, including PEG derivatives and cylcodextrin moiety, were grafted to the initially formed surface. Globular nanoparticle arrays were formed through interparticle linking via "click" chemistry or "host-guest" chemistry. Copper(I) catalyzed "click" chemistry also can be explored with azido-terminated Ge NPs which were synthesized by azidation of chloro-terminated Ge NPs. Water soluble PEGylated Ge NPs were synthesized by "click" reaction for biological application. PEGylated Ge NP clusters were prepared using alpha, o-bis alkyno or bis-azido polyethylene glycol (PEG) derivatives by copper catalyzed "click" reaction via inter-particle linking. These nanoparticles were further functionalized by azido beta-cyclodextrin (beta-CD) and azido adamantane via alkyne-azide "click" reactions. Nanoparticle clusters were made from the functionalized Ge NPs by "host-guest" chemistry of beta-CD functionalized Ge NPs either with adamantane functionalized Ge NPs or fullerene, C60.
NASA Technical Reports Server (NTRS)
Walatka, Pamela P.; Clucas, Jean; McCabe, R. Kevin; Plessel, Todd; Potter, R.; Cooper, D. M. (Technical Monitor)
1994-01-01
The Flow Analysis Software Toolkit, FAST, is a software environment for visualizing data. FAST is a collection of separate programs (modules) that run simultaneously and allow the user to examine the results of numerical and experimental simulations. The user can load data files, perform calculations on the data, visualize the results of these calculations, construct scenes of 3D graphical objects, and plot, animate and record the scenes. Computational Fluid Dynamics (CFD) visualization is the primary intended use of FAST, but FAST can also assist in the analysis of other types of data. FAST combines the capabilities of such programs as PLOT3D, RIP, SURF, and GAS into one environment with modules that share data. Sharing data between modules eliminates the drudgery of transferring data between programs. All the modules in the FAST environment have a consistent, highly interactive graphical user interface. Most commands are entered by pointing and'clicking. The modular construction of FAST makes it flexible and extensible. The environment can be custom configured and new modules can be developed and added as needed. The following modules have been developed for FAST: VIEWER, FILE IO, CALCULATOR, SURFER, TOPOLOGY, PLOTTER, TITLER, TRACER, ARCGRAPH, GQ, SURFERU, SHOTET, and ISOLEVU. A utility is also included to make the inclusion of user defined modules in the FAST environment easy. The VIEWER module is the central control for the FAST environment. From VIEWER, the user can-change object attributes, interactively position objects in three-dimensional space, define and save scenes, create animations, spawn new FAST modules, add additional view windows, and save and execute command scripts. The FAST User Guide uses text and FAST MAPS (graphical representations of the entire user interface) to guide the user through the use of FAST. Chapters include: Maps, Overview, Tips, Getting Started Tutorial, a separate chapter for each module, file formats, and system administration.
Learning Clicks: Year End Report 2008/2009
ERIC Educational Resources Information Center
Alberta Advanced Education and Technology, 2009
2009-01-01
Learning Clicks was developed in 2003 as an interactive, fun way for Alberta students to learn about these opportunities. Learning Clicks is a program designed to support Strategy 2.4 in Alberta Advanced Education and Technology's 2007-10 Business Plan. The 2008/2009 season was the 5th year of the Learning Clicks program. This paper offers a…
Separation of Sperm Whale Click-Trains for Multipath Rejection and Localization
2010-03-05
Correlation 12 3.3 Multipath Elimination Rules 13 4 LOCALIZATION 15 4.1 Localization Approach 15 4.2 Inter-Sensor Time-Delay Estimation Approach...Using Bayes’ rule , kj = ’°g kj = >°g< P(H, P(H0 HJ) \\J) (2) />(//,)p(zJ//,) p(H0)p(z,JH0) where p(//o) and p(H\\) are the a priori probabilities...overlapping clicks.) 3.3 MULTIPATH ELIMINATION RULES Multipath click-trains are eliminated if the individual clicks within the click-train are
Insecure Behaviors on Mobile Devices Under Stress
2014-04-08
a text or in an email . The most secure network is only as secure as its most careless user. Thus, in the current project we sought to discover the...challenges in mobile security is human behavior. The most secure password may be useless if it is sent as a text or in an email . The most secure network...The most secure password may be useless if it is sent as a text or in an email . The most secure network is only as secure as its most careless user
The 60 Minute Network Security Guide (First Steps Towards a Secure Network Environment)
2001-10-16
default/ passwd file in UNIX. Administrators should obtain and run password-guessing programs (i.e., “John the Ripper,’’ “L0phtCrack,” and “Crack...system on which it is running, it is a good idea to transfer the encrypted passwords (the dumped SAM database for Windows and the /etc/ passwd and /etc...ownership by root and group sys. The /etc/ passwd file should have permissions 644 with owner root and group root. n Be cracked every month to find
Extension of the PC version of VEPFIT with input and output routines running under Windows
NASA Astrophysics Data System (ADS)
Schut, H.; van Veen, A.
1995-01-01
The fitting program VEPFIT has been extended with applications running under the Microsoft-Windows environment facilitating the input and output of the VEPFIT fitting module. We have exploited the Microsoft-Windows graphical users interface by making use of dialog windows, scrollbars, command buttons, etc. The user communicates with the program simply by clicking and dragging with the mouse pointing device. Keyboard actions are limited to a minimum. Upon changing one or more input parameters the results of the modeling of the S-parameter and Ps fractions versus positron implantation energy are updated and displayed. This action can be considered as the first step in the fitting procedure upon which the user can decide to further adapt the input parameters or to forward these parameters as initial values to the fitting routine. The modeling step has proven to be helpful for designing positron beam experiments.
shinyCircos: an R/Shiny application for interactive creation of Circos plot.
Yu, Yiming; Ouyang, Yidan; Yao, Wen
2018-04-01
Creation of Circos plot is one of the most efficient approaches to visualize genomic data. However, the installation and use of existing tools to make Circos plot are challenging for users lacking of coding experiences. To address this issue, we developed an R/Shiny application shinyCircos, a graphical user interface for interactive creation of Circos plot. shinyCircos can be easily installed either on computers for personal use or on local or public servers to provide online use to the community. Furthermore, various types of Circos plots could be easily generated and decorated with simple mouse-click. shinyCircos and its manual are freely available at https://github.com/venyao/shinyCircos. shinyCircos is deployed at https://yimingyu.shinyapps.io/shinycircos/ and http://shinycircos.ncpgr.cn/ for online use. diana1983941@mail.hzau.edu.cn or yaowen@henau.edu.cn.
Method and System For an Automated Tool for En Route Traffic Controllers
NASA Technical Reports Server (NTRS)
Erzberger, Heinz (Inventor); McNally, B. David (Inventor)
2001-01-01
A method and system for a new automation tool for en route air traffic controllers first finds all aircraft flying on inefficient routes, then determines whether it is possible to save time by bypassing some route segments, and finally whether the improved route is free of conflicts with other aircraft. The method displays all direct-to eligible aircraft to an air traffic controller in a list sorted by highest time savings. By allowing the air traffic controller to easily identify and work with the highest pay-off aircraft, the method of the present invention contributes to a significant increase in both air traffic controller and aircraft productivity. A graphical computer interface (GUI) is used to enable the air traffic controller to send the aircraft direct to a waypoint or fix closer to the destination airport by a simple point and click action.
Method and system for an automated tool for en route traffic controllers
NASA Technical Reports Server (NTRS)
Erzberger, Heinz (Inventor); McNally, B. David (Inventor)
2001-01-01
A method and system for a new automation tool for en route air traffic controllers first finds all aircraft flying on inefficient routes, then determines whether it is possible to save time by bypassing some route segments, and finally whether the improved route is free of conflicts with other aircraft. The method displays all direct-to eligible aircraft to an air traffic controller in a list sorted by highest time savings. By allowing the air traffic controller to easily identify and work with the highest pay-off aircraft, the method of the present invention contributes to a significant increase in both air traffic controller and aircraft productivity. A graphical computer interface (GUI) is used to enable the air traffic controller to send the aircraft direct to a waypoint or fix closer to the destination airport by a simple point and click action.
Shah, Peer Azmat; Hasbullah, Halabi B.; Lawal, Ibrahim A.; Aminu Mu'azu, Abubakar; Tang Jung, Low
2014-01-01
Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO). PMID:24688398
Li, Chun-Ta; Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming
2017-06-23
In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.
A Web-Based Development Environment for Collaborative Data Analysis
NASA Astrophysics Data System (ADS)
Erdmann, M.; Fischer, R.; Glaser, C.; Klingebiel, D.; Komm, M.; Müller, G.; Rieger, M.; Steggemann, J.; Urban, M.; Winchen, T.
2014-06-01
Visual Physics Analysis (VISPA) is a web-based development environment addressing high energy and astroparticle physics. It covers the entire analysis spectrum from the design and validation phase to the execution of analyses and the visualization of results. VISPA provides a graphical steering of the analysis flow, which consists of self-written, re-usable Python and C++ modules for more demanding tasks. All common operating systems are supported since a standard internet browser is the only software requirement for users. Even access via mobile and touch-compatible devices is possible. In this contribution, we present the most recent developments of our web application concerning technical, state-of-the-art approaches as well as practical experiences. One of the key features is the use of workspaces, i.e. user-configurable connections to remote machines supplying resources and local file access. Thereby, workspaces enable the management of data, computing resources (e.g. remote clusters or computing grids), and additional software either centralized or individually. We further report on the results of an application with more than 100 third-year students using VISPA for their regular particle physics exercises during the winter term 2012/13. Besides the ambition to support and simplify the development cycle of physics analyses, new use cases such as fast, location-independent status queries, the validation of results, and the ability to share analyses within worldwide collaborations with a single click become conceivable.
NASA Astrophysics Data System (ADS)
Looney, Craig W.
2009-10-01
Wolfram|Alpha (http://www.wolframalpha.com/), a free internet-based mathematical engine released earlier this year, represents an orders-of magnitude advance in mathematical power freely available - without money, passwords, or downloads - on the web. Wolfram|Alpha is based on Mathematica, so it can plot functions, take derivatives, solve systems of equations, perform symbolic and numerical integration, and more. These capabilities (especially plotting and integration) will be explored in the context of topics covered in upper level undergraduate physics courses.
