37 CFR 5.3 - Prosecution of application under secrecy orders; withholding patent.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 37 Patents, Trademarks, and Copyrights 1 2011-07-01 2011-07-01 false Prosecution of application under secrecy orders; withholding patent. 5.3 Section 5.3 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND TRADEMARK OFFICE, DEPARTMENT OF COMMERCE GENERAL SECRECY OF CERTAIN INVENTIONS AND...
37 CFR 5.3 - Prosecution of application under secrecy orders; withholding patent.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 37 Patents, Trademarks, and Copyrights 1 2012-07-01 2012-07-01 false Prosecution of application under secrecy orders; withholding patent. 5.3 Section 5.3 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND TRADEMARK OFFICE, DEPARTMENT OF COMMERCE GENERAL SECRECY OF CERTAIN INVENTIONS AND...
37 CFR 5.3 - Prosecution of application under secrecy orders; withholding patent.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 37 Patents, Trademarks, and Copyrights 1 2013-07-01 2013-07-01 false Prosecution of application under secrecy orders; withholding patent. 5.3 Section 5.3 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND TRADEMARK OFFICE, DEPARTMENT OF COMMERCE GENERAL SECRECY OF CERTAIN INVENTIONS AND...
37 CFR 5.3 - Prosecution of application under secrecy orders; withholding patent.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Prosecution of application under secrecy orders; withholding patent. 5.3 Section 5.3 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND TRADEMARK OFFICE, DEPARTMENT OF COMMERCE GENERAL SECRECY OF CERTAIN INVENTIONS AND...
37 CFR 5.3 - Prosecution of application under secrecy orders; withholding patent.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 37 Patents, Trademarks, and Copyrights 1 2014-07-01 2014-07-01 false Prosecution of application under secrecy orders; withholding patent. 5.3 Section 5.3 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND TRADEMARK OFFICE, DEPARTMENT OF COMMERCE GENERAL SECRECY OF CERTAIN INVENTIONS AND...
Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming
Yang, Maoqiang; Zhang, Bangning; Huang, Yuzhen; Yang, Nan; Guo, Daoxing; Gao, Bin
2016-01-01
In this paper, we investigate the secure transmission in wireless sensor networks (WSNs) consisting of one multiple-antenna base station (BS), multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC) scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS) is employed at the BS and cooperative jamming (CJ) is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI) of both the legitimate channel and the eavesdropper’s channel, it explores a zero-forcing beamforming (ZFB) scheme or a null-space artificial noise (NAN) scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance. PMID:27845753
Wang, Dawei; Ren, Pinyi; Du, Qinghe; Sun, Li; Wang, Yichen
2016-01-01
The rapid proliferation of independently-designed and -deployed wireless sensor networks extremely crowds the wireless spectrum and promotes the emergence of cognitive radio sensor networks (CRSN). In CRSN, the sensor node (SN) can make full use of the unutilized licensed spectrum, and the spectrum efficiency is greatly improved. However, inevitable spectrum sensing errors will adversely interfere with the primary transmission, which may result in primary transmission outage. To compensate the adverse effect of spectrum sensing errors, we propose a reciprocally-benefited secure transmission strategy, in which SN’s interference to the eavesdropper is employed to protect the primary confidential messages while the CRSN is also rewarded with a loose spectrum sensing error probability constraint. Specifically, according to the spectrum sensing results and primary users’ activities, there are four system states in this strategy. For each state, we analyze the primary secrecy rate and the SN’s transmission rate by taking into account the spectrum sensing errors. Then, the SN’s transmit power is optimally allocated for each state so that the average transmission rate of CRSN is maximized under the constraint of the primary maximum permitted secrecy outage probability. In addition, the performance tradeoff between the transmission rate of CRSN and the primary secrecy outage probability is investigated. Moreover, we analyze the primary secrecy rate for the asymptotic scenarios and derive the closed-form expression of the SN’s transmission outage probability. Simulation results show that: (1) the performance of the SN’s average throughput in the proposed strategy outperforms the conventional overlay strategy; (2) both the primary network and CRSN benefit from the proposed strategy. PMID:27897988
37 CFR 5.5 - Permit to disclose or modification of secrecy order.
Code of Federal Regulations, 2011 CFR
2011-07-01
... consigned prior to being lodged in the foreign patent office. The petition should include a statement... 37 Patents, Trademarks, and Copyrights 1 2011-07-01 2011-07-01 false Permit to disclose or modification of secrecy order. 5.5 Section 5.5 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND...
