Science.gov

Sample records for cryptographic key management

  1. Cryptographic Key Management and Critical Risk Assessment

    SciTech Connect

    Abercrombie, Robert K

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and usedmore » as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of

  2. A cryptographic key management solution for HIPAA privacy/security regulations.

    PubMed

    Lee, W-B; Lee, C-D

    2008-01-01

    The Health Insurance Portability and Accountability Act (HIPAA) privacy and security regulations are two crucial provisions in the protection of healthcare privacy. Privacy regulations create a principle to assure that patients have more control over their health information and set limits on the use and disclosure of health information. The security regulations stipulate the provisions implemented to guard data integrity, confidentiality, and availability. Undoubtedly, the cryptographic mechanisms are well defined to provide suitable solutions. In this paper, to comply with the HIPAA regulations, a flexible cryptographic key management solution is proposed to facilitate interoperations among the applied cryptographic mechanisms. In addition, case of consent exceptions intended to facilitate emergency applications and other possible exceptions can also be handled easily.

  3. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    SciTech Connect

    Abercrombie, Robert K; Sheldon, Frederick T; Aldridge, Hal

    2011-01-01

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following:more » 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.« less

  4. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    SciTech Connect

    Abercrombie, R. K.; Peters, Scott

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modifiedmore » and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of

  5. SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information?

    NASA Astrophysics Data System (ADS)

    Rührmair, Ulrich

    This paper discusses a new cryptographic primitive termed SIMPL system. Roughly speaking, a SIMPL system is a special type of Physical Unclonable Function (PUF) which possesses a binary description that allows its (slow) public simulation and prediction. Besides this public key like functionality, SIMPL systems have another advantage: No secret information is, or needs to be, contained in SIMPL systems in order to enable cryptographic protocols - neither in the form of a standard binary key, nor as secret information hidden in random, analog features, as it is the case for PUFs. The cryptographic security of SIMPLs instead rests on (i) a physical assumption on their unclonability, and (ii) a computational assumption regarding the complexity of simulating their output. This novel property makes SIMPL systems potentially immune against many known hardware and software attacks, including malware, side channel, invasive, or modeling attacks.

  6. Quantum key management

    DOEpatents

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  7. Secure management of biomedical data with cryptographic hardware.

    PubMed

    Canim, Mustafa; Kantarcioglu, Murat; Malin, Bradley

    2012-01-01

    The biomedical community is increasingly migrating toward research endeavors that are dependent on large quantities of genomic and clinical data. At the same time, various regulations require that such data be shared beyond the initial collecting organization (e.g., an academic medical center). It is of critical importance to ensure that when such data are shared, as well as managed, it is done so in a manner that upholds the privacy of the corresponding individuals and the overall security of the system. In general, organizations have attempted to achieve these goals through deidentification methods that remove explicitly, and potentially, identifying features (e.g., names, dates, and geocodes). However, a growing number of studies demonstrate that deidentified data can be reidentified to named individuals using simple automated methods. As an alternative, it was shown that biomedical data could be shared, managed, and analyzed through practical cryptographic protocols without revealing the contents of any particular record. Yet, such protocols required the inclusion of multiple third parties, which may not always be feasible in the context of trust or bandwidth constraints. Thus, in this paper, we introduce a framework that removes the need for multiple third parties by collocating services to store and to process sensitive biomedical data through the integration of cryptographic hardware. Within this framework, we define a secure protocol to process genomic data and perform a series of experiments to demonstrate that such an approach can be run in an efficient manner for typical biomedical investigations.

  8. Secure Management of Biomedical Data With Cryptographic Hardware

    PubMed Central

    Canim, Mustafa; Kantarcioglu, Murat; Malin, Bradley

    2014-01-01

    The biomedical community is increasingly migrating toward research endeavors that are dependent on large quantities of genomic and clinical data. At the same time, various regulations require that such data be shared beyond the initial collecting organization (e.g., an academic medical center). It is of critical importance to ensure that when such data are shared, as well as managed, it is done so in a manner that upholds the privacy of the corresponding individuals and the overall security of the system. In general, organizations have attempted to achieve these goals through deidentification methods that remove explicitly, and potentially, identifying features (e.g., names, dates, and geocodes). However, a growing number of studies demonstrate that deidentified data can be reidentified to named individuals using simple automated methods. As an alternative, it was shown that biomedical data could be shared, managed, and analyzed through practical cryptographic protocols without revealing the contents of any particular record. Yet, such protocols required the inclusion of multiple third parties, which may not always be feasible in the context of trust or bandwidth constraints. Thus, in this paper, we introduce a framework that removes the need for multiple third parties by collocating services to store and to process sensitive biomedical data through the integration of cryptographic hardware. Within this framework, we define a secure protocol to process genomic data and perform a series of experiments to demonstrate that such an approach can be run in an efficient manner for typical biomedical investigations. PMID:22010157

  9. Protecting Cryptographic Keys and Functions from Malware Attacks

    DTIC Science & Technology

    2010-12-01

    registers. modifies RSA private key signing in OpenSSL to use the technique. The resulting system has the following features: 1. No special hardware is...the above method based on OpenSSL , by exploiting the Streaming SIMD Extension (SSE) XMM registers of modern Intel and AMD x86-compatible CPU’s [22...one can store a 2048-bit exponent.1 Our prototype is based on OpenSSL 0.9.8e, the Ubuntu 6.06 Linux distribution with a 2.6.15 kernel, and SSE2 which

  10. A Cryptographic SoC for Robust Protection of Secret Keys in IPTV DRM Systems

    NASA Astrophysics Data System (ADS)

    Lee, Sanghan; Yang, Hae-Yong; Yeom, Yongjin; Park, Jongsik

    The security level of an internet protocol television (IPTV) digital right management (DRM) system ultimately relies on protection of secret keys. Well known devices for the key protection include smartcards and battery backup SRAMs (BB-SRAMs); however, these devices could be vulnerable to various physical attacks. In this paper, we propose a secure and cost-effective design of a cryptographic system on chip (SoC) that integrates the BB-SRAM with a cell-based design technique. The proposed SoC provides robust safeguard against the physical attacks, and satisfies high-speed and low-price requirements of IPTV set-top boxes. Our implementation results show that the maximum encryption rate of the SoC is 633Mb/s. In order to verify the data retention capabilities, we made a prototype chip using 0.18µm standard cell technology. The experimental results show that the integrated BB-SRAM can reliably retain data with a 1.4µA leakage current.

  11. Apparatus, system and method for providing cryptographic key information with physically unclonable function circuitry

    DOEpatents

    Areno, Matthew

    2015-12-08

    Techniques and mechanisms for providing a value from physically unclonable function (PUF) circuitry for a cryptographic operation of a security module. In an embodiment, a cryptographic engine receives a value from PUF circuitry and based on the value, outputs a result of a cryptographic operation to a bus of the security module. The bus couples the cryptographic engine to control logic or interface logic of the security module. In another embodiment, the value is provided to the cryptographic engine from the PUF circuitry via a signal line which is distinct from the bus, where any exchange of the value by either of the cryptographic engine and the PUF circuitry is for communication of the first value independent of the bus.

  12. Novel Authentication of Monitoring Data Through the use of Secret and Public Cryptographic Keys

    SciTech Connect

    Benz, Jacob M.; Tolk, Keith; Tanner, Jennifer E.

    The Office of Nuclear Verification (ONV) is supporting the development of a piece of equipment to provide data authentication and protection for a suite of monitoring sensors as part of a larger effort to create an arms control technology toolkit. This device, currently called the Red Box, leverages the strengths of both secret and public cryptographic keys to authenticate, digitally sign, and pass along monitoring data to allow for host review, and redaction if necessary, without the loss of confidence in the authenticity of the data by the monitoring party. The design of the Red Box will allow for themore » addition and removal of monitoring equipment and can also verify that the data was collected by authentic monitoring equipment prior to signing the data and sending it to the host and for review. The host will then forward the data to the monitor for review and inspection. This paper will highlight the progress to date of the Red Box development, and will explain the novel method of leveraging both symmetric and asymmetric (secret and public key) cryptography to authenticate data within a warhead monitoring regime.« less

  13. Automatic Inference of Cryptographic Key Length Based on Analysis of Proof Tightness

    DTIC Science & Technology

    2016-06-01

    within an attack tree structure, then expand attack tree methodology to include cryptographic reductions. We then provide the algorithms for...maintaining and automatically reasoning about these expanded attack trees . We provide a software tool that utilizes machine-readable proof and attack metadata...and the attack tree methodology to provide rapid and precise answers regarding security parameters and effective security. This eliminates the need

  14. Evaluating privacy-preserving record linkage using cryptographic long-term keys and multibit trees on large medical datasets.

    PubMed

    Brown, Adrian P; Borgs, Christian; Randall, Sean M; Schnell, Rainer

    2017-06-08

    Integrating medical data using databases from different sources by record linkage is a powerful technique increasingly used in medical research. Under many jurisdictions, unique personal identifiers needed for linking the records are unavailable. Since sensitive attributes, such as names, have to be used instead, privacy regulations usually demand encrypting these identifiers. The corresponding set of techniques for privacy-preserving record linkage (PPRL) has received widespread attention. One recent method is based on Bloom filters. Due to superior resilience against cryptographic attacks, composite Bloom filters (cryptographic long-term keys, CLKs) are considered best practice for privacy in PPRL. Real-world performance of these techniques using large-scale data is unknown up to now. Using a large subset of Australian hospital admission data, we tested the performance of an innovative PPRL technique (CLKs using multibit trees) against a gold-standard derived from clear-text probabilistic record linkage. Linkage time and linkage quality (recall, precision and F-measure) were evaluated. Clear text probabilistic linkage resulted in marginally higher precision and recall than CLKs. PPRL required more computing time but 5 million records could still be de-duplicated within one day. However, the PPRL approach required fine tuning of parameters. We argue that increased privacy of PPRL comes with the price of small losses in precision and recall and a large increase in computational burden and setup time. These costs seem to be acceptable in most applied settings, but they have to be considered in the decision to apply PPRL. Further research on the optimal automatic choice of parameters is needed.

  15. Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

    SciTech Connect

    Molotkov, S. N.

    2008-07-15

    In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper's capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determinedmore » for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency ({eta} {approx} 20%) and dark count probability (p{sub dark} {approx} 10{sup -7})« less

  16. Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

    NASA Astrophysics Data System (ADS)

    Molotkov, S. N.

    2008-07-01

    In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper’s capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determined for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency (η ≈ 20%) and dark count probability ( p dark ˜ 10-7).

  17. Secure SCADA communication by using a modified key management scheme.

    PubMed

    Rezai, Abdalhossein; Keshavarzi, Parviz; Moravej, Zahra

    2013-07-01

    This paper presents and evaluates a new cryptographic key management scheme which increases the efficiency and security of the Supervisory Control And Data Acquisition (SCADA) communication. In the proposed key management scheme, two key update phases are used: session key update and master key update. In the session key update phase, session keys are generated in the master station. In the master key update phase, the Elliptic Curve Diffie-Hellman (ECDH) protocol is used. The Poisson process is also used to model the Security Index (SI) and Quality of Service (QoS). Our analysis shows that the proposed key management not only supports the required speed in the MODBUS implementation but also has several advantages compared to other key management schemes for secure communication in SCADA networks. Copyright © 2013 ISA. Published by Elsevier Ltd. All rights reserved.

  18. Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-Law-Johnson-noise scheme.

    PubMed

    Kish, Laszlo B; Abbott, Derek; Granqvist, Claes G

    2013-01-01

    Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law-Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive) attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional) security of the KLJN method has not been successfully challenged.

  19. Critical Analysis of the Bennett–Riedel Attack on Secure Cryptographic Key Distributions via the Kirchhoff-Law–Johnson-Noise Scheme

    PubMed Central

    Kish, Laszlo B.; Abbott, Derek; Granqvist, Claes G.

    2013-01-01

    Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law–Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive) attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional) security of the KLJN method has not been successfully challenged. PMID:24358129

  20. Cryptographic Securities Exchanges

    NASA Astrophysics Data System (ADS)

    Thorpe, Christopher; Parkes, David C.

    While transparency in financial markets should enhance liquidity, its exploitation by unethical and parasitic traders discourages others from fully embracing disclosure of their own information. Traders exploit both the private information in upstairs markets used to trade large orders outside traditional exchanges and the public information present in exchanges' quoted limit order books. Using homomorphic cryptographic protocols, market designers can create "partially transparent" markets in which every matched trade is provably correct and only beneficial information is revealed. In a cryptographic securities exchange, market operators can hide information to prevent its exploitation, and still prove facts about the hidden information such as bid/ask spread or market depth.

  1. A novel key management solution for reinforcing compliance with HIPAA privacy/security regulations.

    PubMed

    Lee, Chien-Ding; Ho, Kevin I-J; Lee, Wei-Bin

    2011-07-01

    Digitizing medical records facilitates the healthcare process. However, it can also cause serious security and privacy problems, which are the major concern in the Health Insurance Portability and Accountability Act (HIPAA). While various conventional encryption mechanisms can solve some aspects of these problems, they cannot address the illegal distribution of decrypted medical images, which violates the regulations defined in the HIPAA. To protect decrypted medical images from being illegally distributed by an authorized staff member, the model proposed in this paper provides a way to integrate several cryptographic mechanisms. In this model, the malicious staff member can be tracked by a watermarked clue. By combining several well-designed cryptographic mechanisms and developing a key management scheme to facilitate the interoperation among these mechanisms, the risk of illegal distribution can be reduced.

  2. The Zagora cryptograph

    NASA Astrophysics Data System (ADS)

    Coucouzeli, A.

    A unique lead seal from the well-known eighth century B.C. settlement of Zagora on the island of Andros dramatically confirms and expands our knowledge of the town planning identified at the site and constituting the earliest example of an orthogonal grid plan in the Greek world. The seal in question is decorated with a symbolic design that constitutes a rare representation of the Dioskouroi as part of the constellation Gemini. This design appears to have acted as a cryptograph enciphering the basic mathematical and astronomical principles behind the planning of Zagora. Besides offering us new insights into early Greek settlement planning, the cryptograph seems to reveal an advanced practical competence in mathematics and celestial observation, which was hitherto unsuspected for such an early period. The Zagora cryptograph also suggests that astronomy and mathematics played a crucial role in the strengthening of the ruling elite's power at Zagora in the framework of the rising city-state or polis. The tight interweaving of astronomical, mathematical, architectural and social considerations in the planning of Zagora is an entirely new discovery for Greece, whose implications are far-reaching.

  3. Cryptographically secure biometrics

    NASA Astrophysics Data System (ADS)

    Stoianov, A.

    2010-04-01

    Biometric systems usually do not possess a cryptographic level of security: it has been deemed impossible to perform a biometric authentication in the encrypted domain because of the natural variability of biometric samples and of the cryptographic intolerance even to a single bite error. Encrypted biometric data need to be decrypted on authentication, which creates privacy and security risks. On the other hand, the known solutions called "Biometric Encryption (BE)" or "Fuzzy Extractors" can be cracked by various attacks, for example, by running offline a database of images against the stored helper data in order to obtain a false match. In this paper, we present a novel approach which combines Biometric Encryption with classical Blum-Goldwasser cryptosystem. In the "Client - Service Provider (SP)" or in the "Client - Database - SP" architecture it is possible to keep the biometric data encrypted on all the stages of the storage and authentication, so that SP never has an access to unencrypted biometric data. It is shown that this approach is suitable for two of the most popular BE schemes, Fuzzy Commitment and Quantized Index Modulation (QIM). The approach has clear practical advantages over biometric systems using "homomorphic encryption". Future work will deal with the application of the proposed solution to one-to-many biometric systems.

  4. Low-power cryptographic coprocessor for autonomous wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Olszyna, Jakub; Winiecki, Wiesław

    2013-10-01

    The concept of autonomous wireless sensor networks involves energy harvesting, as well as effective management of system resources. Public-key cryptography (PKC) offers the advantage of elegant key agreement schemes with which a secret key can be securely established over unsecure channels. In addition to solving the key management problem, the other major application of PKC is digital signatures, with which non-repudiation of messages exchanges can be achieved. The motivation for studying low-power and area efficient modular arithmetic algorithms comes from enabling public-key security for low-power devices that can perform under constrained environment like autonomous wireless sensor networks. This paper presents a cryptographic coprocessor tailored to the autonomous wireless sensor networks constraints. Such hardware circuit is aimed to support the implementation of different public-key cryptosystems based on modular arithmetic in GF(p) and GF(2m). Key components of the coprocessor are described as GEZEL models and can be easily transformed to VHDL and implemented in hardware.

  5. Quantum cryptographic system with reduced data loss

    DOEpatents

    Lo, H.K.; Chau, H.F.

    1998-03-24

    A secure method for distributing a random cryptographic key with reduced data loss is disclosed. Traditional quantum key distribution systems employ similar probabilities for the different communication modes and thus reject at least half of the transmitted data. The invention substantially reduces the amount of discarded data (those that are encoded and decoded in different communication modes e.g. using different operators) in quantum key distribution without compromising security by using significantly different probabilities for the different communication modes. Data is separated into various sets according to the actual operators used in the encoding and decoding process and the error rate for each set is determined individually. The invention increases the key distribution rate of the BB84 key distribution scheme proposed by Bennett and Brassard in 1984. Using the invention, the key distribution rate increases with the number of quantum signals transmitted and can be doubled asymptotically. 23 figs.

  6. Quantum cryptographic system with reduced data loss

    DOEpatents

    Lo, Hoi-Kwong; Chau, Hoi Fung

    1998-01-01

    A secure method for distributing a random cryptographic key with reduced data loss. Traditional quantum key distribution systems employ similar probabilities for the different communication modes and thus reject at least half of the transmitted data. The invention substantially reduces the amount of discarded data (those that are encoded and decoded in different communication modes e.g. using different operators) in quantum key distribution without compromising security by using significantly different probabilities for the different communication modes. Data is separated into various sets according to the actual operators used in the encoding and decoding process and the error rate for each set is determined individually. The invention increases the key distribution rate of the BB84 key distribution scheme proposed by Bennett and Brassard in 1984. Using the invention, the key distribution rate increases with the number of quantum signals transmitted and can be doubled asymptotically.

  7. Key Words for New Managers.

    ERIC Educational Resources Information Center

    Kim, Taeock; Isaac, Frederick

    This paper briefly describes the effects of changes instituted by new library administrators and discusses the roles of both upper and middle level library managers in the process of adapting to change. Suggestions based on the experience of the authors as new middle level managers at a time when extensive changes were occurring in a university…

  8. Defense frontier analysis of quantum cryptographic systems.

    PubMed

    Slutsky, B; Rao, R; Sun, P C; Tancevski, L; Fainman, S

    1998-05-10

    When a quantum cryptographic system operates in the presence of background noise, security of the key can be recovered by a procedure called key distillation. A key-distillation scheme effective against so-called individual (bitwise-independent) eavesdropping attacks involves sacrifice of some of the data through privacy amplification. We derive the amount of data sacrifice sufficient to defend against individual eavesdropping attacks in both BB84 and B92 protocols and show in what sense the communication becomes secure as a result. We also compare the secrecy capacity of various quantum cryptosystems, taking into account data sacrifice during key distillation, and conclude that the BB84 protocol may offer better performance characteristics than the B92.

  9. Deductive Verification of Cryptographic Software

    NASA Technical Reports Server (NTRS)

    Almeida, Jose Barcelar; Barbosa, Manuel; Pinto, Jorge Sousa; Vieira, Barbara

    2009-01-01

    We report on the application of an off-the-shelf verification platform to the RC4 stream cipher cryptographic software implementation (as available in the openSSL library), and introduce a deductive verification technique based on self-composition for proving the absence of error propagation.

  10. Keys to career success in managed care.

    PubMed

    Sandrick, K

    1996-04-01

    Given the prominence that managed care will have in the future U.S. healthcare system, financial managers who want to advance their careers must take steps to hone their managed care knowledge and skills, become accomplished managed care strategists, and identify opportunities to gain expertise in the managed care field. Healthcare Financial Management interviewed a number of managed care experts to obtain their views on how healthcare financial managers can prepare for a career in managed care organizations. The experts agree that one of the keys to future success lies in financial managers' willingness to assume more and different types of responsibility than before as the shift to managed care continues.

  11. 6 Keys to Identity Management

    ERIC Educational Resources Information Center

    Shoham, Idan

    2011-01-01

    An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…

  12. Method for exponentiating in cryptographic systems

    DOEpatents

    Brickell, Ernest F.; Gordon, Daniel M.; McCurley, Kevin S.

    1994-01-01

    An improved cryptographic method utilizing exponentiation is provided which has the advantage of reducing the number of multiplications required to determine the legitimacy of a message or user. The basic method comprises the steps of selecting a key from a preapproved group of integer keys g; exponentiating the key by an integer value e, where e represents a digital signature, to generate a value g.sup.e ; transmitting the value g.sup.e to a remote facility by a communications network; receiving the value g.sup.e at the remote facility; and verifying the digital signature as originating from the legitimate user. The exponentiating step comprises the steps of initializing a plurality of memory locations with a plurality of values g.sup.xi ; computi The United States Government has rights in this invention pursuant to Contract No. DE-AC04-76DP00789 between the Department of Energy and AT&T Company.

  13. Eight Key Facets of Small Business Management.

    ERIC Educational Resources Information Center

    Scott, James Calvert

    1980-01-01

    Identifies eight key facets of small business management and suggests activities that may be used to assist in their development. The key facets are (1) product or service, (2) competition, (3) marketing strategies, (4) personnel needs, (5) equipment and facility needs, (6) finances, (7) planning, and (8) entrepreneurship. (JOW)

  14. Setting objectives for managing Key deer

    USGS Publications Warehouse

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  15. Cryptographer

    ERIC Educational Resources Information Center

    Sullivan, Megan

    2005-01-01

    For the general public, the field of cryptography has recently become famous as the method used to uncover secrets in Dan Brown's fictional bestseller, The Da Vinci Code. But the science of cryptography has been popular for centuries--secret hieroglyphics discovered in Egypt suggest that code-making dates back almost 4,000 years. In today's…

  16. Key personality traits of sales managers.

    PubMed

    Lounsbury, John W; Foster, Nancy A; Levy, Jacob J; Gibson, Lucy W

    2014-01-01

    Sales managers are crucial for producing positive sales outcomes for companies. However, there has been a relative dearth of scholarly investigations into the personal attributes of sales managers. Such information could prove important in the recruitment, selection, training needs identification, career planning, counseling, and development of sales managers. Drawing on Holland's vocational theory, we sought to identify key personality traits that distinguish sales managers from other occupations and are related to their career satisfaction. The main sample was comprised of a total of 978 sales managers employed in a large number of companies across the United States (along with a comparison sample drawn from 79,512 individuals from other professional occupations). Participants completed an online version of Resource Associates' Personal Style Inventory as well a measure of career satisfaction. Our sample of 978 sales managers had higher levels of Assertiveness, Customer Service Orientation, Extraversion, Image Management, Optimism, and Visionary Style; and lower levels of Conscientiousness, Agreeableness, Intrinsic Motivation, Openness, and Tough-Mindedness than a sample of 79,512 individuals in a variety of other occupations. Nine of these traits were significantly correlated with sales managers' career satisfaction. Based on the results, a psychological profile of sales managers was presented as were implications for their recruitment, selection, training, development, and mentoring.

  17. Symmetric Key Services Markup Language (SKSML)

    NASA Astrophysics Data System (ADS)

    Noor, Arshad

    Symmetric Key Services Markup Language (SKSML) is the eXtensible Markup Language (XML) being standardized by the OASIS Enterprise Key Management Infrastructure Technical Committee for requesting and receiving symmetric encryption cryptographic keys within a Symmetric Key Management System (SKMS). This protocol is designed to be used between clients and servers within an Enterprise Key Management Infrastructure (EKMI) to secure data, independent of the application and platform. Building on many security standards such as XML Signature, XML Encryption, Web Services Security and PKI, SKSML provides standards-based capability to allow any application to use symmetric encryption keys, while maintaining centralized control. This article describes the SKSML protocol and its capabilities.

  18. SARS: Key factors in crisis management.

    PubMed

    Tseng, Hsin-Chao; Chen, Thai-Form; Chou, Shieu-Ming

    2005-03-01

    This study was conducted at a single hospital selected in Taipei during the SARS (Severe Acute Respiratory Syndrome) outbreak from March to July, 2003 in Taiwan. During this period of time, 104 SARS patients were admitted to the hospital. There were no negative reports related to the selected hospital despite its being located right in the center of an area struck by the epidemic. The purpose of this study was to identify the key factors enabling the hospital to survive SARS unscathed. Data were collected from in-depth interviews with the nursing directors and nursing managers of the SARS units, along with a review of relevant hospital documents. The five key elements identified as survival factors during this SARS crisis are as follows: 1. good control of timing for crisis management, 2. careful decision-making, 3. thorough implementation, 4. effective communication, and 5. trust between management and employees. The results of this study reconfirmed the selected hospital as a model for good crisis management during the SARS epidemic.

  19. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.

    PubMed

    Sanchez-Iborra, Ramon; Sánchez-Gómez, Jesús; Pérez, Salvador; Fernández, Pedro J; Santa, José; Hernández-Ramos, José L; Skarmeta, Antonio F

    2018-06-05

    Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN), which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa) and its layer-two supporter LoRa Wide Area Network (LoRaWAN), which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie⁻Hellman Over COSE (EDHOC) is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  20. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    PubMed

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  1. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks

    PubMed Central

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-01-01

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure. PMID:28338632

  2. William Friedman, Geneticist Turned Cryptographer

    PubMed Central

    Goldman, Irwin L.

    2017-01-01

    William Friedman (1891–1969), trained as a plant geneticist at Cornell University, was employed at Riverbank Laboratories by the eccentric millionaire George Fabyan to work on wheat breeding. Friedman, however, soon became intrigued by and started working on a pet project of Fabyan’s involving the conjecture that Francis Bacon, a polymath known for the study of ciphers, was the real author of Shakespeare’s plays. Thus, beginning in ∼1916, Friedman turned his attention to the so called “Baconian cipher,” and developed decryption techniques that bore similarity to approaches for solving problems in population genetics. His most significant, indeed pathbreaking, work used ideas from genetics and statistics, focusing on analysis of the frequencies of letters in language use. Although he had transitioned from being a geneticist to a cryptographer, his earlier work had resonance in his later pursuits. He soon began working directly for the United States government and produced solutions used to solve complex military ciphers, in particular to break the Japanese Purple code during World War II. Another important legacy of his work was the establishment of the Signal Intelligence Service and eventually the National Security Agency. PMID:28476859

  3. William Friedman, Geneticist Turned Cryptographer.

    PubMed

    Goldman, Irwin L

    2017-05-01

    William Friedman (1891-1969), trained as a plant geneticist at Cornell University, was employed at Riverbank Laboratories by the eccentric millionaire George Fabyan to work on wheat breeding. Friedman, however, soon became intrigued by and started working on a pet project of Fabyan's involving the conjecture that Francis Bacon, a polymath known for the study of ciphers, was the real author of Shakespeare's plays. Thus, beginning in ∼1916, Friedman turned his attention to the so called "Baconian cipher," and developed decryption techniques that bore similarity to approaches for solving problems in population genetics. His most significant, indeed pathbreaking, work used ideas from genetics and statistics, focusing on analysis of the frequencies of letters in language use. Although he had transitioned from being a geneticist to a cryptographer, his earlier work had resonance in his later pursuits. He soon began working directly for the United States government and produced solutions used to solve complex military ciphers, in particular to break the Japanese Purple code during World War II. Another important legacy of his work was the establishment of the Signal Intelligence Service and eventually the National Security Agency. Copyright © 2017 by the Genetics Society of America.

  4. Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)

    SciTech Connect

    Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R

    2013-01-01

    In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardwaremore » and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.« less

  5. An SSH key management system: easing the pain of managing key/user/account associations

    NASA Astrophysics Data System (ADS)

    Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.

    2008-07-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.

  6. Common Criteria for Information Technology Security Evaluation: Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness)

    DTIC Science & Technology

    2002-03-22

    may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

  7. Heavy-Ion Microbeam Fault Injection into SRAM-Based FPGA Implementations of Cryptographic Circuits

    NASA Astrophysics Data System (ADS)

    Li, Huiyun; Du, Guanghua; Shao, Cuiping; Dai, Liang; Xu, Guoqing; Guo, Jinlong

    2015-06-01

    Transistors hit by heavy ions may conduct transiently, thereby introducing transient logic errors. Attackers can exploit these abnormal behaviors and extract sensitive information from the electronic devices. This paper demonstrates an ion irradiation fault injection attack experiment into a cryptographic field-programmable gate-array (FPGA) circuit. The experiment proved that the commercial FPGA chip is vulnerable to low-linear energy transfer carbon irradiation, and the attack can cause the leakage of secret key bits. A statistical model is established to estimate the possibility of an effective fault injection attack on cryptographic integrated circuits. The model incorporates the effects from temporal, spatial, and logical probability of an effective attack on the cryptographic circuits. The rate of successful attack calculated from the model conforms well to the experimental results. This quantitative success rate model can help evaluate security risk for designers as well as for the third-party assessment organizations.

  8. Key Intersections between HRD and Management

    ERIC Educational Resources Information Center

    Egan, Toby M.

    2011-01-01

    This article is in part inspired by an HRD director's insight that his HRD staff should view themselves as HRD Family Doctors, suggesting that a doctor-patient relationship was similar in many respects to the HRD-manager consulting relationship. Although that is possible in some organizations, the author's interviews with corporate managers and…

  9. A novel, privacy-preserving cryptographic approach for sharing sequencing data

    PubMed Central

    Cassa, Christopher A; Miller, Rachel A; Mandl, Kenneth D

    2013-01-01

    Objective DNA samples are often processed and sequenced in facilities external to the point of collection. These samples are routinely labeled with patient identifiers or pseudonyms, allowing for potential linkage to identity and private clinical information if intercepted during transmission. We present a cryptographic scheme to securely transmit externally generated sequence data which does not require any patient identifiers, public key infrastructure, or the transmission of passwords. Materials and methods This novel encryption scheme cryptographically protects participant sequence data using a shared secret key that is derived from a unique subset of an individual’s genetic sequence. This scheme requires access to a subset of an individual’s genetic sequence to acquire full access to the transmitted sequence data, which helps to prevent sample mismatch. Results We validate that the proposed encryption scheme is robust to sequencing errors, population uniqueness, and sibling disambiguation, and provides sufficient cryptographic key space. Discussion Access to a set of an individual’s genotypes and a mutually agreed cryptographic seed is needed to unlock the full sequence, which provides additional sample authentication and authorization security. We present modest fixed and marginal costs to implement this transmission architecture. Conclusions It is possible for genomics researchers who sequence participant samples externally to protect the transmission of sequence data using unique features of an individual’s genetic sequence. PMID:23125421

  10. Elliptic net and its cryptographic application

    NASA Astrophysics Data System (ADS)

    Muslim, Norliana; Said, Mohamad Rushdan Md

    2017-11-01

    Elliptic net is a generalization of elliptic divisibility sequence and in cryptography field, most cryptographic pairings that are based on elliptic curve such as Tate pairing can be improved by applying elliptic nets algorithm. The elliptic net is constructed by using n dimensional array of values in rational number satisfying nonlinear recurrence relations that arise from elliptic divisibility sequences. The two main properties hold in the recurrence relations are for all positive integers m>n, hm +nhm -n=hm +1hm -1hn2-hn +1hn -1hm2 and hn divides hm whenever n divides m. In this research, we discuss elliptic divisibility sequence associated with elliptic nets based on cryptographic perspective and its possible research direction.

  11. Using Compilers to Enhance Cryptographic Product Development

    NASA Astrophysics Data System (ADS)

    Bangerter, E.; Barbosa, M.; Bernstein, D.; Damgård, I.; Page, D.; Pagter, J. I.; Sadeghi, A.-R.; Sovio, S.

    Developing high-quality software is hard in the general case, and it is significantly more challenging in the case of cryptographic software. A high degree of new skill and understanding must be learnt and applied without error to avoid vulnerability and inefficiency. This is often beyond the financial, manpower or intellectual resources avail-able. In this paper we present the motivation for the European funded CACE (Computer Aided Cryptography Engineering) project The main objective of CACE is to provide engineers (with limited or no expertise in cryptography) with a toolbox that allows them to generate robust and efficient implementations of cryptographic primitives. We also present some preliminary results already obtained in the early stages of this project, and discuss the relevance of the project as perceived by stakeholders in the mobile device arena.

  12. Cryptographic Boolean Functions with Biased Inputs

    DTIC Science & Technology

    2015-07-31

    theory of random graphs developed by Erdős and Rényi [2]. The graph properties in a random graph expressed as such Boolean functions are used by...distributed Bernoulli variates with the parameter p. Since our scope is within the area of cryptography , we initiate an analysis of cryptographic...Boolean functions with biased inputs, which we refer to as µp-Boolean functions, is a common generalization of Boolean functions which stems from the

  13. Enrollment Management: A Key to Student Success.

    ERIC Educational Resources Information Center

    Spence, Charles C.; And Others

    This four-part presentation examines the theory and practice of enrollment management at Florida Community College at Jacksonville (FCCJ). First, Charles C. Spence offers a brief description of FCCJ and reviews some of the problems facing the college when he assumed the presidency in 1985, including a significant enrollment decline and serious…

  14. Higher Education Management. The Key Elements.

    ERIC Educational Resources Information Center

    Warner, David, Ed.; Palfreyman, David, Ed.

    This book presents the views of 15 individual authors on the principles of management in higher education from a British perspective. Preliminary material includes brief biographical sketches of each contributing author and a list of selected abbreviations. Individual chapters are: (1) "Setting the Scene" (David Palfreyman and David…

  15. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    NASA Astrophysics Data System (ADS)

    Bui, Francis Minhthang; Hatzinakos, Dimitrios

    2007-12-01

    As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG) signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  16. Careful assessment key in managing prostatitis.

    PubMed

    Gujadhur, Rahul; Aning, Jonathan

    2015-04-01

    Prostatitis is a common condition estimated to affect up to 30% of men in their lifetime, it is most prevalent in men aged between 35 and 50. Prostatitis is subclassified into: acute bacterial prostatitis, chronic bacterial prostatitis, chronic pelvic pain and asymptomatic inflammatory prostatitis. Acute bacterial prostatitis presents with acute onset pelvic pain which may or may not be related to voiding, lower urinary tract symptoms, sometimes haematuria or haematospermia and systemic symptoms such as fever and rigors. A documented history of recurrent urinary tract infections is the key feature of chronic bacterial prostatitis. Duration of symptoms > 3 months defines chronicity. The key symptom of chronic pelvic pain syndrome is pain. Patients may describe pain during or after ejaculation as their predominant symptom. Clinical assessment includes a thorough history and examination. A digital rectal examination should be performed after a midstream urine (MSU) sample has been collected for urine dipstick, microscopy and culture. The prostate should be checked for nodules. In acute bacterial prostatitis the MSU is the only laboratory investigation required. Chronic pelvic pain syndrome may be multifactorial and part of a more generalised pain disorder. Pelvic floor muscle abnormalities, altered neuroendocrine pathways, chemically induced inflammation, bacterial infection, autoimmune processes, dysfunctional voiding as well intraprostatic ductal reflux mechanisms have all been identified in men with chronic pelvic pain syndrome.

  17. Risk management of key issues of FPSO

    NASA Astrophysics Data System (ADS)

    Sun, Liping; Sun, Hai

    2012-12-01

    Risk analysis of key systems have become a growing topic late of because of the development of offshore structures. Equipment failures of offloading system and fire accidents were analyzed based on the floating production, storage and offloading (FPSO) features. Fault tree analysis (FTA), and failure modes and effects analysis (FMEA) methods were examined based on information already researched on modules of relex reliability studio (RRS). Equipment failures were also analyzed qualitatively by establishing a fault tree and Boolean structure function based on the shortage of failure cases, statistical data, and risk control measures examined. Failure modes of fire accident were classified according to the different areas of fire occurrences during the FMEA process, using risk priority number (RPN) methods to evaluate their severity rank. The qualitative analysis of FTA gave the basic insight of forming the failure modes of FPSO offloading, and the fire FMEA gave the priorities and suggested processes. The research has practical importance for the security analysis problems of FPSO.

  18. Managing clinical education through understanding key principles.

    PubMed

    Cunningham, Joanne; Wright, Caroline; Baird, Marilyn

    2015-01-01

    Traditionally, a practicum facilitated the integration of on-campus learning and practical workplace training. Over the past 3 decades, an educative practicum has evolved that promotes clinical reasoning, including analytical and evaluative abilities, through reflective practice. Anecdotal evidence indicates that the delivery of clinical education within medical radiation science entry-level programs continues to vacillate between traditional practicums and the new reflective practicums. To review the literature about clinical education within the medical radiation sciences and identify key principles for practitioners seeking to reflect upon and improve their approach to teaching and supporting students in the clinical environment. A search of 3 major journal databases, Internet searches, and hand searches of reference lists were conducted to identify literature about clinical education in the medical radiation sciences from January 1, 2000, to December 31, 2012. Twenty-two studies were included in this review. The 5 key elements associated with clinical education include the clinical support model and quality, overcoming the theory-practice gap, learning outcomes and reliable and valid assessment, preparing and supporting students, and accommodating differing teaching and learning needs. Many factors influence the quality of clinical education, including the culture of the clinical environment and clinical leadership roles. Several approaches can help students bridge the theory-practice gap, including simulators, role-playing activities, and reflective journals. In addition, clinical educators should use assessment strategies that objectively measure student progress, and they should be positive role models for their students. The successful clinical education of students in the medical radiation sciences depends upon the systems, structures, and people in the clinical environment. Clinical education is accomplished through the collaborative efforts of the

  19. Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management

    NASA Astrophysics Data System (ADS)

    Sridevi, B.; Sivaranjani, S.; Rajaram, S.

    2013-01-01

    In all walks of life the way of communication is transformed by the rapid growth of wireless communication and its pervasive use. A wireless network which is fixed and richer in bandwidth is specified as IEEE 802.16, promoted and launched by an industrial forum is termed as Worldwide Interoperability for Microwave Access (WiMAX). This technology enables seamless delivery of wireless broadband service for fixed and/or mobile users. The obscurity is the long delay which occurs during the handoff management in every network. Mobile WiMAX employs an authenticated key management protocol as a part of handoff management in which the Base Station (BS) controls the distribution of keying material to the Mobile Station (MS). The protocol employed is Privacy Key Management Version 2- Extensible Authentication Protocol (PKMV2-EAP) which is responsible for the normal and periodical authorization of MSs, reauthorization as well as key refreshing. Authorization key (AK) and Traffic Encryption key (TEK) plays a vital role in key exchange. When the lifetime of key expires, MS has to request for a new key to BS which in turn leads to repetition of authorization, authentication as well as key exchange. To avoid service interruption during reauthorization , two active keys are transmitted at the same time by BS to MS. The consequences of existing work are hefty amount of bandwidth utilization, time consumption and large storage. It is also endured by Man in the Middle attack and Impersonation due to lack of security in key exchange. This paper designs an automatic mutual refreshing of keys to minimize bandwidth utilization, key storage and time consumption by proposing Previous key and Iteration based Key Refreshing Function (PKIBKRF). By integrating PKIBKRF in key generation, the simulation results indicate that 21.8% of the bandwidth and storage of keys are reduced and PKMV2 mutual authentication time is reduced by 66.67%. The proposed work is simulated with Qualnet model and

  20. Data standardization. The key to effective management

    USGS Publications Warehouse

    Wagner, C. Russell

    1991-01-01

    Effective management of the nation's water resources is dependent upon accurate and consistent hydrologic information. Before the emergence of environmental concerns in the 1960's, most hydrologic information was collected by the U.S. Geological Survey and other Federal agencies that used fairly consistent methods and equipment. In the past quarter century, however, increased environmental awareness has resulted in an expansion of hydrologic data collection not only by Federal agencies, but also by state and municipal governments, university investigators, and private consulting firms. The acceptance and use of standard methods of collecting and processing hydrologic data would contribute to cost savings and to greater credibility of flow information vital to responsible assessment and management of the nation's water resources. This paper traces the evolution of the requirements and uses of open-channel flow information in the U.S., and the sequence of efforts to standardize the methods used to obtain this information in the future. The variable nature of naturally flowing rivers results in continually changing hydraulic properties of their channels. Those persons responsible for measurement of water flowing in open channels (streamflow) must use a large amount of judgement in the selection of appropriate equipment and technique to obtain accurate flow information. Standardization of the methods used in the measurement of streamflow is essential to assure consistency of data, but must also allow considerable latitude for individual judgement to meet constantly changing field conditions.

  1. Key Management Infrastructure Increment 2 (KMI Inc 2)

    DTIC Science & Technology

    2016-03-01

    2016 Major Automated Information System Annual Report Key Management Infrastructure Increment 2 (KMI Inc 2) Defense Acquisition Management...PB - President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be Determined TY - Then...Assigned: April 6, 2015 Program Information Program Name Key Management Infrastructure Increment 2 (KMI Inc 2) DoD Component DoD The acquiring DoD

  2. SHAMROCK: A Synthesizable High Assurance Cryptography and Key Management Coprocessor

    DTIC Science & Technology

    2016-11-01

    and excluding devices from a communicating group as they become trusted, or untrusted. An example of using rekeying to dynamically adjust group...algorithms, such as the Elliptic Curve Digital Signature Algorithm (ECDSA), work by computing a cryptographic hash of a message using, for example , the...material is based upon work supported by the Assistant Secretary of Defense for Research and Engineering under Air Force Contract No. FA8721- 05-C

  3. Institutional Research: The Key to Successful Enrollment Management.

    ERIC Educational Resources Information Center

    Clagett, Craig A.

    Enrollment management includes the processes and activities that influence the size, shape, and characteristics of a student body by directing institutional efforts in marketing, recruitment, admissions, pricing, and financial aid. Institutional research plays an essential, if not the key, role in enrollment management. This report discusses the…

  4. Physical cryptographic verification of nuclear warheads

    PubMed Central

    Kemp, R. Scott; Danagoulian, Areg; Macdonald, Ruaridh R.; Vavrek, Jayson R.

    2016-01-01

    How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times. PMID:27432959

  5. Physical cryptographic verification of nuclear warheads

    DOE PAGES

    Kemp, R. Scott; Danagoulian, Areg; Macdonald, Ruaridh R.; ...

    2016-07-18

    How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably securemore » cryptographic hash that does not rely on electronics or software. Finally, these techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times.« less

  6. Physical cryptographic verification of nuclear warheads

    NASA Astrophysics Data System (ADS)

    Kemp, R. Scott; Danagoulian, Areg; Macdonald, Ruaridh R.; Vavrek, Jayson R.

    2016-08-01

    How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times.

  7. Physical cryptographic verification of nuclear warheads.

    PubMed

    Kemp, R Scott; Danagoulian, Areg; Macdonald, Ruaridh R; Vavrek, Jayson R

    2016-08-02

    How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times.

  8. DNA based random key generation and management for OTP encryption.

    PubMed

    Zhang, Yunpeng; Liu, Xin; Sun, Manhui

    2017-09-01

    One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.

  9. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    PubMed

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  10. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    PubMed Central

    Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism. PMID:28934152

  11. Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current

    NASA Astrophysics Data System (ADS)

    Hayashi, Yu-Ichi; Homma, Naofumi; Mizuki, Takaaki; Sugawara, Takeshi; Kayano, Yoshiki; Aoki, Takafumi; Minegishi, Shigeki; Satoh, Akashi; Sone, Hideaki; Inoue, Hiroshi

    This paper presents a possibility of Electromagnetic (EM) analysis against cryptographic modules outside their security boundaries. The mechanism behind the information leakage is explained from the view point of Electromagnetic Compatibility: electric fluctuation released from cryptographic modules can conduct to peripheral circuits based on ground bounce, resulting in radiation. We demonstrate the consequence of the mechanism through experiments where the ISO/IEC standard block cipher AES (Advanced Encryption Standard) is implemented on an FPGA board and EM radiations from power and communication cables are measured. Correlation Electromagnetic Analysis (CEMA) is conducted in order to evaluate the information leakage. The experimental results show that secret keys are revealed even though there are various disturbing factors such as voltage regulators and AC/DC converters between the target module and the measurement points. We also discuss information-suppression techniques as electrical-level countermeasures against such CEMAs.

  12. Physically unclonable cryptographic primitives using self-assembled carbon nanotubes.

    PubMed

    Hu, Zhaoying; Comeras, Jose Miguel M Lobez; Park, Hongsik; Tang, Jianshi; Afzali, Ali; Tulevski, George S; Hannon, James B; Liehr, Michael; Han, Shu-Jen

    2016-06-01

    Information security underpins many aspects of modern society. However, silicon chips are vulnerable to hazards such as counterfeiting, tampering and information leakage through side-channel attacks (for example, by measuring power consumption, timing or electromagnetic radiation). Single-walled carbon nanotubes are a potential replacement for silicon as the channel material of transistors due to their superb electrical properties and intrinsic ultrathin body, but problems such as limited semiconducting purity and non-ideal assembly still need to be addressed before they can deliver high-performance electronics. Here, we show that by using these inherent imperfections, an unclonable electronic random structure can be constructed at low cost from carbon nanotubes. The nanotubes are self-assembled into patterned HfO2 trenches using ion-exchange chemistry, and the width of the trench is optimized to maximize the randomness of the nanotube placement. With this approach, two-dimensional (2D) random bit arrays are created that can offer ternary-bit architecture by determining the connection yield and switching type of the nanotube devices. As a result, our cryptographic keys provide a significantly higher level of security than conventional binary-bit architecture with the same key size.

  13. Physically unclonable cryptographic primitives using self-assembled carbon nanotubes

    NASA Astrophysics Data System (ADS)

    Hu, Zhaoying; Comeras, Jose Miguel M. Lobez; Park, Hongsik; Tang, Jianshi; Afzali, Ali; Tulevski, George S.; Hannon, James B.; Liehr, Michael; Han, Shu-Jen

    2016-06-01

    Information security underpins many aspects of modern society. However, silicon chips are vulnerable to hazards such as counterfeiting, tampering and information leakage through side-channel attacks (for example, by measuring power consumption, timing or electromagnetic radiation). Single-walled carbon nanotubes are a potential replacement for silicon as the channel material of transistors due to their superb electrical properties and intrinsic ultrathin body, but problems such as limited semiconducting purity and non-ideal assembly still need to be addressed before they can deliver high-performance electronics. Here, we show that by using these inherent imperfections, an unclonable electronic random structure can be constructed at low cost from carbon nanotubes. The nanotubes are self-assembled into patterned HfO2 trenches using ion-exchange chemistry, and the width of the trench is optimized to maximize the randomness of the nanotube placement. With this approach, two-dimensional (2D) random bit arrays are created that can offer ternary-bit architecture by determining the connection yield and switching type of the nanotube devices. As a result, our cryptographic keys provide a significantly higher level of security than conventional binary-bit architecture with the same key size.

  14. Institutional Data Management in Higher Education. ECAR Key Findings

    ERIC Educational Resources Information Center

    Yanosky, Ronald

    2009-01-01

    This document presents the key findings from the 2009 ECAR (EDUCAUSE Center for Applied Research) study of institutional data management, which examines the policies and practices by which higher education institutions effectively collect, protect, and use digital information assets to meet academic and business needs. Importantly, it also…

  15. From shared care to disease management: key-influencing factors

    PubMed Central

    Eijkelberg, Irmgard M.J.G.; Spreeuwenberg, Cor; Mur-Veeman, Ingrid M.; Wolffenbuttel, Bruce H.R.

    2001-01-01

    Abstract Background In order to improve the quality of care of chronically ill patients the traditional boundaries between primary and secondary care are questioned. To demolish these boundaries so-called ‘shared care’ projects have been initiated in which different ways of substitution of care are applied. When these projects end, disease management may offer a solution to expand the achieved co-operation between primary and secondary care. Objective Answering the question: What key factors influence the development and implementation of shared care projects from a management perspective and how are they linked? Theory The theoretical framework is based on the concept of the learning organisation. Design Reference point is a multiple case study that finally becomes a single case study. Data are collected by means of triangulation. The studied cases concern two interrelated Dutch shared care projects for type 2 diabetic patients, that in the end proceed as one disease management project. Results In these cases the predominant key-influencing factors appear to be the project management, commitment and local context, respectively. The factor project management directly links the latter two, albeit managing both appear prerequisites to its success. In practice this implies managing the factors' interdependency by the application of change strategies and tactics in a committed and skilful way. Conclusion Project management, as the most important and active key factor, is advised to cope with the interrelationships of the influencing factors in a gradually more fundamental way by using strategies and tactics that enable learning processes. Then small-scale shared care projects may change into a disease management network at a large scale, which may yield the future blueprint to proceed. PMID:16896415

  16. From shared care to disease management: key-influencing factors.

    PubMed

    Eijkelberg, I M; Spreeuwenberg, C; Mur-Veeman, I M; Wolffenbuttel, B H

    2001-01-01

    In order to improve the quality of care of chronically ill patients the traditional boundaries between primary and secondary care are questioned. To demolish these boundaries so-called 'shared care' projects have been initiated in which different ways of substitution of care are applied. When these projects end, disease management may offer a solution to expand the achieved co-operation between primary and secondary care. Answering the question: What key factors influence the development and implementation of shared care projects from a management perspective and how are they linked? The theoretical framework is based on the concept of the learning organisation. Reference point is a multiple case study that finally becomes a single case study. Data are collected by means of triangulation. The studied cases concern two interrelated Dutch shared care projects for type 2 diabetic patients, that in the end proceed as one disease management project. In these cases the predominant key-influencing factors appear to be the project management, commitment and local context, respectively. The factor project management directly links the latter two, albeit managing both appear prerequisites to its success. In practice this implies managing the factors' interdependency by the application of change strategies and tactics in a committed and skillful way. Project management, as the most important and active key factor, is advised to cope with the interrelationships of the influencing factors in a gradually more fundamental way by using strategies and tactics that enable learning processes. Then small-scale shared care projects may change into a disease management network at a large scale, which may yield the future blueprint to proceed.

  17. Physically Unclonable Cryptographic Primitives by Chemical Vapor Deposition of Layered MoS2.

    PubMed

    Alharbi, Abdullah; Armstrong, Darren; Alharbi, Somayah; Shahrjerdi, Davood

    2017-12-26

    Physically unclonable cryptographic primitives are promising for securing the rapidly growing number of electronic devices. Here, we introduce physically unclonable primitives from layered molybdenum disulfide (MoS 2 ) by leveraging the natural randomness of their island growth during chemical vapor deposition (CVD). We synthesize a MoS 2 monolayer film covered with speckles of multilayer islands, where the growth process is engineered for an optimal speckle density. Using the Clark-Evans test, we confirm that the distribution of islands on the film exhibits complete spatial randomness, hence indicating the growth of multilayer speckles is a spatial Poisson process. Such a property is highly desirable for constructing unpredictable cryptographic primitives. The security primitive is an array of 2048 pixels fabricated from this film. The complex structure of the pixels makes the physical duplication of the array impossible (i.e., physically unclonable). A unique optical response is generated by applying an optical stimulus to the structure. The basis for this unique response is the dependence of the photoemission on the number of MoS 2 layers, which by design is random throughout the film. Using a threshold value for the photoemission, we convert the optical response into binary cryptographic keys. We show that the proper selection of this threshold is crucial for maximizing combination randomness and that the optimal value of the threshold is linked directly to the growth process. This study reveals an opportunity for generating robust and versatile security primitives from layered transition metal dichalcogenides.