Zheng, Yun; Zhao, Lihua; Ma, Zhanfang
2018-05-15
Sensitivity amplification strategy by implementing click chemistry in the construction of biosensing interface can efficiently improve the performance of immunosensor. Herein, we developed a sandwich-type amperometric immunosensor for ultrasensitive detection of carbohydrate antigen 24-2 (CA 242) based on pH responsive label-assisted click chemistry triggered sensitivity amplification strategy. The sensitivity of amperometric immunosensor relies on the current response differences (ΔI) caused by per unit concentration target analyte. The pH responsive Cu 2+ -loaded polydopamine (CuPDA) particles conjugated with detection antibodies were employed as labels, which can release Cu(II) ions by regulating pH. In the presence of ascorbic acid (reductant), Cu(II) ions were reduced to Cu(I) ions. Azide-functionalized double-stranded DNA (dsDNA) as signal enhancer was immobilized on the substrate through Cu + -catalyzed azide/alkyne cycloaddition reaction. With the help of the click reaction, the ΔI caused by target was elevated prominently, resulting in sensitivity amplification of the immunosensor. Under optimal condition, the proposed immunosensor exhibited excellent performance with linear range from 0.0001 to 100 U mL -1 and ultralow detection limit of 20.74 μU mL -1 . This work successfully combines click chemistry with pH-responsive labels in sandwich-type amperometric immunosensor, providing a promising sensitivity amplification strategy to construct immunosensing platform for analysis of other tumor marker. Copyright © 2018 Elsevier B.V. All rights reserved.
Li, Zhiquan; Zou, Xiucheng; Zhu, Guigang; Liu, Xiaoya; Liu, Ren
2018-05-09
Developing efficient unimolecular visible light-emitting diode (LED) light photoinitiators (PIs) with photobleaching capability, which are essential for various biomedical applications and photopolymerization of thick materials, remains a great challenge. Herein, we demonstrate the synthesis of a series of novel PIs, containing coumarin moieties as chromophores and oxime ester groups as initiation functionalities and explore their structure-activity relationship. The investigated oxime esters can effectively induce acrylates and thiol-based click photopolymerization under 450 nm visible LED light irradiation. The initiator O-3 exhibited excellent photobleaching capability and enabled photopolymerization of thick materials (∼4.8 mm). The efficient unimolecular photobleachable initiators show great potential in dental materials and 3D printings.
In situ click chemistry: from small molecule discovery to synthetic antibodies
Agnew, Heather D.; Lai, Bert; Lee, Su Seong; Lim, Jaehong; Nag, Arundhati; Pitram, Suresh; Rohde, Rosemary; Heath, James R.
2013-01-01
Advances in the fields of proteomics, molecular imaging, and therapeutics are closely linked to the availability of affinity reagents that selectively recognize their biological targets. Here we present a review of Iterative Peptide In Situ Click Chemistry (IPISC), a novel screening technology for designing peptide multiligands with high affinity and specificity. This technology builds upon in situ click chemistry, a kinetic target-guided synthesis approach where the protein target catalyzes the conjugation of two small molecules, typically through the azide–alkyne Huisgen cycloaddition. Integrating this methodology with solid phase peptide libraries enables the assembly of linear and branched peptide multiligands we refer to as Protein Catalyzed Capture Agents (PCC Agents). The resulting structures can be thought of as analogous to the antigen recognition site of antibodies and serve as antibody replacements in biochemical and cell-based applications. In this review, we discuss the recent progress in ligand design through IPISC and related approaches, focusing on the improvements in affinity and specificity as multiligands are assembled by target-catalyzed peptide conjugation. We compare the IPISC process to small molecule in situ click chemistry with particular emphasis on the advantages and technical challenges of constructing antibody-like PCC Agents. PMID:22836343
Yang, Xi; Wang, Shanshan; Ghiviriga, Ion; ...
2015-05-19
A novel synthetic method to create gold based metallo–oligomers/polymers via the combination of inorganic click (iClick) with intermolecular aurophilic interactions is demonstrated. Complexes [PEt 3Au] 4(μ-N 3C 2C 6H 5) (1) and [PPhMe 2Au] 43C 2C 6H 5) (2) and {[PEt 3Au] 4[(μ-N 3C 2) 2-9,9-dihexyl-9H-fluorene]} n (8) have been synthesized via iClick. The tetranuclear structures of 1 and 2, induced by aurophilic bonding, are confirmed in the solid state through single crystal X-ray diffraction experiments and in solution via variable temperature NMR spectroscopy. The extended 1D structure of 8 is constructed by aurophilic induced self-assembly. 1H DOSY NMR analysismore » reveals that the aurophilic bonds in 1, 2, and 8 are retained in the solution phase. The degree of polymerization within complex 8 is temperature and concentration dependent, as determined by 1H DOSY NMR. The complex 8 is a rare example of a solution stable higher ordered structure linked by aurophilic interactions.« less
A comparison of muscular activity during single and double mouse clicks.
Thorn, Stefan; Forsman, Mikael; Hallbeck, Susan
2005-05-01
Work-related musculoskeletal disorders (WMSDs) in the neck/shoulder region and the upper extremities are a common problem among computer workers. Occurrences of motor unit (MU) double discharges with very short inter-firing intervals (doublets) have been hypothesised as a potential additional risk for overuse of already exhausted fibres during long-term stereotyped activity. Doublets are reported to be present during double-click mouse work tasks. A few comparative studies have been carried out on overall muscle activities for short-term tasks with single types of actions, but none on occurrences of doublets during double versus single clicks. The main purpose of this study was to compare muscle activity levels of single and double mouse clicks during a long-term combined mouse/keyboard work task. Four muscles were studied: left and right upper trapezius, right extensor digitorum communis (EDC) and right flexor carpi ulnaris. Additionally, MU activity was analysed through intramuscular electromyography in the EDC muscle for a selection of subjects. The results indicate that double clicking produces neither higher median or 90th percentile levels in the trapezius and EDC muscles, nor a higher disposition for MU doublets, than does single clicking. Especially for the 90th percentile levels, the indications are rather the opposite (in the EDC significantly higher during single clicks in 8 of 11 subjects, P < 0.05). Although it cannot be concluded from the present study that double clicks are harmless, there were no signs that double clicks during computer work generally constitute a larger risk factor for WMSDs than do single clicks.
Nebbioso, Antonio; Piccolo, Alessandro
2015-11-01
A click reaction is reported here for the first time as a useful technique to control the conformational stability of natural organic matter (NOM) suprastructures. Click conjugates were successfully formed between a previously butynylated NOM hydrophobic fraction and a hydrophilic polyethylene glycol (PEG)-amino chain. The click products were shown by size exclusion chromatography (HPSEC) hyphenated with Orbitrap mass spectrometry (MS) in electrospray ionization (ESI) (+), while precursors were visible in ESI (-). Despite their increase in molecular weight, HPSEC elution of click conjugates occurred after that of precursors, thus showing their departure from the NOM supramolecular association. This indicates that the click-conjugated NOM molecules were varied in their hydrophilic and cationic character and lost the capacity to accommodate in the original hydrophobic suprastructures. The most abundant product had the C16H30O5N4 formula, a click conjugate of butanoic acid, while other products were short-chained (C4-C8) linear unsaturated and hydroxylated carboxylic acids. Tandem MS revealed formation of triazole rings in clicked conjugates and their two fragmentations at the ester and the C-N alkyl-aryl bonds. The behavior of NOM molecules modified by click chemistry confirms that hydrophobicity and ionic charge of humic molecules play a pivotal role in stabilizing intermolecular forces in NOM. Moreover, the versatility of the click reaction may become useful to decorate NOM molecules with a variety of substrates, in order to alter NOM conformational and chemical properties and diversify its applications in the environment.
Genesis of the Mechanical Heart Valves' Ultrasonic Closing Clicks
NASA Astrophysics Data System (ADS)
Hasegawa, Jun; Kobayashi, Kenji
A new in vitro experimental tool was developed to study the mechanism of the ultrasonic closing clicks' genesis of mechanical heart valves. Since the newly developed tester adopted compressed air flow directly instead of the blood analog fluid to drive the mechanical heart valve, it is not possibe to generate any cavitation. Closing clicks were measured with a small accelerometer at the surface of the valve holder made of silicone rubber. Ultrasonic closing clicks as well as audible closing clicks, similar to those measured clinically, could be observed using this setup. Thus, it was confirmed that the ultrasonic closing clicks can be generated without the existence of cavitation. Simultaneous measurements of the valve motion were made with a high-speed video camera, and the analysis of the video frames and clicks showed that higher frequency signal components of more than 50kHz could be generated only at the instant of the closure, which means the collision of the occluder with the housing. Eighteen miniature accelerometers with an area of one square millimeter were developed and stuck on the housing to monitor the distribution of the housing vibrations in detail, and it was found that the vibrations correspond to the ultrasonic closing clicks propagated from the valve stop: the collision point of the occluder with the housing. This fact indicated that the generation of ultrasonic closing clicks are limited to the small area of the collision. From those results, it was concluded that the major origin of the ultrasonic closing clicks' genesis should be the collision of the occluder with the housing.
Guo, Jinshan; Kim, Gloria B.; Shan, Dingying; Kim, Jimin P.; Hu, Jianqing; Wang, Wei; Hamad, Fawzi G.; Qian, Guoying; Rizk, Elias B.; Yang, Jian
2016-01-01
For the first time, a convenient copper-catalyzed azide-alkyne cycloaddition (CuAAC, click chemistry) was successfully introduced into injectable citrate-based mussel-inspired bioadhesives (iCMBAs, iCs) to improve both cohesive and wet adhesive strengths and elongate the degradation time, providing numerous advantages in surgical applications. The major challenge to developing such an adhesive was the mutual inhibition effect between the oxidant used for crosslinking catechol groups and the Cu(II) reductant used for CuAAC, which was successfully minimized by adding a biocompatible buffering agent typically used in cell culture, 4-(2-hydroxyethyl) -1-piperazineethanesulfonic acid (HEPES), as a copper chelating agent. Among the investigated formulations, the highest adhesion strength achieved (223.11 ± 15.94 kPa) was around 13 times higher than that of a commercially available fibrin glue (15.4 ± 2.8 kPa). In addition, dual-crosslinked (i.e. click crosslinking and mussel-inspired crosslinking) iCMBAs still preserved considerable antibacterial and antifungal capabilities that are beneficial for the bioadhesives used as hemostatic adhesives or sealants for wound management. PMID:27770631
Assembly of a biocompatible triazole-linked gene by one-pot click-DNA ligation
NASA Astrophysics Data System (ADS)
Kukwikila, Mikiembo; Gale, Nittaya; El-Sagheer, Afaf H.; Brown, Tom; Tavassoli, Ali
2017-11-01
The chemical synthesis of oligonucleotides and their enzyme-mediated assembly into genes and genomes has significantly advanced multiple scientific disciplines. However, these approaches are not without their shortcomings; enzymatic amplification and ligation of oligonucleotides into genes and genomes makes automation challenging, and site-specific incorporation of epigenetic information and/or modified bases into large constructs is not feasible. Here we present a fully chemical one-pot method for the assembly of oligonucleotides into a gene by click-DNA ligation. We synthesize the 335 base-pair gene that encodes the green fluorescent protein iLOV from ten functionalized oligonucleotides that contain 5ʹ-azide and 3ʹ-alkyne units. The resulting click-linked iLOV gene contains eight triazoles at the sites of chemical ligation, and yet is fully biocompatible; it is replicated by DNA polymerases in vitro and encodes a functional iLOV protein in Escherichia coli. We demonstrate the power and potential of our one-pot gene-assembly method by preparing an epigenetically modified variant of the iLOV gene.