37 CFR 5.5 - Permit to disclose or modification of secrecy order.
Code of Federal Regulations, 2012 CFR
2012-07-01
... consigned prior to being lodged in the foreign patent office. The petition should include a statement... 37 Patents, Trademarks, and Copyrights 1 2012-07-01 2012-07-01 false Permit to disclose or modification of secrecy order. 5.5 Section 5.5 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND...
37 CFR 5.5 - Permit to disclose or modification of secrecy order.
Code of Federal Regulations, 2013 CFR
2013-07-01
... consigned prior to being lodged in the foreign patent office. The petition should include a statement... 37 Patents, Trademarks, and Copyrights 1 2013-07-01 2013-07-01 false Permit to disclose or modification of secrecy order. 5.5 Section 5.5 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND...
37 CFR 5.5 - Permit to disclose or modification of secrecy order.
Code of Federal Regulations, 2014 CFR
2014-07-01
... consigned prior to being lodged in the foreign patent office. The petition should include a statement... 37 Patents, Trademarks, and Copyrights 1 2014-07-01 2014-07-01 false Permit to disclose or modification of secrecy order. 5.5 Section 5.5 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND...
Jiao, Haisong; Pu, Tao; Zheng, Jilin; Xiang, Peng; Fang, Tao
2017-05-15
The physical-layer security of a quantum-noise randomized cipher (QNRC) system is, for the first time, quantitatively evaluated with secrecy capacity employed as the performance metric. Considering quantum noise as a channel advantage for legitimate parties over eavesdroppers, the specific wire-tap models for both channels of the key and data are built with channel outputs yielded by quantum heterodyne measurement; the general expressions of secrecy capacities for both channels are derived, where the matching codes are proved to be uniformly distributed. The maximal achievable secrecy rate of the system is proposed, under which secrecy of both the key and data is guaranteed. The influences of various system parameters on secrecy capacities are assessed in detail. The results indicate that QNRC combined with proper channel codes is a promising framework of secure communication for long distance with high speed, which can be orders of magnitude higher than the perfect secrecy rates of other encryption systems. Even if the eavesdropper intercepts more signal power than the legitimate receiver, secure communication (up to Gb/s) can still be achievable. Moreover, the secrecy of running key is found to be the main constraint to the systemic maximal secrecy rate.
Physical-layer security analysis of PSK quantum-noise randomized cipher in optically amplified links
NASA Astrophysics Data System (ADS)
Jiao, Haisong; Pu, Tao; Xiang, Peng; Zheng, Jilin; Fang, Tao; Zhu, Huatao
2017-08-01
The quantitative security of quantum-noise randomized cipher (QNRC) in optically amplified links is analyzed from the perspective of physical-layer advantage. Establishing the wire-tap channel models for both key and data, we derive the general expressions of secrecy capacities for the key against ciphertext-only attack and known-plaintext attack, and that for the data, which serve as the basic performance metrics. Further, the maximal achievable secrecy rate of the system is proposed, under which secrecy of both the key and data is guaranteed. Based on the same framework, the secrecy capacities of various cases can be assessed and compared. The results indicate perfect secrecy is potentially achievable for data transmission, and an elementary principle of setting proper number of photons and bases is given to ensure the maximal data secrecy capacity. But the key security is asymptotically perfect, which tends to be the main constraint of systemic maximal secrecy rate. Moreover, by adopting cascaded optical amplification, QNRC can realize long-haul transmission with secure rate up to Gb/s, which is orders of magnitude higher than the perfect secrecy rates of other encryption systems.
37 CFR 5.5 - Permit to disclose or modification of secrecy order.
Code of Federal Regulations, 2010 CFR
2010-07-01
... to file must be made known, as well as all attorneys, agents and others to whom the material will be....C. 182, shall be made by a “permit” or “modification” of the secrecy order. (b) Petitions for a... explanation of such clearance should be made in the petition including the name of the agency or department...