  18. Active listening: The key of successful communication in hospital managers.

    PubMed

    Jahromi, Vahid Kohpeima; Tabatabaee, Seyed Saeed; Abdar, Zahra Esmaeili; Rajabi, Mahboobeh

    2016-03-01

    One of the important causes of medical errors and unintentional harm to patients is ineffective communication. The important part of this skill, in case it has been forgotten, is listening. The objective of this study was to determine whether managers in hospitals listen actively. This study was conducted between May and June 2014 among three levels of managers at teaching hospitals in Kerman, Iran. Active Listening skill among hospital managers was measured by self-made Active Listening Skill Scale (ALSS), which consists of the key elements of active listening and has five subscales, i.e., Avoiding Interruption, Maintaining Interest, Postponing Evaluation, Organizing Information, and Showing Interest. The data were analyzed by IBM-SPSS software, version 20, and the Pearson product-moment correlation coefficient, the chi-squared test, and multiple linear regressions. The mean score of active listening in hospital managers was 2.32 out of 3.The highest score (2.27) was obtained by the first-level managers, and the top managers got the lowest score (2.16). Hospital mangers were best in showing interest and worst in avoiding interruptions. The area of employment was a significant predictor of avoiding interruption and the managers' gender was a strong predictor of skill in maintaining interest (p < 0.05). The type of management and education can predict postponing evaluation, and the length of employment can predict showing interest (p < 0.05). There is a necessity for the development of strategies to create more awareness among the hospital managers concerning their active listening skills.

  19. Biased decoy-state measurement-device-independent quantum cryptographic conferencing with finite resources.

    PubMed

    Chen, RuiKe; Bao, WanSu; Zhou, Chun; Li, Hongwei; Wang, Yang; Bao, HaiZe

    2016-03-21

    In recent years, a large quantity of work have been done to narrow the gap between theory and practice in quantum key distribution (QKD). However, most of them are focus on two-party protocols. Very recently, Yao Fu et al proposed a measurement-device-independent quantum cryptographic conferencing (MDI-QCC) protocol and proved its security in the limit of infinitely long keys. As a step towards practical application for MDI-QCC, we design a biased decoy-state measurement-device-independent quantum cryptographic conferencing protocol and analyze the performance of the protocol in both the finite-key and infinite-key regime. From numerical simulations, we show that our decoy-state analysis is tighter than Yao Fu et al. That is, we can achieve the nonzero asymptotic secret key rate in long distance with approximate to 200km and we also demonstrate that with a finite size of data (say 1011 to 1013 signals) it is possible to perform secure MDI-QCC over reasonable distances.

  20. Active listening: The key of successful communication in hospital managers

    PubMed Central

    Jahromi, Vahid Kohpeima; Tabatabaee, Seyed Saeed; Abdar, Zahra Esmaeili; Rajabi, Mahboobeh

    2016-01-01

    Introduction One of the important causes of medical errors and unintentional harm to patients is ineffective communication. The important part of this skill, in case it has been forgotten, is listening. The objective of this study was to determine whether managers in hospitals listen actively. Methods This study was conducted between May and June 2014 among three levels of managers at teaching hospitals in Kerman, Iran. Active Listening skill among hospital managers was measured by self-made Active Listening Skill Scale (ALSS), which consists of the key elements of active listening and has five subscales, i.e., Avoiding Interruption, Maintaining Interest, Postponing Evaluation, Organizing Information, and Showing Interest. The data were analyzed by IBM-SPSS software, version 20, and the Pearson product-moment correlation coefficient, the chi-squared test, and multiple linear regressions. Results The mean score of active listening in hospital managers was 2.32 out of 3.The highest score (2.27) was obtained by the first-level managers, and the top managers got the lowest score (2.16). Hospital mangers were best in showing interest and worst in avoiding interruptions. The area of employment was a significant predictor of avoiding interruption and the managers’ gender was a strong predictor of skill in maintaining interest (p < 0.05). The type of management and education can predict postponing evaluation, and the length of employment can predict showing interest (p < 0.05). Conclusion There is a necessity for the development of strategies to create more awareness among the hospital managers concerning their active listening skills. PMID:27123221

  1. DOD Financial Management: Effect of Continuing Weaknesses on Management and Operations and Status of Key Challenges

    DTIC Science & Technology

    2014-05-13

    the information needed to effectively (1) manage its assets, (2) assess program performance and make budget decisions , (3) make cost- effective ... decision making, including the information needed to effectively (1) manage its assets, (2) assess program performance and make budget decisions , (3...incorporating key elements of a comprehensive management approach , such as a complete analysis of the return on investment, quantitatively -defined goals

  2. Key management and encryption under the bounded storage model.

    SciTech Connect

    Draelos, Timothy John; Neumann, William Douglas; Lanzone, Andrew J.

    2005-11-01

    There are several engineering obstacles that need to be solved before key management and encryption under the bounded storage model can be realized. One of the critical obstacles hindering its adoption is the construction of a scheme that achieves reliable communication in the event that timing synchronization errors occur. One of the main accomplishments of this project was the development of a new scheme that solves this problem. We show in general that there exist message encoding techniques under the bounded storage model that provide an arbitrarily small probability of transmission error. We compute the maximum capacity of this channelmore » using the unsynchronized key-expansion as side-channel information at the decoder and provide tight lower bounds for a particular class of key-expansion functions that are pseudo-invariant to timing errors. Using our results in combination with Dziembowski et al. [11] encryption scheme we can construct a scheme that solves the timing synchronization error problem. In addition to this work we conducted a detailed case study of current and future storage technologies. We analyzed the cost, capacity, and storage data rate of various technologies, so that precise security parameters can be developed for bounded storage encryption schemes. This will provide an invaluable tool for developing these schemes in practice.« less

  3. Key management of the double random-phase-encoding method using public-key encryption

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  4. [Linking anonymous databases for national and international multicenter epidemiological studies: a cryptographic algorithm].

    PubMed

    Quantin, C; Fassa, M; Coatrieux, G; Riandey, B; Trouessin, G; Allaert, F A

    2009-02-01

    Compiling individual records which come from different sources remains very important for multicenter epidemiological studies, but at the same time European directives or other national legislation concerning nominal data processing have to be respected. These legal aspects can be satisfied by implementing mechanisms that allow anonymization of patient data (such as hashing techniques). Moreover, for security reasons, official recommendations suggest using different cryptographic keys in combination with a cryptographic hash function for each study. Unfortunately, such an anonymization procedure is in contradiction with the common requirement in public health and biomedical research as it becomes almost impossible to link records from separate data collections where the same entity is not referenced in the same way. Solving this paradox by using methodology based on the combination of hashing and enciphering techniques is the main aim of this article. The method relies on one of the best known hashing functions (the secure hash algorithm) to ensure the anonymity of personal information while providing greater resistance to dictionary attacks, combined with encryption techniques. The originality of the method relies on the way the combination of hashing and enciphering techniques is performed: like in asymmetric encryption, two keys are used but the private key depends on the patient's identity. The combination of hashing and enciphering techniques provides a great improvement in the overall security of the proposed scheme. This methodology makes the stored data available for use in the field of public health for the benefit of patients, while respecting legal security requirements.

  5. Cryptographic robustness of a quantum cryptography system using phase-time coding

    SciTech Connect

    Molotkov, S. N.

    2008-01-15

    A cryptographic analysis is presented of a new quantum key distribution protocol using phase-time coding. An upper bound is obtained for the error rate that guarantees secure key distribution. It is shown that the maximum tolerable error rate for this protocol depends on the counting rate in the control time slot. When no counts are detected in the control time slot, the protocol guarantees secure key distribution if the bit error rate in the sifted key does not exceed 50%. This protocol partially discriminates between errors due to system defects (e.g., imbalance of a fiber-optic interferometer) and eavesdropping. In themore » absence of eavesdropping, the counts detected in the control time slot are not caused by interferometer imbalance, which reduces the requirements for interferometer stability.« less

  6. Using the Hill Cipher to Teach Cryptographic Principles

    ERIC Educational Resources Information Center

    McAndrew, Alasdair

    2008-01-01

    The Hill cipher is the simplest example of a "block cipher," which takes a block of plaintext as input, and returns a block of ciphertext as output. Although it is insecure by modern standards, its simplicity means that it is well suited for the teaching of such concepts as encryption modes, and properties of cryptographic hash functions. Although…

  7. 75 FR 52798 - State-07, Cryptographic Clearance Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... of records, Authority for maintenance of the system, Purpose, Safeguards and Retrievability as well... INDIVIDUALS COVERED BY THE SYSTEM: All current Civil Service and Foreign Service direct hire employees of the... well as those who have already received cryptographic clearance. CATEGORIES OF RECORDS IN THE SYSTEM...

  8. Manager. Outlining for Busy Managers the Key Points of Effective Management. The Supervisor's "Do-It-Yourself" Series 2.

    ERIC Educational Resources Information Center

    Rabey, Gordon P.

    This guide, which is intended for new supervisors and managers to use in an independent study setting, deals with the key points of effective management. The following topics are discussed in the individual sections: understanding what a manager is and why managers are appointed; setting objectives and achieving results; planning and controlling…

  9. A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method

    PubMed Central

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Chen, Wei

    2016-01-01

    With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment. Current key management researches pay less attention to the security of sensor networks with MS. This paper proposes a hybrid key management schemes based on a Polynomial Pool-based key pre-distribution and Basic Random key pre-distribution (PPBR) to be used in WSNs with MS. The scheme takes full advantages of these two kinds of methods to improve the cracking difficulty of the key system. The storage effectiveness and the network resilience can be significantly enhanced as well. The tree-based path key establishment method is introduced to effectively solve the problem of communication link connectivity. Simulation clearly shows that the proposed scheme performs better in terms of network resilience, connectivity and storage effectiveness compared to other widely used schemes. PMID:27070624

  10. Soil management: The key to soil quality and sustainable agriculture

    NASA Astrophysics Data System (ADS)

    Basch, Gottlieb; Barão, Lúcia; Soares, Miguel

    2017-04-01

    Today, after the International Year of Soils in 2015 and the proclamation by the International Union of Soil Sciences of the International Decade of Soils 2015-2020, much attention is paid to soil quality. Often used interchangeably, both terms, soil quality and soil health, refer to dynamic soil properties such as soil organic matter or pH, while soil quality also includes inherent soil properties such as texture or mineral composition. However, it is the dynamic or manageable properties that adequate soil management can influence and thus contribute to a well-functioning soil environment capable to deliver the soil-mediated provisioning, regulating and supporting ecosystem services and soil functions. This contribution intends to highlight the key principles of sustainable soil management and provide evidence that they are compliant with a productive, resource efficient and ecologically friendly agriculture. Paradoxically, and despite benefitting from good soil quality, agriculture itself when based on conventional, especially intensive tillage-based soil management practices contributes decisively to soil degradation and to several of the soil threats as identified by the Soil Thematic Strategy, being soil erosion and soil organic matter decline the most notorious ones. To mitigate soil degradation, the European Union's Common Agricultural Policy has introduced conservation measures, mainly through cross-compliance measures supposed to guarantee minimum soil cover, to limit soil erosion and to maintain the levels of soil organic matter. However, it remains unclear to what extent EU member states apply these 'Good Agricultural and Environmental Condition' (GAEC) measures to their utilized agricultural areas. Effective and cost-efficient soil management systems able to conserve or to restore favourable soil conditions, to minimize soil erosion and to invert soil organic matter and soil biodiversity decline and improve soil structure are those capable to mimic as

  11. Key management schemes using routing information frames in secure wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  12. Cryptographic synchronization recovery by measuring randomness of decrypted data

    DOEpatents

    Maestas, Joseph H.; Pierson, Lyndon G.

    1990-01-01

    The invention relates to synchronization of encrypted data communication systems and a method which looks for any lack of pattern or intelligent information in the received data and triggers a resynchronization signal based thereon. If the encrypter/decrypter pairs are out of cryptographic synchronization, the received (decrypted) data resembles pseudorandom data. A method and system are provided for detecting such pseudorandom binary data by, for example, ones density. If the data is sufficiently random the system is resynchronized.

  13. An adaptive cryptographic accelerator for network storage security on dynamically reconfigurable platform

    NASA Astrophysics Data System (ADS)

    Tang, Li; Liu, Jing-Ning; Feng, Dan; Tong, Wei

    2008-12-01

    Existing security solutions in network storage environment perform poorly because cryptographic operations (encryption and decryption) implemented in software can dramatically reduce system performance. In this paper we propose a cryptographic hardware accelerator on dynamically reconfigurable platform for the security of high performance network storage system. We employ a dynamic reconfigurable platform based on a FPGA to implement a PowerPCbased embedded system, which executes cryptographic algorithms. To reduce the reconfiguration latency, we apply prefetch scheduling. Moreover, the processing elements could be dynamically configured to support different cryptographic algorithms according to the request received by the accelerator. In the experiment, we have implemented AES (Rijndael) and 3DES cryptographic algorithms in the reconfigurable accelerator. Our proposed reconfigurable cryptographic accelerator could dramatically increase the performance comparing with the traditional software-based network storage systems.

  14. Leadership: The Key to Successful Implementation of Total Quality Management

    DTIC Science & Technology

    1990-05-01

    the implementation of the initiative called Total Quality Management as the philosophy and guiding principles to improve organizational efficiency...where and how to start. This paper presents the critical elements, their interrelationships, and how they can be used to achieve the cultural change necessary for successful implementation of Total Quality Management .

  15. Quality Management and Key Performance Indicators in Oncologic Esophageal Surgery.

    PubMed

    Gockel, Ines; Ahlbrand, Constantin Johannes; Arras, Michael; Schreiber, Elke Maria; Lang, Hauke

    2015-12-01

    Ranking systems and comparisons of quality and performance indicators will be of increasing relevance for complex "high-risk" procedures such as esophageal cancer surgery. The identification of evidence-based standards relevant for key performance indicators in esophageal surgery is essential for establishing monitoring systems and furthermore a requirement to enhance treatment quality. In the course of this review, we analyze the key performance indicators case volume, radicality of resection, and postoperative morbidity and mortality, leading to continuous quality improvement. Ranking systems established on this basis will gain increased relevance in highly complex procedures within the national and international comparison and furthermore improve the treatment of patients with esophageal carcinoma.

  16. Automation is key to managing a population's health.

    PubMed

    Matthews, Michael B; Hodach, Richard

    2012-04-01

    Online tools for automating population health management can help healthcare organizations meet their patients' needs both during and between encounters with the healthcare system. These tools can facilitate: The use of registries to track patients' health status and care gaps. Outbound messaging to notify patients when they need care. Care team management of more patients at different levels of risk. Automation of workflows related to case management and transitions of care. Online educational and mobile health interventions to engage patients in their care. Analytics programs to identify opportunities for improvement.

  17. Interdisciplinary and participatory approaches: the key to effective groundwater management

    NASA Astrophysics Data System (ADS)

    Barthel, Roland; Foster, Stephen; Villholth, Karen G.

    2017-11-01

    The challenges of a changing world, which are progressively threatening sustainable use of groundwater resources, can only be rationally and effectively addressed through close collaboration between experts and practitioners from different disciplines. Furthermore, science and management need to build on stakeholder opinions and processes in order to generate useful knowledge and positive outcomes in terms of sustainable and equitable groundwater management. This essay provides a discussion of the status of and vision for participatory and inter-disciplinary approaches to groundwater evaluation and management as well as a conceptual framework and relevant research questions that will facilitate such approaches.

  18. Medicaid and Managed Care: Key Data, Trends, and Issues

    MedlinePlus

    ... care, child health, preventive care, and chronic disease management. Most states with MCOs and half of 3 states with PCCMs publicly report on the quality of these programs. Some states prepare a MCO ...

  19. Security of a sessional blind signature based on quantum cryptograph

    NASA Astrophysics Data System (ADS)

    Wang, Tian-Yin; Cai, Xiao-Qiu; Zhang, Rui-Ling

    2014-08-01

    We analyze the security of a sessional blind signature protocol based on quantum cryptograph and show that there are two security leaks in this protocol. One is that the legal user Alice can change the signed message after she gets a valid blind signature from the signatory Bob, and the other is that an external opponent Eve also can forge a valid blind message by a special attack, which are not permitted for blind signature. Therefore, this protocol is not secure in the sense that it does not satisfy the non-forgeability of blind signatures. We also discuss the methods to prevent the attack strategies in the end.

  20. Managing the pursuit of health and wealth: the key challenges

    PubMed Central

    Fidler, David P; Drager, Nick; Lee, Kelley

    2009-01-01

    This article forms part of a six-part Series on trade and health, and sets the stage for this Series by analysing key aspects of the relationship between trade and health. The Series takes stock of this relation and provides timely analysis of the key challenges facing efforts to achieve an appropriate balance between trade and health across a diverse range of issues. This introductory article reviews how trade and health have risen and expanded on global policy agendas in the past decade in unprecedented ways, describes how trade and health issues are respectively governed in international relations, examines the ongoing search for policy coherence between the two policy spheres, and highlights the topics of the remaining articles in the Series. PMID:19167061

  1. Managing the pursuit of health and wealth: the key challenges.

    PubMed

    Fidler, David P; Drager, Nick; Lee, Kelley

    2009-01-24

    This article forms part of a six-part Series on trade and health, and sets the stage for this Series by analysing key aspects of the relationship between trade and health. The Series takes stock of this relation and provides timely analysis of the key challenges facing efforts to achieve an appropriate balance between trade and health across a diverse range of issues. This introductory article reviews how trade and health have risen and expanded on global policy agendas in the past decade in unprecedented ways, describes how trade and health issues are respectively governed in international relations, examines the ongoing search for policy coherence between the two policy spheres, and highlights the topics of the remaining articles in the Series.

  2. Key actions towards the sustainable management of European geese.

    PubMed

    Stroud, David A; Madsen, Jesper; Fox, Anthony D

    2017-03-01

    Increasing abundance of geese in North America and Europe constitutes a major conservation success, but has caused increasing conflicts with economic, health and safety interests, as well as ecosystem impacts. Potential conflict resolution through a single, 'one size fits all' policy is hindered by differences in species' ecology, behaviour, abundance and population status, and in contrasting political and socio-economic environments across the flyways. Effective goose management requires coordinated application of a suite of tools from the local level to strategic flyway management actions. The European Goose Management Platform, established under the Agreement on the Conservation of African-Eurasian Migratory Waterbirds, aims to harmonise and prioritise management, monitoring and conservation efforts, sharing best practice internationally by facilitating agreed policies, coordinating flyway efforts, and sharing and exchanging experiences and information. This depends crucially upon adequate government financing, the collection of necessary monitoring data (e.g., on distribution, abundance, hunting bags, demography, ecosystem and agricultural damage), the collation and effective use of such data and information, as well as the evaluation of outcomes of existing management measures.

  3. Innovation & Collaboration Are Keys to Campus Water Management

    ERIC Educational Resources Information Center

    Thaler-Carter, Ruth E.

    2013-01-01

    Water, water everywhere--managing and conserving water resources is a major factor at campuses worldwide. Doing so is a challenge, since water is one of the most-used and ubiquitous resources in any environment. Water is often taken for granted and not measured by the people who use it the most, yet it might have the greatest potential for helping…

  4. Professional Development and Networking: The Keys to Managing My Career

    ERIC Educational Resources Information Center

    Reilly, Cindy

    2013-01-01

    In this article, the author describes her journey serving in five school districts and finally becoming a business manager in her hometown in Wisconsin. Having become involved in professional organizations and working to share what she knows, she became recognized as a skilled business official and thus never had a problem finding a job or…

  5. Planning and Time Management: Keys to Effective Educational Leadership.

    ERIC Educational Resources Information Center

    Sergiovanni, Thomas J.

    1980-01-01

    Educational administrators' concern with planning and time management results from the fragmentation of their daily activities, which research has documented, and their consequent search for order and control. Time is important because its scarcity affects productivity and its use has social-psychological effects on staffs' perceptions of…

  6. Key Institutions in Business and Management Education Research

    ERIC Educational Resources Information Center

    Fornaciari, Charles J.; Arbaugh, J. B.; Asarta, Carlos J.; Bento, Regina F.; Hwang, Alvin; Lund Dean, Kathy

    2017-01-01

    The authors investigate institutional productivity in business and management education (BME) research based on the analysis of 4,464 articles published by 7,210 authors across 17 BME journals over a 10-year period, involving approximately 1,900 schools worldwide. Departing from traditional disciplinary silos, they examine the BME research field…

  7. Networking: A Key to Career Communication and Management Consulting Success

    ERIC Educational Resources Information Center

    Clark, Thomas

    2009-01-01

    Now that job security with one organization is a relic of the past and companies are outsourcing training and other "nonessential" functions, the author suggests in his career communication classes that students develop the same inventive strategies to plan their employment futures that management consultants use to market themselves in the 21st…

  8. Leadership and Strategic Management: Keys to Institutional Priorities and Planning

    ERIC Educational Resources Information Center

    Taylor, James S.; de Lourdes Machado, Maria; Peterson, Marvin W.

    2008-01-01

    Allocating and managing resources have always been important cornerstones of institutional leadership. Institutional resources include financial, physical and human components. Even in the best of times, it is a challenge to do this effectively. In times of diminished and shrinking resources, distributing these precious commodities across the…

  9. SITE TECHNOLOGY CAPSULE: GIS\\KEY ENVIRONMENTAL DATA MANAGEMENT SYSTEM

    EPA Science Inventory

    GIS/Key™ is a comprehensive environmental database management system that integrates site data and graphics, enabling the user to create geologic cross-sections; boring logs; potentiometric, isopleth, and structure maps; summary tables; and hydrographs. GIS/Key™ is menu-driven an...

  10. Waste to energy – key element for sustainable waste management

    SciTech Connect

    Brunner, Paul H., E-mail: paul.h.brunner@tuwien.ac.at; Rechberger, Helmut

    2015-03-15

    Highlights: • First paper on the importance of incineration from a urban metabolism point of view. • Proves that incineration is necessary for sustainable waste management. • Historical and technical overview of 100 years development of MSW incineration. - Abstract: Human activities inevitably result in wastes. The higher the material turnover, and the more complex and divers the materials produced, the more challenging it is for waste management to reach the goals of “protection of men and environment” and “resource conservation”. Waste incineration, introduced originally for volume reduction and hygienic reasons, went through a long and intense development. Together withmore » prevention and recycling measures, waste to energy (WTE) facilities contribute significantly to reaching the goals of waste management. Sophisticated air pollution control (APC) devices ensure that emissions are environmentally safe. Incinerators are crucial and unique for the complete destruction of hazardous organic materials, to reduce risks due to pathogenic microorganisms and viruses, and for concentrating valuable as well as toxic metals in certain fractions. Bottom ash and APC residues have become new sources of secondary metals, hence incineration has become a materials recycling facility, too. WTE plants are supporting decisions about waste and environmental management: They can routinely and cost effectively supply information about chemical waste composition as well as about the ratio of biogenic to fossil carbon in MSW and off-gas.« less

  11. Media Management Education: Key Themes, Pedagogies, and Challenges

    ERIC Educational Resources Information Center

    Förster, Kati; Rohn, Ulrike

    2015-01-01

    The media sphere has changed significantly as a result of globalization, technology, and new habits of media use. Scholars in journalism and mass communication thus call on a transformation and reinvention of higher education in the field. The purpose of this article is to investigate how media management is taught across different institutions,…

  12. Case management: key to access, quality, and financial success.

    PubMed

    Smith, Alison P

    2003-01-01

    Several strategic, organizational, and operational variables drive successful case management programs. Organizational goals and accountability for support by administrative and medical staff leaders set the stage for a comprehensive program. The integration of utilization review, discharge planning, and other functions into the role of the case manager improves productivity and continuity. Choosing a model for assigning patients, a variable unique to the institution, should be carefully considered. Regardless of the power of strategic goals or the creative selection of a model, daily practices that promote daily review and communication will reveal all of the opportunities for improved performance. Complications are avoided one patient at a time and patients deserve vigilance. Length of stay is shortened 1 day at a time and we can no longer afford to miss these opportunities. In the period of high census, an unnecessary day for one patient at the end of his/her stay may mean another patient being diverted to another hospital away from his/her physician and past medical records. Creating constructive physician partnerships and cooperative relationships with postacute care providers can bring a case management program to higher level of performance. While many organizations have employees called "case managers," fewer have a comprehensive approach that has the potential to drive so many important indicators of performance.

  13. Teaching Tip: Utilizing Classroom Simulation to Convey Key Concepts in IT Portfolio Management

    ERIC Educational Resources Information Center

    Larson, Eric C.

    2013-01-01

    Managing a portfolio of IT projects is an important capability for firms and their managers. The classroom simulation described here provides students in an MBA information systems management/strategy course with the opportunity to deepen their understanding of the key concepts that should be considered in managing an IT portfolio and helps…

  14. Turkish Thoracic Society asthma management and prevention guideline: key points.

    PubMed

    Yıldız, Füsun; Oğuzülgen, I Kıvılcım; Dursun, Berna; Mungan, Dilşad; Gemicioğlu, Bilun; Yorgancıoğlu, Arzu

    2011-01-01

    Asthma still has high morbidity and cost despite all advances in pathogenesis, diagnosis and treatment. Although asthma can be controlled with proper diagnosis and treatment, the low rates of control in our country and in the world can not be attributed to the variable course of the disease and patients' psycho-social behaviours for chronic disease. In this context, Turkish Thoracic Society (TTS) has decided to update Asthma Diagnosis and Management Guide latest published in 2000. National data were collected, compiled and prepared by authors, and final form given by the TTS Asthma and Allergy Study Group, after presenting to consultant individuals and institutions. In June 2009, the National Asthma Management and Prevention Guideline were published in Turkish. In this paper, we aimed to present the national guide in English with its basics and individual differences.

  15. A cryptographic hash function based on chaotic network automata

    NASA Astrophysics Data System (ADS)

    Machicao, Jeaneth; Bruno, Odemir M.

    2017-12-01

    Chaos theory has been used to develop several cryptographic methods relying on the pseudo-random properties extracted from simple nonlinear systems such as cellular automata (CA). Cryptographic hash functions (CHF) are commonly used to check data integrity. CHF “compress” arbitrary long messages (input) into much smaller representations called hash values or message digest (output), designed to prevent the ability to reverse the hash values into the original message. This paper proposes a chaos-based CHF inspired on an encryption method based on chaotic CA rule B1357-S2468. Here, we propose an hybrid model that combines CA and networks, called network automata (CNA), whose chaotic spatio-temporal outputs are used to compute a hash value. Following the Merkle and Damgård model of construction, a portion of the message is entered as the initial condition of the network automata, so that the rest parts of messages are iteratively entered to perturb the system. The chaotic network automata shuffles the message using flexible control parameters, so that the generated hash value is highly sensitive to the message. As demonstrated in our experiments, the proposed model has excellent pseudo-randomness and sensitivity properties with acceptable performance when compared to conventional hash functions.

  16. Polarity management: the key challenge for integrated health systems.

    PubMed

    Burns, L R

    1999-01-01

    Integrated health systems are confronted with numerous dilemmas that must be managed. Many of these dilemmas are an inherent part of the system's structure, given that multiple competing hospitals, medical groups, and (sometimes) health plans are often under one organizational roof. This article presents an analysis of these dilemmas--referred to in the management literature as polarities--as they are found in six integrated health systems in Illinois. The nine polarities that must be managed include (1) hospital systems that want to be organizations of physicians; (2) system expansion by growing the physician component; (3) system centralization and physician decentralization; (4) centripetal and centrifugal forces involving physicians; (5) system objectives and physician interests; (6) system centralization and hospital decentralization; (7) primary care physicians and specialists; (8) physician autonomy via collectivization; and (9) vertical and virtual integration. The article identifies some of the solutions to the polarities that have been enacted by systems. In general, executives and physicians in integrated health systems must attend to the processes of integration as much as or more than the structures of integration.

  17. Waste to energy--key element for sustainable waste management.

    PubMed

    Brunner, Paul H; Rechberger, Helmut

    2015-03-01

    Human activities inevitably result in wastes. The higher the material turnover, and the more complex and divers the materials produced, the more challenging it is for waste management to reach the goals of "protection of men and environment" and "resource conservation". Waste incineration, introduced originally for volume reduction and hygienic reasons, went through a long and intense development. Together with prevention and recycling measures, waste to energy (WTE) facilities contribute significantly to reaching the goals of waste management. Sophisticated air pollution control (APC) devices ensure that emissions are environmentally safe. Incinerators are crucial and unique for the complete destruction of hazardous organic materials, to reduce risks due to pathogenic microorganisms and viruses, and for concentrating valuable as well as toxic metals in certain fractions. Bottom ash and APC residues have become new sources of secondary metals, hence incineration has become a materials recycling facility, too. WTE plants are supporting decisions about waste and environmental management: They can routinely and cost effectively supply information about chemical waste composition as well as about the ratio of biogenic to fossil carbon in MSW and off-gas. Copyright © 2014 Elsevier Ltd. All rights reserved.

  18. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

    PubMed Central

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain. PMID:22319333

  19. BARI+: a biometric based distributed key management approach for wireless body area networks.

    PubMed

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  20. Perceived Triggers of Asthma: Key to Symptom Perception and Management

    PubMed Central

    Janssens, Thomas; Ritz, Thomas

    2013-01-01

    Adequate asthma management depends on an accurate identification of asthma triggers. A review of the literature on trigger perception in asthma shows that individuals vary in their perception of asthma triggers and that the correlation between self-reported asthma triggers and allergy tests is only modest. In this paper, we provide an overview of psychological mechanisms involved in the process of asthma triggers identification. We identify sources of errors in trigger identification and targets for behavioral interventions that aim to improve the accuracy of asthma trigger identification and thereby enhance asthma control. PMID:23957335

  1. Knowledge communication: a key to successful crisis management.

    PubMed

    Johansson, Anders; Härenstam, Malin

    2013-09-01

    A winning concept of crisis management can be summarized in 2 words: knowledge communication. If decision makers, communicators, experts, and the public understand what the crisis is about and share their knowledge, the process of handling it will be optimized. Effective crisis communication implies the necessity of an unhindered but purposeful exchange of information within and between authorities, organizations, media, involved individuals, and groups before, during, and after a crisis. This article focuses on the importance of the before, or prevention, part of a crisis since it holds a rich possibility to enhance the chances for successful crisis management of a bioterrorism incident. An extended perspective on crisis communication efficiently links to a more thorough understanding of risk perception with various stakeholders and the public, which also will be helpful for situational awareness. Furthermore, the grounded baseline for the dialogue type of crisis communication suitable in modern society and to modern social media is achieved by linking to those risk communication efforts that are made. The link between risk and crisis should be afforded more attention since, especially in biosecurity, there would be no crisis without risk negligence and poor or malfunctioning preventive efforts.

  2. Geriatric hip fracture management: keys to providing a successful program.

    PubMed

    Basu, N; Natour, M; Mounasamy, V; Kates, S L

    2016-10-01

    Hip fractures are a common event in older adults and are associated with significant morbidity, mortality and costs. This review examines the necessary elements required to implement a successful geriatric fracture program and identifies some of the barriers faced when implementing a successful program. The Geriatric Fracture Center (GFC) is a treatment model that standardizes the approach to the geriatric fracture patient. It is based on five principles: surgical fracture management; early operative intervention; medical co-management with geriatricians; patient-centered, standard order sets to employ best practices; and early discharge planning with a focus on early functional rehabilitation. Implementing a geriatric fracture program begins with an assessment of the hospital's data on hip fractures and standard care metrics such as length of stay, complications, time to surgery, readmission rates and costs. Business planning is essential along with the medical planning process. To successfully develop and implement such a program, strong physician leadership is necessary to articulate both a short- and long-term plan for implementation. Good communication is essential-those organizing a geriatric fracture program must be able to implement standardized plans of care working with all members of the healthcare team and must also be able to foster relationships both within the hospital and with other institutions in the community. Finally, a program of continual quality improvement must be undertaken to ensure that performance outcomes are improving patient care.

  3. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    PubMed

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  4. Is tretinoin still a key agent for photoaging management?

    PubMed

    Ascenso, Andreia; Ribeiro, Helena; Marques, Helena C; Oliveira, Helena; Santos, Conceicao; Simões, Sandra

    2014-01-01

    BACKGROUND & SCOPE OF THE REVIEW: This review focuses on the UV radiation effects on skin, emphasizing the photoaging process, and the photoprotection conferred by tretinoin (all-trans retinoic acid or ATRA). Tretinoin is still the best tested retinoid to reverse photoaged skin. Tretinoin can be used for photoaging treatment or combined treatment by different mechanisms. It binds to and activates retinoic acid receptors, inducing changes in gene expression that leads to cell differentiation, decreased cell proliferation, and inhibition of tumourigenesis. It has been demonstrated that photoaging resulting from UV-B radiation can be treated by retinoid formulations. Pretreatment of human skin with tretinoin blocks dermal matrix degradation followed by sun exposure, inhibiting the induction of the activated protein-1 (AP-1) transcription factor and AP-1 regulated matrix-degrading metalloproteinases. GENERAL SIGNIFICANCE AND INTEREST: Tretinoin should be considered as a key factor as it is the most potent and best-studied retinoid. In addition, the development of advanced drug delivery systems, especially novel nanoformulations, has contributed to overpass some technical drawbacks besides the skin irritation potential. The triple combination of tretinoin, hydroquinone and corticosteroids is still considered the gold standard for melasma. Although there are other novel therapeutic approaches, more high-quality clinical trials are still needed.

  5. Resource management as a key factor for sustainable urban planning.

    PubMed

    Agudelo-Vera, Claudia M; Mels, Adriaan R; Keesman, Karel J; Rijnaarts, Huub H M

    2011-10-01

    Due to fast urbanization and increasing living standards, the environmental sustainability of our global society becomes more and more questionable. In this historical review we investigate the role of resources management (RM) and urban planning (UP) and propose ways for integration in sustainable development (SD). RM follows the principle of circular causation, and we reflect on to what extent RM has been an element for urban planning. Since the existence of the first settlements, a close relationship between RM, urbanization and technological development has been present. RM followed the demand for urban resources like water, energy, and food. In history, RM has been fostered by innovation and technology developments and has driven population growth and urbanization. Recent massive resource demand, especially in relation to energy and material flows, has altered natural ecosystems and has resulted in environmental degradation. UP has developed separately in response to different questions. UP followed the demand for improved living conditions, often associated to safety, good manufacturing and trading conditions and appropriate sanitation and waste management. In history UP has been a developing research area, especially since the industrial era and the related strong urbanization at the end of the 18th century. UP responded to new emerging problems in urban areas and became increasingly complex. Nowadays, UP has to address many objectives that are often conflicting, including, the urban sustainability. Our current urban un-sustainability is rooted in massive resource consumption and waste production beyond natural limits, and the absence of flows from waste to resources. Therefore, sustainable urban development requires integration of RM into UP. We propose new ways to this integration. Copyright © 2011 Elsevier Ltd. All rights reserved.

  6. Symmetric Link Key Management for Secure Neighbor Discovery in a Decentralized Wireless Sensor Network

    DTIC Science & Technology

    2017-09-01

    and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT...KEY MANAGEMENT FOR SECURE NEIGHBOR DISCOVERY IN A DECENTRALIZED WIRELESS SENSOR NETWORK by Kelvin T. Chew September 2017 Thesis Advisor...DATE September 2017 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE SYMMETRIC LINK KEY MANAGEMENT FOR SECURE NEIGHBOR

  7. Notification: Key Management Challenges Confronting the U.S. Chemical Safety and Hazard Investigation Board

    EPA Pesticide Factsheets

    June 9, 2014. The OIG is beginning work to update the fiscal year 2014 list of areas we consider to be the key management challenges confronting the U.S. Chemical Safety and Hazard Investigation Board (CSB).

  8. Designing new institutions for implementing integrated disaster risk management: key elements and future directions.

    PubMed

    Gopalakrishnan, Chennat; Okada, Norio

    2007-12-01

    The goal of integrated disaster risk management is to promote an overall improvement in the quality of safety and security in a region, city or community at disaster risk. This paper presents the case for a thorough overhaul of the institutional component of integrated disaster risk management. A review of disaster management institutions in the United States indicates significant weaknesses in their ability to contribute effectively to the implementation of integrated disaster risk management. Our analysis and findings identify eight key elements for the design of dynamic new disaster management institutions. Six specific approaches are suggested for incorporating the identified key elements in building new institutions that would have significant potential for enhancing the effective implementation of integrated disaster risk management. We have developed a possible blueprint for effective design and construction of efficient, sustainable and functional disaster management institutions.

  9. Cryptographic framework for document-objects resulting from multiparty collaborative transactions.

    PubMed

    Goh, A

    2000-01-01

    Multiparty transactional frameworks--i.e. Electronic Data Interchange (EDI) or Health Level (HL) 7--often result in composite documents which can be accurately modelled using hyperlinked document-objects. The structural complexity arising from multiauthor involvement and transaction-specific sequencing would be poorly handled by conventional digital signature schemes based on a single evaluation of a one-way hash function and asymmetric cryptography. In this paper we outline the generation of structure-specific authentication hash-trees for the the authentication of transactional document-objects, followed by asymmetric signature generation on the hash-tree value. Server-side multi-client signature verification would probably constitute the single most compute-intensive task, hence the motivation for our usage of the Rabin signature protocol which results in significantly reduced verification workloads compared to the more commonly applied Rivest-Shamir-Adleman (RSA) protocol. Data privacy is handled via symmetric encryption of message traffic using session-specific keys obtained through key-negotiation mechanisms based on discrete-logarithm cryptography. Individual client-to-server channels can be secured using a double key-pair variation of Diffie-Hellman (DH) key negotiation, usage of which also enables bidirectional node authentication. The reciprocal server-to-client multicast channel is secured through Burmester-Desmedt (BD) key-negotiation which enjoys significant advantages over the usual multiparty extensions to the DH protocol. The implementation of hash-tree signatures and bi/multidirectional key negotiation results in a comprehensive cryptographic framework for multiparty document-objects satisfying both authentication and data privacy requirements.

  10. The Organization of Teaching Process for the Development of Key Competencies (Case Study: Future Managers)

    ERIC Educational Resources Information Center

    Khusainova, Guzel R.; Galeeva, Farida T.; Giniyatullina, Diana R.; Tarasova, Natalya M.; Tsareva, Ekaterina E.

    2016-01-01

    This article is focused on the development of the organizational forms of future managers training for the development of their key competencies, namely, creativity and the ability to work in a team. The analysis of works of the researchers in the field of management and pedagogics shows that small groups as an organizational form has great…

  11. Agri-Environmental Resource Management by Large-Scale Collective Action: Determining KEY Success Factors

    ERIC Educational Resources Information Center

    Uetake, Tetsuya

    2015-01-01

    Purpose: Large-scale collective action is necessary when managing agricultural natural resources such as biodiversity and water quality. This paper determines the key factors to the success of such action. Design/Methodology/Approach: This paper analyses four large-scale collective actions used to manage agri-environmental resources in Canada and…

  12. Managing malocclusion in the mixed dentition: six keys to success. Part 1.

    PubMed

    Fleming, Padhraig S; Johal, Ama; DiBiase, Andrew T

    2008-11-01

    Indications of developing malocclusion are often present in the mixed dentition.With judicious supervision and timely intervention their effects can be minimized. The general dental practitioner is ideally placed to recognize, manage and correct many such incipient problems. This first of two papers considers three keys to success involving, normal dental development, deviations from normal eruption patterns, crossbite correction and habit cessation. The appropriate management of developing malocclusion may simplify later orthodontic management or indeed make such intervention unnecessary.

  13. Effective user management with high strength crypto -key in dynamic group environment in cloud

    NASA Astrophysics Data System (ADS)

    Kumar, P. J.; Suganya, P.; Karthik, G.

    2017-11-01

    Cloud Clusters consists of various collections of files which are being accessed by multiple users of Cloud. The users are managed as a group and the association of the user to a particular group is dynamic in nature. Every group has a manager who handles the membership of a user to a particular group by issuing keys for encryption and decryption. Due to the dynamic nature of a user he/she may leave the group very frequently. But an attempt can be made by the user who has recently left the group to access a file maintained by that group. Key distribution becomes a critical issue while the behavior of the user is dynamic. Existing techniques to manage the users of group in terms of security and key distribution has been investigated so that to arrive at an objective to identify the scopes to increase security and key management scheme in cloud. The usage of various key combinations to measure the strength of security and efficiency of user management in dynamic cloud environment has been investigated.

  14. Cryptographically supported NFC tags in medication for better inpatient safety.

    PubMed

    Özcanhan, Mehmet Hilal; Dalkılıç, Gökhan; Utku, Semih

    2014-08-01

    Reliable sources report that errors in drug administration are increasing the number of harmed or killed inpatients, during healthcare. This development is in contradiction to patient safety norms. A correctly designed hospital-wide ubiquitous system, using advanced inpatient identification and matching techniques, should provide correct medicine and dosage at the right time. Researchers are still making grouping proof protocol proposals based on the EPC Global Class 1 Generation 2 ver. 1.2 standard tags, for drug administration. Analyses show that such protocols make medication unsecure and hence fail to guarantee inpatient safety. Thus, the original goal of patient safety still remains. In this paper, a very recent proposal (EKATE) upgraded by a cryptographic function is shown to fall short of expectations. Then, an alternative proposal IMS-NFC which uses a more suitable and newer technology; namely Near Field Communication (NFC), is described. The proposed protocol has the additional support of stronger security primitives and it is compliant to ISO communication and security standards. Unlike previous works, the proposal is a complete ubiquitous system that guarantees full patient safety; and it is based on off-the-shelf, new technology products available in every corner of the world. To prove the claims the performance, cost, security and scope of IMS-NFC are compared with previous proposals. Evaluation shows that the proposed system has stronger security, increased patient safety and equal efficiency, at little extra cost.

  15. A joint signal processing and cryptographic approach to multimedia encryption.

    PubMed

    Mao, Yinian; Wu, Min

    2006-07-01

    In recent years, there has been an increasing trend for multimedia applications to use delegate service providers for content distribution, archiving, search, and retrieval. These delegate services have brought new challenges to the protection of multimedia content confidentiality. This paper discusses the importance and feasibility of applying a joint signal processing and cryptographic approach to multimedia encryption, in order to address the access control issues unique to multimedia applications. We propose two atomic encryption operations that can preserve standard compliance and are friendly to delegate processing. Quantitative analysis for these operations is presented to demonstrate that a good tradeoff can be made between security and bitrate overhead. In assisting the design and evaluation of media security systems, we also propose a set of multimedia-oriented security scores to quantify the security against approximation attacks and to complement the existing notion of generic data security. Using video as an example, we present a systematic study on how to strategically integrate different atomic operations to build a video encryption system. The resulting system can provide superior performance over both generic encryption and its simple adaptation to video in terms of a joint consideration of security, bitrate overhead, and friendliness to delegate processing.

  16. Number Theory and Public-Key Cryptography.

    ERIC Educational Resources Information Center

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  17. Effects of a group-based reproductive management extension programme on key management outcomes affecting reproductive performance.

    PubMed

    Brownlie, Tom S; Morton, John M; Heuer, Cord; McDougall, Scott

    2015-02-01

    A group-based reproductive management extension programme has been designed to help managers of dairy herds improve herd reproductive performance. The aims of this study were, firstly, to assess effects of participation by key decision makers (KDMs) in a farmer action group programme in 2009 and 2010 on six key management outcomes (KMOs) that affect reproductive performance over 2 years (2009-2010 and 2010-2011), and secondly, to describe KDM intentions to change management behaviour(s) affecting each management outcome after participation in the programme. Seasonal calving dairy herds from four regions of New Zealand were enrolled in the study. Intentions to modify management behaviour were recorded using the formal written action plans developed during the extension programme. KMOs assessed were calving pattern of the herd, pre-calving heifer liveweight, pre-calving and premating body condition score (BCS), oestrus detection, anoestrus cow management and bull management. Participation was associated with improvements in heifer liveweight, more heifers calving in the first 6 weeks of the seasonal calving period, premating BCS and oestrus detection. No significant effects were observed on anoestrus cow management or bull management. KDMs with greater numbers of proposed actions had lower 6 week in-calf rates in the second study year than KDMs who proposed fewer actions. A more effective strategy to ensure more appropriate objectives is proposed. Strategies to help KDMs to implement proposed actions more successfully should be investigated to improve the programme further. Copyright © 2014 Elsevier Ltd. All rights reserved.

  18. Managing malocclusion in the mixed dentition: six keys to success part 2.

    PubMed

    Fleming, Padhraig; Johal, Ama; DiBiase, Andrew T

    2008-12-01

    Regular recall strategies ensure the general dental practitioner is ideally placed to recognize, manage and correct many occlusal problems in the mixed dentition phase. The first paper focused on recognition of normal and abnormal occlusal development, cessation of habits and correction of crossbites. This paper considers management of leeway space, highlights the importance of palpation of unerupted maxillary canines, and discusses the need for judicious removal of primary teeth (Keys 4-6).

  19. Design and Analysis of Optimization Algorithms to Minimize Cryptographic Processing in BGP Security Protocols.

    PubMed

    Sriram, Vinay K; Montgomery, Doug

    2017-07-01

    The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.

  20. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    PubMed Central

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  1. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    PubMed

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  2. Responding to Recession: IT Funding and Cost Management in Higher Education. Key Findings

    ERIC Educational Resources Information Center

    Goldstein, Philip J.

    2010-01-01

    This document presents the key findings from "Responding to Recession: IT Funding and Cost Management in Higher Education", the 2010 ECAR (EDUCAUSE Center for Applied Research) study of how the economic recession is impacting information technology (IT) organizations and operations in higher education. The study was designed to address the…

  3. Key Factors to Instructors' Satisfaction of Learning Management Systems in Blended Learning

    ERIC Educational Resources Information Center

    Al-Busaidi, Kamla Ali; Al-Shihi, Hafedh

    2012-01-01

    Learning Management System (LMS) enables institutions to administer their educational resources, and support their traditional classroom education and distance education. LMS survives through instructors' continuous use, which may be to a great extent associated with their satisfaction of the LMS. Consequently, this study examined the key factors…

  4. Retraction notice to: "The Application of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks"

    NASA Astrophysics Data System (ADS)

    Si, Lingling; Ji, Zhigang; Wang, Zhihui

    This article has been retracted: please see Elsevier Policy on Article Withdrawal. This article has been retracted at the request of the Publisher. The authors have plagiarized a paper that had already appeared in "Queen's 25th Biennial Symposium on Communications", page 168-172, print ISBN 978-1-4244-5709-0. One of the conditions of submission of a paper for publication is that authors declare explicitly that their work is original and has not appeared in a publication elsewhere. Re-use of any data should be appropriately cited. As such this article represents a severe abuse of the scientific publishing system. The scientific community takes a very strong view on this matter and apologies are offered to readers of the journal that this was not detected during the submission process.

  5. RETRACTED: The Application of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Si, Lingling; Ji, Zhigang; Wang, Zhihui

    This article has been retracted: please see Elsevier Policy on Article Withdrawal. This article has been retracted at the request of the Publisher. The authors have plagiarized a paper that had already appeared in "Queen's 25th Biennial Symposium on Communications", page 168-172, print ISBN 978-1-4244-5709-0, http://dx.doi.org/10.1109/BSC.2010.5472979. One of the conditions of submission of a paper for publication is that authors declare explicitly that their work is original and has not appeared in a publication elsewhere. Re-use of any data should be appropriately cited. As such this article represents a severe abuse of the scientific publishing system. The scientific community takes a very strong view on this matter and apologies are offered to readers of the journal that this was not detected during the submission process.

  6. Entrepreneurial Librarianship: The Key to Effective Information Services Management. Information Services Management Series.

    ERIC Educational Resources Information Center

    St. Clair, Guy

    The need to approach library management from an entrepreneurial business perspective is vital, whether the information facility is in a corporate, academic, public or school setting. Although librarianship is not a business, library management must be driven by the same characteristics-- responsibility, performance, and control--as any other…

  7. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    PubMed Central

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied. PMID:23762851

  8. Secure method for biometric-based recognition with integrated cryptographic functions.

    PubMed

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  9. Fish traders as key actors in fisheries: gender and adaptive management.

    PubMed

    Fröcklin, Sara; de la Torre-Castro, Maricela; Lindström, Lars; Jiddawi, Narriman S

    2013-12-01

    This paper fills an important gap towards adaptive management of small-scale fisheries by analyzing the gender dimension of fish trade in Zanzibar, Tanzania. We hypothesize that gender-based differences are present in the fish value chain and to test the hypothesis interviews were performed to analyze: (i) markets, customers, and mobility, (ii) material and economic resources, (iii) traded fish species, (iv) contacts and organizations, and (v) perceptions and experiences. Additionally, management documents were analyzed to examine the degree to which gender is considered. Results show that women traders had less access to social and economic resources, profitable markets, and high-value fish, which resulted in lower income. These gender inequalities are linked, among others, to women's reproductive roles such as childcare and household responsibilities. Formal fisheries management was found to be gender insensitive, showing how a crucial feedback element of adaptive management is missing in Zanzibar's management system, i.e., knowledge about key actors, their needs and challenges.

  10. A noise-immune cryptographic information protection method for facsimile information transmission and the realization algorithms

    NASA Astrophysics Data System (ADS)

    Krasilenko, Vladimir G.; Bardachenko, Vitaliy F.; Nikolsky, Alexander I.; Lazarev, Alexander A.; Ogorodnik, Konstantin V.

    2006-04-01

    We analyse the existent methods of cryptographic defence for the facsimile information transfer, consider their shortcomings and prove the necessity of better information protection degree. The method of information protection that is based on presentation of input data as images is proposed. We offer a new noise-immune algorithm for realization of this method which consists in transformation of an input frame by pixels transposition according to an entered key. At decoding mode the reverse transformation of image with the use of the same key is used. Practical realization of the given method takes into account noise in the transmission channels and information distortions by scanners, faxes and others like that. We show that the given influences are reduced to the transformation of the input image coordinates. We show the algorithm in detail and consider its basic steps. We show the possibility of the offered method by the means of the developed software. The realized algorithm corrects curvature of frames: turn, scaling, fallout of pixels and others like that. At low noise level (loss of pixel information less than 10 percents) it is possible to encode, transfer and decode any types of images and texts with 12-size font character. The software filters for information restore and noise removing allow to transfer fax data with 30 percents pixels loss at 18-size font text. This percent of data loss can be considerably increased by the use of the software character recognition block that can be realized on fuzzy-neural algorithms. Examples of encoding and decryption of images and texts are shown.