The Click and Twitch in Contemporary Poetry.
ERIC Educational Resources Information Center
Meredith, Bernard
It is the creative writing instructor's role to help the student turn "twitch" poems into "click" poems ("twitch" being a kind of verbal hypertension that takes shape in the absence of anything humanly important to say on the poet's part and "click" being the finished poem that makes a sound like the click of the lid on a perfectly made box).…
Dolphin "packet" use during long-range echolocation tasks.
Finneran, James J
2013-03-01
When echolocating, dolphins typically emit a single broadband "click," then wait to receive the echo before emitting another click. However, previous studies have shown that during long-range echolocation tasks, they may instead emit a burst, or "packet," of several clicks, then wait for the packet of echoes to return before emitting another packet of clicks. The reasons for the use of packets are unknown. In this study, packet use was examined by having trained bottlenose dolphins perform long-range echolocation tasks. The tasks featured "phantom" echoes produced by capturing the dolphin's outgoing echolocation clicks, convolving the clicks with an impulse response to create an echo waveform, and then broadcasting the delayed, scaled echo to the dolphin. Dolphins were trained to report the presence of phantom echoes or a change in phantom echoes. Target range varied from 25 to 800 m. At ranges below 75 m, the dolphins rarely used packets. As the range increased beyond 75 m, two of the three dolphins increasingly produced packets, while the third dolphin instead utilized very high click repetition rates. The use of click packets appeared to be governed more by echo delay (target range) than echo amplitude.
Supin, Alexander Ya; Nachtigall, Paul E; Breese, Marlee
2010-06-01
Evidence of varying hearing sensitivity according to the target distance was obtained in a false killer whale Pseudorca crassidens during echolocation. Auditory evoked potentials (AEPs) triggered by echolocation clicks were recorded. The target distance varied from 1 to 6 m. The records contained AEPs to the self-heard emitted click and AEPs to the echoes. Mean level of echolocation clicks depended on distance (the longer the distance, the higher the click level), however, the effect of click level on AEP amplitude was eliminated by extracting AEPs to clicks of certain particular levels. The amplitude of the echo-provoked AEP was almost independent of distance, however, the amplitude of the AEP to the emitted click, did depend on distance within a range from 1 to 4 m: the longer the distance, the higher the amplitude. The latter result is interpreted as confirmational evidence that the animal is capable of varying hearing sensitivity according to target distance. The variation of hearing sensitivity may help to compensate for the echo attenuation with distance; as a secondary effect, this variation manifested itself in a variation of the amplitude of the AEP to emitted clicks.
Non-auditory, electrophysiological potentials preceding dolphin biosonar click production.
Finneran, James J; Mulsow, Jason; Jones, Ryan; Houser, Dorian S; Accomando, Alyssa W; Ridgway, Sam H
2018-03-01
The auditory brainstem response to a dolphin's own emitted biosonar click can be measured by averaging epochs of the instantaneous electroencephalogram (EEG) that are time-locked to the emitted click. In this study, averaged EEGs were measured using surface electrodes placed on the head in six different configurations while dolphins performed an echolocation task. Simultaneously, biosonar click emissions were measured using contact hydrophones on the melon and a hydrophone in the farfield. The averaged EEGs revealed an electrophysiological potential (the pre-auditory wave, PAW) that preceded the production of each biosonar click. The largest PAW amplitudes occurred with the non-inverting electrode just right of the midline-the apparent side of biosonar click generation-and posterior of the blowhole. Although the source of the PAW is unknown, the temporal and spatial properties rule out an auditory source. The PAW may be a neural or myogenic potential associated with click production; however, it is not known if muscles within the dolphin nasal system can be actuated at the high rates reported for dolphin click production, or if sufficiently coordinated and fast motor endplates of nasal muscles exist to produce a PAW detectable with surface electrodes.
Recording and quantification of ultrasonic echolocation clicks from free-ranging toothed whales
NASA Astrophysics Data System (ADS)
Madsen, P. T.; Wahlberg, M.
2007-08-01
Toothed whales produce short, ultrasonic clicks of high directionality and source level to probe their environment acoustically. This process, termed echolocation, is to a large part governed by the properties of the emitted clicks. Therefore derivation of click source parameters from free-ranging animals is of increasing importance to understand both how toothed whales use echolocation in the wild and how they may be monitored acoustically. This paper addresses how source parameters can be derived from free-ranging toothed whales in the wild using calibrated multi-hydrophone arrays and digital recorders. We outline the properties required of hydrophones, amplifiers and analog to digital converters, and discuss the problems of recording echolocation clicks on the axis of a directional sound beam. For accurate localization the hydrophone array apertures must be adapted and scaled to the behavior of, and the range to, the clicking animal, and precise information on hydrophone locations is critical. We provide examples of localization routines and outline sources of error that lead to uncertainties in localizing clicking animals in time and space. Furthermore we explore approaches to time series analysis of discrete versions of toothed whale clicks that are meaningful in a biosonar context.
Spectrogram analysis of low to mid frequency marine mammal clicks
NASA Astrophysics Data System (ADS)
Ioup, George E.; Ioup, Juliette W.; Larue, James P.; Sidorovskaia, Natalia A.; Kuczaj, Stan A.; Rayborn, Grayson H.; Walker, Christopher D.
2004-05-01
Previous investigators have proposed explanations for some sperm whale click structure and pointed out that the separation of individual pulses within the click might be used to determine approximately the size of the sperm whales. Recently, Mohl et al. [J. Acoust. Soc. Am. 114, 1124-1154 (2003)] have shown that echo-location click structure is highly dependent on the received angle. In data measured by the Littoral Acoustic Demonstration Center using bottom-moored hydrophones in the northern Gulf of Mexico in the summers of 2001 and 2002, rich click structures were observed in the spectrograms of many click trains, some of which exhibit strikingly consistent spectral nulls across the train. Although this structure in the spectra could be due to propagation effects, investigations to date suggest this possibility is highly unlikely, as discussed in the next abstract. Therefore it is at least plausible that the structure could be used to identify individual animals. This is known to be a difficult problem in the case of sperm whales because of the angle dependence of at least some of their clicks. These difficulties are discussed, as is the possible use of the spectrograms of the clicks to identify individuals. [Research supported by ONR.
Engineering graphics data entry for space station data base
NASA Technical Reports Server (NTRS)
Lacovara, R. C.
1986-01-01
The entry of graphical engineering data into the Space Station Data Base was examined. Discussed were: representation of graphics objects; representation of connectivity data; graphics capture hardware; graphics display hardware; site-wide distribution of graphics, and consolidation of tools and hardware. A fundamental assumption was that existing equipment such as IBM based graphics capture software and VAX networked facilities would be exploited. Defensible conclusions reached after study and simulations of use of these systems at the engineering level are: (1) existing IBM based graphics capture software is an adequate and economical means of entry of schematic and block diagram data for present and anticipated electronic systems for Space Station; (2) connectivity data from the aforementioned system may be incorporated into the envisioned Space Station Data Base with modest effort; (3) graphics and connectivity data captured on the IBM based system may be exported to the VAX network in a simple and direct fashion; (4) graphics data may be displayed site-wide on VT-125 terminals and lookalikes; (5) graphics hard-copy may be produced site-wide on various dot-matrix printers; and (6) the system may provide integrated engineering services at both the engineering and engineering management level.
Unconditional security from noisy quantum storage
NASA Astrophysics Data System (ADS)
Wehner, Stephanie
2010-03-01
We consider the implementation of two-party cryptographic primitives based on the sole physical assumption that no large-scale reliable quantum storage is available to the cheating party. An important example of such a task is secure identification. Here, Alice wants to identify herself to Bob (possibly an ATM machine) without revealing her password. More generally, Alice and Bob wish to solve problems where Alice holds an input x (e.g. her password), and Bob holds an input y (e.g. the password an honest Alice should possess), and they want to obtain the value of some function f(x,y) (e.g. the equality function). Security means that the legitimate users should not learn anything beyond this specification. That is, Alice should not learn anything about y and Bob should not learn anything about x, other than what they may be able to infer from the value of f(x,y). We show that any such problem can be solved securely in the noisy-storage model by constructing protocols for bit commitment and oblivious transfer, where we prove security against the most general attack. Our protocols can be implemented with present-day hardware used for quantum key distribution. In particular, no quantum storage is required for the honest parties. Our work raises a large number of immediate theoretical as well as experimental questions related to many aspects of quantum information science, such as for example understanding the information carrying properties of quantum channels and memories, randomness extraction, min-entropy sampling, as well as constructing small handheld devices which are suitable for the task of secure identification. [4pt] Full version available at arXiv:0906.1030 (theoretical) and arXiv:0911.2302 (practically oriented).
Lin, Hui; Ou, Junjie; Liu, Zhongshan; Wang, Hongwei; Dong, Jing; Zou, Hanfa
2015-01-30
A facile approach based on thiol-methacrylate Michael addition click reaction was developed for construction of porous hybrid monolithic materials. Three hybrid monoliths were prepared via thiol-methacrylate click polymerization by using methacrylate-polyhedral oligomeric silsesquioxane (POSS) (cage mixture, n=8, 10, 12, POSS-MA) and three multi-thiol crosslinkers, 1,6-hexanedithiol (HDT), trimethylolpropane tris(3-mercaptopropionate) (TPTM) and pentaerythritol tetrakis(3-mercaptopropionate) (PTM), respectively, in the presence of porogenic solvents (n-propanol and PEG 200) and a catalyst (dimethylphenylphosphine, DMPP). The obtained monoliths possessed high thermal and chemical stabilities. Besides, they all exhibited high column efficiencies and excellent separation abilities in capillary liquid chromatography (cLC). The highest column efficiency could reach ca. 195,000N/m for butylbenzene on the monolith prepared with POSS-MA and TPTM (monolith POSS-TPTM) in reversed-phase (RP) mode at 0.64mm/s. Good chromatographic performance were all achieved in the separations of polycyclic aromatic hydrocarbons (PAHs), phenols, anilines, EPA 610 as well as bovine serum albumin (BSA) digest. The high column efficiencies in the range of 51,400-117,000N/m (achieved on the monolith POSS-PTM in RP mode) convincingly demonstrated the high separation abilities of these thiol-methacrylate based hybrid monoliths. All the results demonstrated the feasibility of the phosphines catalyzed thiol-methacrylate Michael addition click reaction in fabrication of monolithic columns with high efficiency for cLC applications. Copyright © 2014 Elsevier B.V. All rights reserved.