Pautier, Silvère
2017-09-01
For a long time considered as total and absolute, healthcare professional secrecy is today difficult to reconcile with care practices. Lots of paradoxes question its preservation in favour of general interest and public order against the protection of private interest within an individualistic normative society. Exploring this interrogation, the article's objective is to initiate an ethical discussion from a professional caregiver secrecy's historical and sociological evolution perspective. Thus, with the help of theoretical understandings, especially those by Michel Foucault, medical secrecy is considered a defense of rationality specific to populations' government. This conceptualization finds arguments through social collective norms attached to an alienating biopower at the expense of secrecy integrated as an individualistic and immanent social norm. However, beyond the well-known debate on the absolute necessity for change, evolution… the distance from the Socratic and Hippocratic principles engage people and society in real democratic decisions about Health. Also, health professionals, patients, usgers and society must consider the limits that would lead to medical confidentiality.
Code of Federal Regulations, 2010 CFR
2010-07-01
... TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.27 Substantiation form to... Secret Substantiation Form General Information EPA requires that the information requested in a trade secret substantiation be completed using this substantiation form in order to ensure that all facility...
Code of Federal Regulations, 2014 CFR
2014-07-01
... TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.27 Substantiation form to... Secret Substantiation Form General Information EPA requires that the information requested in a trade secret substantiation be completed using this substantiation form in order to ensure that all facility...
Code of Federal Regulations, 2011 CFR
2011-07-01
... TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.27 Substantiation form to... Secret Substantiation Form General Information EPA requires that the information requested in a trade secret substantiation be completed using this substantiation form in order to ensure that all facility...
Code of Federal Regulations, 2012 CFR
2012-07-01
... TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.27 Substantiation form to... Secret Substantiation Form General Information EPA requires that the information requested in a trade secret substantiation be completed using this substantiation form in order to ensure that all facility...
Code of Federal Regulations, 2013 CFR
2013-07-01
... TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.27 Substantiation form to... Secret Substantiation Form General Information EPA requires that the information requested in a trade secret substantiation be completed using this substantiation form in order to ensure that all facility...
Highly entangled states with almost no secrecy.
Christandl, Matthias; Schuch, Norbert; Winter, Andreas
2010-06-18
In this Letter we illuminate the relation between entanglement and secrecy by providing the first example of a quantum state that is highly entangled, but from which, nevertheless, almost no secrecy can be extracted. More precisely, we provide two bounds on the bipartite entanglement of the totally antisymmetric state in dimension d×d. First, we show that the amount of secrecy that can be extracted from the state is low; to be precise it is bounded by O(1/d). Second, we show that the state is highly entangled in the sense that we need a large amount of singlets to create the state: entanglement cost is larger than a constant, independent of d. In order to obtain our results we use representation theory, linear programming, and the entanglement measure known as squashed entanglement. Our findings also clarify the relation between the squashed entanglement and the relative entropy of entanglement.
What Parents Don’t Know: Disclosure and Secrecy in a Sample of Urban Adolescents
Jäggi, Lena; Drazdowski, Tess K.; Kliewer, Wendy
2016-01-01
Research with two-parent European households has suggested that secrecy, and not disclosure of information per se, predicts adolescent adjustment difficulties. The present study attempted to replicate this finding using data from a 4-wave study of 358 poor, urban adolescents (47% male; M age = 12 yrs) in the United States, most of whom (> 92%) were African American. Adolescents self-reported secrecy, disclosure, depressive symptoms, and delinquency at each wave. Confirmatory factor analyses revealed that a two-factor model with secrecy and disclosure as separate, but correlated, factors was a better fit than a one-factor model. However, predictive models differed from previous research. Secrecy did not predict depressive symptoms, rather depressive symptoms predicted secrecy. For delinquency, there were significant paths from both secrecy to delinquency and delinquency to secrecy, as well as from delinquency to disclosure. These results did not differ by age or sex. Comparisons with previous findings are discussed. PMID:27639590
Secrecy From Parents and Type 1 Diabetes Management in Late Adolescence
Wiebe, Deborah J.; Van Bogart, Karina; Turner, Sara L.; Tucker, Christy; Butner, Jonathan E.; Berg, Cynthia A.