  11. Mobility based key management technique for multicast security in mobile ad hoc networks.

    PubMed

    Madhusudhanan, B; Chitra, S; Rajan, C

    2015-01-01

    In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  12. National disease management plans for key chronic non-communicable diseases in Singapore.

    PubMed

    Tan, C C

    2002-07-01

    In Singapore, chronic, non-communicable diseases, namely coronary heart disease, stroke and cancer, account for more than 60% of all deaths and a high burden of disability and healthcare expenditure. The burden of these diseases is likely to rise with our rapidly ageing population and changing lifestyles, and will present profound challenges to our healthcare delivery and financing systems over the next 20 to 30 years. The containment and optimal management of these conditions require a strong emphasis on patient education and the development of integrated models of healthcare delivery in place of the present uncoordinated, compartmentalised way of delivering healthcare. To meet these challenges, the Ministry of Health's major thrusts are disease control measures which focus mainly on primary prevention; and disease management, which coordinates the national effort to reduce the incidence of these key diseases and their predisposing factors and to ameliorate their long-term impact by optimising control to reduce mortality, morbidity and complications, and improving functional status through rehabilitation. The key initiatives include restructuring of the public sector healthcare institutions into two clusters, each comprising a network of primary health care polyclinics, regional hospitals and tertiary institutions. The functional integration of these healthcare elements within each cluster under a common senior administrative and professional management, and the development of common clinical IT systems will greatly facilitate the implementation of disease management programmes. Secondly, the Ministry is establishing National Disease Registries in coronary heart disease, cancer, stroke, myopia and kidney failure, which will be valuable sources of clinical and outcomes data. Thirdly, in partnership with expert groups, national committees and professional agencies, the Ministry will produce clinical practice guidelines which will assist doctors and healthcare

  13. An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter

    PubMed Central

    Qin, Zhongyuan; Zhang, Xinshuai; Feng, Kerong; Zhang, Qunfang; Huang, Jie

    2014-01-01

    With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, small memory, power supply limitations and price, we propose an efficient identity-based key management (IBKM) scheme, which exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead. PMID:25264955

  14. Management of CAD/CAM information: Key to improved manufacturing productivity

    NASA Technical Reports Server (NTRS)

    Fulton, R. E.; Brainin, J.

    1984-01-01

    A key element to improved industry productivity is effective management of CAD/CAM information. To stimulate advancements in this area, a joint NASA/Navy/industry project designated Intergrated Programs for Aerospace-Vehicle Design (IPAD) is underway with the goal of raising aerospace industry productivity through advancement of technology to integrate and manage information involved in the design and manufacturing process. The project complements traditional NASA/DOD research to develop aerospace design technology and the Air Force's Integrated Computer-Aided Manufacturing (ICAM) program to advance CAM technology. IPAD research is guided by an Industry Technical Advisory Board (ITAB) composed of over 100 representatives from aerospace and computer companies.

  15. A brief review on key technologies in the battery management system of electric vehicles

    NASA Astrophysics Data System (ADS)

    Liu, Kailong; Li, Kang; Peng, Qiao; Zhang, Cheng

    2018-04-01

    Batteries have been widely applied in many high-power applications, such as electric vehicles (EVs) and hybrid electric vehicles, where a suitable battery management system (BMS) is vital in ensuring safe and reliable operation of batteries. This paper aims to give a brief review on several key technologies of BMS, including battery modelling, state estimation and battery charging. First, popular battery types used in EVs are surveyed, followed by the introduction of key technologies used in BMS. Various battery models, including the electric model, thermal model and coupled electro-thermal model are reviewed. Then, battery state estimations for the state of charge, state of health and internal temperature are comprehensively surveyed. Finally, several key and traditional battery charging approaches with associated optimization methods are discussed.

  16. Sustainable Materials Management (SMM) - Materials and Waste Management in the United States Key Facts and Figures

    EPA Pesticide Factsheets

    Each year EPA produces a report called Advancing Sustainable Materials Management: Facts and Figures. It includes information on municipal solid waste (MSW) generation, recycling, composting, combustion with energy recovery and landfilling. The 2014 report provides information on historical tipping fees for MSW, and information on the construction and demolition debris generation, which is outside of the scope of MSW. The Facts and Figures website includes recent reports (2012 to 2014 as well as historical information on materials in the U.S. Municipal Waste Stream, 1960 to 2014 (in tons). The reports for both current and historical waste prevention can be accessed at EPA's SMM website. The recent Annual Facts and Figures reports are accessible at the following link: https://www.epa.gov/smm/advancing-sustainable-materials-management-facts-and-figures-report. Historical data as well as studies and summary tables related to the Advancing Sustainable Materials Management Report are accessible here: https://www.epa.gov/smm/studies-summary-tables-and-data-related-advancing-sustainable-materials-management-report. An excel file containing the data from 1960 - 2014 is located here: https://edg.epa.gov/data/PUBLIC/OLEM/Materials_Municipal_Waste_Stream_1960_to_2014.xlsx. EPA also maintains a list of state and local waste characterization studies (reports are not available for all states). You can search for your state at https://www.epa.gov/smm/advancing-

  17. Trust Threshold Based Public Key Management in Mobile Ad Hoc Networks

    DTIC Science & Technology

    2016-03-05

    should operate in a self-organized way. Capkun t al. [15] proposed a certificate-based self-organized pub- c key management for MANETs by removing...period allo node started with ignorance interact with other nodes, th not reach T th Table 2 Attack behavior for operations . Operation Attack...section, we discuss the core operations o CTPKM as illustrated by Fig. 1 . Each mobile entity is able t communicate with other entities using public

  18. Security of Y-00 and Similar Quantum Cryptographic Protocols

    DTIC Science & Technology

    2004-11-16

    security of Y-00 type protocols is clarified. Key words: Quantum cryptography PACS: 03.67.Dd Anew approach to quantum cryptog- raphy called KCQ, ( keyed ...classical- noise key generation [2] or the well known BB84 quantum protocol [3]. A special case called αη (or Y-00 in Japan) has been experimentally in... quantum noise for typical op- erating parameters. It weakens both the data and key security , possibly information-theoretically and cer- tainly

  19. Managing for wildlife: a key component for social acceptance of compatible forest management.

    Treesearch

    A.B. Carey

    2003-01-01

    Why manage for wildlife in U.S. forests? American society demands it. Which species should be favored? The social and cultural value of individual species continue to evolve. Large changes have taken place in less than 40 years; Kimmins (2002) states that changes in societal values have produced “future shock” in the forestry profession, with foresters and their...

  20. Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    PubMed Central

    Chen, Chin-Ling; Lin, I-Hsien

    2010-01-01

    Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths. PMID:22163606

  1. Location-aware dynamic session-key management for grid-based Wireless Sensor Networks.

    PubMed

    Chen, Chin-Ling; Lin, I-Hsien

    2010-01-01

    Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.

  2. The Proposal of Key Performance Indicators in Facility Management and Determination the Weights of Significance

    NASA Astrophysics Data System (ADS)

    Rimbalová, Jarmila; Vilčeková, Silvia

    2013-11-01

    The practice of facilities management is rapidly evolving with the increasing interest in the discourse of sustainable development. The industry and its market are forecasted to develop to include non-core functions, activities traditionally not associated with this profession, but which are increasingly being addressed by facilities managers. The scale of growth in the built environment and the consequential growth of the facility management sector is anticipated to be enormous. Key Performance Indicators (KPI) are measure that provides essential information about performance of facility services delivery. In selecting KPI, it is critical to limit them to those factors that are essential to the organization reaching its goals. It is also important to keep the number of KPI small just to keep everyone's attention focused on achieving the same KPIs. This paper deals with the determination of weights of KPI of FM in terms of the design and use of sustainable buildings.

  3. Key factors of case management interventions for frequent users of healthcare services: a thematic analysis review

    PubMed Central

    Hudon, Catherine; Chouinard, Maud-Christine; Lambert, Mireille; Diadiou, Fatoumata; Bouliane, Danielle; Beaudin, Jérémie

    2017-01-01

    Objective The aim of this paper was to identify the key factors of case management (CM) interventions among frequent users of healthcare services found in empirical studies of effectiveness. Design Thematic analysis review of CM studies. Methods We built on a previously published review that aimed to report the effectiveness of CM interventions for frequent users of healthcare services, using the Medline, Scopus and CINAHL databases covering the January 2004–December 2015 period, then updated to July 2017, with the keywords ‘CM’ and ‘frequent use’. We extracted factors of successful (n=7) and unsuccessful (n=6) CM interventions and conducted a mixed thematic analysis to synthesise findings. Chaudoir’s implementation of health innovations framework was used to organise results into four broad levels of factors: (1) environmental/organisational level, (2) practitioner level, (3) patient level and (4) programme level. Results Access to, and close partnerships with, healthcare providers and community services resources were key factors of successful CM interventions that should target patients with the greatest needs and promote frequent contacts with the healthcare team. The selection and training of the case manager was also an important factor to foster patient engagement in CM. Coordination of care, self-management support and assistance with care navigation were key CM activities. The main issues reported by unsuccessful CM interventions were problems with case finding or lack of care integration. Conclusions CM interventions for frequent users of healthcare services should ensure adequate case finding processes, rigorous selection and training of the case manager, sufficient intensity of the intervention, as well as good care integration among all partners. Other studies could further evaluate the influence of contextual factors on intervention impacts. PMID:29061623

  4. Key factors of case management interventions for frequent users of healthcare services: a thematic analysis review.

    PubMed

    Hudon, Catherine; Chouinard, Maud-Christine; Lambert, Mireille; Diadiou, Fatoumata; Bouliane, Danielle; Beaudin, Jérémie

    2017-10-22

    The aim of this paper was to identify the key factors of case management (CM) interventions among frequent users of healthcare services found in empirical studies of effectiveness. Thematic analysis review of CM studies. We built on a previously published review that aimed to report the effectiveness of CM interventions for frequent users of healthcare services, using the Medline, Scopus and CINAHL databases covering the January 2004-December 2015 period, then updated to July 2017, with the keywords 'CM' and 'frequent use'. We extracted factors of successful (n=7) and unsuccessful (n=6) CM interventions and conducted a mixed thematic analysis to synthesise findings. Chaudoir's implementation of health innovations framework was used to organise results into four broad levels of factors: (1) ,environmental/organisational level, (2) practitioner level, (3) patient level and (4) programme level. Access to, and close partnerships with, healthcare providers and community services resources were key factors of successful CM interventions that should target patients with the greatest needs and promote frequent contacts with the healthcare team. The selection and training of the case manager was also an important factor to foster patient engagement in CM. Coordination of care, self-management support and assistance with care navigation were key CM activities. The main issues reported by unsuccessful CM interventions were problems with case finding or lack of care integration. CM interventions for frequent users of healthcare services should ensure adequate case finding processes, rigorous selection and training of the case manager, sufficient intensity of the intervention, as well as good care integration among all partners. Other studies could further evaluate the influence of contextual factors on intervention impacts. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted

  5. An Analysis of Cryptographically Significant Boolean Functions With High Correlation Immunity by Reconfigurable Computer

    DTIC Science & Technology

    2010-12-01

    with high correlation immunity and then evaluate these functions for other desirable cryptographic features. C. METHOD The only known primary methods...out if not used) # ---------------------------------- # PRIMARY = < primary file 1> < primary file 2> #SECONDARY = <secondary file 1...finding the fuction value for a //set u and for each value of v. end end

  6. Multi-Agent System as a New Approach to Effective Chronic Heart Failure Management: Key Considerations

    PubMed Central

    Mohammadzadeh, Niloofar; Rahimi, Azin

    2013-01-01

    Objectives Given the importance of the follow-up of chronic heart failure (CHF) patients to reduce common causes of re-admission and deterioration of their status that lead to imposing spiritual and physical costs on patients and society, modern technology tools should be used to the best advantage. The aim of this article is to explain key points which should be considered in designing an appropriate multi-agent system to improve CHF management. Methods In this literature review articles were searched with keywords like multi-agent system, heart failure, chronic disease management in Science Direct, Google Scholar and PubMed databases without regard to the year of publications. Results Agents are an innovation in the field of artificial intelligence. Because agents are capable of solving complex and dynamic health problems, to take full advantage of e-Health, the healthcare system must take steps to make use of this technology. Key factors in CHF management through a multi-agent system approach must be considered such as organization, confidentiality in general aspects and design and architecture points in specific aspects. Conclusions Note that use of agent systems only with a technical view is associated with many problems. Hence, in delivering healthcare to CHF patients, considering social and human aspects is essential. It is obvious that identifying and resolving technical and non-technical challenges is vital in the successful implementation of this technology. PMID:24195010

  7. Multi-agent system as a new approach to effective chronic heart failure management: key considerations.

    PubMed

    Mohammadzadeh, Niloofar; Safdari, Reza; Rahimi, Azin

    2013-09-01

    Given the importance of the follow-up of chronic heart failure (CHF) patients to reduce common causes of re-admission and deterioration of their status that lead to imposing spiritual and physical costs on patients and society, modern technology tools should be used to the best advantage. The aim of this article is to explain key points which should be considered in designing an appropriate multi-agent system to improve CHF management. In this literature review articles were searched with keywords like multi-agent system, heart failure, chronic disease management in Science Direct, Google Scholar and PubMed databases without regard to the year of publications. Agents are an innovation in the field of artificial intelligence. Because agents are capable of solving complex and dynamic health problems, to take full advantage of e-Health, the healthcare system must take steps to make use of this technology. Key factors in CHF management through a multi-agent system approach must be considered such as organization, confidentiality in general aspects and design and architecture points in specific aspects. Note that use of agent systems only with a technical view is associated with many problems. Hence, in delivering healthcare to CHF patients, considering social and human aspects is essential. It is obvious that identifying and resolving technical and non-technical challenges is vital in the successful implementation of this technology.

  8. Conceptual framework for holistic dialysis management based on key performance indicators.

    PubMed

    Liu, Hu-Chen; Itoh, Kenji

    2013-10-01

    This paper develops a theoretical framework of holistic hospital management based on performance indicators that can be applied to dialysis hospitals, clinics or departments in Japan. Selection of a key indicator set and its validity tests were performed primarily by a questionnaire survey to dialysis experts as well as their statements obtained through interviews. The expert questionnaire asked respondents to rate the degree of "usefulness" for each of 66 indicators on a three-point scale (19 responses collected). Applying the theoretical framework, we selected a minimum set of key performance indicators for dialysis management that can be used in the Japanese context. The indicator set comprised 27 indicators and items that will be collected through three surveys: patient satisfaction, employee satisfaction, and safety culture. The indicators were confirmed by expert judgment from viewpoints of face, content and construct validity as well as their usefulness. This paper established a theoretical framework of performance measurement for holistic dialysis management from primary healthcare stakeholders' perspectives. In this framework, performance indicators were largely divided into healthcare outcomes and performance shaping factors. Indicators of the former type may be applied for the detection of operational problems or weaknesses in a dialysis hospital, clinic or department, while latent causes of each problem can be more effectively addressed by the latter type of indicators in terms of process, structure and culture/climate within the organization. © 2013 The Authors. Therapeutic Apheresis and Dialysis © 2013 International Society for Apheresis.

  9. KEY ITEMS OF INNOVATION MANAGEMENT IN THE PRIMARY HEALTHCARE CENTRES CASE STUDY: FINLAND.

    PubMed

    Aslani, Alireza; Zolfagharzadeh, Mohammad Mahdi; Naaranoja, Marja

    2015-09-01

    Trends such as aging populations, excess costs, rising public expectations, and progress in medical science and technologies point out the necessity of adaptation and development of innovation in the healthcare systems particularly in developed countries. The main objective of this article is to review diffusion of innovation in the healthcare sector. Different types of innovation, diffusion characteristics, and adoption mechanisms are the subjects that are discussed in the selected case study, Finland. Finally, the key items of innovation management in the Finnish health system are introduced. The results can be implemented in other countries as well.

  10. Using a Functional Simulation of Crisis Management to Test the C2 Agility Model Parameters on Key Performance Variables

    DTIC Science & Technology

    2013-06-01

    1 18th ICCRTS Using a Functional Simulation of Crisis Management to Test the C2 Agility Model Parameters on Key Performance Variables...AND SUBTITLE Using a Functional Simulation of Crisis Management to Test the C2 Agility Model Parameters on Key Performance Variables 5a. CONTRACT...command in crisis management. C2 Agility Model Agility can be conceptualized at a number of different levels; for instance at the team

  11. Key issues in the management of patients with systemic lupus erythematosus: latest developments and clinical implications

    PubMed Central

    Jordan, Natasha; D’Cruz, David

    2015-01-01

    Systemic lupus erythematous (SLE) is a chronic multisystem disease with significant associated morbidity and mortality. A deeper understanding of the pathogenesis of SLE has led to the development of biologic agents, primarily targeting B cells and others inhibiting costimulatory molecules, type I interferons and cytokines such as interleukin-6. Several of these agents have been studied in clinical trials; some have shown promise while others have yielded disappointing results. Economic and regulatory issues continue to hamper the availability of such therapies for SLE patients. With increasing recognition that recurrent flares of disease activity lead to long-term damage accrual, one of the most important recent developments in patient management has been the concept of treat-to-target in SLE while minimizing patient exposure to excessive corticosteroid and other immunosuppressive therapy. This article reviews these key issues in SLE management, outlining recent developments and clinical implications for patients. PMID:26622325

  12. Cancer care management through a mobile phone health approach: key considerations.

    PubMed

    Mohammadzadeh, Niloofar; Safdari, Reza; Rahimi, Azin

    2013-01-01

    Greater use of mobile phone devices seems inevitable because the health industry and cancer care are facing challenges such as resource constraints, rising care costs, the need for immediate access to healthcare data of types such as audio video texts for early detection and treatment of patients and increasing remote aids in telemedicine. Physicians, in order to study the causes of cancer, detect cancer earlier, act in prevention measures, determine the effectiveness of treatment and specify the reasons for the treatment ineffectiveness, need to access accurate, comprehensive and timely cancer data. Mobile devices provide opportunities and can play an important role in consulting, diagnosis, treatment, and quick access to health information. There easy carriage make them perfect tools for healthcare providers in cancer care management. Key factors in cancer care management systems through a mobile phone health approach must be considered such as human resources, confidentiality and privacy, legal and ethical issues, appropriate ICT and provider infrastructure and costs in general aspects and interoperability, human relationships, types of mobile devices and telecommunication related points in specific aspects. The successful implementation of mobile-based systems in cancer care management will constantly face many challenges. Hence, in applying mobile cancer care, involvement of users and considering their needs in all phases of project, providing adequate bandwidth, preparation of standard tools that provide maximum mobility and flexibility for users, decreasing obstacles to interrupt network communications, and using suitable communication protocols are essential. It is obvious that identifying and reducing barriers and strengthening the positive points will have a significant role in appropriate planning and promoting the achievements of mobile cancer care systems. The aim of this article is to explain key points which should be considered in designing

  13. Emergency management in health: key issues and challenges in the UK.

    PubMed

    Lee, Andrew C K; Phillips, Wendy; Challen, Kirsty; Goodacre, Steve

    2012-10-19

    Emergency planning in the UK has grown considerably in recent years, galvanised by the threat of terrorism. However, deficiencies in NHS emergency planning were identified and the evidence-base that underpins it is questionable. Inconsistencies in terminologies and concepts also exist. Different models of emergency management exist internationally but the optimal system is unknown. This study examines the evidence-base and evidence requirements for emergency planning in the UK health context. The study involved semi-structured interviews with key stakeholders and opinion leaders. Purposive sampling was used to obtain a breadth of views from various agencies involved in emergency planning and response. Interviews were then analysed using a grounded approach using standard framework analysis techniques. We conducted 17 key informant interviews. Interviewees identified greater gaps in operational than technical aspects of emergency planning. Social and behavioural knowledge gaps were highlighted with regards to how individuals and organisations deal with risk and behave in emergencies. Evidence-based approaches to public engagement and for developing community resilience to disasters are lacking. Other gaps included how knowledge was developed and used. Conflicting views with regards to the optimal configuration and operation of the emergency management system were voiced. Four thematic categories for future research emerged:(i) Knowledge-base for emergency management: Further exploration is needed of how knowledge is acquired, valued, disseminated, adopted and retained.(ii) Social and behavioural issues: Greater understanding of how individuals approach risk and behave in emergencies is required.(iii) Organisational issues in emergencies: Several conflicting organisational issues were identified; value of planning versus plans, flexible versus standardized procedures, top-down versus bottom-up engagement, generic versus specific planning, and reactive versus

  14. Management of CAD/CAM information: Key to improved manufacturing productivity

    NASA Technical Reports Server (NTRS)

    Fulton, R. E.; Brainin, J.

    1984-01-01

    A key element to improved industry productivity is effective management of CAD/CAM information. To stimulate advancements in this area, a joint NASA/Navy/Industry project designated Integrated Programs for Aerospace-Vehicle Design (IPAD) is underway with the goal of raising aerospace industry productivity through advancement of technology to integrate and manage information involved in the design and manufacturing process. The project complements traditional NASA/DOD research to develop aerospace design technology and the Air Force's Integrated Computer-Aided Manufacturing (ICAM) program to advance CAM technology. IPAD research is guided by an Industry Technical Advisory Board (ITAB) composed of over 100 repesentatives from aerospace and computer companies. The IPAD accomplishments to date in development of requirements and prototype software for various levels of company-wide CAD/CAM data management are summarized and plans for development of technology for management of distributed CAD/CAM data and information required to control future knowledge-based CAD/CAM systems are discussed.

  15. A review on the key issues for lithium-ion battery management in electric vehicles

    NASA Astrophysics Data System (ADS)

    Lu, Languang; Han, Xuebing; Li, Jianqiu; Hua, Jianfeng; Ouyang, Minggao

    2013-03-01

    Compared with other commonly used batteries, lithium-ion batteries are featured by high energy density, high power density, long service life and environmental friendliness and thus have found wide application in the area of consumer electronics. However, lithium-ion batteries for vehicles have high capacity and large serial-parallel numbers, which, coupled with such problems as safety, durability, uniformity and cost, imposes limitations on the wide application of lithium-ion batteries in the vehicle. The narrow area in which lithium-ion batteries operate with safety and reliability necessitates the effective control and management of battery management system. This present paper, through the analysis of literature and in combination with our practical experience, gives a brief introduction to the composition of the battery management system (BMS) and its key issues such as battery cell voltage measurement, battery states estimation, battery uniformity and equalization, battery fault diagnosis and so on, in the hope of providing some inspirations to the design and research of the battery management system.

  16. Defining disaster resilience: comparisons from key stakeholders involved in emergency management in Victoria, Australia.

    PubMed

    Goode, Natassia; Salmon, Paul M; Spencer, Caroline; McArdle, Dudley; Archer, Frank

    2017-01-01

    Three years after the introduction of the National Strategy for Disaster Resilience there remains no unanimously adopted definition of disaster resilience within Australia's emergency management sector. The aim of this study is to determine what the concept means to key stakeholders in the emergency management sector in the Australian State of Victoria, and how these conceptualisations overlap and diverge. Via an online survey, 113 people were asked how they define disaster resilience in their work in the emergency management sector. A data mining software tool, Leximancer, was employed to uncover the relationships between the definitions provided. The findings show that stakeholders see resilience as an 'ability' that encompasses emergency management activities and personal responsibility. However, the findings also highlight some possible points of conflict between stakeholders. In addition, the paper outlines and discusses a number of potential consequences for the implementation and the success of the resilience-based approach in Australia. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.

  17. Formal Analysis of Key Integrity in PKCS#11

    NASA Astrophysics Data System (ADS)

    Falcone, Andrea; Focardi, Riccardo

    PKCS#11 is a standard API to cryptographic devices such as smarcards, hardware security modules and usb crypto-tokens. Though widely adopted, this API has been shown to be prone to attacks in which a malicious user gains access to the sensitive keys stored in the devices. In 2008, Delaune, Kremer and Steel proposed a model to formally reason on this kind of attacks. We extend this model to also describe flaws that are based on integrity violations of the stored keys. In particular, we consider scenarios in which a malicious overwriting of keys might fool honest users into using attacker's own keys, while performing sensitive operations. We further enrich the model with a trusted key mechanism ensuring that only controlled, non-tampered keys are used in cryptographic operations, and we show how this modified API prevents the above mentioned key-replacement attacks.

  18. Deviation Management: Key Management Subsystem Driver of Knowledge-Based Continuous Improvement in the Henry Ford Production System.

    PubMed

    Zarbo, Richard J; Copeland, Jacqueline R; Varney, Ruan C

    2017-10-01

    To develop a business subsystem fulfilling International Organization for Standardization 15189 nonconformance management regulatory standard, facilitating employee engagement in problem identification and resolution to effect quality improvement and risk mitigation. From 2012 to 2016, the integrated laboratories of the Henry Ford Health System used a quality technical team to develop and improve a management subsystem designed to identify, track, trend, and summarize nonconformances based on frequency, risk, and root cause for elimination at the level of the work. Programmatic improvements and training resulted in markedly increased documentation culminating in 71,641 deviations in 2016 classified by a taxonomy of 281 defect types into preanalytic (74.8%), analytic (23.6%), and postanalytic (1.6%) testing phases. The top 10 deviations accounted for 55,843 (78%) of the total. Deviation management is a key subsystem of managers' standard work whereby knowledge of nonconformities assists in directing corrective actions and continuous improvements that promote consistent execution and higher levels of performance. © American Society for Clinical Pathology, 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  19. Group assessment of key indicators of sustainable waste management in developing countries.

    PubMed

    Tot, Bojana; Vujić, Goran; Srđević, Zorica; Ubavin, Dejan; Russo, Mário Augusto Tavares

    2017-09-01

    Decision makers in developing countries are struggling to solve the present problems of solid waste management. Prioritisation and ranking of the most important indicators that influence the waste management system is very useful for any decision maker for the future planning and implementation of a sustainable waste management system. The aim of this study is to evaluate key indicators and their related sub-indicators in a group decision-making environment. In order to gain insight into the subject it was necessary to obtain the qualified opinions of decision makers from different countries who understand the situation in the sector of waste management in developing countries. An assessment is performed by 43 decision makers from both developed and developing countries, and the applied methodology is based on a combined use of the analytic hierarchy process, from the multi-criteria decision-making set of tools, and the preferential voting method known as Borda Count, which belongs to social choice theory. Pairwise comparison of indicators is performed with the analytic hierarchy process, and the ranking of indicators once obtained is assessed with Borda Count. Detailed analysis of the final results showed that the Institutional-Administrative indicator was the most important one, with the maximum weight as derived by both groups of decision makers. The results also showed that the combined use of the analytic hierarchy process and Borda Count contributes to the credibility and objectivity of the decision-making process, allowing its use in more complex waste management group decision-making problems to be recommended.

  20. Socioeconomic status, family background and other key factors influence the management of head lice in Norway.

    PubMed

    Rukke, Bjørn Arne; Soleng, Arnulf; Lindstedt, Heidi Heggen; Ottesen, Preben; Birkemoe, Tone

    2014-05-01

    How head lice infestations are managed by households is an important but generally neglected issue in head lice research. In the present study, we investigate actions taken against head lice by Norwegian households in association with socioeconomic status, family background, school-related variables and other key factors. Repeat questionnaires distributed to caretakers of the same elementary school children during a 2-year period enabled us to study both previous head lice management and any changes in this management through time. Households from 12 schools spanning the main socioeconomic variation found in Norway participated in the study. All students with active head lice infestation were treated in the four investigated periods. Most caretakers used a thorough head lice checking technique and informed others of own infestation. Checking frequency was low as most children were inspected less than monthly. The best determinant of increased checking frequency and thoroughness was personal experience with head lice. The increased awareness, however, seemed to be somewhat short-lived, as there was a decrease in checking frequency and thoroughness within 1 year after infestation. Personal experience with head lice also increased general knowledge related to the parasite. Parents born in developing countries checked their children for head lice more frequently, although less thoroughly, informed fewer contacts when infested, used pediculicides preventively more often and knew less about head lice than parents born in developed countries. Households with highly educated mothers had a lower checking frequency, but their knowledge and willingness to inform others was high. Single parents were more concerned about economic costs and kept children home from school longer while infested than other parents. As head lice management varied among socioeconomic groups and with parental background, differentiated advice should be considered in the control of head lice. The

  1. Notification: Key Management Challenges Confronting the U.S. Chemical Safety and Hazard Investigation Board - FY2016

    EPA Pesticide Factsheets

    January 21, 2016. The EPA OIG is beginning work to update for fiscal year 2016 its list of proposed key management challenges and internal control weaknesses confronting the U.S. Chemical Safety and Hazard Investigation Board (CSB).

  2. Ecological thresholds: The key to successful enviromental management or an important concept with no practical application?

    USGS Publications Warehouse

    Groffman, P.M.; Baron, Jill S.; Blett, T.; Gold, A.J.; Goodman, I.; Gunderson, L.H.; Levinson, B.M.; Palmer, Margaret A.; Paerl, H.W.; Peterson, G.D.; Poff, N.L.; Rejeski, D.W.; Reynolds, J.F.; Turner, M.G.; Weathers, K.C.; Wiens, J.

    2006-01-01

    An ecological threshold is the point at which there is an abrupt change in an ecosystem quality, property or phenomenon, or where small changes in an environmental driver produce large responses in the ecosystem. Analysis of thresholds is complicated by nonlinear dynamics and by multiple factor controls that operate at diverse spatial and temporal scales. These complexities have challenged the use and utility of threshold concepts in environmental management despite great concern about preventing dramatic state changes in valued ecosystems, the need for determining critical pollutant loads and the ubiquity of other threshold-based environmental problems. In this paper we define the scope of the thresholds concept in ecological science and discuss methods for identifying and investigating thresholds using a variety of examples from terrestrial and aquatic environments, at ecosystem, landscape and regional scales. We end with a discussion of key research needs in this area.

  3. Research on key technology of prognostic and health management for autonomous underwater vehicle

    NASA Astrophysics Data System (ADS)

    Zhou, Zhi

    2017-12-01

    Autonomous Underwater Vehicles (AUVs) are non-cable and autonomous motional underwater robotics. With a wide range of activities, it can reach thousands of kilometers. Because it has the advantages of wide range, good maneuverability, safety and intellectualization, it becomes an important tool for various underwater tasks. How to improve diagnosis accuracy of the AUVs electrical system faults, and how to repair AUVs by the information are the focus of navy in the world. In turn, ensuring safe and reliable operation of the system has very important significance to improve AUVs sailing performance. To solve these problems, in the paper the prognostic and health management(PHM) technology is researched and used to AUV, and the overall framework and key technology are proposed, such as data acquisition, feature extraction, fault diagnosis, failure prediction and so on.

  4. Affine Equivalence and Constructions of Cryptographically Strong Boolean Functions

    DTIC Science & Technology

    2013-09-01

    manner is crucial for today’s global citizen. We want our financial transactions over the Internet to get processed without error. Cyber warfare between...encryption and decryption processes . An asymmetric cipher uses different keys to encrypt and decrypt a message, and the connection between the encryption and...Depending on how a symmetric cipher processes a message before encryption or de- cryption, a symmetric cipher can be further classified into a block or

  5. 25 CFR 558.3 - Procedures for forwarding applications and reports for key employees and primary management...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... INDIAN GAMING COMMISSION, DEPARTMENT OF THE INTERIOR GAMING LICENSES AND BACKGROUND INVESTIGATIONS FOR KEY EMPLOYEES AND PRIMARY MANAGEMENT OFFICIALS GAMING LICENSES FOR KEY EMPLOYEES AND PRIMARY... at a gaming operation, a tribe shall: (1) Forward to the Commission a completed application for...

  6. The key incident monitoring and management system - history and role in quality improvement.

    PubMed

    Badrick, Tony; Gay, Stephanie; Mackay, Mark; Sikaris, Ken

    2018-01-26

    The determination of reliable, practical Quality Indicators (QIs) from presentation of the patient with a pathology request form through to the clinician receiving the report (the Total Testing Process or TTP) is a key step in identifying areas where improvement is necessary in laboratories. The Australasian QIs programme Key Incident Monitoring and Management System (KIMMS) began in 2008. It records incidents (process defects) and episodes (occasions at which incidents may occur) to calculate incident rates. KIMMS also uses the Failure Mode Effects Analysis (FMEA) to assign quantified risk to each incident type. The system defines risk as incident frequency multiplied by both a harm rating (on a 1-10 scale) and detection difficulty score (also a 1-10 scale). Between 2008 and 2016, laboratories participating rose from 22 to 69. Episodes rose from 13.2 to 43.4 million; incidents rose from 114,082 to 756,432. We attribute the rise in incident rate from 0.86% to 1.75% to increased monitoring. Haemolysis shows the highest incidence (22.6% of total incidents) and the highest risk (26.68% of total risk). "Sample is suspected to be from the wrong patient" has the second lowest frequency, but receives the highest harm rating (10/10) and detection difficulty score (10/10), so it is calculated to be the 8th highest risk (2.92%). Similarly, retracted (incorrect) reports QI has the 10th highest frequency (3.9%) but the harm/difficulty calculation confers the second highest risk (11.17%). TTP incident rates are generally low (less than 2% of observed episodes), however, incident risks, their frequencies multiplied by both ratings of harm and discovery difficulty scores, concentrate improvement attention and resources on the monitored incident types most important to manage.

  7. Trend analysis of key solvency ratios for health plans in Medicaid managed care.

    PubMed

    McCue, Michael J

    2013-01-01

    The focus of this article is to assess the solvency of health plans that manage Medicaid members across key plan traits, specifically Medicaid dominant or plans with more than 75 percent Medicaid members, and plans owned by publicly traded companies, and sponsored by health care providers. The study accessed National Association of Insurance Commissioners (NAIC) financial data and computed key solvency ratios for 117 Medicaid health plans over a five-year time trend from 2007 to 2011. A mean test compared the mean values for each year and for the entire study period on risk-based capital (RBC), cash-flow margin and debt to total capital ratios across these plan traits. For all years except 2008 Medicaid dominant plans had a lower RBC ratio for all four out of five years. Cash-flow margin ratio for Medicaid dominant plans was only lower in 2011 than non-Medicaid dominant plans. From 2007 to 2010, debt to total capital was higher for plans owned by publicly traded companies than non-publicly traded companies. Given the potential for an expanding Medicaid market, Medicaid health plans have reduced their risk of insolvency by increasing the RBC over time and reducing their debt capital. However between 2010 and 2011 cash-flow margin ratio decreased by almost 180 basis points for Medicaid dominant plans.

  8. Using Temporal Logic to Specify and Verify Cryptographic Protocols (Progress Report)

    DTIC Science & Technology

    1995-01-01

    know, Meadows’ 1Supported by grant HKUST 608/94E from the Hong Kong Research Grants Council. 1 Report Documentation Page Form ApprovedOMB No. 0704... 1 Introduction We have started work on a project to apply temporal logic to reason about cryptographic protocols. Some of the goals of the project...are as follows. 1 . Allow the user to state and prove that the penetrator cannot use logical or algebraic techniques (e.g., we are disregarding

  9. Mechanisms of chronic pain - key considerations for appropriate physical therapy management.

    PubMed

    Courtney, Carol A; Fernández-de-Las-Peñas, César; Bond, Samantha

    2017-07-01

    In last decades, knowledge of nociceptive pain mechanisms has expanded rapidly. The use of quantitative sensory testing has provided evidence that peripheral and central sensitization mechanisms play a relevant role in localized and widespread chronic pain syndromes. In fact, almost any patient suffering with a chronic pain condition will demonstrate impairments in the central nervous system. In addition, it is accepted that pain is associated with different types of trigger factors including social, physiological, and psychological. This rational has provoked a change in the understanding of potential mechanisms of manual therapies, changing from a biomechanical/medical viewpoint, to a neurophysiological/nociceptive viewpoint. Therefore, interventions for patients with chronic pain should be applied based on current knowledge of nociceptive mechanisms since determining potential drivers of the sensitization process is critical for effective management. The current paper reviews mechanisms of chronic pain from a clinical and neurophysiological point of view and summarizes key messages for clinicians for proper management of individuals with chronic pain.

  10. Identifying key areas of ecosystem services potential to improve ecological management in Chongqing City, southwest China.

    PubMed

    Xiao, Yang; Xiao, Qiang

    2018-03-29

    Because natural ecosystems and ecosystem services (ES) are both critical to the well-being of humankind, it is important to understand their relationships and congruence for conservation planning. Spatial conservation planning is required to set focused preservation priorities and to assess future ecological implications. This study uses the combined measures of ES models and ES potential to estimate and analyze all four groups of ecosystem services to generate opportunities to maximize ecosystem services. Subsequently, we identify the key areas of conservation priorities as future forestation and conservation hotspot zones to improve the ecological management in Chongqing City, located in the upper reaches of the Three Gorges Reservoir Area, China. Results show that ecosystem services potential is extremely obvious. Compared to ecosystem services from 2000, we determined that soil conservation could be increased by 59.11%, carbon sequestration by 129.51%, water flow regulation by 83.42%, and water purification by 84.42%. According to our prioritization results, approximately 48% of area converted to forests exhibited high improvements in all ecosystem services (categorized as hotspot-1, hotspot-2, and hotspot-3). The hotspots identified in this study can be used as an excellent surrogate for evaluation ecological engineering benefits and can be effectively applied in improving ecological management planning.

  11. Key Design Considerations When Calculating Cost Savings for Population Health Management Programs in an Observational Setting.

    PubMed

    Murphy, Shannon M E; Hough, Douglas E; Sylvia, Martha L; Dunbar, Linda J; Frick, Kevin D

    2018-02-08

    To illustrate the impact of key quasi-experimental design elements on cost savings measurement for population health management (PHM) programs. Population health management program records and Medicaid claims and enrollment data from December 2011 through March 2016. The study uses a difference-in-difference design to compare changes in cost and utilization outcomes between program participants and propensity score-matched nonparticipants. Comparisons of measured savings are made based on (1) stable versus dynamic population enrollment and (2) all eligible versus enrolled-only participant definitions. Options for the operationalization of time are also discussed. Individual-level Medicaid administrative and claims data and PHM program records are used to match study groups on baseline risk factors and assess changes in costs and utilization. Savings estimates are statistically similar but smaller in magnitude when eliminating variability based on duration of population enrollment and when evaluating program impact on the entire target population. Measurement in calendar time, when possible, simplifies interpretability. Program evaluation design elements, including population stability and participant definitions, can influence the estimated magnitude of program savings for the payer and should be considered carefully. Time specifications can also affect interpretability and usefulness. © Health Research and Educational Trust.

  12. A Hierarchical structure of key performance indicators for operation management and continuous improvement in production systems.

    PubMed

    Kang, Ningxuan; Zhao, Cong; Li, Jingshan; Horst, John A

    2016-01-01

    Key performance indicators (KPIs) are critical for manufacturing operation management and continuous improvement (CI). In modern manufacturing systems, KPIs are defined as a set of metrics to reflect operation performance, such as efficiency, throughput, availability, from productivity, quality and maintenance perspectives. Through continuous monitoring and measurement of KPIs, meaningful quantification and identification of different aspects of operation activities can be obtained, which enable and direct CI efforts. A set of 34 KPIs has been introduced in ISO 22400. However, the KPIs in a manufacturing system are not independent, and they may have intrinsic mutual relationships. The goal of this paper is to introduce a multi-level structure for identification and analysis of KPIs and their intrinsic relationships in production systems. Specifically, through such a hierarchical structure, we define and layer KPIs into levels of basic KPIs, comprehensive KPIs and their supporting metrics, and use it to investigate the relationships and dependencies between KPIs. Such a study can provide a useful tool for manufacturing engineers and managers to measure and utilize KPIs for CI.

  13. A Hierarchical structure of key performance indicators for operation management and continuous improvement in production systems

    PubMed Central

    Kang, Ningxuan; Zhao, Cong; Li, Jingshan; Horst, John A.

    2018-01-01

    Key performance indicators (KPIs) are critical for manufacturing operation management and continuous improvement (CI). In modern manufacturing systems, KPIs are defined as a set of metrics to reflect operation performance, such as efficiency, throughput, availability, from productivity, quality and maintenance perspectives. Through continuous monitoring and measurement of KPIs, meaningful quantification and identification of different aspects of operation activities can be obtained, which enable and direct CI efforts. A set of 34 KPIs has been introduced in ISO 22400. However, the KPIs in a manufacturing system are not independent, and they may have intrinsic mutual relationships. The goal of this paper is to introduce a multi-level structure for identification and analysis of KPIs and their intrinsic relationships in production systems. Specifically, through such a hierarchical structure, we define and layer KPIs into levels of basic KPIs, comprehensive KPIs and their supporting metrics, and use it to investigate the relationships and dependencies between KPIs. Such a study can provide a useful tool for manufacturing engineers and managers to measure and utilize KPIs for CI. PMID:29398722

  14. Identifying Key Performance Indicators for Holistic Hospital Management with a Modified DEMATEL Approach

    PubMed Central

    Si, Sheng-Li; You, Xiao-Yue; Huang, Jia

    2017-01-01

    Performance analysis is an important way for hospitals to achieve higher efficiency and effectiveness in providing services to their customers. The performance of the healthcare system can be measured by many indicators, but it is difficult to improve them simultaneously due to the limited resources. A feasible way is to identify the central and influential indicators to improve healthcare performance in a stepwise manner. In this paper, we propose a hybrid multiple criteria decision making (MCDM) approach to identify key performance indicators (KPIs) for holistic hospital management. First, through integrating evidential reasoning approach and interval 2-tuple linguistic variables, various assessments of performance indicators provided by healthcare experts are modeled. Then, the decision making trial and evaluation laboratory (DEMATEL) technique is adopted to build an interactive network and visualize the causal relationships between the performance indicators. Finally, an empirical case study is provided to demonstrate the proposed approach for improving the efficiency of healthcare management. The results show that “accidents/adverse events”, “nosocomial infection”, ‘‘incidents/errors”, “number of operations/procedures” are significant influential indicators. Also, the indicators of “length of stay”, “bed occupancy” and “financial measures” play important roles in performance evaluation of the healthcare organization. The proposed decision making approach could be considered as a reference for healthcare administrators to enhance the performance of their healthcare institutions. PMID:28825613

  15. Identifying Key Performance Indicators for Holistic Hospital Management with a Modified DEMATEL Approach.

    PubMed

    Si, Sheng-Li; You, Xiao-Yue; Liu, Hu-Chen; Huang, Jia

    2017-08-19

    Performance analysis is an important way for hospitals to achieve higher efficiency and effectiveness in providing services to their customers. The performance of the healthcare system can be measured by many indicators, but it is difficult to improve them simultaneously due to the limited resources. A feasible way is to identify the central and influential indicators to improve healthcare performance in a stepwise manner. In this paper, we propose a hybrid multiple criteria decision making (MCDM) approach to identify key performance indicators (KPIs) for holistic hospital management. First, through integrating evidential reasoning approach and interval 2-tuple linguistic variables, various assessments of performance indicators provided by healthcare experts are modeled. Then, the decision making trial and evaluation laboratory (DEMATEL) technique is adopted to build an interactive network and visualize the causal relationships between the performance indicators. Finally, an empirical case study is provided to demonstrate the proposed approach for improving the efficiency of healthcare management. The results show that "accidents/adverse events", "nosocomial infection", ''incidents/errors", "number of operations/procedures" are significant influential indicators. Also, the indicators of "length of stay", "bed occupancy" and "financial measures" play important roles in performance evaluation of the healthcare organization. The proposed decision making approach could be considered as a reference for healthcare administrators to enhance the performance of their healthcare institutions.

  16. Practical cryptographic strategies in the post-quantum era

    NASA Astrophysics Data System (ADS)

    Kabanov, I. S.; Yunusov, R. R.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-02-01

    Quantum key distribution technologies promise information-theoretic security and are currently being deployed in com-mercial applications. We review new frontiers in information security technologies in communications and distributed storage applications with the use of classical, quantum, hybrid classical-quantum, and post-quantum cryptography. We analyze the cur-rent state-of-the-art, critical characteristics, development trends, and limitations of these techniques for application in enterprise information protection systems. An approach concerning the selection of practical encryption technologies for enterprises with branched communication networks is discussed.

  17. Capacity building in water demand management as a key component for attaining millennium development goals

    NASA Astrophysics Data System (ADS)

    Gumbo, Bekithemba; Forster, Laura; Arntzen, Jaap

    Successful water demand management (WDM) implementation as a component of integrated water resource management (IWRM) can play a significant role in the alleviation of poverty through more efficient use of available water resources. The urban population in Southern African cities is characterised by so-called ‘water poor’ communities who typically expend a high percentage of their household income on poor quality water. Usually they have no access to an affordable alternative source. Although WDM as a component of IWRM is not a panacea for poverty, it can help alleviate poverty by facilitating water services management by municipal water supply agencies (MWSAs) in the region. WDM is a key strategy for achieving the millennium development goals (MDGs) and, as such, should be given due attention in the preparation of national IWRM and water efficiency plans. Various studies in the Southern African region have indicated that capacity building is necessary for nations to develop IWRM and water-use efficiency plans to meet the targets set out in the MDGs. WDM education and training of water professionals and end-users is particularly important in developing countries, which are resource and information-access poor. In response to these findings, The World Conservation Union (IUCN) and its consulting partners, the Training and Instructional Design Academy of South Africa (TIDASA), and Centre for Applied Research (CAR) designed, developed and presented a pilot WDM Guideline Training Module for MWSAs as part of Phase II of IUCN’s Southern Africa regional WDM project. Pilot training was conducted in July 2004 in Lusaka, Zambia for a group of 36 participants involved in municipal water supply from nine Southern African countries. This paper looks at the links between building the capacity of professionals, operational staff and other role-players in the municipal water supply chain to implement WDM as part of broader IWRM strategies, and the subsequent potential for

  18. Policies for managing urban growth and landscape change: a key to conservation in the 21st century

    Treesearch

    David N., tech. ed. Bengston

    2005-01-01

    Protecting natural areas in the face of urbanization is one of the most important challenges for conservation in the 21st century. The papers in this collection examine key issues related to growth management and selected approaches to managing urban growth and minimizing its social and environmental costs. They were presented at the 2004 annual meeting of the Society...

  19. PEM public key certificate cache server

    NASA Astrophysics Data System (ADS)

    Cheung, T.

    1993-12-01

    Privacy Enhanced Mail (PEM) provides privacy enhancement services to users of Internet electronic mail. Confidentiality, authentication, message integrity, and non-repudiation of origin are provided by applying cryptographic measures to messages transferred between end systems by the Message Transfer System. PEM supports both symmetric and asymmetric key distribution. However, the prevalent implementation uses a public key certificate-based strategy, modeled after the X.509 directory authentication framework. This scheme provides an infrastructure compatible with X.509. According to RFC 1422, public key certificates can be stored in directory servers, transmitted via non-secure message exchanges, or distributed via other means. Directory services provide a specialized distributed database for OSI applications. The directory contains information about objects and then provides structured mechanisms for accessing that information. Since directory services are not widely available now, a good approach is to manage certificates in a centralized certificate server. This document describes the detailed design of a centralized certificate cache serve. This server manages a cache of certificates and a cache of Certificate Revocation Lists (CRL's) for PEM applications. PEMapplications contact the server to obtain/store certificates and CRL's. The server software is programmed in C and ELROS. To use this server, ISODE has to be configured and installed properly. The ISODE library 'libisode.a' has to be linked together with this library because ELROS uses the transport layer functions provided by 'libisode.a.' The X.500 DAP library that is included with the ELROS distribution has to be linked in also, since the server uses the DAP library functions to communicate with directory servers.

  20. EMSODEV and EPOS-IP: key findings for effective management of EU research infrastructure projects

    NASA Astrophysics Data System (ADS)

    Materia, Paola; Bozzoli, Sabrina; Beranzoli, Laura; Cocco, Massimo; Favali, Paolo; Freda, Carmela; Sangianantoni, Agata

    2017-04-01

    -2019) is a project of 47 partners, 6 associate partners and several international organizations for a total of 25 countries involved. EPOS IP is a key step in EPOS' mission of a pan-European Earth science integrated platform. It will deliver not only a suite of domain-specific and multidisciplinary data and services in one platform, but also the legal, governance and financial frameworks to ensure the infrastructure future operation and sustainability (EPOS ERIC). INGV experience over the years indicates that effective management of EU RIs projects should contain 5 basic elements: 1.Defined life cycle and milestones: Map of phases, deliverables, key milestones and sufficiency criteria for each group involved in the project using project management tools and software. 2.Shared organization, systems, roles: Defined roles for team members and responsibilities for functional managers are crucial. Similarly, a system of communication and team involvement is essential to success. Leadership and interpersonal/organizational skills are also important. 3.Quality assurance: Quality dimension should be aligned to the project objectives and specific criteria should be identified for each phase of the project. 4.Tracking and variance analysis: Regular reports and periodic meetings of the teams are crucial to identify when things are off target. Schedule slips, cost overruns, open issues, new risks and problems must be dealt with as early as possible. 5.Impact assessment by monitoring the achievement of results and socio-economic impact.

  1. Diagnosis and Management of Heart Failure with Preserved Ejection Frac-tion: 10 Key Lessons

    PubMed Central

    A, Afşin Oktay; Shah, Sanjiv J

    2015-01-01

    Heart failure with preserved ejection fraction (HFpEF) is a common clinical syndrome associated with high rates of morbidi-ty and mortality. Due to the lack of evidence-based therapies and increasing prevalence of HFpEF, clinicians are often con-fronted with these patients and yet have little guidance on how to effectively diagnose and manage them. Here we offer 10 key lessons to assist with the care of patients with HFpEF: (1) Know the difference between diastolic dysfunction, diastolic heart failure, and HFpEF; (2) diagnosing HFpEF is challenging, so be thorough and consider invasive hemodynamic testing to confirm the diagnosis; (3) a normal B-type natriuretic peptide does not exclude the diagnosis of HFpEF; (4) elevated pul-monary artery systolic pressure on echocardiography in the presence of a normal ejection fraction should prompt considera-tion of HFpEF; (5) use dynamic testing in evaluating the possibility of HFpEF in patients with unexplained dyspnea or exer-cise tolerance; (6) all patients with HFpEF should be systematically evaluated for the presence of coronary artery disease; (7) use targeted treatment for HFpEF patients based on their phenotypic classification; (8) treat HFpEF patients now by treating their comorbidities; (9) understand the importance of heart rate in HFpEF—lower is not always better; and (10) do not forget to consider rare diseases (“zebras”) as causes for HFpEF when evaluating and treating patients. Taken together, these 10 key lessons can help clinicians care for challenging patients with HFpEF while we eagerly await the results of ongoing HFpEF clinical trials and observational studies. PMID:24251461

  2. [Application of laboratory information system in the management of the key indicators of quality inspection].