Bottorff, Shalina C; Kasten, Benjamin B; Stojakovic, Jelena; Moore, Adam L; MacGillivray, Leonard R; Benny, Paul D
2014-02-17
Isoxazole ring formation was examined as a potential Cu-free alternative click reaction to Cu(I)-catalyzed alkyne/azide cycloaddition. The isoxazole reaction was explored at macroscopic and radiotracer concentrations with the fac-[M(I)(CO)3](+) (M = Re, (99m)Tc) core for use as a noncoordinating linker strategy between covalently linked molecules. Two click assembly methods (click, then chelate and chelate, then click) were examined to determine the feasibility of isoxazole ring formation with either alkyne-functionalized tridentate chelates or their respective fac-[M(I)(CO)3](+) complexes with a model nitrile oxide generator. Macroscale experiments, alkyne-functionalized chelates, or Re complexes indicate facile formation of the isoxazole ring. (99m)Tc experiments demonstrate efficient radiolabeling with click, then chelate; however, the chelate, then click approach led to faster product formation, but lower yields compared to the Re analogues.
Low-Cost Avoidance Behaviors are Resistant to Fear Extinction in Humans
Vervliet, Bram; Indekeu, Ellen
2015-01-01
Elevated levels of fear and avoidance are core symptoms across the anxiety disorders. It has long been known that fear serves to motivate avoidance. Consequently, fear extinction has been the primary focus in pre-clinical anxiety research for decades, under the implicit assumption that removing the motivator of avoidance (fear) would automatically mitigate the avoidance behaviors as well. Although this assumption has intuitive appeal, it has received little scientific scrutiny. The scarce evidence from animal studies is mixed, while the assumption remains untested in humans. The current study applied an avoidance conditioning protocol in humans to investigate the effects of fear extinction on the persistence of low-cost avoidance. Online danger-safety ratings and skin conductance responses documented the dynamics of conditioned fear across avoidance and extinction phases. Anxiety- and avoidance-related questionnaires explored individual differences in rates of avoidance. Participants first learned to click a button during a predictive danger signal, in order to cancel an upcoming aversive electrical shock (avoidance conditioning). Next, fear extinction was induced by presenting the signal in the absence of shocks while button-clicks were prevented (by removing the button in Experiment 1, or by instructing not to click the button in Experiment 2). Most importantly, post-extinction availability of the button caused a significant return of avoidant button-clicks. In addition, trait-anxiety levels correlated positively with rates of avoidance during a predictive safety signal, and with the rate of pre- to post-extinction decrease during this signal. Fear measures gradually decreased during avoidance conditioning, as participants learned that button-clicks effectively canceled the shock. Preventing button-clicks elicited a sharp increase in fear, which subsequently extinguished. Fear remained low during avoidance testing, but danger-safety ratings increased again when button-clicks were subsequently prevented. Together, these results show that low-cost avoidance behaviors can persist following fear extinction and induce increased threat appraisal. On the other hand, fear extinction did reduce augmented rates of unnecessary avoidance during safety in trait-anxious individuals, and instruction-based response prevention was more effective than removal of response cues. More research is needed to characterize the conditions under which fear extinction might mitigate avoidance. PMID:26733837
Ranak, M S A Noman; Azad, Saiful; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z
2017-01-01
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)-a.k.a., Force Touch in Apple's MacBook, Apple Watch, ZTE's Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on-is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme.
Ranak, M. S. A. Noman; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z.
2017-01-01
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)—a.k.a., Force Touch in Apple’s MacBook, Apple Watch, ZTE’s Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on—is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme. PMID:29084262
Electronic Patient Data Confidentiality Practices Among Surgical Trainees: Questionnaire Study
Mole, Damian J; Fox, Colin; Napolitano, Giulio
2006-01-01
INTRODUCTION The objective of this work was to evaluate the safeguards implemented by surgical trainees to protect the confidentiality of electronic patient data through a structured questionnaire sent to Northern Ireland surgical trainees. PARTICIPANTS AND METHODS A group of 32 basic and higher surgical trainees attending a meeting of the Northern Ireland Association of Surgeons-in-Training were invited to complete a questionnaire regarding their computer use, UK Data Protection Act, 1988 registration and electronic data confidentiality practices. RESULTS Of these 32 trainees, 29 returned completed questionnaires of whom 26 trainees regularly stored sensitive patient data for audit or research purposes on a computer. Only one person was registered under the Data Protection Act, 1988. Of the computers used to store and analyse sensitive data, only 3 of 14 desktops, 8 of 19 laptops and 3 of 14 hand-held computers forced a password logon. Of the 29 trainees, 16 used the same password for all machines, and 25 of 27 passwords were less than 8 characters long. Two respondents declined to reveal details of their secure passwords. Half of all trainees had never adjusted their internet security settings, despite all 14 desktops, 16 of 19 laptops and 5 of 14 hand-helds being routinely connected to the internet. Of the 29 trainees, 28 never encrypted their sensitive data files. Ten trainees had sent unencrypted sensitive patient data over the internet, using a non-secure server. CONCLUSIONS Electronic data confidentiality practices amongst Northern Ireland surgical trainees are unsafe. Simple practical measures to safeguard confidentiality are recommended. PMID:17059715
Qi, Yan; Qiu, Liying; Fan, Wenjiao; Liu, Chenghui; Li, Zhengping
2017-08-07
A versatile flow cytometric bead assay (FCBA) coupled with a completely enzyme-free signal amplification mechanism is developed for the sensitive detection of microRNAs (miRNAs). This new strategy integrates click chemistry-mediated ligation chain reaction (CLCR) with hybridization chain reaction (HCR) for enzyme-free signal amplification on magnetic beads (MBs), and a flow cytometer for the robust fluorescence readout of the MBs. Firstly, target miRNA can initiate CLCR on the surface of MBs based on the click chemical ligation between dibenzocyclooctyne (DBCO)- and azide-modified single-stranded DNA (ssDNA) probes, and the amount of ligated ssDNA sequences on the MBs will be proportional to the dosage of target miRNA. Afterward, each of the ligated ssDNA products can trigger a cascade chain reaction of hybridization events between two alternating fluorophore-tagged hairpin probes, resulting in another signal amplification pathway with an amplified accumulation of fluorophores on the MBs. Finally, the fluorophore-anchored MBs are directly and rapidly analyzed by using a flow cytometer without any separation or elution processes. Herein, the click nucleic acid ligation only occurs on the surface of MBs, so the nonspecific ligations are greatly inhibited compared with that of ligation reaction performed in homogeneous solution. Furthermore, the signal amplification by CLCR-HCR is highly efficient but totally enzyme-free, which may overcome the potential drawbacks of conventional enzyme-catalyzed signal amplification protocols and lead to a high sensitivity. The CLCR-HCR-based FCBA has pushed the detection limit of let-7a miRNA down to the femtomolar (fM) level, showing great potential in miRNA-related biological studies and disease diagnosis.
RUASN: a robust user authentication framework for wireless sensor networks.
Kumar, Pardeep; Choudhury, Amlan Jyoti; Sain, Mangal; Lee, Sang-Gon; Lee, Hoon-Jae
2011-01-01
In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.
Early Restoration Projects Atlas | NOAA Gulf Spill Restoration
trustees are implementing. To view details of an individual project, click the View icon on the list below or click the project marker on the map. For definitions of the project detail click here. To highlight the location of a project from the list, click the Show on Map icon. This atlas will be updated as
Histone Deacetylase Inhibitors through Click Chemistry
Shen, Jie; Woodward, Robert; Kedenburg, James Patrick; Liu, Xianwei; Chen, Min; Fang, Lanyan; Sun, Duxin; Wang, Peng George
2012-01-01
Histone deacetylase inhibitors (HDACi) are a relatively new class of chemotherapy agents. Herein, we report a click-chemistry based approach to the synthesis of HDACi. Fourteen agents were synthesized from the combination of two alkyne and seven azido precursors. The inhibition of HDAC1 and HDAC8 was then determined by in vitro enzymatic assays, after which the cytotoxicity was evaluated in the NCI human cancer cell line screen. A lead compound 5g (NSC746457) was discovered that inhibited HDAC1 at an IC50 value of 104 ± 30 nM and proved quite potent in the cancer cell line screen with GI50 values ranging from 3.92 μM to 10 nM. Thus, this click HDACi design has provided a new chemical scaffold that has not only revealed a lead compound, but one which is easily amendable to further structural modifications given the modular nature of this approach. PMID:19007204
Gu, Yuhua; Kumar, Virendra; Hall, Lawrence O; Goldgof, Dmitry B; Li, Ching-Yen; Korn, René; Bendtsen, Claus; Velazquez, Emmanuel Rios; Dekker, Andre; Aerts, Hugo; Lambin, Philippe; Li, Xiuli; Tian, Jie; Gatenby, Robert A; Gillies, Robert J
2012-01-01
A single click ensemble segmentation (SCES) approach based on an existing “Click&Grow” algorithm is presented. The SCES approach requires only one operator selected seed point as compared with multiple operator inputs, which are typically needed. This facilitates processing large numbers of cases. Evaluation on a set of 129 CT lung tumor images using a similarity index (SI) was done. The average SI is above 93% using 20 different start seeds, showing stability. The average SI for 2 different readers was 79.53%. We then compared the SCES algorithm with the two readers, the level set algorithm and the skeleton graph cut algorithm obtaining an average SI of 78.29%, 77.72%, 63.77% and 63.76% respectively. We can conclude that the newly developed automatic lung lesion segmentation algorithm is stable, accurate and automated. PMID:23459617
Chang, Limin; Li, Ying; Chu, Jia; Qi, Jingyao; Li, Xin
2010-11-08
In this paper, we demonstrated an efficient and robust route to the preparation of well-defined molecularly imprinted polymer based on reversible addition-fragmentation chain transfer (RAFT) polymerization and click chemistry. The alkyne terminated RAFT chain transfer agent was first synthesized, and then click reaction was used to graft RAFT agent onto the surface of silica particles which was modified by azide. Finally, imprinted thin film was prepared in the presence of 2,4-dichlorophenol as the template. The imprinted beads were demonstrated with a homogeneous polymer films (thickness of about 2.27 nm), and exhibited thermal stability under 255°C. The as-synthesized product showed obvious molecular imprinting effects towards the template, fast template rebinding kinetics and an appreciable selectivity over structurally related compounds. Copyright © 2010 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Simeral, J. D.; Kim, S.-P.; Black, M. J.; Donoghue, J. P.; Hochberg, L. R.