2015-01-01
Objectives This study examined (a) associations of parent–adolescent relationship characteristics and adolescent problem behavior with late adolescents’ secrecy from parents about type 1 diabetes management, and (b) whether secrecy was associated with diabetes and psychological outcomes independently of these factors. Methods Adolescents (N = 247, Mage = 17.76 years) completed survey measures of diabetes-related secrecy from parents, disclosure, parental acceptance, parental knowledge, and conduct problems. Mothers and adolescents reported on adolescent adherence to diabetes regimens and adolescents reported their depressive symptoms. Glycemic control was obtained from HbA1c test kits. Results Adolescent-reported disclosure to parents was uniquely negatively associated with secrecy from parents. Controlling for relationship variables, conduct problems, and sociodemographic and illness-related variables, secrecy from mothers was uniquely associated with poorer glycemic control and secrecy from both parents was associated with lower adherence. Conclusions Secrecy about type 1 diabetes management is uniquely associated with diabetes outcomes independent of other relationship characteristics and problem behaviors. PMID:26136405
Rüsch, Nicolas; Abbruzzese, Elvira; Hagedorn, Eva; Hartenhauer, Daniel; Kaufmann, Ilias; Curschellas, Jan; Ventling, Stephanie; Zuaboni, Gianfranco; Bridler, René; Olschewski, Manfred; Kawohl, Wolfram; Rössler, Wulf; Kleim, Birgit; Corrigan, Patrick W
2014-01-01
Facing frequent stigma and discrimination, many people with mental illness have to choose between secrecy and disclosure in different settings. Coming Out Proud (COP), a 3-week peer-led group intervention, offers support in this domain in order to reduce stigma's negative impact. To examine COP's efficacy to reduce negative stigma-related outcomes and to promote adaptive coping styles (Current Controlled Trials number: ISRCTN43516734). In a pilot randomised controlled trial, 100 participants with mental illness were assigned to COP or a treatment-as-usual control condition. Outcomes included self-stigma, empowerment, stigma stress, secrecy and perceived benefits of disclosure. Intention-to-treat analyses found no effect of COP on self-stigma or empowerment, but positive effects on stigma stress, disclosure-related distress, secrecy and perceived benefits of disclosure. Some effects diminished during the 3-week follow-up period. Coming Out Proud has immediate positive effects on disclosure- and stigma stress-related variables and may thus alleviate stigma's negative impact.
NASA Astrophysics Data System (ADS)
Galison, Peter
2010-02-01
Secrecy in matters of national defense goes back far past antiquity. But our modern form of national secrecy owes a huge amount to a the large scale, systematic, and technical system of scientific secrecy that began in the Radar and Manhattan Projects of World War II and came to its current form in the Cold War. Here I would like to capture some of this trajectory and to present some of the paradoxes and deep conundrums that our secrecy system offers us in the Post-Cold War world. )
EPCRA Trade Secret Forms and Instructions
This form is required in order to substantiate claims of trade secrecy. You must be able to describe safeguarding measures and disclosure history for the specific chemical identity, and identify harm to your competitive position.
The relations between secrecy, rejection sensitivity and autonomy-connectedness.
Wismeijer, Andreas A J; Van Assen, Marcel A L M; Bekker, Marrie H J
2014-01-01
The aim of this study was to examine the effects of two attachment-related variables on secrecy: rejection sensitivity and autonomy-connectedness. We hypothesized that rejection sensitivity is positively associated with secrecy, and autonomy-connectedness negatively with rejection sensitivity and secrecy. These hypotheses were generally corroborated in a sample of 303 university students. Moreover, we found that autonomy-connectedness at least partly explained the association between rejection sensitivity and secrecy. Self-awareness was negatively related to secrecy, suggesting that being aware of what one needs and thinks and being able to realize one's needs in social interactions reduce the tendency to keep secrets. In addition, interesting gender effects were found suggesting that men have a higher tendency to have secrets than women after controlling for the effects of autonomy-connectedness and rejection sensitivity. Our findings deepen the insight into possible reasons behind established associations between rejection sensitivity and secrecy, and may have clinical implications.
12 CFR 21.21 - Procedures for monitoring Bank Secrecy Act (BSA) compliance.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Procedures for monitoring Bank Secrecy Act (BSA... MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Procedures for Monitoring Bank Secrecy Act Compliance § 21.21 Procedures for monitoring Bank...