    PubMed

    Guo, Ye; Chen, Qian; Wu, Wei; Cui, Wei

    2015-03-31

    To establish a system of monitoring the key indicator of quality for inspection (KIQI) on a laboratory information system (LIS), and to have a better management of KIQI. Clinical sample made in PUMCH were collected during the whole of 2014. Next, interactive input program were designed to accomplish data collecting of the disqualification rate of samples, the mistake rate of samples and the occasions of losing samples, etc. Then, a series moment of sample collection, laboratory sample arrived, sample test, sample check, response to critical value, namely, trajectory information left on LIS were recorded and the qualification rate of TAT, the notification rate of endangering result were calculated. Finally, the information about quality control were collected to build an internal quality control database and the KIQI, such as the out-of-control rate of quality control and the total error of test items were monitored. The inspection of the sample management shows the disqualification rates in 2014 were all below the target, but the rates in January and February were a little high and the rates of four wards were above 2%. The mistake rates of samples was 0.47 cases/10 000 cases, attaining the target (< 2 cases/10 000 cases). Also, there was no occasion of losing samples in 2014, attaining the target too. The inspection of laboratory reports shows the qualification rates of TAT was within the acceptable range (> 95%), however the rates of blood routine in November (94.75%) was out of range. We have solved the problem by optimizing the processes. The notification rate of endangering result attained the target (≥ 98%), while the rate of timely notification is needed to improve. Quality inspection shows the CV of APTT in August (5.02%) was rising significantly, beyond the accepted CV (5.0%). We have solved the problem by changing the reagent. The CV of TT in 2014 were all below the allowable CV, thus the allowable CV of the next year lower to 10%. It is an objective

  3. Secure key from bound entanglement.

    PubMed

    Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Oppenheim, Jonathan

    2005-04-29

    We characterize the set of shared quantum states which contain a cryptographically private key. This allows us to recast the theory of privacy as a paradigm closely related to that used in entanglement manipulation. It is shown that one can distill an arbitrarily secure key from bound entangled states. There are also states that have less distillable private keys than the entanglement cost of the state. In general, the amount of distillable key is bounded from above by the relative entropy of entanglement. Relationships between distillability and distinguishability are found for a class of states which have Bell states correlated to separable hiding states. We also describe a technique for finding states exhibiting irreversibility in entanglement distillation.

  4. Closing the water cycle - the key role of water and wastewater management in a circular economy

    NASA Astrophysics Data System (ADS)

    Uhlenbrook, Stefan; Connor, Rick; Koncagul, Engin; Ortigara, Angela

    2017-04-01

    Planetary water boundaries are exceeded locally and regionally as water demand and use are escalating and per capita water availability is decreasing. However, wastewater represents an alternative yet reliable source containing for instance, nutrients (for use as fertilizer) and metals that can be extracted, and can be a source of energy. These characteristics mean that water and wastewater are set to play a key role in the circular economy. Furthermore, wastewater use can generate business opportunities and enhance water, food and energy security, therefore helping to alleviate poverty. However, to increase the collection, treatment and use of wastewater, investments in infrastructure and appropriate (low cost) technologies are needed. Ensuring the development of human and institutional capacity is also essential for proper wastewater management. The UN World Water Assessment Programme (WWAP) produces together with several UN-Water Members and Partners the annual World Water Development Report (WWDR). Its 2017 edition "Wastewater: The Untapped Resource" focuses on the critical role of wastewater management for vibrant economies, resilient societies and the maintenance of a healthy environment. Wastewater issues play also a central role in the 2030 Agenda for Sustainable Development, most notably through Sustainable Development Goal (SDG) target 6.3 that aims to improve water quality by reducing the proportion of untreated wastewater released to the environment and increasing its recycling and safe reuse globally. This target is interlinked with several other targets of SDG 6 ('the water goal') as well as to several other SDGs that relate to, poverty reduction, health, energy and food security, among others. The main policy-relevant messages of the WWDR 2017 will be introduced and linked to socio-hydrological approaches. These messages are an important input to the implementation of the water research agenda of the Panta Rhei initiative of IAHS.

  5. Complex adaptive systems (CAS): an overview of key elements, characteristics and application to management theory.

    PubMed

    Ellis, Beverley; Herbert, Stuart Ian

    2011-01-01

    To identify key elements and characteristics of complex adaptive systems (CAS) relevant to implementing clinical governance, drawing on lessons from quality improvement programmes and the use of informatics in primary care. The research strategy includes a literature review to develop theoretical models of clinical governance of quality improvement in primary care organisations (PCOs) and a survey of PCOs. Complex adaptive system theories are a valuable tool to help make sense of natural phenomena, which include human responses to problem solving within the sampled PCOs. The research commenced with a survey; 76% (n16) of respondents preferred to support the implementation of clinical governance initiatives guided by outputs from general practice electronic health records. There was considerable variation in the way in which consultation data was captured, recorded and organised. Incentivised information sharing led to consensus on coding policies and models of data recording ahead of national contractual requirements. Informatics was acknowledged as a mechanism to link electronic health record outputs, quality improvement and resources. Investment in informatics was identified as a development priority in order to embed clinical governance principles in practice. Complex adaptive system theory usefully describes evolutionary change processes, providing insight into how the origins of quality assurance were predicated on rational reductionism and linearity. New forms of governance do not neutralise previous models, but add further dimensions to them. Clinical governance models have moved from deterministic and 'objective' factors to incorporate cultural aspects with feedback about quality enabled by informatics. The socio-technical lessons highlighted should inform healthcare management.

  6. Key Features Of Peer Support In Chronic Disease Prevention And Management.

    PubMed

    Fisher, Edwin B; Ballesteros, Juana; Bhushan, Nivedita; Coufal, Muchieh M; Kowitt, Sarah D; McDonough, A Manuela; Parada, Humberto; Robinette, Jennifer B; Sokol, Rebeccah L; Tang, Patrick Y; Urlaub, Diana

    2015-09-01

    Peer support from community health workers, promotores de salud, and others through community and health care organizations can provide social support and other assistance that enhances health. There is substantial evidence for both the effectiveness and the cost-effectiveness of peer support, as well as for its feasibility, reach, and sustainability. We discuss findings from Peers for Progress, a program of the American Academy of Family Physicians Foundation, to examine when peer support does not work, guide dissemination of peer support programs, and help integrate approaches such as e-health into peer support. Success factors for peer support programs include proactive implementation, attention to participants' emotions, and ongoing supervision. Reaching those whom conventional clinical and preventive services too often fail to reach; reaching whole populations, such as people with diabetes, rather than selected samples; and addressing behavioral health are strengths of peer support that can help achieve health care that is efficient and of high quality. Challenges for policy makers going forward include encouraging workforce development, balancing quality control with maintaining key features of peer support, and ensuring that underresourced organizations can develop and manage peer support programs. Project HOPE—The People-to-People Health Foundation, Inc.

  7. Key Performance Indicators in Radiology: You Can't Manage What You Can't Measure.

    PubMed

    Harvey, H Benjamin; Hassanzadeh, Elmira; Aran, Shima; Rosenthal, Daniel I; Thrall, James H; Abujudeh, Hani H

    2016-01-01

    Quality assurance (QA) is a fundamental component of every successful radiology operation. A radiology QA program must be able to efficiently and effectively monitor and respond to quality problems. However, as radiology QA has expanded into the depths of radiology operations, the task of defining and measuring quality has become more difficult. Key performance indicators (KPIs) are highly valuable data points and measurement tools that can be used to monitor and evaluate the quality of services provided by a radiology operation. As such, KPIs empower a radiology QA program to bridge normative understandings of health care quality with on-the-ground quality management. This review introduces the importance of KPIs in health care QA, a framework for structuring KPIs, a method to identify and tailor KPIs, and strategies to analyze and communicate KPI data that would drive process improvement. Adopting a KPI-driven QA program is both good for patient care and allows a radiology operation to demonstrate measurable value to other health care stakeholders. Copyright © 2015 Mosby, Inc. All rights reserved.

  8. Biometrics based key management of double random phase encoding scheme using error control codes

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2013-08-01

    In this paper, an optical security system has been proposed in which key of the double random phase encoding technique is linked to the biometrics of the user to make it user specific. The error in recognition due to the biometric variation is corrected by encoding the key using the BCH code. A user specific shuffling key is used to increase the separation between genuine and impostor Hamming distance distribution. This shuffling key is then further secured using the RSA public key encryption to enhance the security of the system. XOR operation is performed between the encoded key and the feature vector obtained from the biometrics. The RSA encoded shuffling key and the data obtained from the XOR operation are stored into a token. The main advantage of the present technique is that the key retrieval is possible only in the simultaneous presence of the token and the biometrics of the user which not only authenticates the presence of the original input but also secures the key of the system. Computational experiments showed the effectiveness of the proposed technique for key retrieval in the decryption process by using the live biometrics of the user.

  9. Secure and Efficient Regression Analysis Using a Hybrid Cryptographic Framework: Development and Evaluation.

    PubMed

    Sadat, Md Nazmus; Jiang, Xiaoqian; Aziz, Md Momin Al; Wang, Shuang; Mohammed, Noman

    2018-03-05

    Machine learning is an effective data-driven tool that is being widely used to extract valuable patterns and insights from data. Specifically, predictive machine learning models are very important in health care for clinical data analysis. The machine learning algorithms that generate predictive models often require pooling data from different sources to discover statistical patterns or correlations among different attributes of the input data. The primary challenge is to fulfill one major objective: preserving the privacy of individuals while discovering knowledge from data. Our objective was to develop a hybrid cryptographic framework for performing regression analysis over distributed data in a secure and efficient way. Existing secure computation schemes are not suitable for processing the large-scale data that are used in cutting-edge machine learning applications. We designed, developed, and evaluated a hybrid cryptographic framework, which can securely perform regression analysis, a fundamental machine learning algorithm using somewhat homomorphic encryption and a newly introduced secure hardware component of Intel Software Guard Extensions (Intel SGX) to ensure both privacy and efficiency at the same time. Experimental results demonstrate that our proposed method provides a better trade-off in terms of security and efficiency than solely secure hardware-based methods. Besides, there is no approximation error. Computed model parameters are exactly similar to plaintext results. To the best of our knowledge, this kind of secure computation model using a hybrid cryptographic framework, which leverages both somewhat homomorphic encryption and Intel SGX, is not proposed or evaluated to this date. Our proposed framework ensures data security and computational efficiency at the same time. ©Md Nazmus Sadat, Xiaoqian Jiang, Md Momin Al Aziz, Shuang Wang, Noman Mohammed. Originally published in JMIR Medical Informatics (http://medinform.jmir.org), 05.03.2018.

  10. Secure and Efficient Regression Analysis Using a Hybrid Cryptographic Framework: Development and Evaluation

    PubMed Central

    Jiang, Xiaoqian; Aziz, Md Momin Al; Wang, Shuang; Mohammed, Noman

    2018-01-01

    Background Machine learning is an effective data-driven tool that is being widely used to extract valuable patterns and insights from data. Specifically, predictive machine learning models are very important in health care for clinical data analysis. The machine learning algorithms that generate predictive models often require pooling data from different sources to discover statistical patterns or correlations among different attributes of the input data. The primary challenge is to fulfill one major objective: preserving the privacy of individuals while discovering knowledge from data. Objective Our objective was to develop a hybrid cryptographic framework for performing regression analysis over distributed data in a secure and efficient way. Methods Existing secure computation schemes are not suitable for processing the large-scale data that are used in cutting-edge machine learning applications. We designed, developed, and evaluated a hybrid cryptographic framework, which can securely perform regression analysis, a fundamental machine learning algorithm using somewhat homomorphic encryption and a newly introduced secure hardware component of Intel Software Guard Extensions (Intel SGX) to ensure both privacy and efficiency at the same time. Results Experimental results demonstrate that our proposed method provides a better trade-off in terms of security and efficiency than solely secure hardware-based methods. Besides, there is no approximation error. Computed model parameters are exactly similar to plaintext results. Conclusions To the best of our knowledge, this kind of secure computation model using a hybrid cryptographic framework, which leverages both somewhat homomorphic encryption and Intel SGX, is not proposed or evaluated to this date. Our proposed framework ensures data security and computational efficiency at the same time. PMID:29506966

  11. Secure multi-party communication with quantum key distribution managed by trusted authority

    SciTech Connect

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD aremore » extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.« less

  12. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  13. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2015-01-06

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  14. Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks

    NASA Astrophysics Data System (ADS)

    Naranjo, J. A. M.; López-Ramos, J. A.; Casado, L. G.

    Key distribution for multimedia live streaming peer-to-peer overlay networks is a field still in its childhood stage. A scheme designed for networks of this kind must seek security and efficiency while keeping in mind the following restrictions: limited bandwidth, continuous playing, great audience size and clients churn. This paper introduces two novel schemes that allow a trade-off between security and efficiency by allowing to dynamically vary the number of levels used in the key hierarchy. These changes are motivated by great variations in audience size, and initiated by decision of the Key Server. Additionally, a comparative study of both is presented, focusing on security and audience size. Results show that larger key hierarchies can supply bigger audiences, but offer less security against statistical attacks. The opposite happens for shorter key hierarchies.

  15. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    DTIC Science & Technology

    2016-04-05

    applications in wireless networks such as military battlefields, emergency response, mobile commerce , online gaming, and collaborative work are based on the...www.elsevier.com/locate/peva Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc...Accepted 19 September 2010 Available online 26 September 2010 Keywords: Mobile ad hoc networks Intrusion detection Group communication systems Group

  16. Defense Health Care: Applying Key Management Practices Should Help Achieve Efficiencies within the Military Health System

    DTIC Science & Technology

    2012-04-01

    5. Realign the TRICARE Management Activity and establish a Joint Military Health Service Directorate to consolidate shared services and common...Directorate to consolidate shared services and common functions Realign TRICARE Management Activity and establish a TRICARE Health Plan Agency to...Uniformed Services University of the Health Sciences, (2) TRICARE health plan, (3) Health Management Support, and (4) Shared Services division

  17. Cryptographic Protocol for Comparing Sets without Leaking Them: Applications in Astronomy

    NASA Astrophysics Data System (ADS)

    McCullough, Peter R.

    2011-09-01

    We describe a cryptographic protocol for two or more persons to compare individual lists of astronomical objects of interest without leaking them. Cryptographers have long known such protocols; astronomers and other scientists may benefit from them also. We describe some latent opportunities that would be enabled by this protocol. Consider the following scenario: Alice has a set of stars that are candidate hosts of transiting planets. Bob has a similar set. Alice and Bob have a mutual desire to know the intersection of their two lists without revealing them to each other. Alice and Bob can recruit a trusted third party, Josephine, to make the comparison, report the results, and then destroy each list. Limitations of that approach are that 1) Josephine must devote time to make each comparison, 2) Alice and Bob may not know a Josephine that they both can trust, especially if Alice and Bob are from different communities, 3) Josephine may not indeed be trustworthy, 4) a fourth person may wittingly or unwittingly intercept one or both of the lists in Josephine's care, and 5) anticipating those limitations, Alice and Bob may elect not to recruit a Josephine and hence not compare their lists. We describe a variant that overcomes those limitations by A) encrypting the lists prior to transmitting them to Josephine, and B) replacing a human Josephine with a computer website.

  18. Epidemiological Data Management during an Outbreak of Ebola Virus Disease: Key Issues and Observations from Sierra Leone.

    PubMed

    Owada, Kei; Eckmanns, Tim; Kamara, Kande-Bure O'Bai; Olu, Olushayo Oluseun

    2016-01-01

    Sierra Leone experienced intense transmission of Ebola virus disease (EVD) from May 2014 to November 2015 during which a total of 8,704 confirmed cases and over 3,589 confirmed deaths were reported. Our field observation showed many issues in the EVD data management system, which may have contributed to the magnitude and long duration of the outbreak. In this perspective article, we explain the key issues with EVD data management in the field, and the resulting obstacles in analyzing key epidemiological indicators during the outbreak response work. Our observation showed that, during the latter part of the EVD outbreak, surveillance and data management improved at all levels in the country as compared to the earlier stage. We identified incomplete filling and late arrival of the case investigation forms at data management centers, difficulties in detecting double entries and merging identified double entries in the database, and lack of clear process of how death of confirmed cases in holding, treatment, and community care centers are reported to the data centers as some of challenges to effective data management. Furthermore, there was no consolidated database that captured and linked all data sources in a structured way. We propose development of a new application tool easily adaptable to new occurrences, regular data harmonization meetings between national and district data management teams, and establishment of a data quality audit system to assure good quality data as ways to improve EVD data management during future outbreaks.

  19. Productivity--a key to managing cost-per-case. Part 1.

    PubMed

    Orefice, J J; Jennings, M C

    1983-08-01

    Productivity and productivity management are critical to effective case-mix management. Case-mix management expands on traditional productivity management to include the relationship between such intermediate products as patient days, tests and meals, and the ultimate end product, the case. As hospitals search to increase the profitability of specific case types, they must focus on two critical productivity control points. First, they must examine length of stay and ancillary utilization as one level of productivity. Then they must turn to more traditional analyses and review departmental productivity in the production of the intermediate products. No case-mix management system is complete unless it focuses on both of these critical relationships. Part two of this article will explore performance reporting and its role in managing both productivity and case mix.

  20. [Discussion on developing a data management plan and its key factors in clinical study based on electronic data capture system].

    PubMed

    Li, Qing-na; Huang, Xiu-ling; Gao, Rui; Lu, Fang

    2012-08-01

    Data management has significant impact on the quality control of clinical studies. Every clinical study should have a data management plan to provide overall work instructions and ensure that all of these tasks are completed according to the Good Clinical Data Management Practice (GCDMP). Meanwhile, the data management plan (DMP) is an auditable document requested by regulatory inspectors and must be written in a manner that is realistic and of high quality. The significance of DMP, the minimum standards and the best practices provided by GCDMP, the main contents of DMP based on electronic data capture (EDC) and some key factors of DMP influencing the quality of clinical study were elaborated in this paper. Specifically, DMP generally consists of 15 parts, namely, the approval page, the protocol summary, role and training, timelines, database design, creation, maintenance and security, data entry, data validation, quality control and quality assurance, the management of external data, serious adverse event data reconciliation, coding, database lock, data management reports, the communication plan and the abbreviated terms. Among them, the following three parts are regarded as the key factors: designing a standardized database of the clinical study, entering data in time and cleansing data efficiently. In the last part of this article, the authors also analyzed the problems in clinical research of traditional Chinese medicine using the EDC system and put forward some suggestions for improvement.

  1. How coaching can play a key role in the development of nurse managers.

    PubMed

    Westcott, Liz

    2016-09-01

    The aim of this study was to explore empirically the role that coaching plays in the development of nurse managers in order to inform further research and policy makers about the potential utility and value of this means of development. There is evidence of the importance of the role of nurse managers who are first line managers of a team of nurses within any health sector. However, there appears to be little understanding of the United Kingdom wide scope of nurse manager development across the United Kingdom and the means to increase its effectiveness. At the same time, it appears that some nurse managers receive coaching to help in their development. This is a mixed methods study, using a pragmatist paradigm. Data was gathered from a quantitative survey and qualitative interviews. This paper is reporting the results of the qualitative interviews only. Twenty-one qualitative interviews were undertaken with nurse managers, coaches and directors of nursing to draw out their own experiences of coaching for nurse managers. Thematic analysis framework was used for data interrogation, identifying new patterns and emerging themes. Themes that emerged from interviews include how nurse managers were introduced to coaching, how they balanced transitions, the role of reflection, the value of relationships and overlaps between clinical supervision, mentoring and coaching. Findings show that following coaching, nurse managers gained increased resilience, confidence and better coping mechanisms. This resulted in perceived improved team management and cohesion and appeared to lead to better quality of care for patients. This study suggests the importance of nurse managers accessing coaching, to enable transformational leadership of their teams of nurses. It suggests also the importance of organisations supporting a coaching culture, to ensure staff satisfaction, motivation and improved quality of patient care. © 2016 John Wiley & Sons Ltd.

  2. Key Authors in Business and Management Education Research: Productivity, Topics, and Future Directions

    ERIC Educational Resources Information Center

    Arbaugh, J. B.; Asarta, Carlos J.; Hwang, Alvin; Fornaciari, Charles J.; Bento, Regina F.; Dean, Kathy Lund

    2017-01-01

    Previous studies of author productivity in business and management education (BME) research have focused on single disciplinary areas, and even single journals. This study is the first to examine the productivity of BME scholars across multiple disciplinary areas (i.e., accounting, economics, finance, information systems, management, marketing,…

  3. Interviewing Key Informants: Strategic Planning for a Global Public Health Management Program

    ERIC Educational Resources Information Center

    Kun, Karen E.; Kassim, Anisa; Howze, Elizabeth; MacDonald, Goldie

    2013-01-01

    The Centers for Disease Control and Prevention's Sustainable Management Development Program (SMDP) partners with low- and middle-resource countries to develop management capacity so that effective global public health programs can be implemented and better health outcomes can be achieved. The program's impact however, was variable. Hence, there…

  4. Leadership and Quality Management: An Analysis of Three Key Features of the Greek Education System

    ERIC Educational Resources Information Center

    Saiti, Anna

    2012-01-01

    Purpose: This paper aims to investigate whether educational leadership in Greece implements the values of total quality management and contributes to the improvement of the educational process, and to offer proposals for a framework of total quality management that would contribute to an improvement in the overall quality of the education process.…

  5. The scenic impact of key forest attributes and long-term management alternatives for hardwood forests

    Treesearch

    R.G. Ribe

    1991-01-01

    The problem of identifying the scenic value of forest attributes and management plans is empirically explored. A sample of hardwood forests in Wisconsin, representing a diversity of management histories, is analyzed through photographs and field inventories. Scenic beauty judgements of the photographs by a diversity of respondents yield general scenic beauty estimates...

  6. Biodiversity in the city: key challenges for urban green space management

    Treesearch

    Myla F.J. Aronson; Christopher A. Lepczyk; Karl L. Evans; Mark A. Goddard; Susannah B. Lerman; J. Scott MacIvor; Charles H. Nilon; Timothy Vargo

    2017-01-01

    Cities play important roles in the conservation of global biodiversity, particularly through the planning and management of urban green spaces (UGS). However, UGS management is subject to a complex assortment of interacting social, cultural, and economic factors, including governance, economics, social networks, multiple stakeholders, individual preferences, and social...

  7. Lean Information Management: Criteria For Selecting Key Performance Indicators At Shop Floor

    NASA Astrophysics Data System (ADS)

    Iuga, Maria Virginia; Kifor, Claudiu Vasile; Rosca, Liviu-Ion

    2015-07-01

    Most successful organizations worldwide use key performance indicators as an important part of their corporate strategy in order to forecast, measure and plan their businesses. Performance metrics vary in their purpose, definition and content. Therefore, the way organizations select what they think are the optimal indicators for their businesses varies from company to company, sometimes even from department to department. This study aims to answer the question of what is the most suitable way to define and select key performance indicators. More than that, it identifies the right criteria to select key performance indicators at shop floor level. This paper contributes to prior research by analysing and comparing previously researched selection criteria and proposes an original six-criteria-model, which caters towards choosing the most adequate KPIs. Furthermore, the authors take the research a step further by further steps to closed research gaps within this field of study.

  8. Software Acquisition Risk Management Key Process Area (KPA) - A Guidebook Version 1.0.

    DTIC Science & Technology

    1997-08-01

    Budget - Software Project Management Practices and Techniques. McGraw-Hill International (UK) Limited, 1992. [Boehm 81 ] Boehm, Barry . Software...Engineering Economics. Englewood Cliffs, N.J.: Prentice-Hall, Inc., 1981. [Boehm 89] Boehm, Barry . IEEE Tutorial on Software Risk Management. New York: IEEE...95] [Mayrhauser 90] [Moran 90] [Myers 96] [NRC 89] [Osborn 53] [Paulk 95] [ Pressman 92] [Pulford 96] [Scholtes 88] [Sisti 94] [STSC 96

  9. Investigation of Current State of Crytpography and Theoretical Implementation of a Cryptographic System for the Combat Service Support Control System.

    DTIC Science & Technology

    1987-05-01

    34 Advances in Crypt g: Proceedings of CRYPTO 84,r o ... .. .. _ __...o ... .. ... ....... ed. by G.R. Blakely and D. Chaum . [Wagn84b] Wagner, Neal R...in Distributed Computer Systems," IEEE Trans. on Computers, Vol. C-35, No. 7, Jul. 86, pp. 583-590. Gifford, David K., "Cryptographic Sealing for

  10. Physical key-protected one-time pad

    PubMed Central

    Horstmeyer, Roarke; Judkewitz, Benjamin; Vellekoop, Ivo M.; Assawaworrarit, Sid; Yang, Changhuei

    2013-01-01

    We describe an encrypted communication principle that forms a secure link between two parties without electronically saving either of their keys. Instead, random cryptographic bits are kept safe within the unique mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of unique 2 mm3 scattering objects. This shared randomness is used to facilitate information-theoretically secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage over electronic memory include the inability to probe, duplicate or selectively reset any bits without fundamentally altering the entire key space. Our ability to securely couple the randomness contained within two unique physical objects can extend to strengthen hardware required by a variety of cryptographic protocols, which is currently a critically weak link in the security pipeline of our increasingly mobile communication culture. PMID:24345925

  11. Key articles and guidelines in the management of pulmonary arterial hypertension: 2011 update.

    PubMed

    Johnson, Samuel G; Kayser, Steven R; Attridge, Rebecca L; Duvall, Laura; Kiser, Tyree H; Moote, Rebecca; Reed, Brent N; Rodgers, Jo E; Erstad, Brian

    2012-06-01

    Pharmacotherapeutic approaches for the management of pulmonary arterial hypertension (PAH) have expanded greatly in the last 10 years. Pulmonary arterial hypertension is a relatively rare disease and is associated with myriad disease processes. The older term for PAH, primary PAH, has been changed to represent these differences and to distinguish it from postcapillary PAH associated with left-sided heart failure. Limitations in evaluating treatment approaches for PAH include its rarity, the small number of patients included in clinical trials, and issues regarding the use of placebo-controlled trials in a disease with such a high mortality rate if left untreated. Management options include the use of prostacyclin and prostacyclin analogues, endothelin receptor antagonists, and phosphodiesterase inhibitors, as well as traditional background therapy with diuretics, digoxin, calcium channel blockers, and warfarin. Numerous drugs are under investigation to evaluate their possible roles in management. Combination therapy is increasingly becoming a standard approach to therapy, with mounting literature to document effectiveness. Current or emerging roles for the pharmacist in the management of PAH largely involves ensuring access to drug therapy, facilitating specialty pharmacy dispensing, and providing patient counseling. Newer roles may include future drug development, optimized use of investigational drugs, and specialized disease management programs. This compilation includes a series of articles identifying important literature in cardiovascular pharmacotherapy. This bibliography focuses on pharmacotherapeutic management of pulmonary arterial hypertension (PAH). Most of the cited works present the results of significant human clinical studies that have shaped the management of patients with PAH. Limited primary literature is available for some topics, so in addition, consensus documents prepared by expert panels are reviewed. This compilation may serve as a

  12. [Key points for the management of dermatitis in Latin America. The SLAAI Consensus].

    PubMed

    Sánchez, Jorge; Páez, Bruno; Macías-Weinmann, Alejandra; De Falco, Alicia

    2015-01-01

    The incidence of atopic dermatitis in Latin America, as in other regions, has been increasing in recent years. The SLAAI consensus is based on a systematic search for articles related to dermatitis, with focus in the pathophysiology and treatment and its impact on Latin America, and reviewed using the Delphi methodology (Revista Alergia Mexico 2014;61:178-211). In this article we highlight the key points of consensus and particular considerations in Latin America.

  13. Five key attributes can increase marine protected areas performance for small-scale fisheries management

    NASA Astrophysics Data System (ADS)

    di Franco, Antonio; Thiriet, Pierre; di Carlo, Giuseppe; Dimitriadis, Charalampos; Francour, Patrice; Gutiérrez, Nicolas L.; Jeudy de Grissac, Alain; Koutsoubas, Drosos; Milazzo, Marco; Otero, María Del Mar; Piante, Catherine; Plass-Johnson, Jeremiah; Sainz-Trapaga, Susana; Santarossa, Luca; Tudela, Sergi; Guidetti, Paolo

    2016-12-01

    Marine protected areas (MPAs) have largely proven to be effective tools for conserving marine ecosystem, while socio-economic benefits generated by MPAs to fisheries are still under debate. Many MPAs embed a no-take zone, aiming to preserve natural populations and ecosystems, within a buffer zone where potentially sustainable activities are allowed. Small-scale fisheries (SSF) within buffer zones can be highly beneficial by promoting local socio-economies. However, guidelines to successfully manage SSFs within MPAs, ensuring both conservation and fisheries goals, and reaching a win-win scenario, are largely unavailable. From the peer-reviewed literature, grey-literature and interviews, we assembled a unique database of ecological, social and economic attributes of SSF in 25 Mediterranean MPAs. Using random forest with Boruta algorithm we identified a set of attributes determining successful SSFs management within MPAs. We show that fish stocks are healthier, fishermen incomes are higher and the social acceptance of management practices is fostered if five attributes are present (i.e. high MPA enforcement, presence of a management plan, fishermen engagement in MPA management, fishermen representative in the MPA board, and promotion of sustainable fishing). These findings are pivotal to Mediterranean coastal communities so they can achieve conservation goals while allowing for profitable exploitation of fisheries resources.

  14. Five key attributes can increase marine protected areas performance for small-scale fisheries management.

    PubMed

    Di Franco, Antonio; Thiriet, Pierre; Di Carlo, Giuseppe; Dimitriadis, Charalampos; Francour, Patrice; Gutiérrez, Nicolas L; Jeudy de Grissac, Alain; Koutsoubas, Drosos; Milazzo, Marco; Otero, María Del Mar; Piante, Catherine; Plass-Johnson, Jeremiah; Sainz-Trapaga, Susana; Santarossa, Luca; Tudela, Sergi; Guidetti, Paolo

    2016-12-01

    Marine protected areas (MPAs) have largely proven to be effective tools for conserving marine ecosystem, while socio-economic benefits generated by MPAs to fisheries are still under debate. Many MPAs embed a no-take zone, aiming to preserve natural populations and ecosystems, within a buffer zone where potentially sustainable activities are allowed. Small-scale fisheries (SSF) within buffer zones can be highly beneficial by promoting local socio-economies. However, guidelines to successfully manage SSFs within MPAs, ensuring both conservation and fisheries goals, and reaching a win-win scenario, are largely unavailable. From the peer-reviewed literature, grey-literature and interviews, we assembled a unique database of ecological, social and economic attributes of SSF in 25 Mediterranean MPAs. Using random forest with Boruta algorithm we identified a set of attributes determining successful SSFs management within MPAs. We show that fish stocks are healthier, fishermen incomes are higher and the social acceptance of management practices is fostered if five attributes are present (i.e. high MPA enforcement, presence of a management plan, fishermen engagement in MPA management, fishermen representative in the MPA board, and promotion of sustainable fishing). These findings are pivotal to Mediterranean coastal communities so they can achieve conservation goals while allowing for profitable exploitation of fisheries resources.

  15. Gencrypt: one-way cryptographic hashes to detect overlapping individuals across samples

    PubMed Central

    Turchin, Michael C.; Hirschhorn, Joel N.

    2012-01-01

    Summary: Meta-analysis across genome-wide association studies is a common approach for discovering genetic associations. However, in some meta-analysis efforts, individual-level data cannot be broadly shared by study investigators due to privacy and Institutional Review Board concerns. In such cases, researchers cannot confirm that each study represents a unique group of people, leading to potentially inflated test statistics and false positives. To resolve this problem, we created a software tool, Gencrypt, which utilizes a security protocol known as one-way cryptographic hashes to allow overlapping participants to be identified without sharing individual-level data. Availability: Gencrypt is freely available under the GNU general public license v3 at http://www.broadinstitute.org/software/gencrypt/ Contact: joelh@broadinstitute.org Supplementary information: Supplementary data are available at Bioinformatics online. PMID:22302573

  16. Information management and information technologies: keys to professional and business success.

    PubMed

    Otten, K W

    1984-01-01

    Personal computers, spreadsheets, decision support software, electronic mail and video disks are just a few of the innovations of information technology which attract the attention of information professionals and managers alike: they are all concerned with the rapidly changing face of information technology and how to cope with a changing competitive environment, personally, and for the benefit of their companies. This paper is the first in a monthly series which tries to illuminate some of the factors and changes which shape our future as professionals and managers. In so doing, it guides and motivates the reader to become "information literate," a prerequisite for personal advancement in an information-based economy. This first paper outlines the relationship between technological innovations, use of information tools and information management and what to consider in order to benefit from the information revolution. It explains the risks of becoming professionally obsolete and alerts the reader to get personally involved to remain or become "information and computer literate."

  17. The key to successful management of STS operations: An integrated production planning system

    NASA Technical Reports Server (NTRS)

    Johnson, W. A.; Thomasen, C. T.

    1985-01-01

    Space Transportation System operations managers are being confronted with a unique set of challenges as a result of increasing flight rates, the demand for flight manifest/production schedule flexibility and an emphasis on continued cost reduction. These challenges have created the need for an integrated production planning system that provides managers with the capability to plan, schedule, status and account for an orderly flow of products and services across a large, multi-discipline organization. With increased visibility into the end-to-end production flow for individual and parallel missions in process, managers can assess the integrated impact of changes, identify and measure the interrelationships of resource, schedule, and technical performance requirements and prioritize productivity enhancements.

  18. The integrated supplier: key to cost management and multi-franchise capitation contracting.

    PubMed

    Schuweiler, R C

    1996-05-01

    Capitation...most healthcare providers do not work under it, comprehend it, or even want it, yet supply capitation contracting seminars are popping up everywhere creating the feeling that the bandwagon is leaving, and it might be time to get on board. Not true. Supply capitation is not for all organizations. Capitation contracting is not easy and there are not many successful models to help the uninitiated. If a panacea is sought for reducing supply costs, capitation is only one component of a systematic strategy to reduce materiel costs. This article suggests a direction using the Group Health Materiel Management (Group Health Cooperative of Puget Sound, WA) experience as a point of reference. It advocates a systematic approach that focuses on expense reduction in: cost of goods, holding cost of inventory, labor cost associated with all materiel processes, distribution cost (transportation and par stock pick, pack, and replenishment), product utilization, variation in product standards, and waste stream byproducts. At Group Health (GH) these issues are primarily addressed through the use of: information systems, supplier certification/selection processes, group purchasing compliance, supply channel management, supply capitation contracting programs, standardization, and utilization management. Because of managed care organizational structure, Group Health Cooperative supply capitation contracting, as performed at GH, is discussed not as a quick fix solution but in the spirit of sharing our experience with others who may be considering it as a cost savings tactic in the context of a broad-based materiel management strategy. This article highlights the experiences of GH beginning with materiel management's business process assumptions toward multiple-franchise supply capitation.

  19. Developing trap cropping systems for effective organic management of key insect pests of cucurbit crops (IPM)

    USDA-ARS?s Scientific Manuscript database

    Trap cropping is a behaviorally-based pest management approach that functions by planting highly attractive plants next to a higher value crop so as to attract the pest to the trap crop plants, thus preventing or making less likely the arrival of the pest to the main crop (= cash crop). In 2012, a s...

  20. The Keys to Managing Instruction and Behavior: Considering High Probability Practices

    ERIC Educational Resources Information Center

    Cooper, Justin T.; Scott, Terrance M.

    2017-01-01

    Academics and behavior are inextricably linked, and as such, management of behavior should be considered not as an addition to the teacher's repertoire of skills but as an integral foundational component of effective instruction. Paradoxically, teachers report that students with challenging behavior are both their greatest challenge and that…

  1. The keys to CERN conference rooms - Managing local collaboration facilities in large organisations

    NASA Astrophysics Data System (ADS)

    Baron, T.; Domaracky, M.; Duran, G.; Fernandes, J.; Ferreira, P.; Gonzalez Lopez, J. B.; Jouberjean, F.; Lavrut, L.; Tarocco, N.

    2014-06-01

    For a long time HEP has been ahead of the curve in its usage of remote collaboration tools, like videoconference and webcast, while the local CERN collaboration facilities were somewhat behind the expected quality standards for various reasons. This time is now over with the creation by the CERN IT department in 2012 of an integrated conference room service which provides guidance and installation services for new rooms (either equipped for videoconference or not), as well as maintenance and local support. Managing now nearly half of the 246 meeting rooms available on the CERN sites, this service has been built to cope with the management of all CERN rooms with limited human resources. This has been made possible by the intensive use of professional software to manage and monitor all the room equipment, maintenance and activity. This paper focuses on presenting these packages, either off-the-shelf commercial products (asset and maintenance management tool, remote audio-visual equipment monitoring systems, local automation devices, new generation touch screen interfaces for interacting with the room) when available or locally developed integration and operational layers (generic audio-visual control and monitoring framework) and how they help overcoming the challenges presented by such a service. The aim is to minimise local human interventions while preserving the highest service quality and placing the end user back in the centre of this collaboration platform.

  2. 30 Key Steps to Successful Diversity Management: Mentoring, Networking, and Sponsorship.

    ERIC Educational Resources Information Center

    Gant, Lenora Peters

    2000-01-01

    Outlines three components that are necessary for successful diversity management programs: mentoring, networking, and sponsorship. Provides 10 guidelines under each aspect to help employees feel loyalty and a personal attachment to an organization, feel included in day-to-day operations, and to help with employee retention. (LRW)

  3. Building an Evaluative Culture: The Key to Effective Evaluation and Results Management

    ERIC Educational Resources Information Center

    Mayne, John

    2009-01-01

    As many reviews of results-based performance systems have noted, a weak evaluative culture in an organization undermines attempts at building an effective evaluation and/or results management regime. This article sets out what constitutes a strong evaluative culture where information on performance results is deliberately sought in order to learn…

  4. The Relationship between High Labor-Management Conflict and Turnover of Key School District Personnel.

    ERIC Educational Resources Information Center

    Caldwell, William E.; Sites, Woodrow H.

    Beginning with a review of recent literature on social conflict, this study adopts Coser's distinction between realistic conflict, which seeks to balance both sides of a disagreement, and nonrealistic conflict, which seeks domination by only one party. Where nonrealistic conflict develops in intense labor-management disputes in public school…

  5. Key Features of Management of Technology (MoT) Undergraduate Program in Malaysia

    ERIC Educational Resources Information Center

    Shamsuddin, Alina; Abdullah, Nor Hazana; Wahab, Eta

    2011-01-01

    Management of Technology (MoT) Education is growing both in numbers and importance. There are more than 200 universities in the world that are offering MoT programs. However, these universities have taken different approaches with respect to the names and designs of the programs. In Malaysia, some of the programs are known as Technology…

  6. Right-of-way management: A key to controlling the spread of cogograss (Imperata cylindrica)

    Treesearch

    W.H. Faircloth; M.G. Patterson; James H. Miller; D.H. Teem

    2004-01-01

    Cogongrass [Imperata cylindrica(L.) Beauv.] is an undesired species on highway rights-of-way (ROWS) due to its displacenent of native and/or more manageable grasses, unsightly growth characteristic, and propensity for fire. Fire not only poses a danger to motorists but could cause property loss to adjoining landowners. Most importantly, ROWS provide...

  7. Key Resources on Higher Education Governance, Management, and Leadership. A Guide to the Literature.

    ERIC Educational Resources Information Center

    Peterson, Marvin W., Ed.; Mets, Lisa A., Ed.

    Designed as a reference for both practitioners and scholars, this book describes the general development of governance, management, and leadership in higher education, and also outlines the evolution of particular issues, concepts, and literature within each of these three areas. Each bibliographic entry is numbered to provide cross-references to…

  8. Change Management and the SENCo Role: Developing Key Performance Indicators in the Strategic Development of Inclusivity

    ERIC Educational Resources Information Center

    Done, Liz; Murphy, Mike; Watt, Mia

    2016-01-01

    This article follows an earlier publication highlighting the changing role of special educational needs co-ordinators (SENCos) in England. SENCos are now required to manage change strategically and deliver inclusive school cultures. School-based action research undertaken by a teacher studying for the postgraduate National Award for SEN…

  9. Change Management and the SENCo Role: Developing Key Performance Indicators of Inclusivity

    ERIC Educational Resources Information Center

    Done, Elizabeth; Murphy, Mike; Bedford, Clare

    2016-01-01

    This article highlights the changing role of special educational needs co-ordinators (SENCos) in England. SENCos are now required to manage change strategically and deliver inclusive school cultures. A school-based evaluative study undertaken by a teacher who is studying for the postgraduate National Award for SEN Co-ordination (NASENCO) for…

  10. Positioning the Learning Asset Portfolio as a Key Component in an Organization's Enterprise Risk Management Strategy

    ERIC Educational Resources Information Center

    McAliney, Peter J.

    2009-01-01

    This article presents a process for valuing a portfolio of learning assets used by line executives across industries to value traditional business assets. Embedded within the context of enterprise risk management, this strategic asset allocation process is presented step by step, providing readers the operational considerations to implement this…

  11. Long-Term Soil Experiments: A Key to Managing Earth's Rapidly Changing Critical Zones

    NASA Astrophysics Data System (ADS)

    Richter, D., Jr.

    2014-12-01

    In a few decades, managers of Earth's Critical Zones (biota, humans, land, and water) will be challenged to double food and fiber production and diminish adverse effects of management on the wider environment. To meet these challenges, an array of scientific approaches is being used to increase understanding of Critical Zone functioning and evolution, and one amongst these approaches needs to be long-term soil field studies to move us beyond black boxing the belowground Critical Zone, i.e., to further understanding of processes driving changes in the soil environment. Long-term soil experiments (LTSEs) provide direct observations of soil change and functioning across time scales of decades, data critical for biological, biogeochemical, and environmental assessments of sustainability; for predictions of soil fertility, productivity, and soil-environment interactions; and for developing models at a wide range of temporal and spatial scales. Unfortunately, LTSEs globally are not in a good state, and they take years to mature, are vulnerable to loss, and even today remain to be fully inventoried. Of the 250 LTSEs in a web-based network, results demonstrate that soils and belowground Critical Zones are highly dynamic and responsive to human management. The objective of this study is to review the contemporary state of LTSEs and consider how they contribute to three open questions: (1) can soils sustain a doubling of food production in the coming decades without further impinging on the wider environment, (2) how do soils interact with the global C cycle, and (3) how can soil management establish greater control over nutrient cycling. While LTSEs produce significant data and perspectives for all three questions, there is on-going need and opportunity for reviews of the long-term soil-research base, for establishment of an efficiently run network of LTSEs aimed at sustainability and improving management control over C and nutrient cycling, and for research teams that

  12. A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

    PubMed Central

    Moharram, Mohammed Morsi; Azam, Farzana

    2014-01-01

    Vehicular ad hoc networks (VANETs) are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach. PMID:24587749

  13. Ten key questions about the management of water in the Yellow River basin.

    PubMed

    Barnett, Jon; Webber, Michael; Wang, Mark; Finlayson, Brian; Dickinson, Debbie

    2006-08-01

    Water is scarce in many regions of the world, clean water is difficult to find in most developing countries, there are conflicts between irrigation needs and urban demands, and there is wide debate over appropriate means of resolving these problems. Similarly, in China, there is limited understanding of the ways in which people, groups, and institutions contribute to, are affected by, and respond to changes in water quantity and quality. We use the example of the Yellow River basin to argue that these social, managerial, and policy dimensions of the present water problems are significant and overshadow the physical ones. Despite this, they receive relatively little attention in the research agenda, particularly of the lead agencies in the management of the Yellow River basin. To this end, we ask ten research questions needed to address the policy needs of water management in the basin, split into two groups of five. The first five relate to the importance of water in this basin and the changes that have affected water problems and will continue to do so. The second five questions represent an attempt to explore possible solutions to these problems.

  14. The key to health services in Turkey: new perspectives on leadership and hospital management.

    PubMed

    Sahin, Alper A

    2014-01-01

    Health services are one of the most important criteria for making a country function. Turkey has mobilized all of its resources to provide high-quality, easily accessible and patient-friendly services for its population. To achieve this aim, the Turkish health care system has been undergoing a significant transformation through its Health Transformation Programme begun in 2005. The reforms focus on the introduction of a general health insurance system, changing hospital health services, improvements in hospital management and transformational leadership skills. Firstly, all state-run hospitals in the country were merged under the same umbrella, giving millions of people covered by the national security agency access to all of these hospitals. Secondly, all drugs and medical equipment used by patients were made free of charge. Thanks to these developments, hospitals were modernized, and this modernization process in the health sector is still continuing swiftly. On the other hand, for Turkish hospitals to survive, they need to modernize further and become closer to European models, and produce new leaders with new paradigms. In this new and changing health system, hospital leaders and executive officers should be visionaries and strategists advising when to change direction. Following this doctrine, most Turkish hospitals are now run by two top executives: the hospital manager and the chief executive officer who is in charge of business functions. These executives should clearly be the leaders of high-quality, health care organizations.

  15. Project management office in health care: a key strategy to support evidence-based practice change.

    PubMed

    Lavoie-Tremblay, Mélanie; Bonneville-Roussy, Arielle; Richer, Marie-Claire; Aubry, Monique; Vezina, Michel; Deme, Mariama

    2012-01-01

    This article describes the contribution of a Transition Support Office (TSO) in a health care center in Canada to supporting changes in practice based on evidence and organizational performance in the early phase of a major organizational change. Semistructured individual interviews were conducted with 11 members of the TSO and 13 managers and clinicians from an ambulatory sector in the organization who received support from the TSO. The main themes addressed in the interviews were the description of the TSO, the context of implementation, and the impact. Using the Competing Value Framework by Quinn and Rohrbaugh [Public Product Rev. 1981;5(2):122-140], results revealed that the TSO is a source of expertise that facilitates innovation and implementation of change. It provides material support and human expertise for evidence-based projects. As a single organizational entity responsible for managing change, it gives a sense of cohesiveness. It also facilitates communication among human resources of the entire organization. The TSO is seen as an expertise provider that promotes competency development, training, and evidence-based practices. The impact of a TSO on change in practices and organizational performance in a health care system is discussed.

  16. Reputation management on facebook: awareness is key to protecting yourself, your practice, and the veterinary profession.

    PubMed

    Weijs, Cynthia A; Coe, Jason B; Muise, Amy; Christofides, Emily; Desmarais, Serge

    2014-01-01

    From the Social media use by health professionals occurs in a digital environment where etiquette has yet to be solidly defined. The objectives of this study were to explore veterinarians' personal use of Facebook, knowledge of privacy settings, and factors related to sharing personal information online. All American Animal Hospital Association member veterinarians with a valid e-mail address (9469) were invited to complete an online survey about Facebook (e.g., time spent on Facebook, awareness of consequences, types of information posted). Questions assessing personality dimensions including trust, popularity, self-esteem and professional identity were included. The response rate was 17% (1594 of 9469); 72% of respondents (1148 of 1594) had a personal Facebook profile. Veterinarians were more likely to share information on Facebook than they would in general. Trust, need for popularity, and more time spent on Facebook predicted more disclosure of personal information on Facebook. Awareness of consequences and increased veterinary experience predicted lesser disclosure. As veterinary practices use Facebook to improve client services, they need also to manage risks associated with online disclosure by staff. Raising awareness of reputation management and consequences of posting certain types of information to Facebook is integral to protecting the individual, the practice, and the veterinary profession.

  17. Health and productivity management: establishing key performance measures, benchmarks, and best practices.

    PubMed

    Goetzel, R Z; Guindon, A M; Turshen, I J; Ozminkowski, R J

    2001-01-01

    Major areas considered under the rubric of health and productivity management (HPM) in American business include absenteeism, employee turnover, and the use of medical, disability, and workers' compensation programs. Until recently, few normative data existed for most HPM areas. To meet the need for normative information in HPM, a series of Consortium Benchmarking Studies were conducted. In the most recent application of the study, 1998 HPM costs, incidence, duration, and other program data were collected from 43 employers on almost one million workers. The median HPM costs for these organizations were $9992 per employee, which were distributed among group health (47%), turnover (37%), unscheduled absence (8%), nonoccupational disability (5%), and workers' compensation programs (3%). Achieving "best-practice" levels of performance (operationally defined as the 25th percentile for program expenditures in each HPM area) would realize savings of $2562 per employee (a 26% reduction). The results indicate substantial opportunities for improvement through effective coordination and management of HPM programs. Examples of best-practice activities collated from on-site visits to "benchmark" organizations are also reviewed.

  18. Quantum cryptography using coherent states: Randomized encryption and key generation

    NASA Astrophysics Data System (ADS)

    Corndorf, Eric

    With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic

  19. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    PubMed Central

    Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    2008-01-01

    For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully. PMID:27873956

  20. Key strategies to improve systems for managing patient complaints within health facilities - what can we learn from the existing literature?

    PubMed

    Mirzoev, Tolib; Kane, Sumit

    2018-01-01

    Information from patient complaints - a widely accepted measure of patient satisfaction with services - can inform improvements in service quality, and contribute towards overall health systems performance. While analyses of data from patient complaints received much emphasis, there is limited published literature on key interventions to improve complaint management systems. The objectives are two-fold: first, to synthesise existing evidence and provide practical options to inform future policy and practice and, second, to identify key outstanding gaps in the existing literature to inform agenda for future research. We report results of review of the existing literature. Peer-reviewed published literature was searched in OVID Medline, OVID Global Health and PubMed. In addition, relevant citations from the reviewed articles were followed up, and we also report grey literature from the UK and the Netherlands. Effective interventions can improve collection of complaints (e.g. establishing easy-to-use channels and raising patients' awareness of these), analysis of complaint data (e.g. creating structures and spaces for analysis and learning from complaints data), and subsequent action (e.g. timely feedback to complainants and integrating learning from complaints into service quality improvement). No one single measure can be sufficient, and any intervention to improve patient complaint management system must include different components, which need to be feasible, effective, scalable, and sustainable within local context. Effective interventions to strengthen patient complaints systems need to be: comprehensive, integrated within existing systems, context-specific and cognizant of the information asymmetry and the unequal power relations between the key actors. Four gaps in the published literature represent an agenda for future research: limited understanding of contexts of effective interventions, absence of system-wide approaches, lack of evidence from low- and

  1. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge.

    PubMed

    Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    2008-12-03

    For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODE plus . It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODE plus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.

  2. Strategic management and organizational behavior in dental education: reflections on key issues in an environment of change.

    PubMed

    Dunning, David G; Durham, Timothy M; Lange, Brian M; Aksu, Mert N

    2009-06-01

    With issues such as shrinking revenue, access to care, faculty workloads, and graying faculty, dental schools are faced with difficult challenges that fall to dental school deans to manage. Do dental school deans have the organizational skill sets and ethical frameworks necessary to address the challenges now facing dental schools? The purpose of this article is to pose questions and suggestions regarding some of the key issues in dental colleges today and to stimulate discussion in the dental community about needed changes in dental education.