2011-04-01
The ongoing pilot clinical trial of the BrainGate neural interface system aims in part to assess the feasibility of using neural activity obtained from a small-scale, chronically implanted, intracortical microelectrode array to provide control signals for a neural prosthesis system. Critical questions include how long implanted microelectrodes will record useful neural signals, how reliably those signals can be acquired and decoded, and how effectively they can be used to control various assistive technologies such as computers and robotic assistive devices, or to enable functional electrical stimulation of paralyzed muscles. Here we examined these questions by assessing neural cursor control and BrainGate system characteristics on five consecutive days 1000 days after implant of a 4 × 4 mm array of 100 microelectrodes in the motor cortex of a human with longstanding tetraplegia subsequent to a brainstem stroke. On each of five prospectively-selected days we performed time-amplitude sorting of neuronal spiking activity, trained a population-based Kalman velocity decoding filter combined with a linear discriminant click state classifier, and then assessed closed-loop point-and-click cursor control. The participant performed both an eight-target center-out task and a random target Fitts metric task which was adapted from a human-computer interaction ISO standard used to quantify performance of computer input devices. The neural interface system was further characterized by daily measurement of electrode impedances, unit waveforms and local field potentials. Across the five days, spiking signals were obtained from 41 of 96 electrodes and were successfully decoded to provide neural cursor point-and-click control with a mean task performance of 91.3% ± 0.1% (mean ± s.d.) correct target acquisition. Results across five consecutive days demonstrate that a neural interface system based on an intracortical microelectrode array can provide repeatable, accurate point-and-click control of a computer interface to an individual with tetraplegia 1000 days after implantation of this sensor.
Simeral, J D; Kim, S-P; Black, M J; Donoghue, J P; Hochberg, L R
2013-01-01
The ongoing pilot clinical trial of the BrainGate neural interface system aims in part to assess the feasibility of using neural activity obtained from a small-scale, chronically implanted, intracortical microelectrode array to provide control signals for a neural prosthesis system. Critical questions include how long implanted microelectrodes will record useful neural signals, how reliably those signals can be acquired and decoded, and how effectively they can be used to control various assistive technologies such as computers and robotic assistive devices, or to enable functional electrical stimulation of paralyzed muscles. Here we examined these questions by assessing neural cursor control and BrainGate system characteristics on five consecutive days 1000 days after implant of a 4 × 4 mm array of 100 microelectrodes in the motor cortex of a human with longstanding tetraplegia subsequent to a brainstem stroke. On each of five prospectively-selected days we performed time-amplitude sorting of neuronal spiking activity, trained a population-based Kalman velocity decoding filter combined with a linear discriminant click state classifier, and then assessed closed-loop point-and-click cursor control. The participant performed both an eight-target center-out task and a random target Fitts metric task which was adapted from a human-computer interaction ISO standard used to quantify performance of computer input devices. The neural interface system was further characterized by daily measurement of electrode impedances, unit waveforms and local field potentials. Across the five days, spiking signals were obtained from 41 of 96 electrodes and were successfully decoded to provide neural cursor point-and-click control with a mean task performance of 91.3% ± 0.1% (mean ± s.d.) correct target acquisition. Results across five consecutive days demonstrate that a neural interface system based on an intracortical microelectrode array can provide repeatable, accurate point-and-click control of a computer interface to an individual with tetraplegia 1000 days after implantation of this sensor. PMID:21436513
Collaborative, Trust-Based Security Mechanisms for a National Utility Intranet
2007-09-01
time_message_ceated … username bearnold operation_type copy from_file C:/etc/ passwd \\MPLpw.txt from_file_data_type ND //network data...time_message_created … username bearnold operation_type paste from_file C:\\etc\\ passwd \\MPLpw.txt //logon server password file...from_file_data_type ND from_file_caveat restricted-release to_file F:\\Copy of C:\\etc\\ passwd \\MPLpw.txt //removable drive //end message data
Using Hollywood techniques to teach freshman astronomy over the Internet
NASA Astrophysics Data System (ADS)
Friedberg, R.; Lipnick, D.; Vila Migliaro, M.
We use interactive 'click and drag' learning, bold colors, high graphic design standards, cartooning, animations and videos. We present Astronomy material in three languages, written English, written Spanish, and written and spoken Navajo. This distance-learning course is specifically designed for students with limited proficiency in the English language. We have both a lecture and laboratory series in the course that may be found at www.ibe.ncc.cc.nm.us and http://yoda.phys.unm.edu/ast100. It carries 4 hours of credit as Astronomy 100. To paraphrase John Ford, the great Hollywood director, a good movie should be able to stand with no dialogue. We have tried to meet his standard. We have borrowed heavily from the style of the Pvt. Snafu World War II military training films produced principally by the Walt Disney Studios. We have also used the graphic design techniques that I learned many years ago as a technical briefing officer at the Chief of Naval Operation's Briefing Room at the Pentagon, Washington D.C.. Finally, we use elements of 'Programmed Learning' developed by the American Management Association thirty odd years ago. Elements that make our web course unique are: A laboratory on Navajo Astronomy, lectures translated into Spanish, and many collateral resources for student use both internal to our web site and as external links on the Internet. Much of this work was underwritten by NASA grant NAG5-10254.
NASA Astrophysics Data System (ADS)
Milani, G.; Milani, F.
A GUI software (GURU) for experimental data fitting of rheometer curves in Natural Rubber (NR) vulcanized with sulphur at different curing temperatures is presented. Experimental data are automatically loaded in GURU from an Excel spreadsheet coming from the output of the experimental machine (moving die rheometer). To fit the experimental data, the general reaction scheme proposed by Han and co-workers for NR vulcanized with sulphur is considered. From the simplified kinetic scheme adopted, a closed form solution can be found for the crosslink density, with the only limitation that the induction period is excluded from computations. Three kinetic constants must be determined in such a way to minimize the absolute error between normalized experimental data and numerical prediction. Usually, this result is achieved by means of standard least-squares data fitting. On the contrary, GURU works interactively by means of a Graphical User Interface (GUI) to minimize the error and allows an interactive calibration of the kinetic constants by means of sliders. A simple mouse click on the sliders allows the assignment of a value for each kinetic constant and a visual comparison between numerical and experimental curves. Users will thus find optimal values of the constants by means of a classic trial and error strategy. An experimental case of technical relevance is shown as benchmark.
Wearden, J H; Williams, Emily A; Jones, Luke A
2017-03-01
Four experiments investigated the effect of pre-stimulus events on judgements of the subjective duration of tones that they preceded. Experiments 1 to 4 used click trains, flickering squares, expanding circles, and white noise as pre-stimulus events and showed that (a) periodic clicks appeared to "speed up" the pacemaker of an internal clock but that the effect wore off over a click-free delay, (b) aperiodic click trains, and visual stimuli in the form of flickering squares and expanding circles, also produced similar increases in estimated tone duration, as did white noise, although its effect was weaker. A fifth experiment examined the effects of periodic flicker on reaction time and showed that, as with periodic clicks in a previous experiment, reaction times were shorter when preceded by flicker than without.
Learning of Multimodal Representations With Random Walks on the Click Graph.
Wu, Fei; Lu, Xinyan; Song, Jun; Yan, Shuicheng; Zhang, Zhongfei Mark; Rui, Yong; Zhuang, Yueting
2016-02-01
In multimedia information retrieval, most classic approaches tend to represent different modalities of media in the same feature space. With the click data collected from the users' searching behavior, existing approaches take either one-to-one paired data (text-image pairs) or ranking examples (text-query-image and/or image-query-text ranking lists) as training examples, which do not make full use of the click data, particularly the implicit connections among the data objects. In this paper, we treat the click data as a large click graph, in which vertices are images/text queries and edges indicate the clicks between an image and a query. We consider learning a multimodal representation from the perspective of encoding the explicit/implicit relevance relationship between the vertices in the click graph. By minimizing both the truncated random walk loss as well as the distance between the learned representation of vertices and their corresponding deep neural network output, the proposed model which is named multimodal random walk neural network (MRW-NN) can be applied to not only learn robust representation of the existing multimodal data in the click graph, but also deal with the unseen queries and images to support cross-modal retrieval. We evaluate the latent representation learned by MRW-NN on a public large-scale click log data set Clickture and further show that MRW-NN achieves much better cross-modal retrieval performance on the unseen queries/images than the other state-of-the-art methods.
An improved advertising CTR prediction approach based on the fuzzy deep neural network
Gao, Shu; Li, Mingjiang
2018-01-01
Combining a deep neural network with fuzzy theory, this paper proposes an advertising click-through rate (CTR) prediction approach based on a fuzzy deep neural network (FDNN). In this approach, fuzzy Gaussian-Bernoulli restricted Boltzmann machine (FGBRBM) is first applied to input raw data from advertising datasets. Next, fuzzy restricted Boltzmann machine (FRBM) is used to construct the fuzzy deep belief network (FDBN) with the unsupervised method layer by layer. Finally, fuzzy logistic regression (FLR) is utilized for modeling the CTR. The experimental results show that the proposed FDNN model outperforms several baseline models in terms of both data representation capability and robustness in advertising click log datasets with noise. PMID:29727443
Mondal, Milon; Unver, M Yagiz; Pal, Asish; Bakker, Matthijs; Berrier, Stephan P; Hirsch, Anna K H
2016-10-10
There is an urgent need for the development of efficient methodologies that accelerate drug discovery. We demonstrate that the strategic combination of fragment linking/optimization and protein-templated click chemistry is an efficient and powerful method that accelerates the hit-identification process for the aspartic protease endothiapepsin. The best binder, which inhibits endothiapepsin with an IC 50 value of 43 μm, represents the first example of triazole-based inhibitors of endothiapepsin. Our strategy could find application on a whole range of drug targets. © 2016 The Authors. Published by Wiley-VCH Verlag GmbH & Co. KGaA.
An improved advertising CTR prediction approach based on the fuzzy deep neural network.
Jiang, Zilong; Gao, Shu; Li, Mingjiang
2018-01-01
Combining a deep neural network with fuzzy theory, this paper proposes an advertising click-through rate (CTR) prediction approach based on a fuzzy deep neural network (FDNN). In this approach, fuzzy Gaussian-Bernoulli restricted Boltzmann machine (FGBRBM) is first applied to input raw data from advertising datasets. Next, fuzzy restricted Boltzmann machine (FRBM) is used to construct the fuzzy deep belief network (FDBN) with the unsupervised method layer by layer. Finally, fuzzy logistic regression (FLR) is utilized for modeling the CTR. The experimental results show that the proposed FDNN model outperforms several baseline models in terms of both data representation capability and robustness in advertising click log datasets with noise.