  3. Privacy enhancing techniques - the key to secure communication and management of clinical and genomic data.

    PubMed

    De Moor, G J E; Claerhout, B; De Meyer, F

    2003-01-01

    To introduce some of the privacy protection problems related to genomics based medicine and to highlight the relevance of Trusted Third Parties (TTPs) and of Privacy Enhancing Techniques (PETs) in the restricted context of clinical research and statistics. Practical approaches based on two different pseudonymisation models, both for batch and interactive data collection and exchange, are described and analysed. The growing need of managing both clinical and genetic data raises important legal and ethical challenges. Protecting human rights in the realm of privacy, while optimising research potential and other statistical activities is a challenge that can easily be overcome with the assistance of a trust service provider offering advanced privacy enabling/enhancing solutions. As such, the use of pseudonymisation and other innovative Privacy Enhancing Techniques can unlock valuable data sources.

  4. Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions

    NASA Astrophysics Data System (ADS)

    Kravitz, David William

    This paper presents an insider's view of the rationale and the cryptographic mechanics of some principal elements of the Open Mobile Alliance (OMA) Secure Content Exchange (SCE) Technical Specifications. A primary goal is to enable implementation of a configurable methodology that quarantines the effects that unknown-compromised entities have on still-compliant entities in the system, while allowing import from upstream protection systems and multi-client reuse of Rights Objects that grant access to plaintext content. This has to be done without breaking compatibility with the underlying legacy OMA DRM v2.0/v2.1 Technical Specifications. It is also required that legacy devices can take at least partial advantage of the new import functionality, and can request the creation of SCE-compatible Rights Objects and utilize Rights Objects created upon request of SCE-conformant devices. This must be done in a way that the roles played by newly defined entities unrecognizable by legacy devices remain hidden.

  5. The key to commercial-scale geological CO2 sequestration: Displaced fluid management

    USGS Publications Warehouse

    Surdam, R.C.; Jiao, Z.; Stauffer, P.; Miller, T.

    2011-01-01

    The Wyoming State Geological Survey has completed a thorough inventory and prioritization of all Wyoming stratigraphic units and geologic sites capable of sequestering commercial quantities of CO2 (5-15 Mt CO 2/year). This multi-year study identified the Paleozoic Tensleep/Weber Sandstone and Madison Limestone (and stratigraphic equivalent units) as the leading clastic and carbonate reservoir candidates for commercial-scale geological CO2 sequestration in Wyoming. This conclusion was based on unit thickness, overlying low permeability lithofacies, reservoir storage and continuity properties, regional distribution patterns, formation fluid chemistry characteristics, and preliminary fluid-flow modeling. This study also identified the Rock Springs Uplift in southwestern Wyoming as the most promising geological CO2 sequestration site in Wyoming and probably in any Rocky Mountain basin. The results of the WSGS CO2 geological sequestration inventory led the agency and colleagues at the UW School of Energy Resources Carbon Management Institute (CMI) to collect available geologic, petrophysical, geochemical, and geophysical data on the Rock Springs Uplift, and to build a regional 3-D geologic framework model of the Uplift. From the results of these tasks and using the FutureGen protocol, the WSGS showed that on the Rock Springs Uplift, the Weber Sandstone has sufficient pore space to sequester 18 billion tons (Gt) of CO2, and the Madison Limestone has sufficient pore space to sequester 8 Gt of CO2. ?? 2011 Published by Elsevier Ltd.

  6. Culture, management and finances as key aspects for healthy workplace initiatives.

    PubMed

    Waterworth, Pippa; Pescud, Melanie; Chappell, Stacie; Davies, Christina; Roche, Dee; Shilton, Trevor; Ledger, Melissa; Slevin, Terry; Rosenberg, Michael

    2018-02-01

    The aim of this study was to qualitatively explore the barriers and enablers to implementing healthy workplace initiatives in a sample of workplaces based in Perth, Western Australia. In-depth interviews were conducted with representatives from 31 organizations representing small, medium and large businesses in the Perth metropolitan area which reported having healthy workplace initiatives. In total, 43 factors were mentioned as influencing the implementation of healthy workplace initiatives. Factors appearing to exert the most influence on the implementation of health promoting initiatives in this sample were culture; support from managers and staff; collaboration with industry providers; financial resources circumstances and the physical environment. These factors appeared to be mutually reinforcing and interconnected. Findings suggest there may be merit in applying an organizational development lens to the implementation of workplace health promotion initiatives as this could assist in leveraging enablers and minimizing barriers. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  7. Analysis on Key Points of Construction and Management of Municipal Landscape Engineering

    NASA Astrophysics Data System (ADS)

    Liang, Mingxia; Fei, Cheng

    2018-02-01

    At present, China has made great efforts to promote the construction of ecological civilization and promote the development of ecological protection and environmental construction. It has important practical significance to maintain the ecological balance and environmental quality of our country. Especially with the gradual improvement in people’s awareness of environmental protection, so that the green of the city also put forward higher requirements at the same time with the rising of the level of urbanization. In the process of urban landscape construction, the rational planning of urban landscaping involves a lot of subject knowledge. In the green process, we should fully consider the system of urban development and construction in China, based on the design of urban development and long-term planning of the landscaping project. In addition, we must also consider the traditional layout of the city area and the physical and geographical situation and so on, to enhance the objective and scientific nature of urban landscape. Therefore, it is of great practical significance to ensure the quality of landscaping in the effective management of municipal landscape engineering.

  8. Intercropped Silviculture Systems, a Key to Achieving Soil Fungal Community Management in Eucalyptus Plantations

    PubMed Central

    Rachid, Caio T. C. C.; Balieiro, Fabiano C.; Fonseca, Eduardo S.; Peixoto, Raquel Silva; Chaer, Guilherme M.; Tiedje, James M.; Rosado, Alexandre S.

    2015-01-01

    Fungi are ubiquitous and important contributors to soil nutrient cycling, playing a vital role in C, N and P turnover, with many fungi having direct beneficial relationships with plants. However, the factors that modulate the soil fungal community are poorly understood. We studied the degree to which the composition of tree species affected the soil fungal community structure and diversity by pyrosequencing the 28S rRNA gene in soil DNA. We were also interested in whether intercropping (mixed plantation of two plant species) could be used to select fungal species. More than 50,000 high quality sequences were analyzed from three treatments: monoculture of Eucalyptus; monoculture of Acacia mangium; and a mixed plantation with both species sampled 2 and 3 years after planting. We found that the plant type had a major effect on the soil fungal community structure, with 75% of the sequences from the Eucalyptus soil belonging to Basidiomycota and 19% to Ascomycota, and the Acacia soil having a sequence distribution of 28% and 62%, respectively. The intercropping of Acacia mangium in a Eucalyptus plantation significantly increased the number of fungal genera and the diversity indices and introduced or increased the frequency of several genera that were not found in the monoculture cultivation samples. Our results suggest that management of soil fungi is possible by manipulating the composition of the plant community, and intercropped systems can be a means to achieve that. PMID:25706388

  9. ICI-RS 2015-Is a better understanding of sleep the key in managing nocturia?

    PubMed

    Denys, Marie-Astrid; Cherian, Jerald; Rahnama'i, Mohammad S; O'Connell, Kathleen A; Singer, Jonathan; Wein, Alan J; Dhondt, Karlien; Everaert, Karel; Weiss, Jeffrey P

    2016-09-21

    Nocturia, or waking up at night to void, is a highly prevalent and bothersome lower urinary tract symptom. However, the applied treatment modalities do not improve symptoms in about half of the patients. The aim of this report is to generate new ideas for future nocturia research, with special emphasis on the role of sleep physiology and sleep disorders. The following is a report of the presentations and subsequent discussion of the Nocturia Think Tank session at the annual meeting of the International Consultation on Incontinence Research Society (ICI-RS), which took place in September 2015 in Bristol. General information about the organization of the ICI-RS meeting can be found on the website "www.ici-rs.org." An overview of challenges within the existing evidence, future research ideas, and results of research with regard to nocturia and sleep were presented. In order to optimize the management of nocturia and nocturnal polyuria (NP), future research has to focus on the development of unambiguous terminology regarding nocturia and NP, the role of renal function profiles and simplified frequency volume charts as guidance of individualized therapy and the role of sleep disorders such as periodic limb movements during sleep and habitual voiding as a response to awakening. Neurourol. Urodynam. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  10. SDAI: a key piece of software to manage the new wideband backend at Robledo

    NASA Astrophysics Data System (ADS)

    Rizzo, J. R.; Gutiérrez Bustos, M.; Kuiper, T. B. H.; Cernicharo, J.; Sotuela, I.; Pedreira, A.

    2012-09-01

    A joint collaborative project was recently developed to provide the Madrid Deep Space Communications Complex with a state-of-the-art wideband backend. This new backend provides from 100MHz to 6 GHz of instantaneous bandwidth, and spectral resolutions from 6 to 200 kHz. The backend includes a new intermediate-frequency processor, as well as a FPGA-based FFT spectrometer, which manage thousands of spectroscopic channels in real time. All these equipment need to be controlled and operated by a common software, which has to synchronize activities among affected devices, and also with the observing program. The final output should be a calibrated spectrum, readable by standard radio astronomical tools for further processing. The developed software at this end is named "Spectroscopic Data Acquisition Interface" (SDAI). SDAI is written in python 2.5, using PyQt4 for the User Interface. By an ethernet socket connection, SDAI receives astronomical information (source, frequencies, Doppler correction, etc.) and the antenna status from the observing program. Then it synchronizes the observations at the required frequency by tuning the synthesizers through their USB ports; finally SDAI controls the FFT spectrometers through UDP commands sent by sockets. Data are transmitted from the FFT spectrometers by TCP sockets, and written as standard FITS files. In this paper we describe the modules built, depict a typical observing session, and show some astronomical results using SDAI.

  11. Intercropped silviculture systems, a key to achieving soil fungal community management in eucalyptus plantations.

    PubMed

    Rachid, Caio T C C; Balieiro, Fabiano C; Fonseca, Eduardo S; Peixoto, Raquel Silva; Chaer, Guilherme M; Tiedje, James M; Rosado, Alexandre S

    2015-01-01

    Fungi are ubiquitous and important contributors to soil nutrient cycling, playing a vital role in C, N and P turnover, with many fungi having direct beneficial relationships with plants. However, the factors that modulate the soil fungal community are poorly understood. We studied the degree to which the composition of tree species affected the soil fungal community structure and diversity by pyrosequencing the 28S rRNA gene in soil DNA. We were also interested in whether intercropping (mixed plantation of two plant species) could be used to select fungal species. More than 50,000 high quality sequences were analyzed from three treatments: monoculture of Eucalyptus; monoculture of Acacia mangium; and a mixed plantation with both species sampled 2 and 3 years after planting. We found that the plant type had a major effect on the soil fungal community structure, with 75% of the sequences from the Eucalyptus soil belonging to Basidiomycota and 19% to Ascomycota, and the Acacia soil having a sequence distribution of 28% and 62%, respectively. The intercropping of Acacia mangium in a Eucalyptus plantation significantly increased the number of fungal genera and the diversity indices and introduced or increased the frequency of several genera that were not found in the monoculture cultivation samples. Our results suggest that management of soil fungi is possible by manipulating the composition of the plant community, and intercropped systems can be a means to achieve that.

  12. Intercropped silviculture systems, a key to achieving soil fungal community management in eucalyptus plantations

    DOE PAGES

    Caio T.C.C. Rachid; Balieiro, Fabiano C.; Fonseca, Eduardo S.; ...

    2015-02-23

    Fungi are ubiquitous and important contributors to soil nutrient cycling, playing a vital role in C, N and P turnover, with many fungi having direct beneficial relationships with plants. However, the factors that modulate the soil fungal community are poorly understood. We studied the degree to which the composition of tree species affected the soil fungal community structure and diversity by pyrosequencing the 28S rRNA gene in soil DNA. We were also interested in whether intercropping (mixed plantation of two plant species) could be used to select fungal species. More than 50,000 high quality sequences were analyzed from three treatments:more » monoculture of Eucalyptus; monoculture of Acacia mangium; and a mixed plantation with both species sampled 2 and 3 years after planting. We found that the plant type had a major effect on the soil fungal community structure, with 75% of the sequences from the Eucalyptus soil belonging to Basidiomycota and 19% to Ascomycota, and the Acacia soil having a sequence distribution of 28% and 62%, respectively. The intercropping of Acacia mangium in a Eucalyptus plantation significantly increased the number of fungal genera and the diversity indices and introduced or increased the frequency of several genera that were not found in the monoculture cultivation samples. Our results suggest that management of soil fungi is possible by manipulating the composition of the plant community, and intercropped systems can be a means to achieve that.« less

  13. A Survey of Managers' Access to Key Performance Indicators via HIS: The Case of Iranian Teaching Hospitals.

    PubMed

    Ahmadi, Maryam; Khorrami, Farid; Dehnad, Afsaneh; Golchin, Mohammad H; Azad, Mohsen; Rahimi, Shafei

    2018-01-01

    The challenges of using health information systems in developing countries are different from developed countries for various reasons such as infrastructure and data culture of organizations. The aim of this study is to assess managers' access to key performance indicators (KPI) via Hospital Information System (HIS) in teaching hospitals of Iran. All managers (Census method) of the four teaching hospitals affiliated to Hormozgan University of Medical Sciences (HUMS) were included in this study. KPIs which are linked to the strategic objectives of organizations were adopted from the strategic plan of HUMS. The questionnaire used in this study included three categories: Financial, Human Resources and clinical. One-sample t-test was used and the significant difference score was calculated for the acceptable level. We found that HIS cannot facilitate access to KPIs for managers in the main categories, but it was effective in two subcategories of income (p = 0.314) and salary (P = 0.289)). A study of barriers to the use of managers of HIS in hospitals is suggested.

  14. Permanent right-to-left shunt is the key factor in managing patent foramen ovale.

    PubMed

    Rigatelli, Gianluca; Dell'Avvocata, Fabio; Cardaioli, Paolo; Giordan, Massimo; Braggion, Gabriele; Aggio, Silvio; Chinaglia, Mauro; Mandapaka, Sangeeta; Kuruvilla, John; Chen, Jack P; Nanjundappa, Aravinda

    2011-11-15

    We sought to prospectively evaluate risk of stroke and impact of transcatheter patent foramen ovale (PFO) closure in patients with permanent right-to left shunt compared with those with Valsalva maneuver-induced right-to-left shunt. Pathophysiology and properly management of PFO still remain far from being fully clarified: in particular, the contribution of permanent right-to-left shunt remains unknown. Between March 2006 and October 2010, we enrolled 180 (mean age 44 ± 10.9 years, 98 women) of 320 consecutive patients referred to our center for transcatheter PFO closure, who had spontaneous permanent right-to-left shunt on transcranial Doppler and transthoracic/transesophageal echocardiography. All patients fulfilled the standard current indications for transcatheter closure and underwent preoperative transesophageal echocardiography and brain magnetic resonance imaging, with subsequent intracardiac echocardiographic-guided transcatheter PFO closure. We compared the clinical echocardiographic characteristics of these patients (Permanent Group) with the rest of 140 patients with right-to-left shunt only during Valsalva maneuver (Valsalva Group). Compared with the Valsalva Group patients, patients of the Permanent Group had increased frequency of multiple ischemic brain lesions on magnetic resonance imaging, previous recurrent stroke, previous peripheral arteries embolism, migraine with aura, and-more frequently-atrial septal aneurysm and prominent Eustachian valve. The presence of permanent shunt confers the highest risk of recurrent stroke (odds ratio: 5.9, 95% confidence interval: 2.0 to 12, p < 0.001). No differences were recorded between the 2 groups with regard to recurrence of ischemic events after the closure procedure. Despite its small-sample nature, our study suggests that patients with permanent right-to-left shunt have potentially a higher risk of paradoxical embolism compared with those without. Copyright © 2011 American College of Cardiology

  15. Operational Details of the Five Domains Model and Its Key Applications to the Assessment and Management of Animal Welfare

    PubMed Central

    Mellor, David J.

    2017-01-01

    Simple Summary The Five Domains Model is a focusing device to facilitate systematic, structured, comprehensive and coherent assessment of animal welfare; it is not a definition of animal welfare, nor is it intended to be an accurate representation of body structure and function. The purpose of each of the five domains is to draw attention to areas that are relevant to both animal welfare assessment and management. This paper begins by briefly describing the major features of the Model and the operational interactions between the five domains, and then it details seven interacting applications of the Model. These underlie its utility and increasing application to welfare assessment and management in diverse animal use sectors. Abstract In accord with contemporary animal welfare science understanding, the Five Domains Model has a significant focus on subjective experiences, known as affects, which collectively contribute to an animal’s overall welfare state. Operationally, the focus of the Model is on the presence or absence of various internal physical/functional states and external circumstances that give rise to welfare-relevant negative and/or positive mental experiences, i.e., affects. The internal states and external circumstances of animals are evaluated systematically by referring to each of the first four domains of the Model, designated “Nutrition”, “Environment”, “Health” and “Behaviour”. Then affects, considered carefully and cautiously to be generated by factors in these domains, are accumulated into the fifth domain, designated “Mental State”. The scientific foundations of this operational procedure, published in detail elsewhere, are described briefly here, and then seven key ways the Model may be applied to the assessment and management of animal welfare are considered. These applications have the following beneficial objectives—they (1) specify key general foci for animal welfare management; (2) highlight the foundations of

  16. Assessing the Health-Care Risk: The Clinical-VaR, a Key Indicator for Sound Management.

    PubMed

    Jiménez-Rodríguez, Enrique; Feria-Domínguez, José Manuel; Sebastián-Lacave, Alonso

    2018-03-30

    Clinical risk includes any undesirable situation or operational factor that may have negative consequences for patient safety or capable of causing an adverse event (AE). The AE, intentional or unintentionally, may be related to the human factor, that is, medical errors (MEs). Therefore, the importance of the health-care risk management is a current and relevant issue on the agenda of many public and private institutions. The objective of the management has been evolving from the identification of AE to the assessment of cost-effective and efficient measures that improve the quality control through monitoring. Consequently, the goal of this paper is to propose a Key Risk Indicator (KRI) that enhances the advancement of the health-care management system. Thus, the application of the Value at Risk (VaR) concept in combination to the Loss Distribution Approach (LDA) is proved to be a proactive tool, within the frame of balanced scorecard (BSC), in health organizations. For this purpose, the historical events recorded in the Algo-OpData ® database (Algorithmics Inc., Toronto, ON, Canada, IBM, Armonk, NY, USA) have been used. The analysis highlights the importance of risk in the financials outcomes of the sector. The results of paper show the usefulness of the Clinical-VaR to identify and monitor the risk and sustainability of the implemented controls.

  17. Assessing the Health-Care Risk: The Clinical-VaR, a Key Indicator for Sound Management

    PubMed Central

    Jiménez-Rodríguez, Enrique; Sebastián-Lacave, Alonso

    2018-01-01

    Clinical risk includes any undesirable situation or operational factor that may have negative consequences for patient safety or capable of causing an adverse event (AE). The AE, intentional or unintentionally, may be related to the human factor, that is, medical errors (MEs). Therefore, the importance of the health-care risk management is a current and relevant issue on the agenda of many public and private institutions. The objective of the management has been evolving from the identification of AE to the assessment of cost-effective and efficient measures that improve the quality control through monitoring. Consequently, the goal of this paper is to propose a Key Risk Indicator (KRI) that enhances the advancement of the health-care management system. Thus, the application of the Value at Risk (VaR) concept in combination to the Loss Distribution Approach (LDA) is proved to be a proactive tool, within the frame of balanced scorecard (BSC), in health organizations. For this purpose, the historical events recorded in the Algo-OpData® database (Algorithmics Inc., Toronto, ON, Canada, IBM, Armonk, NY, USA) have been used. The analysis highlights the importance of risk in the financials outcomes of the sector. The results of paper show the usefulness of the Clinical-VaR to identify and monitor the risk and sustainability of the implemented controls. PMID:29601529

  18. Experimental quantum key distribution with source flaws

    NASA Astrophysics Data System (ADS)

    Xu, Feihu; Wei, Kejin; Sajeed, Shihan; Kaiser, Sarah; Sun, Shihai; Tang, Zhiyuan; Qian, Li; Makarov, Vadim; Lo, Hoi-Kwong

    2015-09-01

    Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be proven to be secure in practice. Here, we perform an experiment that shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments, and our theory can be applied to general discrete-variable QKD systems. These features constitute a step towards secure QKD with imperfect devices.

  19. Notification: FY 2017 Update of Proposed Key Management Challenges and Internal Control Weaknesses Confronting the U.S. Chemical Safety and Hazard Investigation Board

    EPA Pesticide Factsheets

    Jan 5, 2017. The EPA OIG is beginning work to update for fiscal year 2017 its list of proposed key management challenges and internal control weaknesses confronting the U.S. Chemical Safety and Hazard Investigation Board (CSB).

  20. Exploring dementia management attitudes in primary care: a key informant survey to primary care physicians in 25 European countries.

    PubMed

    Petrazzuoli, Ferdinando; Vinker, Shlomo; Koskela, Tuomas H; Frese, Thomas; Buono, Nicola; Soler, Jean Karl; Ahrensberg, Jette; Asenova, Radost; Foguet Boreu, Quintí; Ceyhun Peker, Gülsen; Collins, Claire; Hanževački, Miro; Hoffmann, Kathryn; Iftode, Claudia; Kurpas, Donata; Le Reste, Jean Yves; Lichtwarck, Bjørn; Petek, Davorina; Pinto, Daniel; Schrans, Diego; Streit, Sven; Tang, Eugene Yee Hing; Tatsioni, Athina; Torzsa, Péter; Unalan, Pemra C; van Marwijk, Harm; Thulesius, Hans

    2017-09-01

    Strategies for the involvement of primary care in the management of patients with presumed or diagnosed dementia are heterogeneous across Europe. We wanted to explore attitudes of primary care physicians (PCPs) when managing dementia: (i) the most popular cognitive tests, (ii) who had the right to initiate or continue cholinesterase inhibitor or memantine treatment, and (iii) the relationship between the permissiveness of these rules/guidelines and PCP's approach in the dementia investigations and assessment. Key informant survey. Primary care practices across 25 European countries. Four hundred forty-five PCPs responded to a self-administered questionnaire. Two-step cluster analysis was performed using characteristics of the informants and the responses to the survey. Two by two contingency tables with odds ratios and 95% confidence intervals were used to assess the association between categorical variables. A multinomial logistic regression model was used to assess the association of multiple variables (age class, gender, and perceived prescription rules) with the PCPs' attitude of "trying to establish a diagnosis of dementia on their own." Discrepancies between rules/guidelines and attitudes to dementia management was found in many countries. There was a strong association between the authorization to prescribe dementia drugs and pursuing dementia diagnostic work-up (odds ratio, 3.45; 95% CI 2.28-5.23). Differing regulations about who does what in dementia management seemed to affect PCP's engagement in dementia investigations and assessment. PCPs who were allowed to prescribe dementia drugs also claimed higher engagement in dementia work-up than PCPs who were not allowed to prescribe.

  1. Using key performance indicators as knowledge-management tools at a regional health-care authority level.

    PubMed

    Berler, Alexander; Pavlopoulos, Sotiris; Koutsouris, Dimitris

    2005-06-01

    The advantages of the introduction of information and communication technologies in the complex health-care sector are already well-known and well-stated in the past. It is, nevertheless, paradoxical that although the medical community has embraced with satisfaction most of the technological discoveries allowing the improvement in patient care, this has not happened when talking about health-care informatics. Taking the above issue of concern, our work proposes an information model for knowledge management (KM) based upon the use of key performance indicators (KPIs) in health-care systems. Based upon the use of the balanced scorecard (BSC) framework (Kaplan/Norton) and quality assurance techniques in health care (Donabedian), this paper is proposing a patient journey centered approach that drives information flow at all levels of the day-to-day process of delivering effective and managed care, toward information assessment and knowledge discovery. In order to persuade health-care decision-makers to assess the added value of KM tools, those should be used to propose new performance measurement and performance management techniques at all levels of a health-care system. The proposed KPIs are forming a complete set of metrics that enable the performance management of a regional health-care system. In addition, the performance framework established is technically applied by the use of state-of-the-art KM tools such as data warehouses and business intelligence information systems. In that sense, the proposed infrastructure is, technologically speaking, an important KM tool that enables knowledge sharing amongst various health-care stakeholders and between different health-care groups. The use of BSC is an enabling framework toward a KM strategy in health care.

  2. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  3. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  4. Key principles of community-based natural resource management: a synthesis and interpretation of identified effective approaches for managing the commons.

    PubMed

    Gruber, James S

    2010-01-01

    This article examines recent research on approaches to community-based environmental and natural resource management and reviews the commonalities and differences between these interdisciplinary and multistakeholder initiatives. To identify the most effective characteristics of Community-based natural resource management (CBNRM), I collected a multiplicity of perspectives from research teams and then grouped findings into a matrix of organizational principles and key characteristics. The matrix was initially vetted (or "field tested") by applying numerous case studies that were previously submitted to the World Bank International Workshop on CBNRM. These practitioner case studies were then compared and contrasted with the findings of the research teams. It is hoped that the developed matrix may be useful to researchers in further focusing research, understanding core characteristics of effective and sustainable CBNRM, providing practitioners with a framework for developing new CBNRM initiatives for managing the commons, and providing a potential resource for academic institutions during their evaluation of their practitioner-focused environmental management and leadership curriculum.

  5. [Development of key indicators for nurses performance evaluation and estimation of their weights for management by objectives].

    PubMed

    Lee, Eun Hwa; Ahn, Sung Hee

    2010-02-01

    This methodological research was designed to develop performance evaluation key indicators (PEKIs) for management by objectives (MBO) and to estimate their weights for hospital nurses. The PEKIs were developed by selecting preliminary indicators from a literature review, examining content validity and identifying their level of importance. Data were collected from November 14, 2007 to February 18, 2008. Data set for importance of indicators was obtained from 464 nurses and weights of PEKIs domain was from 453 nurses, who worked for at least 2 yr in one of three hospitals. Data were analyzed using X(2)-test, factor analysis, and the Analytical Hierarchy Process. Based upon Content Validity Index of .8 or above, 61 indicators were selected from the 100 preliminary indicators. Finally, 40 PEKIs were developed from the 61 indicators, and categorized into 10 domains. The highest weight of the 10 domains was customer satisfaction, which was followed by patient education, direct nursing care, profit increase, safety management, improvement of nursing quality, completeness of nursing records, enhancing competence of nurses, indirect nursing care, and cost reduction, in that order. PEKIs and their weights can be utilized for impartial evaluation and MBO for hospital nurses. Further research to verify PEKIs would lead to successful implementation of MBO.

  6. Tomographic quantum cryptography: equivalence of quantum and classical key distillation.

    PubMed

    Bruss, Dagmar; Christandl, Matthias; Ekert, Artur; Englert, Berthold-Georg; Kaszlikowski, Dagomir; Macchiavello, Chiara

    2003-08-29

    The security of a cryptographic key that is generated by communication through a noisy quantum channel relies on the ability to distill a shorter secure key sequence from a longer insecure one. For an important class of protocols, which exploit tomographically complete measurements on entangled pairs of any dimension, we show that the noise threshold for classical advantage distillation is identical with the threshold for quantum entanglement distillation. As a consequence, the two distillation procedures are equivalent: neither offers a security advantage over the other.

  7. Short Review on Quantum Key Distribution Protocols.

    PubMed

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  8. The reproductive potential and importance of key management aspects for successful Calluna vulgaris rejuvenation on abandoned Continental heaths.

    PubMed

    Henning, Katrin; von Oheimb, Goddert; Härdtle, Werner; Fichtner, Andreas; Tischew, Sabine

    2017-04-01

    The abandonment of traditional pastoralism as well as the use of heath areas for military purposes has had a major impact on dry heaths in the Continental biogeographical region of Europe, causing severe degradation of its key species Calluna vulgaris (L.) HULL. The reproductive potential of this species in a Continental climate is assumed to be low, although there is yet no observational or experimental evidence for this. More knowledge is also needed about cost-effective and sustainable measures to restore abandoned dry heaths in this biogeographical region, because traditional management options are often too expensive (e.g., sod-cutting) or restricted due to environmental laws and the danger of unexploded ammunition (e.g., burning). Using as an example an 800 ha Continental heathland in Germany that has been abandoned for about two decades, we studied the reproductive potential (seed production, soil seed bank, and germination ability) of degenerate C. vulgaris stands. In addition, we conducted a comprehensive field experiment to test the effects of low-intensity, year-round grazing by Heck cattle and Konik horses as well as one-time mowing and patchy exposure of bare soil on the generative rejuvenation (i.e., recruitment and survival) of degenerate C. vulgaris stands over 3 years. We used generalized linear mixed models for statistical analyses. Seed production of degenerate C. vulgaris stands was high as well as the germination ability of their seeds, being similar to Atlantic heathlands. However, soil seed-bank densities were lower than those found in managed or abandoned Atlantic heaths. Overall seedling recruitment in the field was considerably lower in comparison with Atlantic heaths. Low-intensity grazing or one-time mowing did not induce a substantial increase in C. vulgaris recruitment, whereas an additional one-time creation of bare soil patches or the one-time creation of bare soil without subsequent management significantly facilitated

  9. Diabetes Management and Education in Older Adults: The Development of a National Consensus of Key Research Priorities.

    PubMed

    Sherifali, Diana; Meneilly, Graydon

    2016-02-01

    Diabetes in older adults is increasing in its prevalence and complexity. To date, little research has been done to inform current diabetes management, including education and support, in older adults in Canada. The objective of this interactive national workshop was to develop key research priorities for future research related to diabetes in older adults. Workshop participants comprised interprofessional healthcare providers, decision makers and policy makers from across Canada. Approximately 30 individuals attended an interactive 2-day meeting that included expert presentations and group consensus building using an electronic meeting system as well as nominal group techniques. The results of the 2-day meeting found more than 50 ideas that were summarized into 5 overall themes, with 14 subquestions, reflecting areas such as 1) identifying relevant outcomes for patients, providers and decision makers; 2) diabetes prevention; 3) the impact of diabetes on older adults and informal caregivers; 4) risk assessment tools and 5) effective models of care across a variety of healthcare settings. To date, this workshop is the first of its kind and follows suit with other international working groups and associations. The research priorities developed through consensus from this workshop set forward a research agenda for diabetes in older adults in Canada. Copyright © 2015 Canadian Diabetes Association. Published by Elsevier Inc. All rights reserved.

  10. GIS environmental information analysis of the Darro River basin as the key for the management and hydrological forest restoration.

    PubMed

    Fernandez, Paz; Delgado, Expectación; Lopez-Alonso, Mónica; Poyatos, José Manuel

    2018-02-01

    This article presents analyses of soil and environmental information for the Darro River basin (Granada-Spain) preliminary to its hydrological and forestry restoration. These analyses were carried out using a geographical information system (GIS) and employing a new procedure that adapts hydrological forest-restoration methods. The complete analysis encompasses morphological conditions, soil and climate characteristics as well as vegetation and land use. The study investigates soil erosion in the basin by using Universal Soil Loss Equation (USLE) and by mapping erosion fragility units. The results are presented in a set of maps and their analysis, providing the starting point for river basin management and the hydrological and forestry-restoration project that was approved at the end of 2015. The presence of soft substrates (e.g. gravel and sand) indicates that the area is susceptible to erosion, particularly the areas that are dominated by human activity and have little soil protection. Finally, land use and vegetation cover were identified as key factors in the soil erosion in the basin. According to the results, river authorities have included several measures in the restoration project aimed at reducing the erosion and helping to recover the environmental value of this river basin and to include it in recreation possibilities for the community of Granada. The presented analytical approach, designed by the authors, would be useful as a tool for environmental restoration in other small Mediterranean river basins. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. Measurement Science for Prognostics and Health Management for Smart Manufacturing Systems: Key Findings from a Roadmapping Workshop

    PubMed Central

    Weiss, Brian A.; Vogl, Gregory; Helu, Moneer; Qiao, Guixiu; Pellegrino, Joan; Justiniano, Mauricio; Raghunathan, Anand

    2017-01-01

    The National Institute of Standards and Technology (NIST) hosted the Roadmapping Workshop – Measurement Science for Prognostics and Health Management for Smart Manufacturing Systems (PHM4SMS) in Fall 2014 to discuss the needs and priorities of stakeholders in the PHM4SMS technology area. The workshop brought together over 70 members of the PHM community. The attendees included representatives from small, medium, and large manufacturers; technology developers and integrators; academic researchers; government organizations; trade associations; and standards bodies. The attendees discussed the current and anticipated measurement science challenges to advance PHM methods and techniques for smart manufacturing systems; the associated research and development needed to implement condition monitoring, diagnostic, and prognostic technologies within manufacturing environments; and the priorities to meet the needs of PHM in manufacturing. This paper will summarize the key findings of this workshop, and present some of the critical measurement science challenges and corresponding roadmaps, i.e., suggested courses of action, to advance PHM for manufacturing. Milestones and targeted capabilities will be presented for each roadmap across three areas: PHM Manufacturing Process Techniques; PHM Performance Assessment; and PHM Infrastructure – Hardware, Software, and Integration. An analysis of these roadmaps and crosscutting themes seen across the breakout sessions is also discussed. PMID:28664163

  12. Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks

    NASA Astrophysics Data System (ADS)

    da Silva, Eduardo; Dos Santos, Aldri Luiz; Lima, Michele N.; Albini, Luiz Carlos Pessoa

    Among the key management schemes for MANETs, the Self-Organized Public-Key Management System (PGP-Like) is the main chaining-based key management scheme. It is fully self-organized and does not require any certificate authority. Two kinds of misbehavior attacks are considered to be great threats to PGP-Like: lack of cooperation and impersonation attacks. This work quantifies the impact of such attacks on the PGP-Like. Simulation results show that PGP-Like was able to maintain its effectiveness when submitted to the lack of cooperation attack, contradicting previously theoretical results. It correctly works even in the presence of more than 60% of misbehaving nodes, although the convergence time is affected with only 20% of misbehaving nodes. On the other hand, PGP-Like is completely vulnerable to the impersonation attack. Its functionality is affected with just 5% of misbehaving nodes, confirming previously theoretical results.

  13. Security of subcarrier wave quantum key distribution against the collective beam-splitting attack.

    PubMed

    Miroshnichenko, G P; Kozubov, A V; Gaidash, A A; Gleim, A V; Horoshko, D B

    2018-04-30

    We consider a subcarrier wave quantum key distribution (QKD) system, where quantum encoding is carried out at weak sidebands generated around a coherent optical beam as a result of electro-optical phase modulation. We study security of two protocols, B92 and BB84, against one of the most powerful attacks for this class of systems, the collective beam-splitting attack. Our analysis includes the case of high modulation index, where the sidebands are essentially multimode. We demonstrate numerically and experimentally that a subcarrier wave QKD system with realistic parameters is capable of distributing cryptographic keys over large distances in presence of collective attacks. We also show that BB84 protocol modification with discrimination of only one state in each basis performs not worse than the original BB84 protocol in this class of QKD systems, thus significantly simplifying the development of cryptographic networks using the considered QKD technique.

  14. Is active management the key to the conservation of saproxylic biodiversity? Pollarding promotes the formation of tree hollows.

    PubMed

    Sebek, Pavel; Altman, Jan; Platek, Michal; Cizek, Lukas

    2013-01-01

    Trees with hollows are key features sustaining biodiversity in wooded landscapes. They host rich assemblages of often highly specialised organisms. Hollow trees, however, have become rare and localised in Europe. Many of the associated biota is thus declining or endangered. The challenge of its conservation, therefore, is to safeguard the presence of hollow trees in sufficient numbers. Populations of numerous species associated with tree hollows and dead wood are often found in habitats that were formed by formerly common traditional silvicultural practices such as coppicing, pollarding or pasture. Although it has been occasionally mentioned that such practices increase the formation of hollows and the availability of often sun-exposed dead wood, their effect has never been quantified. Our study examined the hollow incidence in pollard and non-pollard (unmanaged) willows and the effect of pollarding on incremental growth rate by tree ring analysis. The probability of hollow occurrence was substantially higher in pollard than in non-pollard trees. Young pollards, especially, form hollows much more often than non-pollards; for instance, in trees of 50 cm DBH, the probability of hollow ocurrence was ∼0.75 in pollards, but only ∼0.3 in non-pollards. No difference in growth rate was found. Pollarding thus leads to the rapid formation of tree hollows, a habitat usually associated with old trees. It is therefore potentially a very important tool in the restoration of saproxylic habitats and conservation of hollow-dependent fauna. If applied along e.g. roads and watercourses, pollarding could also be used to increase landscape connectivity for saproxylic organisms. In reserves where pollarding was formerly practiced, its restoration would be necessary to prevent loss of saproxylic biodiversity. Our results point to the importance of active management measures for maintaining availability, and spatial and temporal continuity of deadwood microhabitats.

  15. Is Active Management the Key to the Conservation of Saproxylic Biodiversity? Pollarding Promotes the Formation of Tree Hollows

    PubMed Central

    Sebek, Pavel; Altman, Jan; Platek, Michal; Cizek, Lukas

    2013-01-01

    Trees with hollows are key features sustaining biodiversity in wooded landscapes. They host rich assemblages of often highly specialised organisms. Hollow trees, however, have become rare and localised in Europe. Many of the associated biota is thus declining or endangered. The challenge of its conservation, therefore, is to safeguard the presence of hollow trees in sufficient numbers. Populations of numerous species associated with tree hollows and dead wood are often found in habitats that were formed by formerly common traditional silvicultural practices such as coppicing, pollarding or pasture. Although it has been occasionally mentioned that such practices increase the formation of hollows and the availability of often sun-exposed dead wood, their effect has never been quantified. Our study examined the hollow incidence in pollard and non-pollard (unmanaged) willows and the effect of pollarding on incremental growth rate by tree ring analysis. The probability of hollow occurrence was substantially higher in pollard than in non-pollard trees. Young pollards, especially, form hollows much more often than non-pollards; for instance, in trees of 50 cm DBH, the probability of hollow ocurrence was ∼0.75 in pollards, but only ∼0.3 in non-pollards. No difference in growth rate was found. Pollarding thus leads to the rapid formation of tree hollows, a habitat usually associated with old trees. It is therefore potentially a very important tool in the restoration of saproxylic habitats and conservation of hollow-dependent fauna. If applied along e.g. roads and watercourses, pollarding could also be used to increase landscape connectivity for saproxylic organisms. In reserves where pollarding was formerly practiced, its restoration would be necessary to prevent loss of saproxylic biodiversity. Our results point to the importance of active management measures for maintaining availability, and spatial and temporal continuity of deadwood microhabitats. PMID:23544142

  16. A fingerprint key binding algorithm based on vector quantization and error correction

    NASA Astrophysics Data System (ADS)

    Li, Liang; Wang, Qian; Lv, Ke; He, Ning

    2012-04-01

    In recent years, researches on seamless combination cryptosystem with biometric technologies, e.g. fingerprint recognition, are conducted by many researchers. In this paper, we propose a binding algorithm of fingerprint template and cryptographic key to protect and access the key by fingerprint verification. In order to avoid the intrinsic fuzziness of variant fingerprints, vector quantization and error correction technique are introduced to transform fingerprint template and then bind with key, after a process of fingerprint registration and extracting global ridge pattern of fingerprint. The key itself is secure because only hash value is stored and it is released only when fingerprint verification succeeds. Experimental results demonstrate the effectiveness of our ideas.

  17. Quantum key distribution with 1.25 Gbps clock synchronization.

    PubMed

    Bienfang, J; Gross, A; Mink, A; Hershman, B; Nakassis, A; Tang, X; Lu, R; Su, D; Clark, Charles; Williams, Carl; Hagley, E; Wen, Jesse

    2004-05-03

    We have demonstrated the exchange of sifted quantum cryptographic key over a 730 meter free-space link at rates of up to 1.0 Mbps, two orders of magnitude faster than previously reported results. A classical channel at 1550 nm operates in parallel with a quantum channel at 845 nm. Clock recovery techniques on the classical channel at 1.25 Gbps enable quantum transmission at up to the clock rate. System performance is currently limited by the timing resolution of our silicon avalanche photodiode detectors. With improved detector resolution, our technique will yield another order of magnitude increase in performance, with existing technology.

  18. Scientific information and the Tongass land management plan: key findings derived from the scientific literature, species assessments, resource analyses, workshops, and risk assessment panels.

    Treesearch

    Douglas N. Swanston; Charles G. Shaw; Winston P. Smith; Kent R. Julin; Guy A. Cellier; Fred H. Everest

    1996-01-01

    This document highlights key items of information obtained from the published literature and from specific assessments, workshops, resource analyses, and various risk assessment panels conducted as part of the Tongass land management planning process. None of this information dictates any particular decision; however, it is important to consider during decisionmaking...

  19. World Health organization guidelines for management of acute stress, PTSD, and bereavement: key challenges on the road ahead.

    PubMed

    Tol, Wietse A; Barbui, Corrado; Bisson, Jonathan; Cohen, Judith; Hijazi, Zeinab; Jones, Lynne; de Jong, Joop T V M; Magrini, Nicola; Omigbodun, Olayinka; Seedat, Soraya; Silove, Derrick; Souza, Renato; Sumathipala, Athula; Vijayakumar, Lakshmi; Weissbecker, Inka; Zatzick, Douglas; van Ommeren, Mark

    2014-12-01

    Wietse Tol and colleagues discuss some of the key challenges for implementation of new WHO guidelines for stress-related mental health disorders in low- and middle-income countries. Please see later in the article for the Editors' Summary.

  20. Key handling in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Li, Y.; Newe, T.

    2007-07-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  1. Florida Keys

    NASA Image and Video Library

    2002-12-13

    The Florida Keys are a chain of islands, islets and reefs extending from Virginia Key to the Dry Tortugas for about 309 kilometers (192 miles). The keys are chiefly limestone and coral formations. The larger islands of the group are Key West (with its airport), Key Largo, Sugarloaf Key, and Boca Chica Key. A causeway extends from the mainland to Key West. This image was acquired on October 28, 2001, by the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) on NASA's Terra satellite. With its 14 spectral bands from the visible to the thermal infrared wavelength region, and its high spatial resolution of 15 to 90 meters (about 50 to 300 feet), ASTER images Earth to map and monitor the changing surface of our planet. http://photojournal.jpl.nasa.gov/catalog/PIA03890

  2. Modular multiplication in GF(p) for public-key cryptography

    NASA Astrophysics Data System (ADS)

    Olszyna, Jakub

    Modular multiplication forms the basis of modular exponentiation which is the core operation of the RSA cryptosystem. It is also present in many other cryptographic algorithms including those based on ECC and HECC. Hence, an efficient implementation of PKC relies on efficient implementation of modular multiplication. The paper presents a survey of most common algorithms for modular multiplication along with hardware architectures especially suitable for cryptographic applications in energy constrained environments. The motivation for studying low-power and areaefficient modular multiplication algorithms comes from enabling public-key security for ultra-low power devices that can perform under constrained environments like wireless sensor networks. Serial architectures for GF(p) are analyzed and presented. Finally proposed architectures are verified and compared according to the amount of power dissipated throughout the operation.

  3. How To Form a Team: Five Keys to High Performance. For the Practicing Manager. An Ideas into Action Guidebook.

    ERIC Educational Resources Information Center

    Kanaga, Kim; Kossler, Michael E.

    This practical guidebook is designed for managers and leaders who have responsibility for the creation and success of teams. First, a team is described as a workgroup whose members are dependent upon one another for the completion of a given task, and whose members possess different but complementary skill sets. A team manages its own work within…

  4. Keys to success for data-driven decision making: Lessons from participatory monitoring and collaborative adaptive management

    USDA-ARS?s Scientific Manuscript database

    Recent years have witnessed a call for evidence-based decisions in conservation and natural resource management, including data-driven decision-making. Adaptive management (AM) is one prevalent model for integrating scientific data into decision-making, yet AM has faced numerous challenges and limit...

  5. A Critical Evaluation of Phrónêsis as a Key Tool for Professional Excellence for Modern Managers

    ERIC Educational Resources Information Center

    Thomas, Shinto

    2017-01-01

    Phrónêsis or practical wisdom is an important element of Aristotelian virtue ethics. This paper is an attempt to study what is meant by Phrónêsis, how it might be understood, reinterpreted, applied, and extended in contemporary professional management practice and its role in enhancing professional excellence in modern managers. Phrónêsis can…

  6. Evaluation of key driver categories influencing sustainable waste management development with the analytic hierarchy process (AHP): Serbia example.

    PubMed

    Tot, Bojana; Srđević, Bojan; Vujić, Bogdana; Russo, Mário Augusto Tavares; Vujić, Goran

    2016-08-01

    The problems of waste management have become increasingly complex in recent decades. The increasing amount of generated waste, adopted legislation in the field of waste management, administrative issues, economic impacts and social awareness are important drivers in achieving a sustainable waste management system. However, in practice, there are many other drivers that are often mutually in conflict. The purpose of this research is to define the precise driver and their corresponding sub-drivers, which are relevant for developing a waste management system and, on the basis of their importance, to determine which has the predominant influence on the slow development of a waste management system at the national and regional level, within the Republic of Serbia and similar countries of southeast Europe. This research presents two levels of decision making: the first is a pair-wise comparison of the drivers in relation to the goal and the second is a pair-wise comparison of the sub-drivers in relation to the driver and in relation to the goal. Results of performed analyses on the waste management drivers were integrated via the decision-making process supported by an analytic hierarchy process (AHP). The final results of this research shows that the Institutional-Administrative driver is the most important for developing a sustainable waste management system. © The Author(s) 2016.

  7. COLLABORATE©: a universal competency-based paradigm for professional case management, Part III: key considerations for making the paradigm shift.

    PubMed

    Treiger, Teresa M; Fink-Samnick, Ellen

    2014-01-01

    The purpose of the third of this 3-article series is to provide context and justification for a new paradigm of case management built upon a value-driven foundation that * improves the patient's experience of health care delivery, * provides consistency in approach applicable across health care populations, and * optimizes the potential for return on investment. Applicable to all health care sectors where case management is practiced. In moving forward the one fact that rings true is there will be constant change in our industry. As the health care terrain shifts and new influences continually surface, there will be consequences for case management practice. These impacts require nimble clinical professionals in possession of recognized and firmly established competencies. They must be agile to frame (and reframe) their professional practice to facilitate the best possible outcomes for their patients. Case managers can choose to be Gumby or Pokey. This is exactly why the definition of a competency-based case management model's time has come, one sufficiently fluid to fit into any setting of care. The practice of case management transcends the vast array of representative professional disciplines and educational levels. A majority of current models are driven by business priorities rather than the competencies critical to successful practice and quality patient outcomes. This results in a fragmented professional case management identity. While there is inherent value in what each discipline brings to the table, this advanced model unifies behind case management's unique, strengths-based identity instead of continuing to align within traditional divisions (e.g., discipline, work setting, population served). This model fosters case management's expanding career advancement opportunities, including a reflective clinical ladder.

  8. Extending stakeholder theory to promote resource management initiatives to key stakeholders: a case study of water transfers in Alberta, Canada.

    PubMed

    Lafreniere, Katherine C; Deshpande, Sameer; Bjornlund, Henning; Hunter, M Gordon

    2013-11-15

    Many attempts to implement resource management initiatives in Canadian and international communities have been resisted by stakeholders despite inclusion of their representatives in the decision-making process. Managers' failure to understand stakeholders' perspectives when proposing initiatives is a potential cause of this resistance. Our study uses marketing thought to enhance stakeholder theory by bringing in an audience-centric perspective. We attempt to understand how stakeholders perceive their interests in an organization and consequently decide how to influence that organization. By doing so, we investigate whether a disconnect exists between the perceptions of managers and those of stakeholders. Natural resource managers can utilize this knowledge to garner stakeholder support for the organization and its activities. We support this claim with findings from a water transfer plebiscite held in the Canadian province of Alberta. Sixteen personal interviews employing narrative inquiry were conducted to document voters' (i.e., irrigators') interpretations. Copyright © 2013 Elsevier Ltd. All rights reserved.

  9. Success under duress: policies and practices managers view as keys to profitability in five California hospitals with challenging payer mix.

    PubMed

    Rundall, Thomas; Oberlin, Shelley; Thygesen, Brian; Janus, Katharina

    2012-01-01

    Hospitals with a challenging payer mix (CPM)-high proportions of uninsured and Medicaid patients and a low proportion of commercially insured patients-are an important source of care for low-income, uninsured people. Achieving profitability is difficult for CPM hospitals. From 2005 through 2008, only one-third of 67 CPM hospitals in California reported positive total margins. In-depth group interviews were completed with the management leadership teams of a diverse group of five profitable CPM hospitals to identify the management strategies and practices that the hospitals' leadership teams credited for their financial success. Twelve management policy and practice topics were identified. Four of the policies and practices that managers identified involve organizational actions to increase hospital revenue or operational efficiency. These factors are consistent with those identified in previous research. However, managers also identified eight factors not previously revealed in research on hospital profitability, including management policies and practices that establish the organizational culture, workforce, relationships, monitoring systems, and governance necessary to ensure that hospital employees and affiliated physicians support and successfully implement organizational actions necessary to achieve profitability.

  10. Quantum key distribution with an entangled light emitting diode

    NASA Astrophysics Data System (ADS)

    Dzurnak, B.; Stevenson, R. M.; Nilsson, J.; Dynes, J. F.; Yuan, Z. L.; Skiba-Szymanska, J.; Farrer, I.; Ritchie, D. A.; Shields, A. J.

    2015-12-01

    Measurements performed on entangled photon pairs shared between two parties can allow unique quantum cryptographic keys to be formed, creating secure links between users. An advantage of using such entangled photon links is that they can be adapted to propagate entanglement to end users of quantum networks with only untrusted nodes. However, demonstrations of quantum key distribution with entangled photons have so far relied on sources optically excited with lasers. Here, we realize a quantum cryptography system based on an electrically driven entangled-light-emitting diode. Measurement bases are passively chosen and we show formation of an error-free quantum key. Our measurements also simultaneously reveal Bell's parameter for the detected light, which exceeds the threshold for quantum entanglement.

  11. Quantum key distribution without detector vulnerabilities using optically seeded lasers

    NASA Astrophysics Data System (ADS)

    Comandar, L. C.; Lucamarini, M.; Fröhlich, B.; Dynes, J. F.; Sharpe, A. W.; Tam, S. W.-B.; Yuan, Z. L.; Penty, R. V.; Shields, A. J.

    2016-05-01

    Security in quantum cryptography is continuously challenged by inventive attacks targeting the real components of a cryptographic set-up, and duly restored by new countermeasures to foil them. Owing to their high sensitivity and complex design, detectors are the most frequently attacked components. It was recently shown that two-photon interference from independent light sources can be used to remove any vulnerability from detectors. This new form of detection-safe quantum key distribution (QKD), termed measurement-device-independent (MDI), has been experimentally demonstrated but with modest key rates. Here, we introduce a new pulsed laser seeding technique to obtain high-visibility interference from gain-switched lasers and thereby perform MDI-QKD with unprecedented key rates in excess of 1 megabit per second in the finite-size regime. This represents a two to six orders of magnitude improvement over existing implementations and supports the new scheme as a practical resource for secure quantum communications.

  12. Quantum key distribution with an entangled light emitting diode

    SciTech Connect

    Dzurnak, B.; Stevenson, R. M.; Nilsson, J.

    Measurements performed on entangled photon pairs shared between two parties can allow unique quantum cryptographic keys to be formed, creating secure links between users. An advantage of using such entangled photon links is that they can be adapted to propagate entanglement to end users of quantum networks with only untrusted nodes. However, demonstrations of quantum key distribution with entangled photons have so far relied on sources optically excited with lasers. Here, we realize a quantum cryptography system based on an electrically driven entangled-light-emitting diode. Measurement bases are passively chosen and we show formation of an error-free quantum key. Our measurementsmore » also simultaneously reveal Bell's parameter for the detected light, which exceeds the threshold for quantum entanglement.« less

  13. All-optical cryptography of M-QAM formats by using two-dimensional spectrally sliced keys.

    PubMed

    Abbade, Marcelo L F; Cvijetic, Milorad; Messani, Carlos A; Alves, Cleiton J; Tenenbaum, Stefan

    2015-05-10

    There has been an increased interest in enhancing the security of optical communications systems and networks. All-optical cryptography methods have been considered as an alternative to electronic data encryption. In this paper we propose and verify the use of a novel all-optical scheme based on cryptographic keys applied on the spectral signal for encryption of the M-QAM modulated data with bit rates of up to 200 gigabits per second.

  14. Revocable identity-based proxy re-signature against signing key exposure.

    PubMed

    Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.

  15. Revocable identity-based proxy re-signature against signing key exposure

    PubMed Central

    Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification. PMID:29579125

  16. NREL Makes Key Appointments

    Science.gov Websites

    Makes Key Appointments Staffing for Distributed Energy and Tech Management Announced For more information contact: Gary Schmitz, 303-275-4050 email: Gary Schmitz Golden, Colo., Feb. 28, 2001 - Two reorganized Planning and Technology Management Division. Anthony Schaffhauser has been selected to become

  17. DOD BUSINESS SYSTEMS MODERNIZATION: Key Marine Corps System Acquisition Needs to be Better Justified, Defined, and Managed

    DTIC Science & Technology

    2008-07-01

    recommendations. D f e t n t b r a m p s t • • • • T a r o To view the full product, including the scope and methodology, click on GAO-08...Modernization July 28, 2008 The Honorable Daniel K. Akaka Chairman The Honorable John Thune Ranking Member Subcommittee on Readiness and Management...Support Committee on Armed Services United States Senate The Honorable John Ensign United States Senate For decades, the Department of Defense

  18. Online continuing medical education as a key link for successful noncommunicable disease self-management: the CASALUD™ Model.

    PubMed

    Gallardo-Rincón, Héctor; Saucedo-Martínez, Rodrigo; Mujica-Rosales, Ricardo; Lee, Evan M; Israel, Amy; Torres-Beltran, Braulio; Quijano-González, Úrsula; Atkinson, Elena Rose; Kuri-Morales, Pablo; Tapia-Conyer, Roberto

    2017-01-01

    The purpose of this study is to evaluate how the benefits of online continuing medical education (CME) provided to health care professionals traveled along a patient "educational chain". In this study, the educational chain begins with the influence that CME can have on the quality of health care, with subsequent influence on patient knowledge, disease self-management, and disease biomarkers. A total of 422 patients with at least one noncommunicable disease (NCD) treated in eight different Mexican public health clinics were followed over 3 years. All clinics were participants in the CASALUD Model, an NCD care model for primary care, where all clinic staff were offered CME. Data were collected through a questionnaire on health care, patient disease knowledge, and self-management behaviors; blood samples and anthropometric measurements were collected to measure patient disease biomarkers. Between 2013 and 2015, the indexes measuring quality of health care, patient health knowledge, and diabetes self-management activities rose moderately but significantly (from 0.54 to 0.64, 0.80 to 0.84, and 0.62 to 0.67, respectively). Performing self-care activities - including owning and using a glucometer and belonging to a disease support group - saw the highest increase (from 0.65 to 0.75). A1C levels increased between 2013 and 2015 from 7.95 to 8.41% (63-68 mmol/mol) ( P <0.001), and blood pressure decreased between 2014 and 2015 from 143.7/76.8 to 137.5/74.4 (systolic/diastolic reported in mmHg) ( P <0.001). The mean levels of other disease biomarkers remained statistically unchanged, despite the improvements seen in the previous "links" of the educational chain. Online CME can effect certain changes in the educational chain linking quality of health care, patient knowledge, and self-management behaviors. However, in order to assure adequate NCD control, the entire health care system must be improved in tandem. Online CME programs, such as CASALUD's, are feasible strategies

  19. Online continuing medical education as a key link for successful noncommunicable disease self-management: the CASALUD™ Model

    PubMed Central

    Gallardo-Rincón, Héctor; Saucedo-Martínez, Rodrigo; Mujica-Rosales, Ricardo; Lee, Evan M; Israel, Amy; Torres-Beltran, Braulio; Quijano-González, Úrsula; Atkinson, Elena Rose; Kuri-Morales, Pablo; Tapia-Conyer, Roberto

    2017-01-01

    Purpose The purpose of this study is to evaluate how the benefits of online continuing medical education (CME) provided to health care professionals traveled along a patient “educational chain”. In this study, the educational chain begins with the influence that CME can have on the quality of health care, with subsequent influence on patient knowledge, disease self-management, and disease biomarkers. Methods A total of 422 patients with at least one noncommunicable disease (NCD) treated in eight different Mexican public health clinics were followed over 3 years. All clinics were participants in the CASALUD Model, an NCD care model for primary care, where all clinic staff were offered CME. Data were collected through a questionnaire on health care, patient disease knowledge, and self-management behaviors; blood samples and anthropometric measurements were collected to measure patient disease biomarkers. Results Between 2013 and 2015, the indexes measuring quality of health care, patient health knowledge, and diabetes self-management activities rose moderately but significantly (from 0.54 to 0.64, 0.80 to 0.84, and 0.62 to 0.67, respectively). Performing self-care activities – including owning and using a glucometer and belonging to a disease support group – saw the highest increase (from 0.65 to 0.75). A1C levels increased between 2013 and 2015 from 7.95 to 8.41% (63–68 mmol/mol) (P<0.001), and blood pressure decreased between 2014 and 2015 from 143.7/76.8 to 137.5/74.4 (systolic/diastolic reported in mmHg) (P<0.001). The mean levels of other disease biomarkers remained statistically unchanged, despite the improvements seen in the previous “links” of the educational chain. Conclusion Online CME can effect certain changes in the educational chain linking quality of health care, patient knowledge, and self-management behaviors. However, in order to assure adequate NCD control, the entire health care system must be improved in tandem. Online CME programs

  20. The SMS4 cryptographic system design based on dynamic partial self-reconfiguration technology

    NASA Astrophysics Data System (ADS)

    Wang, Jianxin; Gao, Xianwei; Li, Xiuying; Sui, Meili

    2013-03-01

    This paper describes SMS4 algorithm by using dynamic partial self-reconfiguration. The design is implemented on Xilinx VirtexII-Pro XC2VP30 FPGA devices. The partial self-reconfiguration encryption/decryption module data throughput is up to 50Mb/s, key expansion and encryption/decryption modules use 1606 and 1570 slices respectively, and the resource utilization ratio of the key expansion by using partial self-reconfiguration technology is less 32.03% and slices are less 757 than the non-reconfiguration technology. SMS4 implementation gets a good balance between high performance and low complexity in area. The theoretical and practical research of dynamic partial self-reconfiguration has a broad space for development and application prospect.

  1. Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations

    NASA Astrophysics Data System (ADS)

    Reid, M. D.

    2000-12-01

    Correlations of the type discussed by EPR in their original 1935 paradox for continuous variables exist for the quadrature phase amplitudes of two spatially separated fields. These correlations were first experimentally reported in 1992. We propose to use such EPR beams in quantum cryptography, to transmit with high efficiency messages in such a way that the receiver and sender may later determine whether eavesdropping has occurred. The merit of the new proposal is in the possibility of transmitting a reasonably secure yet predetermined key. This would allow relay of a cryptographic key over long distances in the presence of lossy channels.

  2. Diabetes Self-Management: A Key for Better Health-related Quality of Life in Patients with Diabetes.

    PubMed

    Badr, Hanan E; Al-Khaledi, Maha; Al-Dousari, Hussah; Al-Dhufairi, Shaikhah; Al-Mousawi, Taiba; Al-Azemi, Rehab; Al-Azimi, Farah

    2018-04-17

    This study was aimed at assessing health-related quality of life (HRQOL) among adult patients with diabetes attending primary health care diabetes clinics in Kuwait and to examine the factors associated with patients with the HRQOL of patients with diabetes. This cross-sectional study was conducted among 503 patients with diabetes attending 26 primary healthcare diabetes clinics in Kuwait. A self-administered questionnaire on participants' socio-demographic and clinical characteristics, in addition to the Diabetes Self-Management Questionnaire (DSMQ) to assess patients' DSM was used. SF12 was employed to assess the HRQOL, producing two outcomes: Physical health composite and Mental health composite. The mean age of participants was 52. ± 0.8 years, 53.1% were males, and 49.0% were Kuwaitis. The median DSM sum score was 6.5. Male patients with diabetes showed significantly better median DSM sum score than female patients with diabetes. The overall median score of HRQOL was 61.7/100 with a better median score of PHC than MHC of quality of life (66.7/100 and 56.7/100, respectively). Multivariate analysis revealed a significant direct association between DSM and better primary health composite and mental health composite. It also showed that female gender, and reporting two or more diabetic complications were significantly associated with poor PHC. Kuwaiti patients with diabetes showed a modest level of HRQOL. Patients' DSM, gender, and diabetes complications were significant independent correlates to HRQOL. Appraisal of patients with diabetes' HRQOL as an essential component of diabetes management in clinical settings is suggested. Further studies to examine the impact of good diabetes self-management on HRQOL improvement are needed.

    . ©2018The Author(s). Published by S. Karger AG, Basel.

  3. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications

    PubMed Central

    Rafi Ahamed, Shaik

    2016-01-01

    In biomedical, data security is the most expensive resource for wireless body area network applications. Cryptographic algorithms are used in order to protect the information against unauthorised access. Advanced encryption standard (AES) cryptographic algorithm plays a vital role in telemedicine applications. The authors propose a novel approach for design of substitution bytes (S-Box) using second-order reversible one-dimensional cellular automata (RCA2) as a replacement to the classical look-up-table (LUT) based S-Box used in AES algorithm. The performance of proposed RCA2 based S-Box and conventional LUT based S-Box is evaluated in terms of security using the cryptographic properties such as the nonlinearity, correlation immunity bias, strict avalanche criteria and entropy. Moreover, it is also shown that RCA2 based S-Boxes are dynamic in nature, invertible and provide high level of security. Further, it is also found that the RCA2 based S-Box have comparatively better performance than that of conventional LUT based S-Box. PMID:27733924

  4. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications.

    PubMed

    Gangadari, Bhoopal Rao; Rafi Ahamed, Shaik

    2016-09-01

    In biomedical, data security is the most expensive resource for wireless body area network applications. Cryptographic algorithms are used in order to protect the information against unauthorised access. Advanced encryption standard (AES) cryptographic algorithm plays a vital role in telemedicine applications. The authors propose a novel approach for design of substitution bytes (S-Box) using second-order reversible one-dimensional cellular automata (RCA 2 ) as a replacement to the classical look-up-table (LUT) based S-Box used in AES algorithm. The performance of proposed RCA 2 based S-Box and conventional LUT based S-Box is evaluated in terms of security using the cryptographic properties such as the nonlinearity, correlation immunity bias, strict avalanche criteria and entropy. Moreover, it is also shown that RCA 2 based S-Boxes are dynamic in nature, invertible and provide high level of security. Further, it is also found that the RCA 2 based S-Box have comparatively better performance than that of conventional LUT based S-Box.

  5. Key strategies to improve systems for managing patient complaints within health facilities – what can we learn from the existing literature?

    PubMed Central

    2018-01-01

    ABSTRACT Background: Information from patient complaints – a widely accepted measure of patient satisfaction with services – can inform improvements in service quality, and contribute towards overall health systems performance. While analyses of data from patient complaints received much emphasis, there is limited published literature on key interventions to improve complaint management systems. Objectives: The objectives are two-fold: first, to synthesise existing evidence and provide practical options to inform future policy and practice and, second, to identify key outstanding gaps in the existing literature to inform agenda for future research. Methods: We report results of review of the existing literature. Peer-reviewed published literature was searched in OVID Medline, OVID Global Health and PubMed. In addition, relevant citations from the reviewed articles were followed up, and we also report grey literature from the UK and the Netherlands. Results: Effective interventions can improve collection of complaints (e.g. establishing easy-to-use channels and raising patients’ awareness of these), analysis of complaint data (e.g. creating structures and spaces for analysis and learning from complaints data), and subsequent action (e.g. timely feedback to complainants and integrating learning from complaints into service quality improvement). No one single measure can be sufficient, and any intervention to improve patient complaint management system must include different components, which need to be feasible, effective, scalable, and sustainable within local context. Conclusions: Effective interventions to strengthen patient complaints systems need to be: comprehensive, integrated within existing systems, context-specific and cognizant of the information asymmetry and the unequal power relations between the key actors. Four gaps in the published literature represent an agenda for future research: limited understanding of contexts of effective interventions

  6. Research on the key technologies of 3D spatial data organization and management for virtual building environments

    NASA Astrophysics Data System (ADS)

    Gong, Jun; Zhu, Qing

    2006-10-01

    As the special case of VGE in the fields of AEC (architecture, engineering and construction), Virtual Building Environment (VBE) has been broadly concerned. Highly complex, large-scale 3d spatial data is main bottleneck of VBE applications, so 3d spatial data organization and management certainly becomes the core technology for VBE. This paper puts forward 3d spatial data model for VBE, and the performance to implement it is very high. Inherent storage method of CAD data makes data redundant, and doesn't concern efficient visualization, which is a practical bottleneck to integrate CAD model, so An Efficient Method to Integrate CAD Model Data is put forward. Moreover, Since the 3d spatial indices based on R-tree are usually limited by their weakness of low efficiency due to the severe overlap of sibling nodes and the uneven size of nodes, a new node-choosing algorithm of R-tree are proposed.

  7. Delivering heart failure disease management in 3 tertiary care centers: key clinical components and venues of care.

    PubMed

    Shah, Monica R; Whellan, David J; Peterson, Eric D; Nohria, Anju; Hasselblad, Vic; Xue, Zhenyi; Bowers, Margaret T; O'Connor, Christopher M; Califf, Robert M; Stevenson, Lynne W

    2008-04-01

    Little data exist to assist to help those organizing and managing heart failure (HF) disease management (DM) programs. We aimed to describe the intensity of outpatient HF care (clinic visits and telephone calls) and medical and nonpharmacological interventions in the outpatient setting. This was a prospective substudy of 130 patients enrolled in STARBRITE in HFDM programs at 3 centers. Follow-up occurred 10, 30, 60, 90, and 120 days after discharge. The number of clinic visits and calls made by HF cardiologists, nurse practitioners, and nurses were prospectively tracked. The results were reported as medians and interquartile ranges. There were a total of 581 calls with 4 (2, 6) per patient and 467 clinic visits with 3 (2, 5) per patient. Time spent per patient was 8.9 (6, 10.6) minutes per call and 23.8 (20, 28.3) minutes per clinic visit. Nurses and nurse practitioners spent 113 hours delivering care on the phone, and physicians and nurse practitioners spent 187.6 hours in clinic. Issues addressed during calls included HF education (341 times [52.6%]) and fluid overload (87 times [41.8%]). Medical interventions included adjustments to loop diuretics (calls 101 times, clinic 156 times); beta-blockers (calls 18 times, clinic 126 times); vasodilators (calls 8 times, clinic 55 times). More than a third of clinician time was spent on calls, during which >50% of patient contacts and HF education and >39% of diuretic adjustments occurred. Administrators and public and private insurers need to recognize the amount of medical care delivered over the telephone and should consider reimbursement for these activities.

  8. Pre-Mrna Introns as a Model for Cryptographic Algorithm:. Theory and Experiments

    NASA Astrophysics Data System (ADS)

    Regoli, Massimo

    2010-01-01

    The RNA-Crypto System (shortly RCS) is a symmetric key algorithm to cipher data. The idea for this new algorithm starts from the observation of nature. In particular from the observation of RNA behavior and some of its properties. In particular the RNA sequences have some sections called Introns. Introns, derived from the term "intragenic regions", are non-coding sections of precursor mRNA (pre-mRNA) or other RNAs, that are removed (spliced out of the RNA) before the mature RNA is formed. Once the introns have been spliced out of a pre-mRNA, the resulting mRNA sequence is ready to be translated into a protein. The corresponding parts of a gene are known as introns as well. The nature and the role of Introns in the pre-mRNA is not clear and it is under ponderous researches by Biologists but, in our case, we will use the presence of Introns in the RNA-Crypto System output as a strong method to add chaotic non coding information and an unnecessary behaviour in the access to the secret key to code the messages. In the RNA-Crypto System algorithm the introns are sections of the ciphered message with non-coding information as well as in the precursor mRNA.

  9. Return of the pulmonary nodule: the radiologist's key role in implementing the 2015 BTS guidelines on the investigation and management of pulmonary nodules.

    PubMed

    Graham, Richard N J; Baldwin, David R; Callister, Matthew E J; Gleeson, Fergus V

    2016-01-01

    The British Thoracic Society has published new comprehensive guidelines for the management of pulmonary nodules. These guidelines are significantly different from those previously published, as they use two malignancy prediction calculators to better characterize the risk of malignancy. There are recommendations for a higher nodule size threshold for follow-up (≥5 mm or ≥80 mm(3)) and a reduction of the follow-up period to 1 year for solid pulmonary nodules; both of these will reduce the number of follow-up CT scans. PET-CT plays a crucial role in characterization also, with an ordinal scale being recommended for reporting. Radiologists will be the key in implementing these guidelines, and routine use of volumetric image-analysis software will be required to manage patients with pulmonary nodules correctly.

  10. Key Nutrients.

    ERIC Educational Resources Information Center

    Federal Extension Service (USDA), Washington, DC.

    Lessons written to help trainer agents prepare aides for work with families in the Food and Nutrition Program are presented in this booklet. The key nutrients discussed in the 10 lessons are protein, carbohydrates, fat, calcium, iron, iodine, and Vitamins A, B, C, and D. the format of each lesson is as follows: Purpose, Presentation, Application…

  11. Secure password-based authenticated key exchange for web services

    SciTech Connect

    Liang, Fang; Meder, Samuel; Chevassut, Olivier

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options inmore » the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.« less

  12. Parallel point-multiplication architecture using combined group operations for high-speed cryptographic applications

    PubMed Central

    Saeedi, Ehsan; Kong, Yinan

    2017-01-01

    In this paper, we propose a novel parallel architecture for fast hardware implementation of elliptic curve point multiplication (ECPM), which is the key operation of an elliptic curve cryptography processor. The point multiplication over binary fields is synthesized on both FPGA and ASIC technology by designing fast elliptic curve group operations in Jacobian projective coordinates. A novel combined point doubling and point addition (PDPA) architecture is proposed for group operations to achieve high speed and low hardware requirements for ECPM. It has been implemented over the binary field which is recommended by the National Institute of Standards and Technology (NIST). The proposed ECPM supports two Koblitz and random curves for the key sizes 233 and 163 bits. For group operations, a finite-field arithmetic operation, e.g. multiplication, is designed on a polynomial basis. The delay of a 233-bit point multiplication is only 3.05 and 3.56 μs, in a Xilinx Virtex-7 FPGA, for Koblitz and random curves, respectively, and 0.81 μs in an ASIC 65-nm technology, which are the fastest hardware implementation results reported in the literature to date. In addition, a 163-bit point multiplication is also implemented in FPGA and ASIC for fair comparison which takes around 0.33 and 0.46 μs, respectively. The area-time product of the proposed point multiplication is very low compared to similar designs. The performance (1Area×Time=1AT) and Area × Time × Energy (ATE) product of the proposed design are far better than the most significant studies found in the literature. PMID:28459831

  13. Parallel point-multiplication architecture using combined group operations for high-speed cryptographic applications.

    PubMed

    Hossain, Md Selim; Saeedi, Ehsan; Kong, Yinan

    2017-01-01

    In this paper, we propose a novel parallel architecture for fast hardware implementation of elliptic curve point multiplication (ECPM), which is the key operation of an elliptic curve cryptography processor. The point multiplication over binary fields is synthesized on both FPGA and ASIC technology by designing fast elliptic curve group operations in Jacobian projective coordinates. A novel combined point doubling and point addition (PDPA) architecture is proposed for group operations to achieve high speed and low hardware requirements for ECPM. It has been implemented over the binary field which is recommended by the National Institute of Standards and Technology (NIST). The proposed ECPM supports two Koblitz and random curves for the key sizes 233 and 163 bits. For group operations, a finite-field arithmetic operation, e.g. multiplication, is designed on a polynomial basis. The delay of a 233-bit point multiplication is only 3.05 and 3.56 μs, in a Xilinx Virtex-7 FPGA, for Koblitz and random curves, respectively, and 0.81 μs in an ASIC 65-nm technology, which are the fastest hardware implementation results reported in the literature to date. In addition, a 163-bit point multiplication is also implemented in FPGA and ASIC for fair comparison which takes around 0.33 and 0.46 μs, respectively. The area-time product of the proposed point multiplication is very low compared to similar designs. The performance ([Formula: see text]) and Area × Time × Energy (ATE) product of the proposed design are far better than the most significant studies found in the literature.

  14. Projections of change in key ecosystem indicators for planning and management of marine protected areas: An example study for European seas

    NASA Astrophysics Data System (ADS)

    Kay, Susan; Butenschön, Momme

    2018-02-01

    Marine Protected Areas (MPAs) are widely used as tools to maintain biodiversity, protect habitats and ensure that development is sustainable. If MPAs are to maintain their role into the future it is important for managers to understand how conditions at these sites may change as a result of climate change and other drivers, and this understanding needs to extend beyond temperature to a range of key ecosystem indicators. This case study demonstrates how spatially-aggregated model results for multiple variables can provide useful projections for MPA planners and managers. Conditions in European MPAs have been projected for the 2040s using unmitigated and globally managed scenarios of climate change and river management, and hence high and low emissions of greenhouse gases and riverborne nutrients. The results highlight the vulnerability of potential refuge sites in the north-west Mediterranean and the need for careful monitoring at MPAs to the north and west of the British Isles, which may be affected by changes in Atlantic circulation patterns. The projections also support the need for more MPAs in the eastern Mediterranean and Adriatic Sea, and can inform the selection of sites.

  15. Soil quality is key for planning and managing urban allotments intended for the sustainable production of home-consumption vegetables.

    PubMed

    Bretzel, F; Calderisi, M; Scatena, M; Pini, R

    2016-09-01

    The growing importance of urban allotments in planning and managing urban areas is due to the combined positive effects on ecosystem services, the economy and human well-being, especially of groups of the urban population that can be vulnerable (e.g. the elderly, immigrants, low-income families). Some studies have highlighted the potential risk of contamination by metals of vegetables grown in urban areas and the lack of appropriate site-specific risk assessments. However, surveys are still lacking on the possibilities of using urban soil as a good substrate to produce vegetables for home consumption. We assessed the soil quality in two areas in Pisa (Italy), one intended for urban horticulture and the other already cultivated for that purpose. We analysed the soils for the main chemical and physical characteristics (texture, bulk density, water stability index, pH, cation exchange capacity, organic carbon, total nitrogen, phosphorous) and elements (Pb, Cu, Ni, Cr, Zn, Cd, As, K, Al and Mn). Our results showed that both areas had physical and chemical heterogeneity due to the effects of urbanization and to the different cultivation techniques employed. The metal content was lower than the guidelines limits, and the soil conditions (pH = 8) greatly reduced the metal mobility. Copper concentration in some of the cultivated area samples was higher than the limits, representing a possible stress factor for the microbial biodiversity and fauna. Our findings demonstrate that site-specific surveys are necessary before planning urban cultivation areas, and educating urban gardeners regarding sustainable cultivation techniques is a priority for a safe environment.

  16. Clinical considerations and key issues in the management of patients with Erdheim-Chester Disease: a seven case series.

    PubMed

    Mazor, Roei D; Manevich-Mazor, Mirra; Kesler, Anat; Aizenstein, Orna; Eshed, Iris; Jaffe, Ronald; Pessach, Yakov; Goldberg, Ilan; Sprecher, Eli; Yaish, Iris; Gural, Alexander; Ganzel, Chezi; Shoenfeld, Yehuda

    2014-12-01

    Erdheim-Chester Disease (ECD), a non Langerhans' cell histiocytosis of orphan nature and propensity for multi-systemic presentations, comprises an intricate medical challenge in terms of diagnosis, treatment and complication management. The objectives are to report the clinical, radiological and pathological characteristics, as well as cardinal therapeutic approaches to ECD patients and to provide clinical analyses of the medical chronicles of these complex patients. Patients with biopsy proven ECD were audited by a multi-disciplinary team of specialists who formed a coherent timeline of all the substantial clinical events in the evolution of their patients' illness. Seven patients (five men, two women) were recruited to the study. The median age at presentation was 53 years (range: 39 to 62 years). The median follow-up time was 36 months (range: 1 to 72 months). Notable ECD involvement sites included the skeleton (seven), pituitary gland (seven), retroperitoneum (five), central nervous system (four), skin (four), lungs and pleura (four), orbits (three), heart and great vessels (three) and retinae (one). Prominent signs and symptoms were fever (seven), polyuria and polydipsia (six), ataxia and dysarthria (four), bone pain (four), exophthalmos (three), renovascular hypertension (one) and dyspnea (one). The V600E BRAF mutation was verified in three of six patients tested. Interferon-α treatment was beneficial in three of six patients treated. Vemurafenib yielded dramatic neurological improvement in a BRAF mutated patient. Infliximab facilitated pericardial effusion volume reduction. Cladribine improved cerebral blood flow originally compromised by perivenous lesions. ECD is a complex, multi-systemic, clonal entity coalescing both neoplastic and inflammatory elements and strongly dependent on impaired RAS/RAF/MEK/ERK signaling.

  17. Influence of Anthropogenic Disturbances on Stand Structural Complexity in Andean Temperate Forests: Implications for Managing Key Habitat for Biodiversity

    PubMed Central

    2017-01-01

    Forest attributes and their abundances define the stand structural complexity available as habitat for faunal biodiversity; however, intensive anthropogenic disturbances have the potential to degrade and simplify forest stands. In this paper we develop an index of stand structural complexity and show how anthropogenic disturbances, namely fire, logging, livestock, and their combined presence, affect stand structural complexity in a southern Global Biodiversity Hotspot. From 2011 to 2013, we measured forest structural attributes as well as the presence of anthropogenic disturbances in 505 plots in the Andean zone of the La Araucanía Region, Chile. In each plot, understory density, coarse woody debris, number of snags, tree diameter at breast height, and litter depth were measured, along with signs of the presence of anthropogenic disturbances. Ninety-five percent of the plots showed signs of anthropogenic disturbance (N = 475), with the combined presence of fire, logging, and livestock being the most common disturbance (N = 222; 44% of plots). The lowest values for the index were measured in plots combining fire, logging, and livestock. Undisturbed plots and plots with the presence of relatively old fires (> 70 years) showed the highest values for the index of stand structural complexity. Our results suggest that secondary forests < 70-year post-fire event, with the presence of habitat legacies (e.g. snags and CWD), can reach a structural complexity as high as undisturbed plots. Temperate forests should be managed to retain structural attributes, including understory density (7.2 ± 2.5 # contacts), volume of CWD (22.4 ± 25.8 m3/ha), snag density (94.4 ± 71.0 stems/ha), stand basal area (61.2 ± 31.4 m2/ha), and litter depth (7.5 ± 2.7 cm). Achieving these values will increase forest structural complexity, likely benefiting a range of faunal species in South American temperate forests. PMID:28068349

  18. Topography and crop management are key factors for the development of american leaf spot epidemics on coffee in costa rica.

    PubMed

    Avelino, Jacques; Cabut, Sandrine; Barboza, Bernardo; Barquero, Miguel; Alfaro, Ronny; Esquivel, César; Durand, Jean-François; Cilas, Christian

    2007-12-01

    ABSTRACT We monitored the development of American leaf spot of coffee, a disease caused by the gemmiferous fungus Mycena citricolor, in 57 plots in Costa Rica for 1 or 2 years in order to gain a clearer understanding of conditions conducive to the disease and improve its control. During the investigation, characteristics of the coffee trees, crop management, and the environment were recorded. For the analyses, we used partial least-squares regression via the spline functions (PLSS), which is a nonlinear extension to partial least-squares regression (PLS). The fungus developed well in areas located between approximately 1,100 and 1,550 m above sea level. Slopes were conducive to its development, but eastern-facing slopes were less affected than the others, probably because they were more exposed to sunlight, especially in the rainy season. The distance between planting rows, the shade percentage, coffee tree height, the type of shade, and the pruning system explained disease intensity due to their effects on coffee tree shading and, possibly, on the humidity conditions in the plot. Forest trees and fruit trees intercropped with coffee provided particularly propitious conditions. Apparently, fertilization was unfavorable for the disease, probably due to dilution phenomena associated with faster coffee tree growth. Finally, series of wet spells interspersed with dry spells, which were frequent in the middle of the rainy season, were critical for the disease, probably because they affected the production and release of gemmae and their viability. These results could be used to draw up a map of epidemic risks taking topographical factors into account. To reduce those risks and improve chemical control, our results suggested that farmers should space planting rows further apart, maintain light shading in the plantation, and prune their coffee trees.

  19. Influence of Anthropogenic Disturbances on Stand Structural Complexity in Andean Temperate Forests: Implications for Managing Key Habitat for Biodiversity.

    PubMed

    Caviedes, Julián; Ibarra, José Tomás

    2017-01-01

    Forest attributes and their abundances define the stand structural complexity available as habitat for faunal biodiversity; however, intensive anthropogenic disturbances have the potential to degrade and simplify forest stands. In this paper we develop an index of stand structural complexity and show how anthropogenic disturbances, namely fire, logging, livestock, and their combined presence, affect stand structural complexity in a southern Global Biodiversity Hotspot. From 2011 to 2013, we measured forest structural attributes as well as the presence of anthropogenic disturbances in 505 plots in the Andean zone of the La Araucanía Region, Chile. In each plot, understory density, coarse woody debris, number of snags, tree diameter at breast height, and litter depth were measured, along with signs of the presence of anthropogenic disturbances. Ninety-five percent of the plots showed signs of anthropogenic disturbance (N = 475), with the combined presence of fire, logging, and livestock being the most common disturbance (N = 222; 44% of plots). The lowest values for the index were measured in plots combining fire, logging, and livestock. Undisturbed plots and plots with the presence of relatively old fires (> 70 years) showed the highest values for the index of stand structural complexity. Our results suggest that secondary forests < 70-year post-fire event, with the presence of habitat legacies (e.g. snags and CWD), can reach a structural complexity as high as undisturbed plots. Temperate forests should be managed to retain structural attributes, including understory density (7.2 ± 2.5 # contacts), volume of CWD (22.4 ± 25.8 m3/ha), snag density (94.4 ± 71.0 stems/ha), stand basal area (61.2 ± 31.4 m2/ha), and litter depth (7.5 ± 2.7 cm). Achieving these values will increase forest structural complexity, likely benefiting a range of faunal species in South American temperate forests.

  20. Ineffective Healthcare Technology Management in Benin’s Public Health Sector: The Perceptions of Key Actors and Their Ability to Address the Main Problems

    PubMed Central

    Houngbo, P. Thierry; De Cock Buning, Tjard; Bunders, Joske; Coleman, Harry L. S.; Medenou, Daton; Dakpanon, Laurent; Zweekhorst, Marjolein

    2017-01-01

    Background: Low-income countries face many contextual challenges to manage healthcare technologies effectively, as the majority are imported and resources are constrained to a greater extent. Previous healthcare technology management (HTM) policies in Benin have failed to produce better quality of care for the population and costeffectiveness for the government. This study aims to identify and assess the main problems facing HTM in Benin’s public health sector, as well as the ability of key actors within the sector to address these problems. Methods: We conducted 2 surveys in 117 selected health facilities. The first survey was based on 377 questionnaires and 259 interviews, and the second involved observation and group interviews at health facilities. The Temple-Bird Healthcare Technology Package System (TBHTPS), tailored to the context of Benin’s health system, was used as a conceptual framework. Results: The findings of the first survey show that 85% of key actors in Benin’s HTM sector characterized the system as failing in components of the TBHTPS framework. Biomedical, clinical, healthcare technology engineers and technicians perceived problems most severely, followed by users of equipment, managers and hospital directors, international organization officers, local and foreign suppliers, and finally policy-makers, planners and administrators at the Ministry of Health (MoH). The 5 most important challenges to be addressed are policy, strategic management and planning, and technology needs assessment and selection – categorized as major enabling inputs (MEI) in HTM by the TBHTPS framework – and installation and commissioning, training and skill development and procurement, which are import and use activities (IUA). The ability of each key actor to address these problems (the degree of political or administrative power they possess) was inversely proportional to their perception of the severity of the problems. Observational data gathered during site

  1. A Secure Key Distribution System of Quantum Cryptography Based on the Coherent State

    NASA Technical Reports Server (NTRS)

    Guo, Guang-Can; Zhang, Xiao-Yu

    1996-01-01

    The cryptographic communication has a lot of important applications, particularly in the magnificent prospects of private communication. As one knows, the security of cryptographic channel depends crucially on the secrecy of the key. The Vernam cipher is the only cipher system which has guaranteed security. In that system the key must be as long as the message and most be used only once. Quantum cryptography is a method whereby key secrecy can be guaranteed by a physical law. So it is impossible, even in principle, to eavesdrop on such channels. Quantum cryptography has been developed in recent years. Up to now, many schemes of quantum cryptography have been proposed. Now one of the main problems in this field is how to increase transmission distance. In order to use quantum nature of light, up to now proposed schemes all use very dim light pulses. The average photon number is about 0.1. Because of the loss of the optical fiber, it is difficult for the quantum cryptography based on one photon level or on dim light to realize quantum key-distribution over long distance. A quantum key distribution based on coherent state is introduced in this paper. Here we discuss the feasibility and security of this scheme.

  2. Fractional optical cryptographic protocol for data containers in a noise-free multiuser environment

    NASA Astrophysics Data System (ADS)

    Jaramillo, Alexis; Barrera, John Fredy; Zea, Alejandro Vélez; Torroba, Roberto

    2018-03-01

    Optical encryption systems have great potential for flexible and high-performance data protection, making them an area of rapid development. However, most approaches present two main issues, namely, the presence of speckle noise, and the degree of security they offer. Here we introduce an experimental implementation of an optical encrypting protocol that tackles these issues by taking advantage of recent developments in the field. These developments include the introduction of information containers for noise free information retrieval, the use of multiplexing to allow for a multiple user environment and an architecture based on the Joint fractional Fourier transform that allows increased degrees of freedom and simplifies the experimental requirements. Thus, data handling via QR code containers involving multiple users processed in a fractional joint transform correlator produce coded information with increased security and ease of use. In this way, we can guarantee that only the user with the correct combination of encryption key and security parameters can achieve noise free information after deciphering. We analyze the performance of the system when the order of the fractional Fourier transform is changed during decryption. We show experimental results that confirm the validity of our proposal.

  3. DNA-based cryptographic methods for data hiding in DNA media.

    PubMed

    Marwan, Samiha; Shawish, Ahmed; Nagaty, Khaled

    2016-12-01

    Information security can be achieved using cryptography, steganography or a combination of them, where data is firstly encrypted using any of the available cryptography techniques and then hid into any hiding medium. Recently, the famous genomic DNA has been introduced as a hiding medium, known as DNA steganography, due to its notable ability to hide huge data sets with a high level of randomness and hence security. Despite the numerous cryptography techniques, to our knowledge only the vigenere cipher and the DNA-based playfair cipher have been combined with the DNA steganography, which keeps space for investigation of other techniques and coming up with new improvements. This paper presents a comprehensive analysis between the DNA-based playfair, vigenere, RSA and the AES ciphers, each combined with a DNA hiding technique. The conducted analysis reports the performance diversity of each combined technique in terms of security, speed, hiding capacity in addition to both key size and data size. Moreover, this paper proposes a modification of the current combined DNA-based playfair cipher technique, which makes it not only simple and fast but also provides a significantly higher hiding capacity and security. The conducted extensive experimental studies confirm such outstanding performance in comparison with all the discussed combined techniques. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  4. Completely device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Aguilar, Edgar A.; Ramanathan, Ravishankar; Kofler, Johannes; Pawłowski, Marcin

    2016-08-01

    Quantum key distribution (QKD) is a provably secure way for two distant parties to establish a common secret key, which then can be used in a classical cryptographic scheme. Using quantum entanglement, one can reduce the necessary assumptions that the parties have to make about their devices, giving rise to device-independent QKD (DIQKD). However, in all existing protocols to date the parties need to have an initial (at least partially) random seed as a resource. In this work, we show that this requirement can be dropped. Using recent advances in the fields of randomness amplification and randomness expansion, we demonstrate that it is sufficient for the message the parties want to communicate to be (partially) unknown to the adversaries—an assumption without which any type of cryptography would be pointless to begin with. One party can use her secret message to locally generate a secret sequence of bits, which can then be openly used by herself and the other party in a DIQKD protocol. Hence our work reduces the requirements needed to perform secure DIQKD and establish safe communication.

  5. Science advancements key to increasing management value of life stage monitoring networks for endangered Sacramento River winter-run Chinook salmon in California

    USGS Publications Warehouse

    Johnson, Rachel C.; Windell, Sean; Brandes, Patricia L.; Conrad, J. Louise; Ferguson, John; Goertler, Pascale A. L.; Harvey, Brett N.; Heublein, Joseph; Isreal, Joshua A.; Kratville, Daniel W.; Kirsch, Joseph E.; Perry, Russell W.; Pisciotto, Joseph; Poytress, William R.; Reece, Kevin; Swart, Brycen G.

    2017-01-01

    A robust monitoring network that provides quantitative information about the status of imperiled species at key life stages and geographic locations over time is fundamental for sustainable management of fisheries resources. For anadromous species, management actions in one geographic domain can substantially affect abundance of subsequent life stages that span broad geographic regions. Quantitative metrics (e.g., abundance, movement, survival, life history diversity, and condition) at multiple life stages are needed to inform how management actions (e.g., hatcheries, harvest, hydrology, and habitat restoration) influence salmon population dynamics. The existing monitoring network for endangered Sacramento River winterrun Chinook Salmon (SRWRC, Oncorhynchus tshawytscha) in California’s Central Valley was compared to conceptual models developed for each life stage and geographic region of the life cycle to identify relevant SRWRC metrics. We concluded that the current monitoring network was insufficient to diagnose when (life stage) and where (geographic domain) chronic or episodic reductions in SRWRC cohorts occur, precluding within- and among-year comparisons. The strongest quantitative data exist in the Upper Sacramento River, where abundance estimates are generated for adult spawners and emigrating juveniles. However, once SRWRC leave the upper river, our knowledge of their identity, abundance, and condition diminishes, despite the juvenile monitoring enterprise. We identified six system-wide recommended actions to strengthen the value of data generated from the existing monitoring network to assess resource management actions: (1) incorporate genetic run identification; (2) develop juvenile abundance estimates; (3) collect data for life history diversity metrics at multiple life stages; (4) expand and enhance real-time fish survival and movement monitoring; (5) collect fish condition data; and (6) provide timely public access to monitoring data in open data

  6. End of life care for people with dementia: The views of health professionals, social care service managers and frontline staff on key requirements for good practice

    PubMed Central

    Lee, Richard Philip; Bamford, Claire; Poole, Marie; McLellan, Emma; Exley, Catherine; Robinson, Louise

    2017-01-01

    Background Evidence consistently shows that people with advanced dementia experience suboptimal end of life care compared to those with cancer; with increased hospitalisation, inadequate pain control and fewer palliative care interventions. Understanding the views of those service managers and frontline staff who organise and provide care is crucial in order to develop better end of life care for people with dementia. Methods and findings Qualitative interviews and focus groups were conducted from 2013 to 2015 with 33 service managers and 54 staff involved in frontline care, including doctors, nurses, nursing and care home managers, service development leads, senior managers/directors, care assistants and senior care assistants/team leads. All were audio recorded and transcribed verbatim. Participants represented a diverse range of service types and occupation. Transcripts were subject to coding and thematic analysis in data meetings. Analysis of the data led to the development of seven key themes: Recognising end of life (EOL) and tools to support end of life care (EOLC), Communicating with families about EOL, Collaborative working, Continuity of care, Ensuring comfort at EOL, Supporting families, Developing and supporting staff. Each is discussed in detail and comprise individual and collective views on approaches to good end of life care for people with dementia. Conclusions The significant challenges of providing good end of life care for people with dementia requires that different forms of expertise should be recognised and used; including the skills and knowledge of care assistants. Successfully engaging with people with dementia and family members and helping them to recognise the dying trajectory requires a supportive integration of emotional and technical expertise. The study strengthens the existing evidence base in this area and will be used with a related set of studies (on the views of other stakeholders and observations and interviews conducted in

  7. End of life care for people with dementia: The views of health professionals, social care service managers and frontline staff on key requirements for good practice.

    PubMed

    Lee, Richard Philip; Bamford, Claire; Poole, Marie; McLellan, Emma; Exley, Catherine; Robinson, Louise

    2017-01-01

    Evidence consistently shows that people with advanced dementia experience suboptimal end of life care compared to those with cancer; with increased hospitalisation, inadequate pain control and fewer palliative care interventions. Understanding the views of those service managers and frontline staff who organise and provide care is crucial in order to develop better end of life care for people with dementia. Qualitative interviews and focus groups were conducted from 2013 to 2015 with 33 service managers and 54 staff involved in frontline care, including doctors, nurses, nursing and care home managers, service development leads, senior managers/directors, care assistants and senior care assistants/team leads. All were audio recorded and transcribed verbatim. Participants represented a diverse range of service types and occupation. Transcripts were subject to coding and thematic analysis in data meetings. Analysis of the data led to the development of seven key themes: Recognising end of life (EOL) and tools to support end of life care (EOLC), Communicating with families about EOL, Collaborative working, Continuity of care, Ensuring comfort at EOL, Supporting families, Developing and supporting staff. Each is discussed in detail and comprise individual and collective views on approaches to good end of life care for people with dementia. The significant challenges of providing good end of life care for people with dementia requires that different forms of expertise should be recognised and used; including the skills and knowledge of care assistants. Successfully engaging with people with dementia and family members and helping them to recognise the dying trajectory requires a supportive integration of emotional and technical expertise. The study strengthens the existing evidence base in this area and will be used with a related set of studies (on the views of other stakeholders and observations and interviews conducted in four services) to develop an evidence

  8. Are national policies and programs for prevention and management of postpartum hemorrhage and preeclampsia adequate? A key informant survey in 37 countries.

    PubMed

    Smith, Jeffrey Michael; Currie, Sheena; Cannon, Tirza; Armbruster, Deborah; Perri, Julia

    2014-08-01

    Although maternal mortality has declined substantially in recent years, efforts to address postpartum hemorrhage (PPH) and preeclampsia/eclampsia (PE/E) must be systematically scaled up in order for further reduction to take place. In 2012, a key informant survey was conducted to identify both national and global gaps in PPH and PE/E program priorities and to highlight focus areas for future national and global programming. Between January and March 2012, national program teams in 37 countries completed a 44-item survey, consisting mostly of dichotomous yes/no responses and addressing 6 core programmatic areas: policy, training, medication distribution and logistics, national reporting of key indicators, programming, and challenges to and opportunities for scale up. An in-country focal person led the process to gather the necessary information from key local stakeholders. Some countries also provided national essential medicines lists and service delivery guidelines for comparison and further analysis. Most surveyed countries have many elements in place to address PPH and PE/E, but notable gaps remain in both policy and practice. Oxytocin and magnesium sulfate were reported to be regularly available in facilities in 89% and 76% of countries, respectively. Only 27% of countries, however, noted regular availability of misoprostol in health facilities. Midwife scope of practice regarding PPH and PE/E is inconsistent with global norms in a number of countries: 22% of countries do not allow midwives to administer magnesium sulfate and 30% do not allow them to perform manual removal of the placenta. Most countries surveyed have many of the essential policies and program elements to prevent/manage PPH and PE/E, but absence of commodities (especially misoprostol), limitations in scope of practice for midwives, and gaps in inclusion of maternal health indicators in the national data systems have impeded efforts to scale up programs nationally.

  9. Availability of antidotes and key emergency drugs in tertiary care hospitals of Punjab and assessment of the knowledge of health care professionals in the management of poisoning cases.

    PubMed

    Arslan, Naheed; Khiljee, Sonia; Bakhsh, Allah; Ashraf, Muhammad; Maqsood, Iram

    2016-03-01

    This study was conducted to evaluate the availability of antidotes/key emergency drugs in tertiary care hospitals of the Punjab province, and to assess the knowledge of health care professionals in the stocking and administration of antidotes in the proper management of poisoning cases. Seventeen (n=17) tertiary care hospitals of Punjab Pakistan were selected. Two performas (A and B) were designed for 26 antidotes/key emergency drugs and given to the hospital pharmacists and physicians respectively. It was observed that Activated Charcoal, being the universal antidote was found only in 6 hospitals (41%). Digoxin Immune Fab, Edentate Calcium disodium and Glucagon were not available in emergency department of any hospital and even not included in the formulary of any hospital. About 80% pharmacists were aware of the method of preparation of Activated Charcoal and 85% physicians were familiar with its route of administration. Data showed that tertiary care hospitals of Punjab do not stock antidotes according to national drug policy. Moreover the study strongly suggests the development of health care centers and professional by organizing antidote awareness programs, continuous education and record keeping of poisonous cases and availability of emergency drugs around the clock.

  10. Silicon photonic transceiver circuit for high-speed polarization-based discrete variable quantum key distribution

    DOE PAGES

    Cai, Hong; Long, Christopher M.; DeRose, Christopher T.; ...

    2017-01-01

    We demonstrate a silicon photonic transceiver circuit for high-speed discrete variable quantum key distribution that employs a common structure for transmit and receive functions. The device is intended for use in polarization-based quantum cryptographic protocols, such as BB84. Our characterization indicates that the circuit can generate the four BB84 states (TE/TM/45°/135° linear polarizations) with >30 dB polarization extinction ratios and gigabit per second modulation speed, and is capable of decoding any polarization bases differing by 90° with high extinction ratios.

  11. Silicon photonic transceiver circuit for high-speed polarization-based discrete variable quantum key distribution.

    PubMed

    Cai, Hong; Long, Christopher M; DeRose, Christopher T; Boynton, Nicholas; Urayama, Junji; Camacho, Ryan; Pomerene, Andrew; Starbuck, Andrew L; Trotter, Douglas C; Davids, Paul S; Lentine, Anthony L

    2017-05-29

    We demonstrate a silicon photonic transceiver circuit for high-speed discrete variable quantum key distribution that employs a common structure for transmit and receive functions. The device is intended for use in polarization-based quantum cryptographic protocols, such as BB84. Our characterization indicates that the circuit can generate the four BB84 states (TE/TM/45°/135° linear polarizations) with >30 dB polarization extinction ratios and gigabit per second modulation speed, and is capable of decoding any polarization bases differing by 90° with high extinction ratios.

  12. Silicon photonic transceiver circuit for high-speed polarization-based discrete variable quantum key distribution

    SciTech Connect

    Cai, Hong; Long, Christopher M.; DeRose, Christopher T.

    We demonstrate a silicon photonic transceiver circuit for high-speed discrete variable quantum key distribution that employs a common structure for transmit and receive functions. The device is intended for use in polarization-based quantum cryptographic protocols, such as BB84. Our characterization indicates that the circuit can generate the four BB84 states (TE/TM/45°/135° linear polarizations) with >30 dB polarization extinction ratios and gigabit per second modulation speed, and is capable of decoding any polarization bases differing by 90° with high extinction ratios.

  13. Small private key MQPKS on an embedded microprocessor.

    PubMed

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  14. Small Private Key PKS on an Embedded Microprocessor

    PubMed Central

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  15. Unconditional security of a three state quantum key distribution protocol.

    PubMed

    Boileau, J-C; Tamaki, K; Batuwantudawe, J; Laflamme, R; Renes, J M

    2005-02-04

    Quantum key distribution (QKD) protocols are cryptographic techniques with security based only on the laws of quantum mechanics. Two prominent QKD schemes are the Bennett-Brassard 1984 and Bennett 1992 protocols that use four and two quantum states, respectively. In 2000, Phoenix et al. proposed a new family of three-state protocols that offers advantages over the previous schemes. Until now, an error rate threshold for security of the symmetric trine spherical code QKD protocol has been shown only for the trivial intercept-resend eavesdropping strategy. In this Letter, we prove the unconditional security of the trine spherical code QKD protocol, demonstrating its security up to a bit error rate of 9.81%. We also discuss how this proof applies to a version of the trine spherical code QKD protocol where the error rate is evaluated from the number of inconclusive events.

  16. Effective, clinically feasible and sustainable: Key design features of psycho-educational and supportive care interventions to promote individualised self-management in cancer care.

    PubMed

    Schofield, Penelope; Chambers, Suzanne

    2015-05-01

    As the global burden of cancer increases healthcare services will face increasing challenges in meet the complex needs of these patients, their families and the communities in which they live. This raises the question of how to meet patient need where direct clinical contact may be constrained or not readily available. Patients and families require resources and skills to manage their illness outside of the hospital setting within their own communities. To propose a framework for the development and delivery of psycho-educational and supportive care interventions drawing on theoretical principles of behaviour change and evidence-based interventions, and based on extensive experience in developing and testing complex interventions in oncology. At the core of this intervention framework are considerations of efficiency: interventions are designed to cater for individuals' unique needs; to place minimal demands on the health system infrastructure and to be rapidly disseminated into usual care if successful. There are seven key features: 1) Targeting cancer type and stage; 2) Tailoring to unique individual needs; 3) Promotion of patient self-management of their disease and treatment side effects; 4) Efficient delivery of the intervention; 5) Training and adherence to protocol; 6) Ensuring the intervention is evidence-based; 7) Confirming stakeholder acceptability of the intervention. A case study of a randomised controlled trial which tested psycho-educational oncology interventions using this framework is presented. These interventions were designed to cater for individuals' unique needs and promote self-management while placing minimal demands on the acute health care setting. Innovative ways to realise the potentially major impact that psycho-educational and supportive care interventions can have on psychological morbidity, coping, symptoms and quality of life in serious and chronic illness are needed. This framework, which is driven by theory, evidence, and

  17. Enhanced diffie-hellman algorithm for reliable key exchange

    NASA Astrophysics Data System (ADS)

    Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj

    2017-11-01

    The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.