Franco, Ana; Gaillard, Vinciane; Cleeremans, Axel; Destrebecqz, Arnaud
2015-12-01
Statistical learning can be used to extract the words from continuous speech. Gómez, Bion, and Mehler (Language and Cognitive Processes, 26, 212-223, 2011) proposed an online measure of statistical learning: They superimposed auditory clicks on a continuous artificial speech stream made up of a random succession of trisyllabic nonwords. Participants were instructed to detect these clicks, which could be located either within or between words. The results showed that, over the length of exposure, reaction times (RTs) increased more for within-word than for between-word clicks. This result has been accounted for by means of statistical learning of the between-word boundaries. However, even though statistical learning occurs without an intention to learn, it nevertheless requires attentional resources. Therefore, this process could be affected by a concurrent task such as click detection. In the present study, we evaluated the extent to which the click detection task indeed reflects successful statistical learning. Our results suggest that the emergence of RT differences between within- and between-word click detection is neither systematic nor related to the successful segmentation of the artificial language. Therefore, instead of being an online measure of learning, the click detection task seems to interfere with the extraction of statistical regularities.
A novel approach to transformed biometrics using successive projections
NASA Astrophysics Data System (ADS)
Gopi, E. S.
2010-02-01
Unlike user created password, number of biometrics is limited for creating account in different organizations. Transformed biometrics attempts to solve the problem by transforming the biometric into another form, which is unique to the particular organization. This makes the availability of different transformed biometrics in different organizations transformed from the same biometrics and helps in foolproof transactions. In this article a novel approach to transformed biometrics using successive projection technique is suggested .In the proposed technique, the user can register up to 5*4n-1 organizations if the length of the biometric password is 'n'.
Conner, Kip P.; Vennam, Preethi; Woods, Caleb M.; Krzyaniak, Matthew D.; Bowman, Michael K.; Atkins, William M.
2012-01-01
In comparison to imidazole (IMZ) and 1,2,4-triazole (1,2,4-TRZ) the isosteric 1,2,3-triazole (1,2,3-TRZ) is unrepresented among CYP inhibitors. This is surprising because 1,2,3-TRZs are easily obtained via ‘click’ chemistry. To understand this underrepresentation of 1,2,3-TRZs among CYP inhibitors, thermodynamic and DFT computational studies were performed with unsusbstituted IMZ, 1,2,4-TRZ, and 1,2,3-TRZ. The results indicate that the lower affinity of 1,2,3-TRZ for the heme iron includes a large unfavorable entropy term likely originating in solvent – 1,2,3-TRZ interactions; the difference is not solely due to differences in the enthalpy of heme – ligand interactions. In addition, the 1,2,3-TRZ fragment was incorporated into a well-established CYP3A4 substrate and mechanism based inactivator, 17-α-ethynylestradiol (17EE), via click chemistry. This derivative, 17-click, yielded optical spectra consistent with low spin ferric heme iron (type II) in contrast to 17EE, which yields a high spin complex (type I). Furthermore, the rate of CYP3A4-mediated metabolism of 17-click was comparable to 17EE, and with different regioselectivity. Surprisingly, CW EPR and HYSCORE EPR spectroscopy indicate that the 17-click does not displace water from the 6th axial ligand position of CYP3A4 as expected for a type II ligand. We propose a binding model where 17-click pendant 1,2,3-TRZ hydrogen bonds with the 6th axial water ligand. The results demonstrate the potential for 1,2,3-TRZ to form metabolically labile water-bridged low spin heme complexes, consistent with recent evidence that nitrogenous type II ligands of CYPs can be efficiently metabolized. The specific case of [CYP3A4•17-click] highlights the risk of interpreting CYP-ligand complex structure on the basis of optical spectra. PMID:22809252
Pereiro, Iago; Bendali, Amel; Tabnaoui, Sanae; Alexandre, Lucile; Srbova, Jana; Bilkova, Zuzana; Deegan, Shane; Joshi, Lokesh; Viovy, Jean-Louis; Malaquin, Laurent
2017-01-01
A microfluidic method to specifically capture and detect infectious bacteria based on immunorecognition and proliferative power is presented. It involves a microscale fluidized bed in which magnetic and drag forces are balanced to retain antibody-functionalized superparamagnetic beads in a chamber during sample perfusion. Captured cells are then cultivated in situ by infusing nutritionally-rich medium. The system was validated by the direct one-step detection of Salmonella Typhimurium in undiluted unskimmed milk, without pre-treatment. The growth of bacteria induces an expansion of the fluidized bed, mainly due to the volume occupied by the newly formed bacteria. This expansion can be observed with the naked eye, providing simple low-cost detection of only a few bacteria and in a few hours. The time to expansion can also be measured with a low-cost camera, allowing quantitative detection down to 4 cfu (colony forming unit), with a dynamic range of 100 to 107 cfu ml–1 in 2 to 8 hours, depending on the initial concentration. This mode of operation is an equivalent of quantitative PCR, with which it shares a high dynamic range and outstanding sensitivity and specificity, operating at the live cell rather than DNA level. Specificity was demonstrated by controls performed in the presence of a 500× excess of non-pathogenic Lactococcus lactis. The system's versatility was demonstrated by its successful application to the detection and quantitation of Escherichia coli O157:H15 and Enterobacter cloacae. This new technology allows fast, low-cost, portable and automated bacteria detection for various applications in food, environment, security and clinics. PMID:28626552
Ross, C; Shaw, S; Marshall, S; Stephen, S; Bailey, K; Cole, R; Wylie, J; Bullard, J; Van Caeseele, P; Reimer, J; Plourde, P
2016-02-04
The city of Winnipeg has experienced a surge of infectious syphilis cases since the fall of 2012, concentrated among men who have sex with men (MSM) and who use social media technologies-including phone applications-to meet sexual contacts. To evaluate the acceptability, cost and effectiveness of a campaign promoting syphilis testing on popular websites and applications used by MSM in the Winnipeg Health Region (WHR). The Winnipeg Regional Health Authority developed a campaign in March 2014 highlighting the syphilis outbreak and the importance of seeking testing. Over one month, advertisements appeared on four web-platforms: Grindr, Facebook, Squirt and the Gay Ad Network. When clicked, ads would direct the user to an information website. Acceptability was assessed using the number of 'clicks' elicited by advertisements on each platform. The cost of each platform's run of advertisements was compared to the number clicks elicited to produce a cost-per-click ratio for each platform. Effectiveness was assessed by comparing the number of syphilis tests ordered for male residents of the Winnipeg Health Region in the seven-week period before and after the campaign, as well as to the same time periods in 2012 and 2013. Out of 800,000 appearances purchased, the advertisements elicited 2,166 clicks, suggesting good acceptability. Grindr and Squirt advertisements had a better cost-per-click ratio than Facebook or the Gay Ad Network. There was no significant difference in testing before (2,049 tests) versus after (2,025 tests) the campaign and these findings were similar to testing trends in 2012 and 2013. Although this web-based campaign showed good acceptability and low cost, it did not appear to increase syphilis testing. This may be due to a poor campaign design; it also suggests that an education campaign alone may be insufficient to change behaviour.
NASA Astrophysics Data System (ADS)
Friedrich, J.
1999-08-01
As lecturers, our main concern and goal is to develop more attractive and efficient ways of communicating up-to-date scientific knowledge to our students and facilitate an in-depth understanding of physical phenomena. Computer-based instruction is very promising to help both teachers and learners in their difficult task, which involves complex cognitive psychological processes. This complexity is reflected in high demands on the design and implementation methods used to create computer-assisted learning (CAL) programs. Due to their concepts, flexibility, maintainability and extended library resources, object-oriented modeling techniques are very suitable to produce this type of pedagogical tool. Computational fluid dynamics (CFD) enjoys not only a growing importance in today's research, but is also very powerful for teaching and learning fluid dynamics. For this purpose, an educational PC program for university level called 'CFDLab 1.1' for Windows™ was developed with an interactive graphical user interface (GUI) for multitasking and point-and-click operations. It uses the dual reciprocity boundary element method as a versatile numerical scheme, allowing to handle a variety of relevant governing equations in two dimensions on personal computers due to its simple pre- and postprocessing including 2D Laplace, Poisson, diffusion, transient convection-diffusion.
McNeil, Leslie Klis; Reich, Claudia; Aziz, Ramy K; Bartels, Daniela; Cohoon, Matthew; Disz, Terry; Edwards, Robert A; Gerdes, Svetlana; Hwang, Kaitlyn; Kubal, Michael; Margaryan, Gohar Rem; Meyer, Folker; Mihalo, William; Olsen, Gary J; Olson, Robert; Osterman, Andrei; Paarmann, Daniel; Paczian, Tobias; Parrello, Bruce; Pusch, Gordon D; Rodionov, Dmitry A; Shi, Xinghua; Vassieva, Olga; Vonstein, Veronika; Zagnitko, Olga; Xia, Fangfang; Zinner, Jenifer; Overbeek, Ross; Stevens, Rick
2007-01-01
The National Microbial Pathogen Data Resource (NMPDR) (http://www.nmpdr.org) is a National Institute of Allergy and Infections Disease (NIAID)-funded Bioinformatics Resource Center that supports research in selected Category B pathogens. NMPDR contains the complete genomes of approximately 50 strains of pathogenic bacteria that are the focus of our curators, as well as >400 other genomes that provide a broad context for comparative analysis across the three phylogenetic Domains. NMPDR integrates complete, public genomes with expertly curated biological subsystems to provide the most consistent genome annotations. Subsystems are sets of functional roles related by a biologically meaningful organizing principle, which are built over large collections of genomes; they provide researchers with consistent functional assignments in a biologically structured context. Investigators can browse subsystems and reactions to develop accurate reconstructions of the metabolic networks of any sequenced organism. NMPDR provides a comprehensive bioinformatics platform, with tools and viewers for genome analysis. Results of precomputed gene clustering analyses can be retrieved in tabular or graphic format with one-click tools. NMPDR tools include Signature Genes, which finds the set of genes in common or that differentiates two groups of organisms. Essentiality data collated from genome-wide studies have been curated. Drug target identification and high-throughput, in silico, compound screening are in development.
Hernández, Oscar E; Zurek, Eduardo E
2013-05-15
We present a software tool called SENB, which allows the geometric and biophysical neuronal properties in a simple computational model of a Hodgkin-Huxley (HH) axon to be changed. The aim of this work is to develop a didactic and easy-to-use computational tool in the NEURON simulation environment, which allows graphical visualization of both the passive and active conduction parameters and the geometric characteristics of a cylindrical axon with HH properties. The SENB software offers several advantages for teaching and learning electrophysiology. First, SENB offers ease and flexibility in determining the number of stimuli. Second, SENB allows immediate and simultaneous visualization, in the same window and time frame, of the evolution of the electrophysiological variables. Third, SENB calculates parameters such as time and space constants, stimuli frequency, cellular area and volume, sodium and potassium equilibrium potentials, and propagation velocity of the action potentials. Furthermore, it allows the user to see all this information immediately in the main window. Finally, with just one click SENB can save an image of the main window as evidence. The SENB software is didactic and versatile, and can be used to improve and facilitate the teaching and learning of the underlying mechanisms in the electrical activity of an axon using the biophysical properties of the squid giant axon.