  18. Cryptographic Combinatorial Securities Exchanges

    NASA Astrophysics Data System (ADS)

    Thorpe, Christopher; Parkes, David C.

    We present a useful new mechanism that facilitates the atomic exchange of many large baskets of securities in a combinatorial exchange. Cryptography prevents information about the securities in the baskets from being exploited, enhancing trust. Our exchange offers institutions who wish to trade large positions a new alternative to existing methods of block trading: they can reduce transaction costs by taking advantage of other institutions’ available liquidity, while third party liquidity providers guarantee execution—preserving their desired portfolio composition at all times. In our exchange, institutions submit encrypted orders which are crossed, leaving a “remainder”. The exchange proves facts about the portfolio risk of this remainder to third party liquidity providers without revealing the securities in the remainder, the knowledge of which could also be exploited. The third parties learn either (depending on the setting) the portfolio risk parameters of the remainder itself, or how their own portfolio risk would change if they were to incorporate the remainder into a portfolio they submit. In one setting, these third parties submit bids on the commission, and the winner supplies necessary liquidity for the entire exchange to clear. This guaranteed clearing, coupled with external price discovery from the primary markets for the securities, sidesteps difficult combinatorial optimization problems. This latter method of proving how taking on the remainder would change risk parameters of one’s own portfolio, without revealing the remainder’s contents or its own risk parameters, is a useful protocol of independent interest.

  19. A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks

    PubMed Central

    Liu, Wenchao; Zhang, Zhenhua; Li, Miaoxin; Liu, Zhenglin

    2014-01-01

    Secret key leakage in wireless sensor networks (WSNs) is a high security risk especially when sensor nodes are deployed in hostile environment and physically accessible to attackers. With nowadays semi/fully-invasive attack techniques attackers can directly derive the cryptographic key from non-volatile memory (NVM) storage. Physically Unclonable Function (PUF) is a promising technology to resist node capture attacks, and it also provides a low cost and tamper-resistant key provisioning solution. In this paper, we designed a PUF based on double-data-rate SDRAM Type 3 (DDR3) memory by exploring its memory decay characteristics. We also described a prototype of 128-bit key generation based on DDR3 PUF with integrated fuzzy extractor. Due to the wide adoption of DDR3 memory in WSN, our proposed DDR3 PUF technology with high security levels and no required hardware changes is suitable for a wide range of WSN applications. PMID:24984058

  20. Five key pillars of an analytics center of excellence, which are required to manage populations and transform organizations into the next era of health care.

    PubMed

    Reichert, Jim; Furlong, Gerry

    2014-01-01

    Acute care facilities are experiencing fiscal challenges as noted by decreasing admissions and lower reimbursement creating an unsustainable fiscal environment as we move into the next era of health care. This situation necessitates a strategy to move away from acting solely on hunches and instinct to using analytics to become a truly data-driven organization that identifies opportunities within patient populations to improve the quality and efficiency of care across the continuum. A brief overview of knowledge management philosophies will be provided and how it is used to enable organizations to leverage data, information, and knowledge for operational transformation leading to improved outcomes. This article outlines the 5 key pillars of an Analytics Center of Excellence; governance, organizational structure, people, process, and technology, that are foundational to the development of this strategy. While culture is the most important factor to achieve organizational transformation and improved care delivery, it is the 5 pillars of the ACoE that will enable the culture shift necessary to become a truly data-driven organization and thus achieve transformation into the next era of health care.

  1. Optimal attacks on qubit-based Quantum Key Recycling

    NASA Astrophysics Data System (ADS)

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  2. Management of Adult Syphilis: Key Questions to Inform the 2015 Centers for Disease Control and Prevention Sexually Transmitted Diseases Treatment Guidelines.

    PubMed

    Ghanem, Khalil G

    2015-12-15

    A panel of experts generated 8 "key questions" in the management of adult syphilis. A systematic literature review was conducted and tables of evidence were constructed to answer these important questions. Penicillin is the drug of choice to treat syphilis. Doxycycline to treat early and late latent syphilis is an acceptable alternate option if penicillin cannot be used. There is no added benefit to enhanced antimicrobial therapy when treating human immunodeficiency virus-infected persons with syphilis. If a patient misses a dose of penicillin in a course of weekly therapy for late syphilis, clinical experience suggests that an interval of 10-14 days between doses might be acceptable before restarting the sequence of injections. Pharmacologic considerations suggest that an interval of 7-9 days between doses, if feasible, may be more optimal. Missed doses are not acceptable for pregnant women. A cerebrospinal fluid examination to diagnose neurosyphilis is recommended in persons diagnosed with tertiary syphilis (eg, cardiovascular syphilis or late benign syphilis), persons with neurological signs or symptoms consistent with neurosyphilis, and asymptomatic persons whose serological titers do not decline appropriately following recommended therapy and in whom reinfection is ruled out. Infection and reinfection rates, particularly among men who have sex with men, are high. Frequent serological screening of this population appears to be the most cost-efficient intervention. The Centers for Disease Control and Prevention continues to recommend the use of the traditional rapid plasma reagin-based screening algorithm. The positive predictive value for syphilis associated with an isolated unconfirmed reactive treponemal chemiluminescence assay or enzyme immunoassay is low if the epidemiological risk and clinical probability for syphilis are low. Among pregnant women with serodiscordant serologies (positive treponemal tests and a negative nontreponemal test), the risk of

  3. Adaptive real time selection for quantum key distribution in lossy and turbulent free-space channels

    NASA Astrophysics Data System (ADS)

    Vallone, Giuseppe; Marangon, Davide G.; Canale, Matteo; Savorgnan, Ilaria; Bacco, Davide; Barbieri, Mauro; Calimani, Simon; Barbieri, Cesare; Laurenti, Nicola; Villoresi, Paolo

    2015-04-01

    The unconditional security in the creation of cryptographic keys obtained by quantum key distribution (QKD) protocols will induce a quantum leap in free-space communication privacy in the same way that we are beginning to realize secure optical fiber connections. However, free-space channels, in particular those with long links and the presence of atmospheric turbulence, are affected by losses, fluctuating transmissivity, and background light that impair the conditions for secure QKD. Here we introduce a method to contrast the atmospheric turbulence in QKD experiments. Our adaptive real time selection (ARTS) technique at the receiver is based on the selection of the intervals with higher channel transmissivity. We demonstrate, using data from the Canary Island 143-km free-space link, that conditions with unacceptable average quantum bit error rate which would prevent the generation of a secure key can be used once parsed according to the instantaneous scintillation using the ARTS technique.

  4. Implementing Diffie-Hellman key exchange using quantum EPR pairs

    NASA Astrophysics Data System (ADS)

    Mandal, Sayonnha; Parakh, Abhishek

    2015-05-01

    This paper implements the concepts of perfect forward secrecy and the Diffie-Hellman key exchange using EPR pairs to establish and share a secret key between two non-authenticated parties and transfer messages between them without the risk of compromise. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. This makes BB84-based quantum cryptography protocol unsuitable for network computing environments. Diffie-Hellman does not require the two parties to be mutually authenticated to each other, yet it can provide a basis for a number of authenticated protocols, most notably the concept of perfect forward secrecy. The work proposed in this paper provides a new direction in utilizing quantum EPR pairs in quantum key exchange. Although, classical cryptography boasts of efficient and robust protocols like the Diffie-Hellman key exchange, in the current times, with the advent of quantum computing they are very much vulnerable to eavesdropping and cryptanalytic attacks. Using quantum cryptographic principles, however, these classical encryption algorithms show more promise and a more robust and secure structure for applications. The unique properties of quantum EPR pairs also, on the other hand, go a long way in removing attacks like eavesdropping by their inherent nature of one particle of the pair losing its state if a measurement occurs on the other. The concept of perfect forward secrecy is revisited in this paper to attribute tighter security to the proposed protocol.

  5. Key techniques and risk management for the application of the Pile-Beam-Arch (PBA) excavation method: a case study of the Zhongjie subway station.

    PubMed

    Guan, Yong-ping; Zhao, Wen; Li, Shen-gang; Zhang, Guo-bin

    2014-01-01

    The design and construction of shallow-buried tunnels in densely populated urban areas involve many challenges. The ground movements induced by tunneling effects pose potential risks to infrastructure such as surface buildings, pipelines, and roads. In this paper, a case study of the Zhongjie subway station located in Shenyang, China, is examined to investigate the key construction techniques and the influence of the Pile-Beam-Arch (PBA) excavation method on the surrounding environment. This case study discusses the primary risk factors affecting the environmental safety and summarizes the corresponding risk mitigation measures and key techniques for subway station construction using the PBA excavation method in a densely populated urban area.

  6. Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys

    NASA Astrophysics Data System (ADS)

    Takahashi, Junko; Fukunaga, Toshinori

    This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.

  7. New public key cryptosystem based on quaternions

    NASA Astrophysics Data System (ADS)

    Durcheva, Mariana; Karailiev, Kristian

    2017-12-01

    Quaternions are not commonly used in cryptography. Nevertheless, the noncommutativity of their multiplication makes them suitable for cryptographic purposes. In this paper we suggest a Diffie-Hellman like cryptosystem based on the the quaternions. Additionally, a computer realization of the protocol is given.

  8. Apollo management: A key to the solution of the social-economical dilemma - The transferability of space-travel managerial techniques to the civil sector

    NASA Technical Reports Server (NTRS)

    Puttkamer, J. V.

    1973-01-01

    An analysis has been conducted to find out whether the management techniques developed in connection with the Apollo project could be used for dealing with such urgent problems of modern society as the crisis of the cities, the increasing environmental pollution, and the steadily growing traffic. Basic concepts and definitions of program and system management are discussed together with details regarding the employment of these concepts in connection with the solution of the problems of the Apollo program. Principles and significance of a systems approach are considered, giving attention to planning, system analysis, system integration, and project management. An application of the methods of project management to the problems of the civil sector is possible if the special characteristics of each particular case are taken into account.

  9. The use of key indicators as a foundation for knowledge management: the experiences of Monterey County's Social and Employment Services Department.

    PubMed

    Lindberg, Arley

    2012-01-01

    While effective knowledge management practices are commonly sought by organizations, facilitating the use and ongoing engagement in these practices can be challenging. To this end, one agency developed a strategy for institutionalizing their knowledge management functions by appointing a team responsible for monitoring and implementing knowledge management functions, and creating a report for use as a tool by departments agency-wide. Aimed at increasing transparency both within the agency and with the surrounding community, the report provides an overview of individual departments' programs, goals, recent caseload trends, and latest achievements. The report is made available online and accessible by the general public. This case study describes the development of this team and report, as well as lessons learned and future knowledge management goals for the agency. Copyright © Taylor & Francis Group, LLC

  10. Evaluation of the Quality of Occupational Health and Safety Management Systems Based on Key Performance Indicators in Certified Organizations.

    PubMed

    Mohammadfam, Iraj; Kamalinia, Mojtaba; Momeni, Mansour; Golmohammadi, Rostam; Hamidi, Yadollah; Soltanian, Alireza

    2017-06-01

    Occupational Health and Safety Management Systems are becoming more widespread in organizations. Consequently, their effectiveness has become a core topic for researchers. This paper evaluates the performance of the Occupational Health and Safety Assessment Series 18001 specification in certified companies in Iran. The evaluation is based on a comparison of specific criteria and indictors related to occupational health and safety management practices in three certified and three noncertified companies. Findings indicate that the performance of certified companies with respect to occupational health and safety management practices is significantly better than that of noncertified companies. Occupational Health and Safety Assessment Series 18001-certified companies have a better level of occupational health and safety; this supports the argument that Occupational Health and Safety Management Systems play an important strategic role in health and safety in the workplace.

  11. Key Techniques and Risk Management for the Application of the Pile-Beam-Arch (PBA) Excavation Method: A Case Study of the Zhongjie Subway Station

    PubMed Central

    Guan, Yong-ping; Zhao, Wen; Li, Shen-gang; Zhang, Guo-bin

    2014-01-01

    The design and construction of shallow-buried tunnels in densely populated urban areas involve many challenges. The ground movements induced by tunneling effects pose potential risks to infrastructure such as surface buildings, pipelines, and roads. In this paper, a case study of the Zhongjie subway station located in Shenyang, China, is examined to investigate the key construction techniques and the influence of the Pile-Beam-Arch (PBA) excavation method on the surrounding environment. This case study discusses the primary risk factors affecting the environmental safety and summarizes the corresponding risk mitigation measures and key techniques for subway station construction using the PBA excavation method in a densely populated urban area. PMID:25221783

  12. Keys to Successful Diabetes Self-Management for Uninsured Patients: Social Support, Observational Learning, and Turning Points A Safety Net Providers’ Strategic Alliance Study

    PubMed Central

    Hanahan, Melissa A.; Werner, James J.; Tomsik, Phillip; Weirich, Stephen A.; Reichsman, Ann; Navracruz, Lisa; Clemons-Clark, Terri; Cella, Peggi; Terchek, Joshua; Munson, Michelle R.

    2015-01-01

    Objective To determine how medically uninsured patients with limited material resources successfully manage diabetes. Methods Clinicians at 5 safety net practices enrolled uninsured adult patients (N=26) with prior diagnosis of diabetes for 6 months or longer. Patients were interviewed about enabling factors, motivations, resources, and barriers. Chart reviews and clinician surveys supplemented interview data. Interview, survey, and chart review data were analyzed and findings were summarized. Results Two distinct groups of patients were investigated: 1) “successful,” defined as those with an HbA1c of ≤7% or a recent improvement of at least 2% (n=17); and 2) “unsuccessful,” defined as patients with HbA1c of ≥9% (n=9) without recent improvement. In comparison to unsuccessful patients, successful patients more often reported having friends or family with diabetes, sought information about the disease, used evidence-based self-management strategies, held an accurate perception of their own disease control, and experienced “turning point” events that motivated increased efforts in disease management. Conclusions Uninsured safety net patients who successfully managed diabetes learned from friends and family with diabetes and leveraged disease-related events into motivational turning points. It may be beneficial for clinicians to incorporate social learning and motivational enhancement into diabetes interventions to increase patients’ motivation for improved levels of self-management. PMID:21671529

  13. Keys to successful diabetes self-management for uninsured patients: social support, observational learning, and turning points: a safety net providers' strategic alliance study.

    PubMed

    Madden, Melissa Hanahan; Tomsik, Philip; Terchek, Joshua; Navracruz, Lisa; Reichsman, Ann; Clark, Terri Clemons; Cella, Peggi; Weirich, Stephen A; Munson, Michelle R; Werner, James J

    2011-03-01

    To examine how medically uninsured patients who receive health care at federally qualified health centers and free clinics are able to successfully self-manage diabetes compared to patients who are less successful. Two distinct groups of patients with diabetes for 6 months or longer were enrolled: (1) successful, defined as those with glycated hemoglobin (HbA1c) of 7% or less or a recent improvement of at least 2% (n=17); and (2) unsuccessful, defined as patients with HbAlc of at least 9% (n=9) and without recent improvement. Patients were interviewed about enabling factors, motivators, resources, and barriers to diabetes self-management. Data from interviews, chart reviews, and clinician surveys were analyzed using qualitative methods and statistical techniques. African Americans comprised 57.7% of the sample and whites 38.5% (N=26). No significant differences were detected between successful and unsuccessful groups in age, race, education, or employment status. Clinicians rated unsuccessful patients as having more severe diabetes and significantly lower levels of control than successful patients. Compared to unsuccessful patients, successful patients more often reported having friends or family with diabetes, more frequently sought information about the disease, used evidence-based self-management strategies, held more accurate perceptions of their own diabetes control, and experienced "turning point" events that motivated increased efforts in disease management. Patients who successfully managed diabetes learned from diabetic family members and interpreted disease-related events as motivational turning points. It may be beneficial to incorporate social learning and motivational enhancement into diabetes interventions to increase patients' motivation for improved levels of self-management.

  14. Run-length encoding graphic rules, biochemically editable designs and steganographical numeric data embedment for DNA-based cryptographical coding system.

    PubMed

    Kawano, Tomonori

    2013-03-01

    There have been a wide variety of approaches for handling the pieces of DNA as the "unplugged" tools for digital information storage and processing, including a series of studies applied to the security-related area, such as DNA-based digital barcodes, water marks and cryptography. In the present article, novel designs of artificial genes as the media for storing the digitally compressed data for images are proposed for bio-computing purpose while natural genes principally encode for proteins. Furthermore, the proposed system allows cryptographical application of DNA through biochemically editable designs with capacity for steganographical numeric data embedment. As a model case of image-coding DNA technique application, numerically and biochemically combined protocols are employed for ciphering the given "passwords" and/or secret numbers using DNA sequences. The "passwords" of interest were decomposed into single letters and translated into the font image coded on the separate DNA chains with both the coding regions in which the images are encoded based on the novel run-length encoding rule, and the non-coding regions designed for biochemical editing and the remodeling processes revealing the hidden orientation of letters composing the original "passwords." The latter processes require the molecular biological tools for digestion and ligation of the fragmented DNA molecules targeting at the polymerase chain reaction-engineered termini of the chains. Lastly, additional protocols for steganographical overwriting of the numeric data of interests over the image-coding DNA are also discussed.

  15. Revealing of photon-number splitting attack on quantum key distribution system by photon-number resolving devices

    NASA Astrophysics Data System (ADS)

    Gaidash, A. A.; Egorov, V. I.; Gleim, A. V.

    2016-08-01

    Quantum cryptography allows distributing secure keys between two users so that any performed eavesdropping attempt would be immediately discovered. However, in practice an eavesdropper can obtain key information from multi-photon states when attenuated laser radiation is used as a source of quantum states. In order to prevent actions of an eavesdropper, it is generally suggested to implement special cryptographic protocols, like decoy states or SARG04. In this paper, we describe an alternative method based on monitoring photon number statistics after detection. We provide a useful rule of thumb to estimate approximate order of difference of expected distribution and distribution in case of attack. Formula for calculating a minimum value of total pulses or time-gaps to resolve attack is shown. Also formulas for actual fraction of raw key known to Eve were derived. This method can therefore be used with any system and even combining with mentioned special protocols.

  16. Dealing with Diversity: A Key Issue for Educational Management. Proceedings of the ENIRDEM Conference (14th, Brno and Telc, the Czech Republic, September 22-25, 2005)

    ERIC Educational Resources Information Center

    Pol, Milan, Ed.

    2006-01-01

    An anthology of speeches of the 14th conference of the European Network for Improving Research and Development in Educational Management (ENIRDEM), held on 22 to 25 September 2005 in Brno and Telc, the Czech Republic, this book contains 13 contributions by 19 speakers and co-authors, covering various questions related to the topic of diversity in…

  17. 10 CFR 95.18 - Key personnel.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... INFORMATION AND RESTRICTED DATA Physical Security § 95.18 Key personnel. The senior management official and... Clearance. Other key management officials, as determined by the CSA, must be granted an access authorization... organization's policies or practices in the performance of activities involving classified information. This...

  18. Quantum key distribution network for multiple applications

    NASA Astrophysics Data System (ADS)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  19. Providing Cryptographic Security and Evidentiary Chain-of-Custody with the Advanced Forensic Format, Library, and Tools

    DTIC Science & Technology

    2008-08-19

    1 hash of the page page%d sha256 The segment for the SHA256 hash of the page Bad Sector Management: badsectors The number of sectors in the image...written, AFFLIB can automatically compute the page’s MD5, SHA-1, and/or SHA256 hash and write an associated segment containing the hash value. The...are written into segments themselves, with the segment name being name/ sha256 where name is the original segment name sha256 is the hash algorithm used

  20. Directions of management for the development of fuel-and-energy complex as the key driver of the social-and-economic development of regions

    NASA Astrophysics Data System (ADS)

    Mottaeva, Asiiat

    2017-10-01

    The article is dedicated to the problems of the participation of the energy enterprises in the social-and-economic development of the regions and municipalities. The complex of mechanisms of the implementation of the Energy strategy in the form of strategic initiatives of the development of the energy industry representing the complex inter-industry state-private long-term projects is presented in the article. The author considers the development of the energy industry to be the key driver of the social-and-economic development of regions. The author proves, that the increase in competitiveness of Russian energy, geographical and grocery diversification of export and improvement of quality of export products might allow to solve some problems of the development of national economy.

  1. Delay and cost performance analysis of the diffie-hellman key exchange protocol in opportunistic mobile networks

    NASA Astrophysics Data System (ADS)

    Soelistijanto, B.; Muliadi, V.

    2018-03-01

    Diffie-Hellman (DH) provides an efficient key exchange system by reducing the number of cryptographic keys distributed in the network. In this method, a node broadcasts a single public key to all nodes in the network, and in turn each peer uses this key to establish a shared secret key which then can be utilized to encrypt and decrypt traffic between the peer and the given node. In this paper, we evaluate the key transfer delay and cost performance of DH in opportunistic mobile networks, a specific scenario of MANETs where complete end-to-end paths rarely exist between sources and destinations; consequently, the end-to-end delays in these networks are much greater than typical MANETs. Simulation results, driven by a random node movement model and real human mobility traces, showed that DH outperforms a typical key distribution scheme based on the RSA algorithm in terms of key transfer delay, measured by average key convergence time; however, DH performs as well as the benchmark in terms of key transfer cost, evaluated by total key (copies) forwards.

  2. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.

    PubMed

    Guo, Lifeng; Yau, Wei-Chuen

    2015-02-01

    Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.

  3. Key management practices to prevent high infestation levels of Varroa destructor in honey bee colonies at the beginning of the honey yield season.

    PubMed

    Giacobino, Agostina; Molineri, Ana; Bulacio Cagnolo, Natalia; Merke, Julieta; Orellano, Emanuel; Bertozzi, Ezequiel; Masciangelo, Germán; Pietronave, Hernán; Pacini, Adriana; Salto, Cesar; Signorini, Marcelo

    2016-09-01

    Varroa destructor is considered one of the main threats to worldwide apiculture causing a variety of physiological effects at individual and colony level. Also, Varroa mites are often associated with several honey bee viruses presence. Relatively low levels of Varroa during the spring, at the beginning of the honey yield season, can have a significant economic impact on honey production and colony health. Winter treatments against Varroa and certain management practices may delay mite population growth during following spring and summer improving colonies performance during the honey yield season. The aim of this study was to identify risk factors associated with the presence of Varroa destructor in late spring in apiaries from temperate climate. A longitudinal study was carried out in 48 apiaries, randomly selected to evaluate V. destructor infestation level throughout the year. The percentage of infestation with V. destructor was assessed four times during one year and the beekeepers answered a survey concerning all management practices applied in the colonies. We used a generalized linear mixed model to determine association between risk of achieving 2% infestation on adult bees at the beginning of the honey yield season and all potential explanatory variables. The complete dataset was scanned to identify colonies clusters with a higher probability of achieving damage thresholds throughout the year. Colonies that achieved ≥2% of infestation with V. destructor during spring were owned by less experienced beekeepers. Moreover, as Varroa populations increase exponentially during spring and summer, if the spring sampling time is later this growth remains unobserved. Monitoring and winter treatment can be critical for controlling mite population during the honey production cycle. Spatial distribution of colonies with a higher risk of achieving high Varroa levels seems to be better explained by management practices than a geographical condition. Copyright © 2016

  4. Integration of health management and support systems is key to achieving cost reduction and operational concept goals of the 2nd generation reusable launch vehicle

    NASA Astrophysics Data System (ADS)

    Koon, Phillip L.; Greene, Scott

    2002-07-01

    Our aerospace customers are demanding that we drastically reduce the cost of operating and supporting our products. Our space customer in particular is looking for the next generation of reusable launch vehicle systems to support more aircraft like operation. To achieve this goal requires more than an evolution in materials, processes and systems, what is required is a paradigm shift in the design of the launch vehicles and the processing systems that support the launch vehicles. This paper describes the Automated Informed Maintenance System (AIM) we are developing for NASA's Space Launch Initiative (SLI) Second Generation Reusable Launch Vehicle (RLV). Our system includes an Integrated Health Management (IHM) system for the launch vehicles and ground support systems, which features model based diagnostics and prognostics. Health Management data is used by our AIM decision support and process aids to automatically plan maintenance, generate work orders and schedule maintenance activities along with the resources required to execute these processes. Our system will automate the ground processing for a spaceport handling multiple RLVs executing multiple missions. To accomplish this task we are applying the latest web based distributed computing technologies and application development techniques.

  5. Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment

    NASA Astrophysics Data System (ADS)

    Hassan, Waleed K.; Al-Assam, Hisham

    2017-05-01

    The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.

  6. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    PubMed

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  7. Run-length encoding graphic rules, biochemically editable designs and steganographical numeric data embedment for DNA-based cryptographical coding system

    PubMed Central

    Kawano, Tomonori

    2013-01-01

    There have been a wide variety of approaches for handling the pieces of DNA as the “unplugged” tools for digital information storage and processing, including a series of studies applied to the security-related area, such as DNA-based digital barcodes, water marks and cryptography. In the present article, novel designs of artificial genes as the media for storing the digitally compressed data for images are proposed for bio-computing purpose while natural genes principally encode for proteins. Furthermore, the proposed system allows cryptographical application of DNA through biochemically editable designs with capacity for steganographical numeric data embedment. As a model case of image-coding DNA technique application, numerically and biochemically combined protocols are employed for ciphering the given “passwords” and/or secret numbers using DNA sequences. The “passwords” of interest were decomposed into single letters and translated into the font image coded on the separate DNA chains with both the coding regions in which the images are encoded based on the novel run-length encoding rule, and the non-coding regions designed for biochemical editing and the remodeling processes revealing the hidden orientation of letters composing the original “passwords.” The latter processes require the molecular biological tools for digestion and ligation of the fragmented DNA molecules targeting at the polymerase chain reaction-engineered termini of the chains. Lastly, additional protocols for steganographical overwriting of the numeric data of interests over the image-coding DNA are also discussed. PMID:23750303

  8. Understanding the heterogeneity in volume overload and fluid distribution in decompensated heart failure is key to optimal volume management: role for blood volume quantitation.

    PubMed

    Miller, Wayne L; Mullan, Brian P

    2014-06-01

    This study sought to quantitate total blood volume (TBV) in patients hospitalized for decompensated chronic heart failure (DCHF) and to determine the extent of volume overload, and the magnitude and distribution of blood volume and body water changes following diuretic therapy. The accurate assessment and management of volume overload in patients with DCHF remains problematic. TBV was measured by a radiolabeled-albumin dilution technique with intravascular volume, pre-to-post-diuretic therapy, evaluated at hospital admission and at discharge. Change in body weight in relation to quantitated TBV was used to determine interstitial volume contribution to total fluid loss. Twenty-six patients were prospectively evaluated. Two patients had normal TBV at admission. Twenty-four patients were hypervolemic with TBV (7.4 ± 1.6 liters) increased by +39 ± 22% (range, +9.5% to +107%) above the expected normal volume. With diuresis, TBV decreased marginally (+30 ± 16%). Body weight declined by 6.9 ± 5.2 kg, and fluid intake/fluid output was a net negative 8.4 ± 5.2 liters. Interstitial compartment fluid loss was calculated at 6.2 ± 4.0 liters, accounting for 85 ± 15% of the total fluid reduction. TBV analysis demonstrated a wide range in the extent of intravascular overload. Dismissal measurements revealed marginally reduced intravascular volume post-diuretic therapy despite large reductions in body weight. Mobilization of interstitial fluid to the intravascular compartment with diuresis accounted for this disparity. Intravascular volume, however, remained increased at dismissal. The extent, composition, and distribution of volume overload are highly variable in DCHF, and this variability needs to be taken into account in the approach to individualized therapy. TBV quantitation, particularly serial measurements, can facilitate informed volume management with respect to a goal of treating to euvolemia. Copyright © 2014 American College of Cardiology Foundation. Published

  9. Public Key Cryptography.

    ERIC Educational Resources Information Center

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  10. Establishing Key Performance Indicators [KPIs] and Their Importance for the Surgical Management of Inflammatory Bowel Disease-Results From a Pan-European, Delphi Consensus Study.

    PubMed

    Morar, Pritesh S; Hollingshead, James; Bemelman, Willem; Sevdalis, Nick; Pinkney, Thomas; Wilson, Graeme; Dunlop, Malcolm; Davies, R Justin; Guy, Richard; Fearnhead, Nicola; Brown, Steven; Warusavitarne, Janindra; Edwards, Cathryn; Faiz, Omar

    2017-10-27

    Key performance indicators [KPIs] exist across a range of areas in medicine. They help to monitor outcomes, reduce variation, and drive up standards across services. KPIs exist for inflammatory bowel disease [IBD] care, but none specifically cover inflammatory bowel disease [IBD] surgical service provision. This was a consensus-based study using a panel of expert IBD clinicians from across Europe. Items were developed and fed through a Delphi process to achieve consensus. Items were ranked on a Likert scale from 1 [not important] to 5 [very important]. Consensus was defined when the inter quartile range was ≤ 1, and items with a median score > 3 were considered for inclusion. A panel of 21 experts [14 surgeons and 7 gastroenterologists] was recruited. Consensus was achieved on procedure-specific KPIs for ileocaecal and perianal surgery for Crohn's disease, [N = 10] with themes relating to morbidity [N = 7], multidisciplinary input [N = 2], and quality of life [N = 1]; and for subtotal colectomy, proctocolectomy and ileoanal pouch surgery for ulcerative colitis [N = 11], with themes relating to mortality [N = 2], morbidity [N = 8], and service provision [N = 1]. Consensus was also achieved for measures of the quality of IBD surgical service provision and quality assurance in IBD surgery. This study has provided measurable KPIs for the provision of surgical services in IBD. These indicators cover IBD surgery in general, the governance and structures of the surgical services, and separate indicators for specific subareas of surgery. Monitoring of IBD services with these KPIs may reduce variation across services and improve quality. Copyright © 2017 European Crohn’s and Colitis Organisation (ECCO). Published by Oxford University Press. All rights reserved. For permissions, please email: journals.permissions@oup.com

  11. Integrating biology into invasive species management is a key principle for eradication success: the case of yellow crazy ant Anoplolepis gracilipes in northern Australia.

    PubMed

    Hoffmann, B D

    2015-04-01

    The lack of biological knowledge of many invasive species remains as one of the greatest impediments to their management. Here I detail targeted research into the biology of the yellow crazy ant Anoplolepis gracilipes within northern Australia and detail how such knowledge can be used to improve the management outcomes for this species. I quantified nest location and density in three habitats, worker activity over 24 h, infestation expansion rate, seasonal variation of worker abundance and the timing of production of sexuals. Nests were predominantly (up to 68%) located at the bases of large trees, indicating that search efforts should focus around tree bases. Nest density was one nest per 22, 7.1 and 6.3 m2 in the three habitats, respectively. These data form the baselines for quantifying treatment efficacy and set sampling densities for post-treatment assessments. Most (60%) nests were underground, predominantly (89%) occurring in an open area rather than underneath a rock or log. Some seasonality was evident for nests within leaf litter, with most (83%) occurring during the 'wet season' (October-March). Of the underground nests, most were shallow, with 44% being less than 10 cm deep, and 67% being less than 20 cm deep. Such nest location and density information serves many management purposes, for improving detection, mapping and post-treatment assessments, and also provided strong evidence that carbohydrate supply was a major driver of A. gracilipes populations. Just over half of the nests (56%) contained queens. Of the 62 underground nests containing queens, most queens (80%) were located at the deepest chamber. When queens were present, most often (38%) only one queen was present, the most being 16. Queen number per nest was the lowest in July and August just prior to the emergence of virgin queens in September, with queen numbers then remaining steadily high until April. Nothing is known for any ant species about how the queen number per nest/colony affects

  12. Keys to Scholarship

    ERIC Educational Resources Information Center

    Hebert, Terri

    2011-01-01

    Up ahead, a foreboding wooden door showing wear from passage of earlier travelers is spotted. As the old porch light emits a pale yellow glow, a key ring emerges from deep inside the coat pocket. Searching for just the right key, the voyager settles on one that also shows age. As the key enters its receptacle and begins to turn, a clicking noise…

  13. Work Keys USA.

    ERIC Educational Resources Information Center

    Work Keys USA, 1998

    1998-01-01

    "Work Keys" is a comprehensive program for assessing and teaching workplace skills. This serial "special issue" features 18 first-hand reports on Work Keys projects in action in states across North America. They show how the Work Keys is helping businesses and educators solve the challenge of building a world-class work force.…

  14. Type 2 diabetes mellitus in older people: a brief statement of key principles of modern day management including the assessment of frailty. A national collaborative stakeholder initiative.

    PubMed

    Strain, W D; Hope, S V; Green, A; Kar, P; Valabhji, J; Sinclair, A J

    2018-04-07

    Rates of population ageing are unprecedented and this, combined with the progressive urbanization of lifestyles, has led to a dramatic shift in the epidemiology of diabetes towards old age, particularly to those aged 60-79 years. Both ageing and diabetes are recognized as important risk factors for the development of functional decline and disability. In addition, diabetes is associated with a high economic, social and health burden. Traditional macrovascular and microvascular complications of diabetes appear to account for less than half of the diabetes-related disability observed in older people. Despite this, older adults are under-represented in clinical trials. Guidelines from organizations such as the National Institute for Health and Care Excellence (NICE), the European Association for the Study of Diabetes, and the American Diabetes Association acknowledge the need for individualized care, but the glycaemic targets that are suggested to constitute good control [HbA 1c 53-59 mmol/mol (7-7.5%)] are too tight for frail older individuals. We present a framework for the assessment of older adults and guidelines for the management of this population according to their frailty status, with the intention of reducing complications and improving quality of life for these people. © 2018 The Authors. Diabetic Medicine published by John Wiley & Sons Ltd on behalf of Diabetes UK.

  15. Definition of the key target volume in radiosurgical management of arteriovenous malformations: a new dynamic concept based on angiographic circulation time.

    PubMed

    Valle, Ramiro Del; Zenteno, Marco; Jaramillo, José; Lee, Angel; De Anda, Salvador

    2008-12-01

    The cumulative experience worldwide indicates complete radiosurgical obliteration rates of brain arteriovenous malformations (AVMs) ranging from 35 to 90%. The purpose of this study was to propose a strategy to increase the obliteration rate for AVMs through the dynamic definition of the key target volume (KTV). A prospective series of patients harboring an AVM was assessed using digital subtraction angiography in which a digital counter was used to measure the several stages of the frame-by-frame circulation time. All the patients were analyzed using dynamic measurement planning to define the KTV, corresponding to the volume of the shunt with the least vascular resistance and the earliest venous drainage. All patients underwent catheter-based angiography, a subgroup was additionally assessed by means of a superselective catheterization, and among these a further subgroup received embolization. The shunts were also categorized according to their angioarchitectural type: fistulous, plexiform, or mixed. The authors applied the radiosurgery-based grading system (RBGS) as well to find a correlation with the obliteration rate. This series includes 44 patients treated by radiosurgery; global angiography was performed for all patients, including dynamic measurement planning. Eighty-four percent of them underwent superselective catheterization, and 50% of the total population underwent embolization. In the embolized arm of the study, the pretreatment volume was up to 120 ml. In patients with a single treatment, the mean volume was 8.5 ml, and the median volume was 6.95 +/- 4.56 ml (mean +/- standard deviation), with a KTV of up to 15 ml. For prospectively staged radiosurgery, the mean KTV was 28 ml. The marginal radiation dose was 18-22 Gy, with a mean of dose 20 Gy. The mean RBGS score was 1.70. The overall obliteration rate was 91%, including the repeated radiosurgery group (4 patients), in which 100% showed complete obliteration. The overall permanent deficit was 2 of

  16. Planktonic stages of small pelagic fishes (Sardinella aurita and Engraulis encrasicolus) in the central Mediterranean Sea: The key role of physical forcings and implications for fisheries management

    NASA Astrophysics Data System (ADS)

    Torri, Marco; Corrado, Raffaele; Falcini, Federico; Cuttitta, Angela; Palatella, Luigi; Lacorata, Guglielmo; Patti, Bernardo; Arculeo, Marco; Mifsud, Roberta; Mazzola, Salvatore; Santoleri, Rosalia

    2018-03-01

    Multidisciplinary studies are recently aiming to define diagnostic tools for fishery sustainability by coupling ichthyoplanktonic datasets, physical and bio-geochemical oceanographic measurements, and ocean modelling. The main goal of these efforts is to understand those processes that control the dispersion and fate of fish larvae and eggs, and thus tuning the inter-annual variability of the biomass of small pelagic fish species. In this paper we analyse the distribution of eggs and larvae as well as the biological features of the two species of pelagic fish, Engraulis encrasicolus and Sardinella aurita in the north-eastern sector of the Sicily Channel (Mediterranean Sea) from ichthyoplanktonic data collected during the 2010 and 2011 summer cruises. We use Lagrangian simulations and satellite data (i.e., sea surface temperature, wind, and chlorophyll-a concentration) to recognize the main oceanographic patterns that mark eggs and larvae transport processes. We provide a mechanistic explanation of a cross-shore transport process by using a potential vorticity (PV) model that takes into account the role of wind stress in generating cold filaments. Our results show that the strong offshore transport towards Malta occurred in 2010 was likely due to a persistent Mistral wind forcing that generated high-PV cold filaments. This phenomenon was not found in the 2011 analysis, which indeed showed an along-shore transport towards the retention area of Capo Passero. Since, for the first time, we describe the spatial distribution of the early life stage of Sardinella aurita in the northern part of the Sicily Channel and we clarify the link between the ocean dynamics and the fate of small pelagic fish larvae, this work provides a useful, diagnostic tool for the sustainable management of fishery resources.

  17. Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach

    NASA Astrophysics Data System (ADS)

    Naik, R. Lalu; Reddy, P. Chenna

    2015-12-01

    The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they are unconditionally secure. Quantum key distribution protocols can effectively prevent various attacks in the quantum channel, while classical cryptography is efficient in authentication and verification of secret keys. By combining both quantum cryptography and classical cryptography, security of communications over networks can be leveraged. Hwang, Lee and Li exploited the merits of both cryptographic paradigms for provably secure communications to prevent replay, man-in-the-middle, and passive attacks. In this paper, we propose a new scheme with the combination of quantum cryptography and classical cryptography for 802.11i wireless LANs. Since quantum cryptography is premature in wireless networks, our work is a significant step forward toward securing communications in wireless networks. Our scheme is known as hybrid quantum key distribution protocol. Our analytical results revealed that the proposed scheme is provably secure for wireless networks.

  18. Provably secure and high-rate quantum key distribution with time-bin qudits

    DOE PAGES

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; ...

    2017-11-24

    The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. Wemore » use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. In conclusion, the security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.« less

  19. Provably secure and high-rate quantum key distribution with time-bin qudits

    PubMed Central

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.

    2017-01-01

    The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. We use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. The security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system. PMID:29202028

  20. Provably secure and high-rate quantum key distribution with time-bin qudits.

    PubMed

    Islam, Nurul T; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J

    2017-11-01

    The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. We use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. The security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.

  1. Provably secure and high-rate quantum key distribution with time-bin qudits

    SciTech Connect

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton

    The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. Wemore » use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. In conclusion, the security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.« less

  2. A new method for generating an invariant iris private key based on the fuzzy vault system.

    PubMed

    Lee, Youn Joo; Park, Kang Ryoung; Lee, Sung Joo; Bae, Kwanghyuk; Kim, Jaihie

    2008-10-01

    Cryptographic systems have been widely used in many information security applications. One main challenge that these systems have faced has been how to protect private keys from attackers. Recently, biometric cryptosystems have been introduced as a reliable way of concealing private keys by using biometric data. A fuzzy vault refers to a biometric cryptosystem that can be used to effectively protect private keys and to release them only when legitimate users enter their biometric data. In biometric systems, a critical problem is storing biometric templates in a database. However, fuzzy vault systems do not need to directly store these templates since they are combined with private keys by using cryptography. Previous fuzzy vault systems were designed by using fingerprint, face, and so on. However, there has been no attempt to implement a fuzzy vault system that used an iris. In biometric applications, it is widely known that an iris can discriminate between persons better than other biometric modalities. In this paper, we propose a reliable fuzzy vault system based on local iris features. We extracted multiple iris features from multiple local regions in a given iris image, and the exact values of the unordered set were then produced using the clustering method. To align the iris templates with the new input iris data, a shift-matching technique was applied. Experimental results showed that 128-bit private keys were securely and robustly generated by using any given iris data without requiring prealignment.

  3. Quantum dense key distribution

    SciTech Connect

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.

    2004-03-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  4. UK national audit against the key performance indicators in the British Association for Sexual Health and HIV Medical Foundation for AIDS and Sexual Health Sexually Transmitted Infections Management Standards.

    PubMed

    McClean, H; Sullivan, A K; Carne, C A; Warwick, Z; Menon-Johansson, A; Clutterbuck, D

    2012-10-01

    A national audit of practice performance against the key performance indicators in the British Association for Sexual Health and HIV (BASHH) and HIV Medical Foundation for AIDS Sexual Health Standards for the Management of Sexually Transmitted Infections (STIs) was conducted in 2011. Approximately 60% and 8% of level 3 and level 2 services, respectively, participated. Excluding partner notification performance, the five lowest areas of performance for level 3 clinics were the STI/HIV risk assessment, care pathways linking care in level 2 clinics to local level 3 services, HIV test offer to patients with concern about STIs, information governance and receipt of chlamydial test results by clinicians within seven working days (the worst area of performance). The five lowest areas of performance for level 2 clinics were participating in audit, having an audit plan for the management of STIs for 2009-2010, the STI/HIV risk assessment, HIV test offer to patients with concern about STIs and information governance. The results are discussed with regard to the importance of adoption of the standards by commissioners of services because of their relevance to other national quality assurance drivers, and the need for development of a national system of STI management quality assurance measurement and reporting.

  5. Mechanical Verification of Cryptographic Protocols

    NASA Astrophysics Data System (ADS)

    Cheng, Xiaochun; Ma, Xiaoqi; Huang, Scott C.-H.; Cheng, Maggie

    Information security is playing an increasingly important role in modern society, driven especially by the uptake of the Internet for information transfer. Large amount of information is transmitted everyday through the Internet, which is often the target of malicious attacks. In certain areas, this issue is vital. For example, military departments of governments often transmit a great amount of top-secret data, which, if divulged, could become a huge threat to the public and to national security. Even in our daily life, it is also necessary to protect information. Consider e-commerce systems as an example. No one is willing to purchase anything over the Internet before being assured that all their personal and financial information will always be kept secure and will never be leaked to any unauthorised person or organisation.

  6. Probability Distributions over Cryptographic Protocols

    DTIC Science & Technology

    2009-06-01

    Artificial Immune Algorithm . . . . . . . . . . . . . . . . . . . 9 3 Design Decisions 11 3.1 Common Ground...creation algorithm for unbounded distribution . . . . . . . 24 4.2 Message creation algorithm for unbounded naive distribution . . . . 24 4.3 Protocol...creation algorithm for intended-run distributions . . . . . . 26 4.4 Protocol and message creation algorithm for realistic distribution . . 32 ix THIS

  7. Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Lederer, Christian; Mader, Roland; Koschuch, Manuel; Großschädl, Johann; Szekely, Alexander; Tillich, Stefan

    Wireless Sensor Networks (WSNs) are playing a vital role in an ever-growing number of applications ranging from environmental surveillance over medical monitoring to home automation. Since WSNs are often deployed in unattended or even hostile environments, they can be subject to various malicious attacks, including the manipulation and capture of nodes. The establishment of a shared secret key between two or more individual nodes is one of the most important security services needed to guarantee the proper functioning of a sensor network. Despite some recent advances in this field, the efficient implementation of cryptographic key establishment for WSNs remains a challenge due to the resource constraints of small sensor nodes such as the MICAz mote. In this paper we present a lightweight implementation of the elliptic curve Diffie-Hellman (ECDH) key exchange for ZigBee-compliant sensor nodes equipped with an ATmega128 processor running the TinyOS operating system. Our implementation uses a 192-bit prime field specified by the NIST as underlying algebraic structure and requires only 5.20 ·106 clock cycles to compute a scalar multiplication if the base point is fixed and known a priori. A scalar multiplication using a random base point takes about 12.33 ·106 cycles. Our results show that a full ECDH key exchange between two MICAz motes consumes an energy of 57.33 mJ (including radio communication), which is significantly better than most previously reported ECDH implementations on comparable platforms.

  8. Optical key system

    SciTech Connect

    Hagans, K.G.; Clough, R.E.

    2000-04-25

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam ofmore » light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.« less

  9. Optical key system

    DOEpatents

    Hagans, Karla G.; Clough, Robert E.

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  10. Seizure classification key to epilepsy management.

    PubMed

    Davidson, Louise; Derry, Chris

    2015-09-01

    The diagnosis of epilepsy carries significant implications for physical, psychosocial and financial wellbeing as well as a small but significant increased risk of mortality. The diagnosis is often incorrect, potentially in up to 20% of cases, so should be revisited if seizures are not responding to treatment. Evidence indicates that misdiagnosis is significantly more common among nonspecialists. SIGN recommends that the diagnosis of epilepsy should be made by an epilepsy specialist, ideally in the setting of a dedicated first seizure or epilepsy clinic. An incorrect diagnosis of epilepsy can be harmful. There is an exhaustive list of epilepsy mimics that can result in misdiagnosis and expose patients to unnecessary treatment with antiepileptic drugs. Diagnosis relies primarily on the history. Investigations can support the diagnosis but cannot make it in isolation, and negative investigation findings are common in epilepsy. Brain imaging will be undertaken in most patients with epilepsy, but is not routinely required in those with a definite diagnosis of genetic generalised epilepsy. The EEG has limitations and can sometimes cloud rather than clarify the diagnostic picture. Distinguishing between a genetic generalised epilepsy and a focal epilepsy is vital as this influences investigation, treatment and prognosis. Generally medication should not be started following a single seizure except in specific circumstances or in cases where the risk of recurrence is high.

  11. Extension Has Key Role in "Pest" Management

    ERIC Educational Resources Information Center

    Bay, Ovid

    1972-01-01

    This article describes the Department of Agriculture's new program which provides a combination of biological and cultural pest control techniques in combination with chemicals, as well as long-range pest control research. (Author/JB)

  12. Electronic Strategies To Manage Key Relationships.

    ERIC Educational Resources Information Center

    Carr, Nora

    2003-01-01

    Describes how Charlotte-Mecklenburg (North Carolina) district used a relational database, e-mail, electronic newsletters, cable television, telecommunications, and the Internet to enhance communications with their constituencies. (PKP)

  13. Key Concept Mathematics and Management Science Models

    ERIC Educational Resources Information Center

    Macbeth, Thomas G.; Dery, George C.

    1973-01-01

    The presentation of topics in calculus and matrix algebra to second semester freshmen along with a treatment of exponential and power functions would permit them to cope with a significant portion of the mathematical concepts that comprise the essence of several disciplines in a business school curriculum. (Author)

  14. Classroom Organization: A Key to Successful Management.

    ERIC Educational Resources Information Center

    Guernsey, Marsha A.

    1989-01-01

    Suggestions are presented to increase the special education teacher's organizational efficiency, focusing on instructional planning and use of time and space as they relate to classroom organization. (JDD)

  15. Managing Technological Change: The Process is Key

    DTIC Science & Technology

    1989-01-01

    research results. The RAND Note reports other outputs of sponsored research for general distri- bution. Publications of The RAND Corporation do not...necessarily reflect the opinions or policies of the sponsors of RAND research. Published by The RAND Corporation 1700 Main Street, P.O. Box 2138, Santa...Procedures in Office Settings: Influences and Outcomes, The RAND Corporation , R-3077-NSF/IRIS, October 1987. Bikson, T.K., C. Stasz, and D. A. Mankin, Computer

  16. [Key informers. When and How?].

    PubMed

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  17. Key papers in prostate cancer.

    PubMed

    Rodney, Simon; Shah, Taimur Tariq; Patel, Hitendra R H; Arya, Manit

    2014-11-01

    Prostate cancer is the most common cancer and second leading cause of death in men. The evidence base for the diagnosis and treatment of prostate cancer is continually changing. We aim to review and discuss past and contemporary papers on these topics to provoke debate and highlight key dilemmas faced by the urological community. We review key papers on prostate-specific antigen screening, radical prostatectomy versus surveillance strategies, targeted therapies, timing of radiotherapy and alternative anti-androgen therapeutics. Previously, the majority of patients, irrespective of risk, underwent radical open surgical procedures associated with considerable morbidity and mortality. Evidence is emerging that not all prostate cancers are alike and that low-grade disease can be safely managed by surveillance strategies and localized treatment to the prostate. The question remains as to how to accurately stage the disease and ultimately choose which treatment pathway to follow.

  18. Key drivers of airline loyalty.

    PubMed

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  19. Key drivers of airline loyalty

    PubMed Central

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-01-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty. PMID:27064618

  20. Employee Spotlight: Baris Key

    SciTech Connect

    Key, Baris

    2014-05-29

    Baris Key, an employee at Argonne National Laboratory, discusses the importance of national lab researchers and how they merge basic science, analyze and process in a way that the industry can benefit from.

  1. Employee Spotlight: Baris Key

    ScienceCinema

    Key, Baris

    2018-04-16

    Baris Key, an employee at Argonne National Laboratory, discusses the importance of national lab researchers and how they merge basic science, analyze and process in a way that the industry can benefit from.

  2. Secret Key Crypto Implementations

    NASA Astrophysics Data System (ADS)

    Bertoni, Guido Marco; Melzani, Filippo

    This chapter presents the algorithm selected in 2001 as the Advanced Encryption Standard. This algorithm is the base for implementing security and privacy based on symmetric key solutions in almost all new applications. Secret key algorithms are used in combination with modes of operation to provide different security properties. The most used modes of operation are presented in this chapter. Finally an overview of the different techniques of software and hardware implementations is given.

  3. Experimental quantum key distribution with simulated ground-to-satellite photon losses and processing limitations

    NASA Astrophysics Data System (ADS)

    Bourgoin, Jean-Philippe; Gigov, Nikolay; Higgins, Brendon L.; Yan, Zhizhong; Meyer-Scott, Evan; Khandani, Amir K.; Lütkenhaus, Norbert; Jennewein, Thomas

    2015-11-01

    Quantum key distribution (QKD) has the potential to improve communications security by offering cryptographic keys whose security relies on the fundamental properties of quantum physics. The use of a trusted quantum receiver on an orbiting satellite is the most practical near-term solution to the challenge of achieving long-distance (global-scale) QKD, currently limited to a few hundred kilometers on the ground. This scenario presents unique challenges, such as high photon losses and restricted classical data transmission and processing power due to the limitations of a typical satellite platform. Here we demonstrate the feasibility of such a system by implementing a QKD protocol, with optical transmission and full post-processing, in the high-loss regime using minimized computing hardware at the receiver. Employing weak coherent pulses with decoy states, we demonstrate the production of secure key bits at up to 56.5 dB of photon loss. We further illustrate the feasibility of a satellite uplink by generating a secure key while experimentally emulating the varying losses predicted for realistic low-Earth-orbit satellite passes at 600 km altitude. With a 76 MHz source and including finite-size analysis, we extract 3374 bits of a secure key from the best pass. We also illustrate the potential benefit of combining multiple passes together: while one suboptimal "upper-quartile" pass produces no finite-sized key with our source, the combination of three such passes allows us to extract 165 bits of a secure key. Alternatively, we find that by increasing the signal rate to 300 MHz it would be possible to extract 21 570 bits of a secure finite-sized key in just a single upper-quartile pass.

  4. Buffer management to solve bed-blocking in the Netherlands 2000–2010. Cooperation from an integrated care chain perspective as a key success factor for managing patient flows

    PubMed Central

    Mur-Veeman, Ingrid; Govers, Mark

    2011-01-01

    Introduction Bed-blocking problems in hospitals reflect how difficult and complex it is to move patients smoothly through the chain of care. In the Netherlands, during the first decade of the 21st century, some hospitals attempted to tackle this problem by using an Intermediate Care Department (ICD) as a buffer for bed-blockers. However, research has shown that ICDs do not sufficiently solve the bed-blocking problem and that bed-blocking is often caused by a lack of buffer management. Tool Buffer management (BM) is a tool that endeavors to balance patient flow in the hospital to nursing home chain of care. Results Additional research has indicated that the absence of BM is not the result of providers’ thinking that BM is unnecessary, unethical or impossible because of unpredictable patient flows. Instead, BM is hampered by a lack of cooperation between care providers. Conclusion Although stakeholders recognize that cooperation is imperative, they often fail to take the actions necessary to realize cooperation. Our assumption is that this lack of willingness and ability to cooperate is the result of several impeding conditions as well as stakeholders’ perceptions of these conditions and the persistence of their current routines, principles and beliefs (RPBs). Discussion We recommend simultaneously working on improving the conditions and changing stakeholders’ perceptions and RPBs. PMID:21954373

  5. Information management

    NASA Technical Reports Server (NTRS)

    Ricks, Wendell; Corker, Kevin

    1990-01-01

    Primary Flight Display (PFD) information management and cockpit display of information management research is presented in viewgraph form. The information management problem in the cockpit, information management burdens, the key characteristics of an information manager, the interface management system handling the flow of information and the dialogs between the system and the pilot, and overall system architecture are covered.

  6. Function key and shortcut key use in airway facilities.

    DOT National Transportation Integrated Search

    2003-02-01

    This document provides information on the function keys and shortcut keys used by systems in the Federal Aviation Administration : Airway Facilities (AF) work environment. It includes a catalog of the function keys and shortcut keys used by each syst...

  7. Attacks on quantum key distribution protocols that employ non-ITS authentication

    NASA Astrophysics Data System (ADS)

    Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.

    2016-01-01

    We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

  8. LACIE analyst interpretation keys

    NASA Technical Reports Server (NTRS)

    Baron, J. G.; Payne, R. W.; Palmer, W. F. (Principal Investigator)

    1979-01-01

    Two interpretation aids, 'The Image Analysis Guide for Wheat/Small Grains Inventories' and 'The United States and Canadian Great Plains Regional Keys', were developed during LACIE phase 2 and implemented during phase 3 in order to provide analysts with a better understanding of the expected ranges in color variation of signatures for individual biostages and of the temporal sequences of LANDSAT signatures. The keys were tested using operational LACIE data, and the results demonstrate that their use provides improved labeling accuracy in all analyst experience groupings, in all geographic areas within the U.S. Great Plains, and during all periods of crop development.

  9. Comparison is key.

    PubMed

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  10. Key Competencies. Second Edition.

    ERIC Educational Resources Information Center

    Haworth, David; Browne, Geoff

    Key competencies (or generic skills) have been specified in four sources: Further Education Unit (FEU), United Kingdom (1987); Finn Report (1991) and Mayer Committee (1992), Australia; U.S. Labor Secretary's Commission on Achieving Necessary Skills (SCANS) (June 1991); and Butterworth and Lovell (1983), New South Wales. A comparison of the four…

  11. Public Key Infrastructure Study

    DTIC Science & Technology

    1994-04-01

    commerce. This Public Key Infrastructure (PKI) study focuses on the United States Federal Government operations, but also addresses national and global ... issues in order to facilitate the interoperation of protected electronic commerce among the various levels of government in the U.S., private citizens

  12. Efficacy of Soybean’s Event DAS-81419-2 Expressing Cry1F and Cry1Ac to Manage Key Tropical Lepidopteran Pests Under Field Conditions in Brazil

    PubMed Central

    Marques, L H; Castro, B A; Rossetto, J; Silva, O A B N; Moscardini, V F; Zobiole, L H S; Santos, A C; Valverde-Garcia, P; Babcock, J M; Rule, D M; Fernandes, O A

    2016-01-01

    Abstract Bacillus thuringiensis (Bt) event DAS-81419-2 (Conkesta technology) in soybean, Glycine max (L.) Merrill, expresses Cry1F and Cry1Ac proteins to provide protection from feeding by several lepidopteran pests. A total of 27 field experiments across nine locations were conducted from 2011 to 2015 in southern and central Brazil to characterize the efficacy of DAS-81419-2 soybean infested with Anticarsia gemmatalis Hübner (Lepidoptera: Erebidae), Chrysodeixis includens (Walker) (Lepidoptera: Noctuidae), Heliothis virescens (F.) (Lepidoptera: Noctuidae), and Spodoptera cosmioides (Walker) (Lepidoptera: Noctuidae) during vegetative (V4) and reproductive (R2 and R4) crop developmental stages. The efficacy of DAS-81419-2 was compared to that of a non-Bt isogenic variety managed with or without applications of commercial foliar insecticides for lepidopteran control. DAS-81419-2 soybean consistently experienced defoliation levels of 0.5% or less (compared with 20.05–56.74% in the non-Bt, nonsprayed treatment) and larval survival of < 0.1% in all four species across the vegetative and reproductive plant stages evaluated. The efficacy of DAS-81419-2 was significantly higher than commercial foliar insecticides applied to the non-Bt variety. DAS-81419-2 soybeans containing two highly effective Bt proteins are expected to be a more robust IRM tool compared to single-trait Bt technologies. The consistent efficacy of DAS-81419-2 soybeans across years, locations, and crop stages suggests that it will be a valuable product for management of hard-to-control key lepidopteran pests in South American soybean production. PMID:27401112

  13. Chapter 06: Identification key

    Treesearch

    Alex Wiedenhoeft

    2011-01-01

    The key is written to guide you through the identification process in the most efficient and accurate way possible. It presents you with a numbered series of questions and asks you to answer them. The answers you provide will be based on your interpretations of the anatomical characters in your unknown specimen and will lead you to a new set of questions. Each time you...

  14. Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Hughes, Richard

    2004-05-01

    Quantum key distribution (QKD) uses single-photon communications to generate the shared, secret random number sequences that are used to encrypt and decrypt secret communications. The unconditional security of QKD is based on the interplay between fundamental principles of quantum physics and information theory. An adversary can neither successfully tap the transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). QKD could be particularly attractive for free-space optical communications, both ground-based and for satellites. I will describe a QKD experiment performed over multi-kilometer line-of-sight paths, which serves as a model for a satellite-to-ground key distribution system. The system uses single-photon polarization states, without active polarization switching, and for the first time implements the complete BB84 QKD protocol including, reconciliation, privacy amplification and the all-important authentication stage. It is capable of continuous operation throughout the day and night, achieving the self-sustaining production of error-free, shared, secret bits. I will also report on the results of satellite-to-ground QKD modeling.

  15. DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation.

    PubMed

    Kalsi, Shruti; Kaur, Harleen; Chang, Victor

    2017-12-05

    Cryptography is not only a science of applying complex mathematics and logic to design strong methods to hide data called as encryption, but also to retrieve the original data back, called decryption. The purpose of cryptography is to transmit a message between a sender and receiver such that an eavesdropper is unable to comprehend it. To accomplish this, not only we need a strong algorithm, but a strong key and a strong concept for encryption and decryption process. We have introduced a concept of DNA Deep Learning Cryptography which is defined as a technique of concealing data in terms of DNA sequence and deep learning. In the cryptographic technique, each alphabet of a letter is converted into a different combination of the four bases, namely; Adenine (A), Cytosine (C), Guanine (G) and Thymine (T), which make up the human deoxyribonucleic acid (DNA). Actual implementations with the DNA don't exceed laboratory level and are expensive. To bring DNA computing on a digital level, easy and effective algorithms are proposed in this paper. In proposed work we have introduced firstly, a method and its implementation for key generation based on the theory of natural selection using Genetic Algorithm with Needleman-Wunsch (NW) algorithm and Secondly, a method for implementation of encryption and decryption based on DNA computing using biological operations Transcription, Translation, DNA Sequencing and Deep Learning.

  16. Scientific independence: A key to credibility

    Treesearch

    Leonard F. Ruggiero

    2007-01-01

    Independence and objectivity are key ingredients of scientific credibility, especially in research organizations that are part of a natural resource management agency like the Forest Service. Credibility, in turn, is essential to the utility of scientific information in socio-political processes. In order to develop this thesis further, a basic understanding of Forest...

  17. Key Skills Portfolio Assessment: Good Practice Guide

    ERIC Educational Resources Information Center

    Rolfe, Martin; Wilson, Lorraine

    2007-01-01

    This guide offers advice and guidance to key skills managers, coordinators and other practitioners who are responsible for ensuring that the standards of portfolio assessment in their center are consistent across the center and with national standards. It describes and offers advice and guidance on the stages of assessment and internal moderation…

  18. A Key to the New Library.

    ERIC Educational Resources Information Center

    Gerryts, Egbert; Pienaar, Heila

    This paper discusses finding the key to a new library in order to ensure its future, stressing the importance of alignment between strategy and people. The first section addresses management philosophy for renewal, including replacing the inflexible hierarchical pyramidal structure by a network organization with a service and competency management…

  19. Key Data on Education in Europe 2012

    ERIC Educational Resources Information Center

    Ranguelov, Stanislav; De Coster, Isabelle; Norani, Sogol; Paolini, Giulia

    2012-01-01

    Key Data on Education in Europe 2012 is a Eurydice flagship publication tracing the main developments of European education systems over the last decade. The report combines statistical data with qualitative information to describe the organisation, management and functioning of 37 European education systems from pre-primary to higher education.…

  20. SSME Key Operations Demonstration

    NASA Technical Reports Server (NTRS)

    Anderson, Brian; Bradley, Michael; Ives, Janet

    1997-01-01

    A Space Shuttle Main Engine (SSME) test program was conducted between August 1995 and May 1996 using the Technology Test Bed (TTB) Engine. SSTO vehicle studies have indicated that increases in the propulsion system operating range can save significant weight and cost at the vehicle level. This test program demonstrated the ability of the SSME to accommodate a wide variation in safe operating ranges and therefore its applicability to the SSTO mission. A total of eight tests were completed with four at Marshall Space Flight Center's Advanced Engine Test Facility and four at the Stennis Space Center (SSC) A-2 attitude test stand. Key demonstration objectives were: 1) Mainstage operation at 5.4 to 6.9 mixture ratio; 2) Nominal engine start with significantly reduced engine inlet pressures of 50 psia LOX and 38 psia fuel; and 3) Low power level operation at 17%, 22%, 27%, 40%, 45%, and 50% of Rated Power Level. Use of the highly instrumented TTB engine for this test series has afforded the opportunity to study in great detail engine system operation not possible with a standard SSME and has significantly contributed to a greater understanding of the capabilities of the SSME and liquid rocket engines in general.

  1. Extending key sharing: how to generate a key tightly coupled to a network security policy

    NASA Astrophysics Data System (ADS)

    Kazantzidis, Matheos

    2006-04-01

    Current state of the art security policy technologies, besides the small scale limitation and largely manual nature of accompanied management methods, are lacking a) in real-timeliness of policy implementation and b) vulnerabilities and inflexibility stemming from the centralized policy decision making; even if, for example, a policy description or access control database is distributed, the actual decision is often a centralized action and forms a system single point of failure. In this paper we are presenting a new fundamental concept that allows implement a security policy by a systematic and efficient key distribution procedure. Specifically, we extend the polynomial Shamir key splitting. According to this, a global key is split into n parts, any k of which can re-construct the original key. In this paper we present a method that instead of having "any k parts" be able to re-construct the original key, the latter can only be reconstructed if keys are combined as any access control policy describes. This leads into an easily deployable key generation procedure that results a single key per entity that "knows" its role in the specific access control policy from which it was derived. The system is considered efficient as it may be used to avoid expensive PKI operations or pairwise key distributions as well as provides superior security due to its distributed nature, the fact that the key is tightly coupled to the policy, and that policy change may be implemented easier and faster.

  2. Free-Space Quantum Key Distribution by Rotation-Invariant Twisted Photons

    NASA Astrophysics Data System (ADS)

    Vallone, Giuseppe; D'Ambrosio, Vincenzo; Sponselli, Anna; Slussarenko, Sergei; Marrucci, Lorenzo; Sciarrino, Fabio; Villoresi, Paolo

    2014-08-01

    "Twisted photons" are photons carrying a well-defined nonzero value of orbital angular momentum (OAM). The associated optical wave exhibits a helical shape of the wavefront (hence the name) and an optical vortex at the beam axis. The OAM of light is attracting a growing interest for its potential in photonic applications ranging from particle manipulation, microscopy, and nanotechnologies to fundamental tests of quantum mechanics, classical data multiplexing, and quantum communication. Hitherto, however, all results obtained with optical OAM were limited to laboratory scale. Here, we report the experimental demonstration of a link for free-space quantum communication with OAM operating over a distance of 210 m. Our method exploits OAM in combination with optical polarization to encode the information in rotation-invariant photonic states, so as to guarantee full independence of the communication from the local reference frames of the transmitting and receiving units. In particular, we implement quantum key distribution, a protocol exploiting the features of quantum mechanics to guarantee unconditional security in cryptographic communication, demonstrating error-rate performances that are fully compatible with real-world application requirements. Our results extend previous achievements of OAM-based quantum communication by over 2 orders of magnitude in the link scale, providing an important step forward in achieving the vision of a worldwide quantum network.

  3. Free-space quantum key distribution by rotation-invariant twisted photons.

    PubMed

    Vallone, Giuseppe; D'Ambrosio, Vincenzo; Sponselli, Anna; Slussarenko, Sergei; Marrucci, Lorenzo; Sciarrino, Fabio; Villoresi, Paolo

    2014-08-08

    "Twisted photons" are photons carrying a well-defined nonzero value of orbital angular momentum (OAM). The associated optical wave exhibits a helical shape of the wavefront (hence the name) and an optical vortex at the beam axis. The OAM of light is attracting a growing interest for its potential in photonic applications ranging from particle manipulation, microscopy, and nanotechnologies to fundamental tests of quantum mechanics, classical data multiplexing, and quantum communication. Hitherto, however, all results obtained with optical OAM were limited to laboratory scale. Here, we report the experimental demonstration of a link for free-space quantum communication with OAM operating over a distance of 210 m. Our method exploits OAM in combination with optical polarization to encode the information in rotation-invariant photonic states, so as to guarantee full independence of the communication from the local reference frames of the transmitting and receiving units. In particular, we implement quantum key distribution, a protocol exploiting the features of quantum mechanics to guarantee unconditional security in cryptographic communication, demonstrating error-rate performances that are fully compatible with real-world application requirements. Our results extend previous achievements of OAM-based quantum communication by over 2 orders of magnitude in the link scale, providing an important step forward in achieving the vision of a worldwide quantum network.

  4. Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks

    PubMed Central

    Guo, Hua; Zheng, Yandong; Zhang, Xiyong; Li, Zhoujun

    2016-01-01

    In resource-constrained wireless networks, resources such as storage space and communication bandwidth are limited. To guarantee secure communication in resource-constrained wireless networks, group keys should be distributed to users. The self-healing group key distribution (SGKD) scheme is a promising cryptographic tool, which can be used to distribute and update the group key for the secure group communication over unreliable wireless networks. Among all known SGKD schemes, exponential arithmetic based SGKD (E-SGKD) schemes reduce the storage overhead to constant, thus is suitable for the the resource-constrained wireless networks. In this paper, we provide a new mechanism to achieve E-SGKD schemes with backward secrecy. We first propose a basic E-SGKD scheme based on a known polynomial-based SGKD, where it has optimal storage overhead while having no backward secrecy. To obtain the backward secrecy and reduce the communication overhead, we introduce a novel approach for message broadcasting and self-healing. Compared with other E-SGKD schemes, our new E-SGKD scheme has the optimal storage overhead, high communication efficiency and satisfactory security. The simulation results in Zigbee-based networks show that the proposed scheme is suitable for the resource-restrained wireless networks. Finally, we show the application of our proposed scheme. PMID:27136550

  5. Stress Management: Positive Thinking

    MedlinePlus

    Healthy Lifestyle Stress management Positive thinking helps with stress management and can even improve your health. Practice overcoming negative self-talk ... with optimism is a key part of effective stress management. And effective stress management is associated with ...

  6. Limitations on quantum key repeaters.

    PubMed

    Bäuml, Stefan; Christandl, Matthias; Horodecki, Karol; Winter, Andreas

    2015-04-23

    A major application of quantum communication is the distribution of entangled particles for use in quantum key distribution. Owing to noise in the communication line, quantum key distribution is, in practice, limited to a distance of a few hundred kilometres, and can only be extended to longer distances by use of a quantum repeater, a device that performs entanglement distillation and quantum teleportation. The existence of noisy entangled states that are undistillable but nevertheless useful for quantum key distribution raises the question of the feasibility of a quantum key repeater, which would work beyond the limits of entanglement distillation, hence possibly tolerating higher noise levels than existing protocols. Here we exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key. As a consequence, we give examples of states suitable for quantum key distribution but unsuitable for the most general quantum key repeater protocol.

  7. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  8. System and method for key generation in security tokens

    SciTech Connect

    Evans, Philip G.; Humble, Travis S.; Paul, Nathanael R.

    Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).

  9. Key issues in transplant tourism.

    PubMed

    Akoh, Jacob A

    2012-02-24

    Access to organ transplantation depends on national circumstances, and is partly determined by the cost of health care, availability of transplant services, the level of technical capacity and the availability of organs. Commercial transplantation is estimated to account for 5%-10% (3500-7000) of kidney transplants performed annually throughout the world. This review is to determine the state and outcome of renal transplantation associated with transplant tourism (TT) and the key challenges with such transplantation. The stakeholders of commercial transplantation include: patients on the waiting lists in developed countries or not on any list in developing countries; dialysis funding bodies; middlemen, hosting transplant centres; organ-exporting countries; and organ vendors. TT and commercial kidney transplants are associated with a high incidence of surgical complications, acute rejection and invasive infection which cause major morbidity and mortality. There are ethical and medical concerns regarding the management of recipients of organs from vendors. The growing demand for transplantation, the perceived failure of altruistic donation in providing enough organs has led to calls for a legalised market in organ procurement or regulated trial in incentives for donation. Developing transplant services worldwide has many benefits - improving results of transplantation as they would be performed legally, increasing the donor pool and making TT unnecessary. Meanwhile there is a need to re-examine intrinsic attitudes to TT bearing in mind the cultural and economic realities of globalisation. Perhaps the World Health Organization in conjunction with The Transplantation Society would set up a working party of stakeholders to study this matter in greater detail and make recommendations.

  10. Key issues in transplant tourism

    PubMed Central

    Akoh, Jacob A

    2012-01-01

    Access to organ transplantation depends on national circumstances, and is partly determined by the cost of health care, availability of transplant services, the level of technical capacity and the availability of organs. Commercial transplantation is estimated to account for 5%-10% (3500-7000) of kidney transplants performed annually throughout the world. This review is to determine the state and outcome of renal transplantation associated with transplant tourism (TT) and the key challenges with such transplantation. The stakeholders of commercial transplantation include: patients on the waiting lists in developed countries or not on any list in developing countries; dialysis funding bodies; middlemen, hosting transplant centres; organ-exporting countries; and organ vendors. TT and commercial kidney transplants are associated with a high incidence of surgical complications, acute rejection and invasive infection which cause major morbidity and mortality. There are ethical and medical concerns regarding the management of recipients of organs from vendors. The growing demand for transplantation, the perceived failure of altruistic donation in providing enough organs has led to calls for a legalised market in organ procurement or regulated trial in incentives for donation. Developing transplant services worldwide has many benefits - improving results of transplantation as they would be performed legally, increasing the donor pool and making TT unnecessary. Meanwhile there is a need to re-examine intrinsic attitudes to TT bearing in mind the cultural and economic realities of globalisation. Perhaps the World Health Organization in conjunction with The Transplantation Society would set up a working party of stakeholders to study this matter in greater detail and make recommendations. PMID:24175191

  11. Key Objectives Bank: Year 9. Key Stage 3: National Strategy.

    ERIC Educational Resources Information Center

    Department for Education and Skills, London (England).

    In each sub-section of the "Framework for Teaching English: Years 7, 8 and 9," certain key objectives are identified in boldface print. These objectives are key because they signify skills or understanding which are crucial to pupils' language development. They are challenging for the age group and are important markers of progress. This…

  12. Strategies of Educational Decentralization: Key Questions and Core Issues.

    ERIC Educational Resources Information Center

    Hanson, E. Mark

    1998-01-01

    Explains key issues and forces that shape organization and management strategies of educational decentralization, using examples from Colombia, Venezuela, Argentina, Nicaragua, and Spain. Core decentralization issues include national and regional goals, planning, political stress, resource distribution, infrastructure development, and job…

  13. Digital rights management for digital cinema

    NASA Astrophysics Data System (ADS)

    Kirovski, Darko; Peinado, Marcus; Petitcolas, Fabien A. P.

    2001-12-01

    There is a wide consensus among the feature film production studios that the Internet era brings a new paradigm for film distribution to cinemas worldwide. The benefits of digital cinema to both producers and cinemas are numerous: significantly lower distribution and maintenance costs, immediate access to film libraries, higher presentation quality, and strong potential for developing new business models. Despite these advantages, the studios are still reluctant to jump into the digital age. The main showstopper for digital cinema is the danger of widespread piracy. Piracy already costs Hollywood an estimated two billion dollars annually and digital cinema without proper copyright enforcement could increase this number. In this paper, we present a copyright management system that aims at providing the set of necessary security tools: standard cryptographic primitives and copyright protection mechanisms that enable a reliable and secure feature film delivery system.

  14. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    PubMed

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to

  15. Key Value Considerations for Consultant Pharmacists.

    PubMed

    Meyer, Lee; Perry, Ronald G; Rhodus, Susan M; Stearns, Wendy

    2016-07-01

    Managing the efficiency and costs of residents' drug regimens outside the acute-care hospital and through transitions of care requires a toolbox filled with cost-control tools and careful collaboration among the pharmacy provider(s), facility staff, and the consultant/senior care pharmacist. This article will provide the reader with key long-term care business strategies that affect the profitability of the pharmacy provider in various care settings while, at the same time, ensuring optimal therapy for residents as they transition across levels of care. Readers can take away ideas on how to access critical information, what they can do with this information, and how they can improve the overall care process. Four experts in various aspects of pharmacy management share their insights on pharmacy practice issues including formulary management, performance metrics, short-cycle dispensing challenges/solutions, cost-control measures, facility surveys, billing practices, medication reconciliation, prospective medication reviews, and transitions of care.

  16. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    DTIC Science & Technology

    2016-03-10

    Contractor Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: Seaworthy Quantum Key Distribution Design and Validation (SEAKEY...Technologies Kathryn Carson Program Manager Quantum Information Processing 2 | P a g e Approved for public release; distribution is...we have continued work calculating the key rates achievable parametrically with receiver performance. In addition, we describe the initial designs

  17. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    DTIC Science & Technology

    2015-05-27

    Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: Seaworthy Quantum Key Distribution Design and Validation (SEAKEY...Technologies Kathryn Carson Program Manager Quantum Information Processing Report Documentation Page Form ApprovedOMB No. 0704-0188 Public...2016 4. TITLE AND SUBTITLE Seaworthy Quantum Key Distribution Design and Validation (SEAKEY) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM

  18. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias

    2006-10-15

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less

  19. Photopsias: A Key to Diagnosis.

    PubMed

    Brown, Gary C; Brown, Melissa M; Fischer, David H

    2015-10-01

    lighted environments (29%), and often initiated by head/eye movements (60%). Retinal detachment had a similar profile, but with more nontemporal photopsias (40%) (P = 0.01). The photopsias from neovascular AMD are more centrally located (83%), quick and repetitive (79%), seen in light (73%) and dark (63%) environments, have no inciting stimuli (84%), and are more likely to be nonwhite (40%). A pointed history for photopsias can reveal a cause that may not initially seem apparent. Thus, the history can play a key role in management decisions. Copyright © 2015 American Academy of Ophthalmology. Published by Elsevier Inc. All rights reserved.

  20. Keeping the Best: A Practical Guide to Retaining Key Employees.

    ERIC Educational Resources Information Center

    Bevan, Stephen; Barber, Linda; Robinson, Dilys

    This book, which is intended to assist human resource professionals and line managers in the United Kingdom, is a practical guide to retaining key employees. Discussed in the introduction are the relationship between downsizing and retention, problems that retention difficulties pose for human resource management, and the effects of retention…

  1. Slips of the Typewriter Key.

    ERIC Educational Resources Information Center

    Berg, Thomas

    2002-01-01

    Presents an analysis of 500 submorphemic slips of the typewriter key that escaped the notice of authors and other proofreaders and thereby made their way into the published records of scientific research. (Author/VWL)

  2. Algorithms for Lightweight Key Exchange.

    PubMed

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  3. Optimizing Requirements Decisions with KEYS

    NASA Technical Reports Server (NTRS)

    Jalali, Omid; Menzies, Tim; Feather, Martin

    2008-01-01

    Recent work with NASA's Jet Propulsion Laboratory has allowed for external access to five of JPL's real-world requirements models, anonymized to conceal proprietary information, but retaining their computational nature. Experimentation with these models, reported herein, demonstrates a dramatic speedup in the computations performed on them. These models have a well defined goal: select mitigations that retire risks which, in turn, increases the number of attainable requirements. Such a non-linear optimization is a well-studied problem. However identification of not only (a) the optimal solution(s) but also (b) the key factors leading to them is less well studied. Our technique, called KEYS, shows a rapid way of simultaneously identifying the solutions and their key factors. KEYS improves on prior work by several orders of magnitude. Prior experiments with simulated annealing or treatment learning took tens of minutes to hours to terminate. KEYS runs much faster than that; e.g for one model, KEYS ran 13,000 times faster than treatment learning (40 minutes versus 0.18 seconds). Processing these JPL models is a non-linear optimization problem: the fewest mitigations must be selected while achieving the most requirements. Non-linear optimization is a well studied problem. With this paper, we challenge other members of the PROMISE community to improve on our results with other techniques.

  4. Modelling in forest management

    Treesearch

    Mark J. Twery

    2004-01-01

    Forest management has traditionally been considered management of trees for timber. It really includes vegetation management and land management and people management as multiple objectives. As such, forest management is intimately linked with other topics in this volume, most especially those chapters on ecological modelling and human dimensions. The key to...

  5. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    NASA Astrophysics Data System (ADS)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  6. Essential Oil from Clove Bud (Eugenia aromatica Kuntze) Inhibit Key Enzymes Relevant to the Management of Type-2 Diabetes and Some Pro-oxidant Induced Lipid Peroxidation in Rats Pancreas in vitro.

    PubMed

    Oboh, Ganiyu; Akinbola, Ifeoluwa A; Ademosun, Ayokunle O; Sanni, David M; Odubanjo, Oluwatoyin V; Olasehinde, Tosin A; Oyeleye, Sunday I

    2015-01-01

    The inhibition of enzymes involved in the breakdown of carbohydrates is considered a therapeutic approach to the management of type-2 diabetes. This study sought to investigate the effects of essential oil from clove bud on α-amylase and α-glucosidase activities. Essential oil from clove bud was extracted by hydrodistillation, dried with anhydrous Na2SO4 and characterized using gas chromatography-mass spectrometry (GC-MS). The effects of the essential oil on α-amylase and α-glucosidase activities were investigated. The antioxidant properties of the oil and the inhibition of Fe(2+) and sodium nitroprusside-induced malondialdehyde (MDA) production in rats pancreas homogenate were also carried out. The essential oil inhibited α-amylase (EC50=88.9 μl/L) and α-glucosidase (EC50=71.94 μl/L) activities in a dose-dependent manner. Furthermore, the essential oil inhibited Fe(2+) and SNP-induced MDA production and exhibited antioxidant activities through their NO*, OH*, scavenging and Fe(2+)- chelating abilities. The total phenolic and flavonoid contents of the essential oil were 12.95 mg/g and 6.62 mg/g respectively. GC-MS analysis revealed the presence of α-pinene, β-pinene, neral, geranial, gamma terpinene, cis-ocimene, allo ocimene, 1,8-cineole, linalool, borneol, myrcene and pinene-2-ol in significant amounts. Furthermore, the essential oils exhibited antioxidant activities as typified by hydroxyl (OH) and nitric oxide (NO)] radicals scavenging and Fe(2+)-chelating abilities. The inhibition of α-amylase and α-glucosidase activities, inhibition of pro-oxidant induced lipid peroxidation in rat pancreas and antioxidant activities could be possible mechanisms for the use of the essential oil in the management and prevention of oxidative stress induced type-2 diabetes.

  7. Florida Everglades and Keys, USA

    NASA Technical Reports Server (NTRS)

    1991-01-01

    Though much of southern Florida is covered by clouds, the Florida Everglades and Keys (25.0N, 82.0W) remain relatively clear in this nearly vertical view. The view covers the Gulf of Mexico port city of Ft. Myers, and Lake Okeechobee, at the top of the scene, in the north, The Everglades, in the center and the entire Florida Key Chain at the bottom. Even with the many popcorn clouds, ground detail and the city of Miami is easily discerned.

  8. Counterfactual Quantum Deterministic Key Distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wang, Jian; Tang, Chao-Jing

    2013-01-01

    We propose a new counterfactual quantum cryptography protocol concerning about distributing a deterministic key. By adding a controlled blocking operation module to the original protocol [T.G. Noh, Phys. Rev. Lett. 103 (2009) 230501], the correlation between the polarizations of the two parties, Alice and Bob, is extended, therefore, one can distribute both deterministic keys and random ones using our protocol. We have also given a simple proof of the security of our protocol using the technique we ever applied to the original protocol. Most importantly, our analysis produces a bound tighter than the existing ones.

  9. On the optimality of individual entangling-probe attacks against BB84 quantum key distribution

    NASA Astrophysics Data System (ADS)

    Herbauts, I. M.; Bettelli, S.; Hã¼bel, H.; Peev, M.

    2008-02-01

    Some MIT researchers [Phys. Rev. A 75, 042327 (2007)] have recently claimed that their implementation of the Slutsky-Brandt attack [Phys. Rev. A 57, 2383 (1998); Phys. Rev. A 71, 042312 (2005)] to the BB84 quantum-key-distribution (QKD) protocol puts the security of this protocol “to the test” by simulating “the most powerful individual-photon attack” [Phys. Rev. A 73, 012315 (2006)]. A related unfortunate news feature by a scientific journal [G. Brumfiel, Quantum cryptography is hacked, News @ Nature (april 2007); Nature 447, 372 (2007)] has spurred some concern in the QKD community and among the general public by misinterpreting the implications of this work. The present article proves the existence of a stronger individual attack on QKD protocols with encrypted error correction, for which tight bounds are shown, and clarifies why the claims of the news feature incorrectly suggest a contradiction with the established “old-style” theory of BB84 individual attacks. The full implementation of a quantum cryptographic protocol includes a reconciliation and a privacy-amplification stage, whose choice alters in general both the maximum extractable secret and the optimal eavesdropping attack. The authors of [Phys. Rev. A 75, 042327 (2007)] are concerned only with the error-free part of the so-called sifted string, and do not consider faulty bits, which, in the version of their protocol, are discarded. When using the provably superior reconciliation approach of encrypted error correction (instead of error discard), the Slutsky-Brandt attack is no more optimal and does not “threaten” the security bound derived by Lütkenhaus [Phys. Rev. A 59, 3301 (1999)]. It is shown that the method of Slutsky and collaborators [Phys. Rev. A 57, 2383 (1998)] can be adapted to reconciliation with error correction, and that the optimal entangling probe can be explicitly found. Moreover, this attack fills Lütkenhaus bound, proving that it is tight (a fact which was not

  10. Ten Keys to the Portal

    ERIC Educational Resources Information Center

    Schaffhauser, Dian

    2011-01-01

    Successful web portals help users stay informed, in touch, and up to speed. They are also a telling window into the efficiency of one's institution. To develop a cutting-edge portal takes planning, communication, and research. In this article, the author presents and discusses 10 keys to portal success: (1) make critical info visible; (2) make the…

  11. Key for Trees of Iowa.

    ERIC Educational Resources Information Center

    Coder, Kim D.; Wray, Paul H.

    This key is designed to help identify the most common trees found in Iowa. It is based on vegetative characteristics such as leaves, fruits, and bark and is illustrated with black and white line drawings. Since vegetative characteristics vary due to climate, age, soil fertility, and other conditions, the numerical sizes listed, such as length and…

  12. Work Keys: Developing the Assessments.

    ERIC Educational Resources Information Center

    McLarty, Joyce R.

    The American College Testing Program is developing a new program, Work Keys, a system to develop and assess employability skills. It consists of four components: (1) a systematic process for profiling job skill requirements; (2) assessments that measure learners' job skill levels; (3) procedures and formats for conveying assessment results so they…

  13. Seven Keys to Successful Study.

    ERIC Educational Resources Information Center

    Edwards, Peter

    Written for secondary, technical, and technical and further education (TAFE) students, this book aims to make learning easier and more enjoyable by showing students how to use a series of basic study skills called "keys." The book offers an explanation, examples, graphic illustrations, and activities for each skill. Chapters include: (1)…

  14. Key Skills and Competencies. Symposium.

    ERIC Educational Resources Information Center

    2002

    This document contains three papers on key skills and competencies and human resource development (HRD). "Career Related Competencies" (Marinka A.C.T. Kuijpers) reports findings from surveys completed by Dutch employees who identified these issues: self-reflection is more important than career control; age and gender influence attitude…

  15. Key Skills Influencing Student Achievement

    ERIC Educational Resources Information Center

    Balch, Tonya; Gruenert, Steve

    2009-01-01

    A predictive, non-experimental, cross-sectional design (Johnson, 2001) was used to conduct a study to determine if elementary administrators' key counseling skills and select demographics predicted state-level student performance indicators in their respective schools. A secondary purpose of this study was to develop a valid and reliable on-line…

  16. Key Reconciliation for High Performance Quantum Key Distribution

    PubMed Central

    Martinez-Mateo, Jesus; Elkouss, David; Martin, Vicente

    2013-01-01

    Quantum Key Distribution is carving its place among the tools used to secure communications. While a difficult technology, it enjoys benefits that set it apart from the rest, the most prominent is its provable security based on the laws of physics. QKD requires not only the mastering of signals at the quantum level, but also a classical processing to extract a secret-key from them. This postprocessing has been customarily studied in terms of the efficiency, a figure of merit that offers a biased view of the performance of real devices. Here we argue that it is the throughput the significant magnitude in practical QKD, specially in the case of high speed devices, where the differences are more marked, and give some examples contrasting the usual postprocessing schemes with new ones from modern coding theory. A good understanding of its implications is very important for the design of modern QKD devices. PMID:23546440

  17. Cryptographic Techniques for Privacy Preserving Identity

    DTIC Science & Technology

    2011-05-13

    information is often sufficient to match an individual to their pseudonym, for example, as in the case of the Netflix Prize movie rental dataset [71]. It was...shown that knowledge of only a couple approximate movie rental dates (as might be revealed by simply mentioning what one has watched recently) is...government censor may require Google or another popular blog host to reveal the login times of the top suspects, which could be correlated with the

  18. A Formal Language for Cryptographic Protocol Requirements

    DTIC Science & Technology

    1996-01-01

    L;KAB; AgKBS ; fA; TAgKAB (4) B sends to A: fTA + 1gKAB Here A and B are two principals. By sending the rst message, A requests of the...A: CertB; fAKBgKA ; algchoiceB; fmd (fAKBgKA ; algchoiceB ; NA; alglistA)gK1 B (3) A sends to B: fAKAgKB ; fmd (fAKAgKB ; fAKBgKA)gK1 A CertX is a...alglistA 3. B sends to C: CertB ; fAKBgKC ; algchoiceB; fmd (fAKBgKC ; algchoiceB ; NA; alglistA)gK1 B (intercepted by I) 4. IB sends to A : CertB

  19. Cryptographic Properties of Monotone Boolean Functions

    DTIC Science & Technology

    2016-01-01

    Algebraic attacks on stream ciphers with linear feedback, in: Advances in Cryptology (Eurocrypt 2003), Lecture Notes in Comput. Sci. 2656, Springer, Berlin...spectrum, algebraic immu- nity MSC 2010: 06E30, 94C10, 94A60, 11T71, 05E99 || Communicated by: Carlo Blundo 1 Introduction Let F 2 be the prime eld of...7]. For the reader’s convenience, we recall some basic notions below. Any f ∈ Bn can be expressed in algebraic normal form (ANF) as f(x 1 , x 2

  20. PACE: Proactively Secure Accumulo with Cryptographic Enforcement

    DTIC Science & Technology

    2017-05-27

    Abstract—Cloud-hosted databases have many compelling ben- efits, including high availability , flexible resource allocation, and resiliency to attack...infrastructure to the cloud. This move is motivated by the cloud’s increased availability , flexibility, and resilience [1]. Most importantly, the cloud enables...a level of availability and performance that would be impossible for many companies to achieve using their own infrastructure. For example, using a

  1. On the concept of cryptographic quantum hashing

    NASA Astrophysics Data System (ADS)

    Ablayev, F.; Ablayev, M.

    2015-12-01

    In the letter we define the notion of a quantum resistant ((ε ,δ ) -resistant) hash function which consists of a combination of pre-image (one-way) resistance (ε-resistance) and collision resistance (δ-resistance) properties. We present examples and discussion that supports the idea of quantum hashing. We present an explicit quantum hash function which is ‘balanced’, one-way resistant and collision resistant and demonstrate how to build a large family of quantum hash functions. Balanced quantum hash functions need a high degree of entanglement between the qubits. We use a phase transformation technique to express quantum hashing constructions, which is an effective way of mapping hash states to coherent states in a superposition of time-bin modes. The phase transformation technique is ready to be implemented with current optical technology.

  2. On Robust Key Agreement Based on Public Key Authentication

    NASA Astrophysics Data System (ADS)

    Hao, Feng

    We describe two new attacks on the HMQV protocol. The first attack raises a serious question on the basic definition of "authentication" in HMQV, while the second attack is generally applicable to many other protocols. In addition, we present a new authenticated key agreement protocol called YAK. Our approach is to depend on well-established techniques such as Schnorr's signature. Among all the related protocols, YAK appears to be the simplest so far. We believe simplicity is an important engineering principle.

  3. Research on Key Technologies of Cloud Computing

    NASA Astrophysics Data System (ADS)

    Zhang, Shufen; Yan, Hongcan; Chen, Xuebin

    With the development of multi-core processors, virtualization, distributed storage, broadband Internet and automatic management, a new type of computing mode named cloud computing is produced. It distributes computation task on the resource pool which consists of massive computers, so the application systems can obtain the computing power, the storage space and software service according to its demand. It can concentrate all the computing resources and manage them automatically by the software without intervene. This makes application offers not to annoy for tedious details and more absorbed in his business. It will be advantageous to innovation and reduce cost. It's the ultimate goal of cloud computing to provide calculation, services and applications as a public facility for the public, So that people can use the computer resources just like using water, electricity, gas and telephone. Currently, the understanding of cloud computing is developing and changing constantly, cloud computing still has no unanimous definition. This paper describes three main service forms of cloud computing: SAAS, PAAS, IAAS, compared the definition of cloud computing which is given by Google, Amazon, IBM and other companies, summarized the basic characteristics of cloud computing, and emphasized on the key technologies such as data storage, data management, virtualization and programming model.

  4. Key Concepts in Microbial Oceanography

    NASA Astrophysics Data System (ADS)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  5. Three Keys to Better Recruiting

    ERIC Educational Resources Information Center

    Brazington, Alicia

    2012-01-01

    Recruitment is an expensive business: In 2010-2011, the median cost to recruit an undergraduate was $2,185 among private colleges and universities, according to Noel-Levitz, an enrollment management consultancy. In these tough fiscal times, admissions departments are under pressure to keep those costs down even as they pursue higher enrollment and…

  6. Key paediatric messages from Amsterdam

    PubMed Central

    Barben, Jürg; Bohlin, Kajsa; Everard, Mark L.; Hall, Graham; Pijnenburg, Mariëlle; Priftis, Kostas N.; Rusconi, Franca; Midulla, Fabio

    2016-01-01

    The Paediatric Assembly of the European Respiratory Society (ERS) maintained its high profile at the 2015 ERS International Congress in Amsterdam. There were symposia on preschool wheeze, respiratory sounds and cystic fibrosis; an educational skills workshop on paediatric respiratory resuscitation; a hot topic session on risk factors and early origins of respiratory diseases; a meet the expert session on paediatric lung function test reference values; and the annual paediatric grand round. In this report the Chairs of the Paediatric Assembly's Groups highlight the key messages from the abstracts presented at the Congress. PMID:27730186

  7. Symmetric autocompensating quantum key distribution

    NASA Astrophysics Data System (ADS)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  8. Nephrology key information for internists

    PubMed Central

    Salim, Sohail Abdul; Medaura, Juan A.; Malhotra, Bharat; Garla, Vishnu; Ahuja, Shradha; Lawson, Nicki; Pamarthy, Amaleswari; Sonani, Hardik; Kovvuru, Karthik; Palabindala, Venkataraman

    2017-01-01

    ABSTRACT Hospitalists and primary care physicians encounter renal disease daily. Although most cases of acute kidney injury (AKI) are secondary to dehydration and resolve by giving fluids, many cases of AKI are due to not uncommon but unfamiliar causes needing nephrology evaluation. Common indications to consult a nephrologist on an emergency basis include hyperkalemia or volume overload in end stage renal disease patients (ESRD). Other causes of immediate consultation are cresenteric glomerulonephritis / rapidly progressive glomerulonephritis in which renal prognosis of the patient depends on timely intervention. The following evidence-based key information could improve patient care and outcomes. Abbreviations: AKI: Acute kidney injury ESRD: End stage renal disease patients PMID:28638567

  9. Outsourcing to exploit a key asset.

    PubMed

    Meerpoel, Lieven; Schroven, Marc; Goris, Koen; Demoen, Koen; Marsden, Siobhan

    2006-06-01

    Much has been written and debated about the economic and organizational advantages of outsourcing a growing list of operations in drug discovery. In what has been described as a modular approach to drug discovery, whole sections of the process are now handled very effectively by a wide variety of specialist suppliers to the pharmaceutical industry. Here we report on a novel outsourced solution to the challenge of consolidating and managing some of the key assets residing within a major research organization - its chemical intermediates. At Johnson and Johnson Pharmaceutical Research and Development this resource has been built up over a period of more than 40 years, and is added to daily. The challenge was to provide the company's scientists with a single source for its own and externally procured intermediates; the solution was developed working in partnership with Sigma-Aldrich.

  10. Ares Knowledge Capture: Summary and Key Themes Presentation

    NASA Technical Reports Server (NTRS)

    Coates, Ralph H.

    2011-01-01

    This report has been developed by the National Aeronautics and Space Administration (NASA) Human Exploration and Operations Mission Directorate (HEOMD) Risk Management team in close coordination with the MSFC Chief Engineers Office. This document provides a point-in-time, cumulative, summary of actionable key lessons learned derived from the design project. Lessons learned invariably address challenges and risks and the way in which these areas have been addressed. Accordingly the risk management thread is woven throughout the document.

  11. Soil fauna: key to new carbon models

    NASA Astrophysics Data System (ADS)

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; De Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; José Jiménez, Juan

    2016-11-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined mostly in terms of plant residue quality and input and microbial decomposition, overlooking the significant regulation provided by soil fauna. The fauna controls almost any aspect of organic matter turnover, foremost by regulating the activity and functional composition of soil microorganisms and their physical-chemical connectivity with soil organic matter. We demonstrate a very strong impact of soil animals on carbon turnover, increasing or decreasing it by several dozen percent, sometimes even turning C sinks into C sources or vice versa. This is demonstrated not only for earthworms and other larger invertebrates but also for smaller fauna such as Collembola. We suggest that inclusion of soil animal activities (plant residue consumption and bioturbation altering the formation, depth, hydraulic properties and physical heterogeneity of soils) can fundamentally affect the predictive outcome of SOM models. Understanding direct and indirect impacts of soil fauna on nutrient availability, carbon sequestration, greenhouse gas emissions and plant growth is key to the understanding of SOM dynamics in the context of global carbon cycling models. We argue that explicit consideration of soil fauna is essential to make realistic modelling predictions on SOM dynamics and to detect expected non-linear responses of SOM dynamics to global change. We present a decision framework, to be further developed through the activities of KEYSOM, a European COST Action, for when mechanistic SOM models

  12. A Recommended Set of Key Arctic Indicators

    NASA Astrophysics Data System (ADS)

    Stanitski, D.; Druckenmiller, M.; Fetterer, F. M.; Gerst, M.; Intrieri, J. M.; Kenney, M. A.; Meier, W.; Overland, J. E.; Stroeve, J.; Trainor, S.

    2017-12-01

    The Arctic is an interconnected and environmentally sensitive system of ice, ocean, land, atmosphere, ecosystems, and people. From local to pan-Arctic scales, the area has already undergone major changes in physical and societal systems and will continue at a pace that is greater than twice the global average. Key Arctic indicators can quantify these changes. Indicators serve as the bridge between complex information and policy makers, stakeholders, and the general public, revealing trends and information people need to make important socioeconomic decisions. This presentation evaluates and compiles more than 70 physical, biological, societal and economic indicators into an approachable summary that defines the changing Arctic. We divided indicators into "existing," "in development," "possible," and "aspirational". In preparing a paper on Arctic Indicators for a special issue of the journal Climatic Change, our group established a set of selection criteria to identify indicators to specifically guide decision-makers in their responses to climate change. A goal of the analysis is to select a manageable composite list of recommended indicators based on sustained, reliable data sources with known user communities. The selected list is also based on the development of a conceptual model that identifies components and processes critical to our understanding of the Arctic region. This list of key indicators is designed to inform the plans and priorities of multiple groups such as the U.S. Global Change Research Program (USGCRP), Interagency Arctic Research Policy Committee (IARPC), and the Arctic Council.

  13. Key attributes of expert NRL referees.

    PubMed

    Morris, Gavin; O'Connor, Donna

    2017-05-01

    Experiential knowledge of elite National Rugby League (NRL) referees was investigated to determine the key attributes contributing to expert officiating performance. Fourteen current first-grade NRL referees were asked to identify the key attributes they believed contributed to their expert refereeing performance. The modified Delphi method involved a 3-round process of an initial semi-structured interview followed by 2 questionnaires to reach consensus of opinion. The data revealed 25 attributes that were rated as most important that underpin expert NRL refereeing performance. Results illustrate the significance of the cognitive category, with the top 6 ranked attributes all cognitive skills. Of these, the referees ranked decision-making accuracy as the most important attribute, followed by reading the game, communication, game understanding, game management and knowledge of the rules. Player rapport, positioning and teamwork were the top ranked game skill attributes underpinning performance excellence. Expert referees also highlighted a number of psychological attributes (e.g., concentration, composure and mental toughness) that were significant to performance. There were only 2 physiological attributes (fitness, aerobic endurance) that were identified as significant to elite officiating performance. In summary, expert consensus was attained which successfully provided a hierarchy of the most significant attributes of expert NRL refereeing performance.

  14. 41 CFR Appendix A to Subpart C of... - 3-Key Points and Principles

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION GENERAL 3-FEDERAL ADVISORY COMMITTEE... or agency management directives; (iv) The applicability of conflict of interest statutes and other... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false 3-Key Points and...

  15. 41 CFR Appendix A to Subpart A of... - 3-Key Points and Principles

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false 3-Key Points and Principles A Appendix A to Subpart A of Part 102 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION GENERAL 3-FEDERAL ADVISORY COMMITTEE...

  16. Clinical risk management.

    PubMed

    Knowles, D

    Managing clinical risk involves all staff with clinical and managerial responsibilities. This article draws attention to some key steps in risk management and ways to deal with the problems when things do go wrong.

  17. Chapter 2. Selecting Key Habitat Attributes for Monitoring

    Treesearch

    Gregory D. Hayward; Lowell H. Suring

    2013-01-01

    The success of habitat monitoring programs depends, to a large extent, on carefully selecting key habitat attributes to monitor. The challenge of choosing a limited but sufficient set of attributes will differ depending on the objectives of the monitoring program. In some circumstances, such as managing National Forest System lands for threatened and endangered species...

  18. The maintenance of key biodiversity attributes through ecosystem restoration operations

    Treesearch

    Robert W. Gray; Bruce A. Blackwell

    2008-01-01

    The requirement to manage for key biodiversity attributes in dry forest ecosystems is mandated in the Forest Practices Code Act of British Columbia. These attributes include snags, large old trees, and large organic debris. In the Squamish Forest District dry forest restoration activities center on the use of thinning operations followed by prescribed fire to restore...

  19. How Are You Doing? Key Performance Indicators and Benchmarking

    ERIC Educational Resources Information Center

    Fahey, John P.

    2011-01-01

    School business officials need to "know and show" that their operations are well managed. To do so, they ask themselves questions, such as "How are they doing? How do they compare with others? Are they making progress fast enough? Are they using the best practices?" Using key performance indicators (KPIs) and benchmarking as regular parts of their…

  20. Summary Letter of Key Requirements for FLM Notification Process

    EPA Pesticide Factsheets

    Letter from Anna Marie Wood, Director of EPA’s Air Quality Policy Division, to Carol McCoy, Chief of the Air Resources Division of the National Park Service (NPS) summarizing the key requirements for the Federal Land Managers (FLMs) notification process.