SCOPE: a web server for practical de novo motif discovery.
Carlson, Jonathan M; Chakravarty, Arijit; DeZiel, Charles E; Gross, Robert H
2007-07-01
SCOPE is a novel parameter-free method for the de novo identification of potential regulatory motifs in sets of coordinately regulated genes. The SCOPE algorithm combines the output of three component algorithms, each designed to identify a particular class of motifs. Using an ensemble learning approach, SCOPE identifies the best candidate motifs from its component algorithms. In tests on experimentally determined datasets, SCOPE identified motifs with a significantly higher level of accuracy than a number of other web-based motif finders run with their default parameters. Because SCOPE has no adjustable parameters, the web server has an intuitive interface, requiring only a set of gene names or FASTA sequences and a choice of species. The most significant motifs found by SCOPE are displayed graphically on the main results page with a table containing summary statistics for each motif. Detailed motif information, including the sequence logo, PWM, consensus sequence and specific matching sites can be viewed through a single click on a motif. SCOPE's efficient, parameter-free search strategy has enabled the development of a web server that is readily accessible to the practising biologist while providing results that compare favorably with those of other motif finders. The SCOPE web server is at
Aural Acoustic Stapedius-Muscle Reflex Threshold Procedures to Test Human Infants and Adults.
Keefe, Douglas H; Feeney, M Patrick; Hunter, Lisa L; Fitzpatrick, Denis F
2017-02-01
Power-based procedures are described to measure acoustic stapedius-muscle reflex threshold and supra-threshold responses in human adult and infant ears at frequencies from 0.2 to 8 kHz. The stimulus set included five clicks in which four pulsed activators were placed between each pair of clicks, with each stimulus set separated from the next by 0.79 s to allow for reflex decay. Each click response was used to detect the presence of reflex effects across frequency that were elicited by a pulsed broadband-noise or tonal activator in the ipsilateral or contralateral test ear. Acoustic reflex shifts were quantified in terms of the difference in absorbed sound power between the initial baseline click and the later four clicks in each set. Acoustic reflex shifts were measured over a 40-dB range of pulsed activators, and the acoustic reflex threshold was objectively calculated using a maximum 10 likelihood procedure. To illustrate the principles underlying these new reflex tests, reflex shifts in absorbed sound power and absorbance are presented for data acquired in an adult ear with normal hearing and in two infant ears in the initial and follow-up newborn hearing screening exams, one with normal hearing and the other with a conductive hearing loss. The use of absorbed sound power was helpful in classifying an acoustic reflex shift as present or absent. The resulting reflex tests are in use in a large study of wideband clinical diagnosis and monitoring of middle-ear and cochlear function in infant and adult ears.
“Click, Click, Cyclize”: A DOS Approach to Sultams Utilizing Vinyl Sulfonamide Linchpins
Zhou, Aihua; Rayabarapu, Dinesh; Hanson, Paul R.
2009-01-01
A diversity-oriented synthesis (DOS) strategy termed “Click, Click, Cyclize” is reported. This approach relies on functional group (FG) pairing between a vinyl sulfonamide and an array of functional groups to synthesize skeletally diverse sultams. Several FG pairing pathways on central tertiary vinyl sulfonamide linchpins have been developed including intramolecular Heck, aza-Michael, ring-closing enyne metathesis, Pauson—Khand, and chemoselective oxidation/Baylis—Hillman reactions. PMID:19115841
Jones, Luke A; Allely, Clare S; Wearden, John H
2011-02-01
A series of experiments demonstrated that a 5-s train of clicks that have been shown in previous studies to increase the subjective duration of tones they precede (in a manner consistent with "speeding up" timing processes) could also have an effect on information-processing rate. Experiments used studies of simple and choice reaction time (Experiment 1), or mental arithmetic (Experiment 2). In general, preceding trials by clicks made response times significantly shorter than those for trials without clicks, but white noise had no effects on response times. Experiments 3 and 4 investigated the effects of clicks on performance on memory tasks, using variants of two classic experiments of cognitive psychology: Sperling's (1960) iconic memory task and Loftus, Johnson, and Shimamura's (1985) iconic masking task. In both experiments participants were able to recall or recognize significantly more information from stimuli preceded by clicks than those preceded by silence.
Bravi, Riccardo; Quarta, Eros; Del Tongo, Claudia; Carbonaro, Nicola; Tognetti, Alessandro; Minciacchi, Diego
2015-06-01
The involvement or noninvolvement of a clock-like neural process, an effector-independent representation of the time intervals to produce, is described as the essential difference between event-based and emergent timing. In a previous work (Bravi et al. in Exp Brain Res 232:1663-1675, 2014a. doi: 10.1007/s00221-014-3845-9 ), we studied repetitive isochronous wrist's flexion-extensions (IWFEs), performed while minimizing visual and tactile information, to clarify whether non-temporal and temporal characteristics of paced auditory stimuli affect the precision and accuracy of the rhythmic motor performance. Here, with the inclusion of new recordings, we expand the examination of the dataset described in our previous study to investigate whether simple and complex paced auditory stimuli (clicks and music) and their imaginations influence in a different way the timing mechanisms for repetitive IWFEs. Sets of IWFEs were analyzed by the windowed (lag one) autocorrelation-wγ(1), a statistical method recently introduced for the distinction between event-based and emergent timing. Our findings provide evidence that paced auditory information and its imagination favor the engagement of a clock-like neural process, and specifically that music, unlike clicks, lacks the power to elicit event-based timing, not counteracting the natural shift of wγ(1) toward positive values as frequency of movements increase.
African Y chromosome and mtDNA divergence provides insight into the history of click languages.
Knight, Alec; Underhill, Peter A; Mortensen, Holly M; Zhivotovsky, Lev A; Lin, Alice A; Henn, Brenna M; Louis, Dorothy; Ruhlen, Merritt; Mountain, Joanna L
2003-03-18
About 30 languages of southern Africa, spoken by Khwe and San, are characterized by a repertoire of click consonants and phonetic accompaniments. The Jumid R:'hoansi (!Kung) San carry multiple deeply coalescing gene lineages. The deep genetic diversity of the San parallels the diversity among the languages they speak. Intriguingly, the language of the Hadzabe of eastern Africa, although not closely related to any other language, shares click consonants and accompaniments with languages of Khwe and San. We present original Y chromosome and mtDNA variation of Hadzabe and other ethnic groups of Tanzania and Y chromosome variation of San and peoples of the central African forests: Biaka, Mbuti, and Lisongo. In the context of comparable published data for other African populations, analyses of each of these independently inherited DNA segments indicate that click-speaking Hadzabe and Jumid R:'hoansi are separated by genetic distance as great or greater than that between any other pair of African populations. Phylogenetic tree topology indicates a basal separation of the ancient ancestors of these click-speaking peoples. That genetic divergence does not appear to be the result of recent gene flow from neighboring groups. The deep genetic divergence among click-speaking peoples of Africa and mounting linguistic evidence suggest that click consonants date to early in the history of modern humans. At least two explanations remain viable. Clicks may have persisted for tens of thousands of years, independently in multiple populations, as a neutral trait. Alternatively, clicks may have been retained, because they confer an advantage during hunting in certain environments.
Hansen, M; Wahlberg, M; Madsen, P T
2008-12-01
Underwater sound signals for biosonar and communication normally have different source properties to serve the purposes of generating efficient acoustic backscatter from small objects or conveying information to conspecifics. Harbor porpoises (Phocoena phocoena) are nonwhistling toothed whales that produce directional, narrowband, high-frequency (HF) echolocation clicks. This study tests the hypothesis that their 130 kHz HF clicks also contain a low-frequency (LF) component more suited for communication. Clicks from three captive porpoises were analyzed to quantify the LF and HF source properties. The LF component is 59 (S.E.M=1.45 dB) dB lower than the HF component recorded on axis, and even at extreme off-axis angles of up to 135 degrees , the HF component is 9 dB higher than the LF component. Consequently, the active space of the HF component will always be larger than that of the LF component. It is concluded that the LF component is a by-product of the sound generator rather than a dedicated pulse produced to serve communication purposes. It is demonstrated that distortion and clipping in analog tape recorders can explain some of the prominent LF components reported in earlier studies, emphasizing the risk of erroneous classification of sound types based on recording artifacts.
Chen, Yingzhuang; Wu, Minghuo; Wang, Keyi; Chen, Bo; Yao, Shouzhuo; Zou, Hanfa; Nie, Lihua
2011-11-04
A novel thiol-ene "click" strategy for the preparation of monolithic trypsin microreactor was proposed. The hybrid organic-inorganic monolithic capillary column with ene-functionality was fabricated by sol-gel process using tetramethoxysilane (TMOS) and γ-methacryloxypropyltrimethoxysilane (γ-MAPS) as precursors. The disulfide bonds of trypsin were reduced to form free thiol groups. Then the trypsin containing free thiol groups was attached on the γ-MAPS hybrid monolithic column with ene-functionality via thiol-ene click chemistry to form a trypsin microreactor. The activity of the trypsin microreactor was characterized by detecting the substrate (Nα-p-tosyl-L-arginine methyl ester hydrochloride, TAME) and the product (Nα-p-tosyl-L-arginine, TA) with on-line capillary zone electrophoresis. After investigating various synthesizing conditions, it was found that the microreactor with poly(N,N'-methylenebisacrylamide) as spacer can deliver the highest activity, yielding a rapid reaction rate. After repeatedly sampling and analyzing for 100 times, the monolithic trypsin microreactor still remained 87.5% of its initial activity. It was demonstrated that thiol-ene "click" strategy for the construction of enzyme microreactor is a promising method for the highly selective immobilization of proteins under mild conditions, especially enzymes with free thiol radicals. Copyright © 2011 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Airlangga, T. J.; Mangunatmadja, I.; Prihartono, J.; Zizlavsky, S.
2017-08-01
Congenital cytomegalovirus (congenital CMV) infection is a leading factor of nongenetic sensorineural hearing loss in children. Hearing loss caused by CMV infection does not have a pathognomonic configuration hence further research is needed. The development of knowledge on hearing loss caused by congenital CMV infection is progressing in many countries. Due to a lack of research in the context of Indonesia, this study assesses hearing impairment in children with congenital CMV infection in Indonesia, more specifically in the Cipto Mangunkusumo Hospital. Our objective was to profile hearing impairment in children 0-5 years of age with congenital CMV infection using Distortion Product Otoacoustic Emissions (DPOAE) and Brain Evoked Response Audiometry Stimulus Click (BERA Click) examinations. This cross-sectional study was conducted in the Cipto Mangunkusum Hospital from November, 2015 to May 2016 with 27 children 0-5 years of age with congenital CMV infection. Of individual ears studied, 58.0% exhibited sensorineural hearing loss. There was a significant relationship between developmental delay and incidence of sensorineural hearing loss. Subjects with a developmental delay were 6.57 times more likely (CI 95%; 1.88-22.87) to experience sensorineural hearing loss. Congenital CMV infection has an important role in causing sensorineural hearing loss in children.
Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming
2017-01-01
In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients’ physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu–Chung’s scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP. PMID:28644381
2017-09-01
Figure 58. Click on run ................................................................................................61 Figure 59. Top view of...engines, helicopter rotors, and turbine blades , and so forth Creating Marks Readable with a Scanner 4. Simple techniques to follow: Make the light...spreadsheet with data Figure 58. Click on Menu bar and find “View” then click on “Macros.” Click on run Figure 59. 62 Top view of xml spreadsheet
Kyhn, Line A.; Tougaard, Jakob; Beedholm, Kristian; Jensen, Frants H.; Ashe, Erin; Williams, Rob; Madsen, Peter T.
2013-01-01
Odontocetes produce a range of different echolocation clicks but four groups in different families have converged on producing the same stereotyped narrow band high frequency (NBHF) click. In microchiropteran bats, sympatric species have evolved the use of different acoustic niches and subtly different echolocation signals to avoid competition among species. In this study, we examined whether similar adaptations are at play among sympatric porpoise species that use NBHF echolocation clicks. We used a six-element hydrophone array to record harbour and Dall’s porpoises in British Columbia (BC), Canada, and harbour porpoises in Denmark. The click source properties of all porpoise groups were remarkably similar and had an average directivity index of 25 dB. Yet there was a small, but consistent and significant 4 kHz difference in centroid frequency between sympatric Dall’s (137±3 kHz) and Canadian harbour porpoises (141±2 kHz). Danish harbour porpoise clicks (136±3 kHz) were more similar to Dall’s porpoise than to their conspecifics in Canada. We suggest that the spectral differences in echolocation clicks between the sympatric porpoises are consistent with evolution of a prezygotic isolating barrier (i.e., character displacement) to avoid hybridization of sympatric species. In practical terms, these spectral differences have immediate application to passive acoustic monitoring. PMID:23723996
Kyhn, Line A; Tougaard, Jakob; Beedholm, Kristian; Jensen, Frants H; Ashe, Erin; Williams, Rob; Madsen, Peter T
2013-01-01
Odontocetes produce a range of different echolocation clicks but four groups in different families have converged on producing the same stereotyped narrow band high frequency (NBHF) click. In microchiropteran bats, sympatric species have evolved the use of different acoustic niches and subtly different echolocation signals to avoid competition among species. In this study, we examined whether similar adaptations are at play among sympatric porpoise species that use NBHF echolocation clicks. We used a six-element hydrophone array to record harbour and Dall's porpoises in British Columbia (BC), Canada, and harbour porpoises in Denmark. The click source properties of all porpoise groups were remarkably similar and had an average directivity index of 25 dB. Yet there was a small, but consistent and significant 4 kHz difference in centroid frequency between sympatric Dall's (137±3 kHz) and Canadian harbour porpoises (141±2 kHz). Danish harbour porpoise clicks (136±3 kHz) were more similar to Dall's porpoise than to their conspecifics in Canada. We suggest that the spectral differences in echolocation clicks between the sympatric porpoises are consistent with evolution of a prezygotic isolating barrier (i.e., character displacement) to avoid hybridization of sympatric species. In practical terms, these spectral differences have immediate application to passive acoustic monitoring.
Click train encoding in primary and non-primary auditory cortex of anesthetized macaque monkeys.
Oshurkova, E; Scheich, H; Brosch, M
2008-06-02
We studied encoding of temporally modulated sounds in 28 multiunits in the primary auditory cortical field (AI) and in 35 multiunits in the secondary auditory cortical field (caudomedial auditory cortical field, CM) by presenting periodic click trains with click rates between 1 and 300 Hz lasting for 2-4 s. We found that all multiunits increased or decreased their firing rate during the steady state portion of the click train and that all except two multiunits synchronized their firing to individual clicks in the train. Rate increases and synchronized responses were most prevalent and strongest at low click rates, as expressed by best modulation frequency, limiting frequency, percentage of responsive multiunits, and average rate response and vector strength. Synchronized responses occurred up to 100 Hz; rate response occurred up to 300 Hz. Both auditory fields responded similarly to low click rates but differed at click rates above approximately 12 Hz at which more multiunits in AI than in CM exhibited synchronized responses and increased rate responses and more multiunits in CM exhibited decreased rate responses. These findings suggest that the auditory cortex of macaque monkeys encodes temporally modulated sounds similar to the auditory cortex of other mammals. Together with other observations presented in this and other reports, our findings also suggest that AI and CM have largely overlapping sensitivities for acoustic stimulus features but encode these features differently.
Click-Evoked Auditory Efferent Activity: Rate and Level Effects.
Boothalingam, Sriram; Kurke, Julianne; Dhar, Sumitrajit
2018-05-07
There currently are no standardized protocols to evaluate auditory efferent function in humans. Typical tests use broadband noise to activate the efferents, but only test the contralateral efferent pathway, risk activating the middle ear muscle reflex (MEMR), and are laborious for clinical use. In an attempt to develop a clinical test of bilateral auditory efferent function, we have designed a method that uses clicks to evoke efferent activity, obtain click-evoked otoacoustic emissions (CEOAEs), and monitor MEMR. This allows for near-simultaneous estimation of cochlear and efferent function. In the present study, we manipulated click level (60, 70, and 80 dB peak-equivalent sound pressure level [peSPL]) and rate (40, 50, and 62.5 Hz) to identify an optimal rate-level combination that evokes measurable efferent modulation of CEOAEs. Our findings (n = 58) demonstrate that almost all click levels and rates used caused significant inhibition of CEOAEs, with a significant interaction between level and rate effects. Predictably, bilateral activation produced greater inhibition compared to stimulating the efferents only in the ipsilateral or contralateral ear. In examining the click rate-level effects during bilateral activation in greater detail, we observed a 1-dB inhibition of CEOAE level for each 10-dB increase in click level, with rate held constant at 62.5 Hz. Similarly, a 10-Hz increase in rate produced a 0.74-dB reduction in CEOAE level, with click level held constant at 80 dB peSPL. The effect size (Cohen's d) was small for either monaural condition and medium for bilateral, faster-rate, and higher-level conditions. We were also able to reliably extract CEOAEs from efferent eliciting clicks. We conclude that clicks can indeed be profitably employed to simultaneously evaluate cochlear health using CEOAEs as well as their efferent modulation. Furthermore, using bilateral clicks allows the evaluation of both the crossed and uncrossed elements of the auditory efferent nervous system, while yielding larger, more discernible, inhibition of the CEOAEs relative to either ipsilateral or contralateral condition.
Taylor, Charles J.; Williamson, Tanja N.; Newson, Jeremy K.; Ulery, Randy L.; Nelson, Hugh L.; Cinotto, Peter J.
2012-01-01
This report describes Phase II modifications made to the Water Availability Tool for Environmental Resources (WATER), which applies the process-based TOPMODEL approach to simulate or predict stream discharge in surface basins in the Commonwealth of Kentucky. The previous (Phase I) version of WATER did not provide a means of identifying sinkhole catchments or accounting for the effects of karst (internal) drainage in a TOPMODEL-simulated basin. In the Phase II version of WATER, sinkhole catchments are automatically identified and delineated as internally drained subbasins, and a modified TOPMODEL approach (called the sinkhole drainage process, or SDP-TOPMODEL) is applied that calculates mean daily discharges for the basin based on summed area-weighted contributions from sinkhole drain-age (SD) areas and non-karstic topographically drained (TD) areas. Results obtained using the SDP-TOPMODEL approach were evaluated for 12 karst test basins located in each of the major karst terrains in Kentucky. Visual comparison of simulated hydrographs and flow-duration curves, along with statistical measures applied to the simulated discharge data (bias, correlation, root mean square error, and Nash-Sutcliffe efficiency coefficients), indicate that the SDPOPMODEL approach provides acceptably accurate estimates of discharge for most flow conditions and typically provides more accurate simulation of stream discharge in karstic basins compared to the standard TOPMODEL approach. Additional programming modifications made to the Phase II version of WATER included implementation of a point-and-click graphical user interface (GUI), which fully automates the delineation of simulation-basin boundaries and improves the speed of input-data processing. The Phase II version of WATER enables the user to select a pour point anywhere on a stream reach of interest, and the program will automatically delineate all upstream areas that contribute drainage to that point. This capability enables automatic delineation of a simulation basin of any size (area) and having any level of stream-network complexity. WATER then automatically identifies the presence of sinkholes catchments within the simulation basin boundaries; extracts and compiles the necessary climatic, topographic, and basin characteristics datasets; and runs the SDP-TOPMODEL approach to estimate daily mean discharges (streamflow).
Vocal reporting of echolocation targets: dolphins often report before click trains end.
Ridgway, S H; Elsberry, W R; Blackwood, D J; Kamolnick, T; Todd, M; Carder, D A; Chaplin, Monica; Cranford, T W
2012-01-01
Bottlenose dolphins (Tursiops truncatus) wore opaque suction cups over their eyes while stationing behind an acoustically opaque door. This put the dolphins in a known position and orientation. When the door opened, the dolphin clicked to detect targets. Trainers specified that Dolphin S emit a whistle if the target was a 7.5 cm water filled sphere, or a pulse burst if the target was a rock. S remained quiet if there was no target. Dolphin B whistled for the sphere. She remained quiet for rock and for no target. Thus, S had to choose between three different responses, whistle, pulse burst, or remain quiet. B had to choose between two different responses, whistle or remain quiet. S gave correct vocal responses averaging 114 ms after her last echolocation click (range 182 ms before and 219 ms after the last click). Average response for B was 21 ms before her last echolocation click (range 250 ms before and 95 ms after the last click in the train). More often than not, B began her whistle response before her echolocation train ended. The findings suggest separate neural pathways for generation of response vocalizations as opposed to echolocation clicks. © 2012 Acoustical Society of America.
Indirect photopatterning of functionalized organic monolayers via copper-catalyzed "click chemistry"
NASA Astrophysics Data System (ADS)
Williams, Mackenzie G.; Teplyakov, Andrew V.
2018-07-01
Solution-based lithographic surface modification of an organic monolayer on a solid substrate is attained based on selective area photo-reduction of copper (II) to copper (I) to catalyze the azide-alkyne dipolar cycloaddition "click" reaction. X-ray photoelectron spectroscopy is used to confirm patterning, and spectroscopic results are analyzed and supplemented with computational models to confirm the surface chemistry. It is determined that this surface modification approach requires irradiation of the solid substrate with all necessary components present in solution. This method requires only minutes of irradiation to result in spatial and temporal control of the covalent surface functionalization of a monolayer and offers the potential for wavelength tunability that may be desirable in many applications utilizing organic monolayers.