12 CFR 21.21 - Procedures for monitoring Bank Secrecy Act (BSA) compliance.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Procedures for monitoring Bank Secrecy Act (BSA... MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Procedures for Monitoring Bank Secrecy Act Compliance § 21.21 Procedures for monitoring Bank...
12 CFR 21.21 - Procedures for monitoring Bank Secrecy Act (BSA) compliance.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Procedures for monitoring Bank Secrecy Act (BSA... MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Procedures for Monitoring Bank Secrecy Act Compliance § 21.21 Procedures for monitoring Bank...
12 CFR 21.21 - Procedures for monitoring Bank Secrecy Act (BSA) compliance.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Procedures for monitoring Bank Secrecy Act (BSA... MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Procedures for Monitoring Bank Secrecy Act Compliance § 21.21 Procedures for monitoring Bank...
12 CFR 21.21 - Procedures for monitoring Bank Secrecy Act (BSA) compliance.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Procedures for monitoring Bank Secrecy Act (BSA... MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Procedures for Monitoring Bank Secrecy Act Compliance § 21.21 Procedures for monitoring Bank...
Secrecy From Parents and Type 1 Diabetes Management in Late Adolescence.
Main, Alexandra; Wiebe, Deborah J; Van Bogart, Karina; Turner, Sara L; Tucker, Christy; Butner, Jonathan E; Berg, Cynthia A
2015-01-01
This study examined (a) associations of parent-adolescent relationship characteristics and adolescent problem behavior with late adolescents' secrecy from parents about type 1 diabetes management, and (b) whether secrecy was associated with diabetes and psychological outcomes independently of these factors. Adolescents (N = 247, Mage = 17.76 years) completed survey measures of diabetes-related secrecy from parents, disclosure, parental acceptance, parental knowledge, and conduct problems. Mothers and adolescents reported on adolescent adherence to diabetes regimens and adolescents reported their depressive symptoms. Glycemic control was obtained from HbA1c test kits. Adolescent-reported disclosure to parents was uniquely negatively associated with secrecy from parents. Controlling for relationship variables, conduct problems, and sociodemographic and illness-related variables, secrecy from mothers was uniquely associated with poorer glycemic control and secrecy from both parents was associated with lower adherence. Secrecy about type 1 diabetes management is uniquely associated with diabetes outcomes independent of other relationship characteristics and problem behaviors. © The Author 2015. Published by Oxford University Press on behalf of the Society of Pediatric Psychology. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
What parents don't know: Disclosure and secrecy in a sample of urban adolescents.
Jäggi, Lena; Drazdowski, Tess K; Kliewer, Wendy
2016-12-01
Research with two-parent European households has suggested that secrecy, and not disclosure of information per se, predicts adolescent adjustment difficulties. The present study attempted to replicate this finding using data from a 4-wave study of 358 poor, urban adolescents (47% male; M age = 12 yrs) in the United States, most of whom (>92%) were African American. Adolescents self-reported secrecy, disclosure, depressive symptoms, and delinquency at each wave. Confirmatory factor analyses revealed that a two-factor model with secrecy and disclosure as separate, but correlated, factors was a better fit than a one-factor model. However, predictive models differed from previous research. Secrecy did not predict depressive symptoms, rather depressive symptoms predicted secrecy. For delinquency, there were significant paths from both secrecy to delinquency and delinquency to secrecy, as well as from delinquency to disclosure. These results did not differ by age or sex. Comparisons with previous findings are discussed. Copyright © 2016 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
Itzhaky, Haya; Kissil, Karni
2015-01-01
This qualitative study examined the intersection of sexual orientation and religion in the Jewish Orthodox community by exploring 22 Orthodox Jewish gay men's experiences living in secrecy. Analysis of in-depth interviews conducted with these men revealed four primary themes: emotional turmoil, ways of coping, impact on family relationships, and importance of the context. Findings from this study describe the daily struggles these men experienced keeping their homosexuality a secret. The findings suggest that in order to design effective interventions with this population, it is crucial to consider the larger community and religious context.
Rüsch, Nicolas; Abbruzzese, Elvira; Hagedorn, Eva; Hartenhauer, Daniel; Kaufmann, Ilias; Curschellas, Jan; Ventling, Stephanie; Zuaboni, Gianfranco; Bridler, René; Olschewski, Manfred; Kawohl, Wolfram; Rössler, Wulf; Kleim, Birgit; Corrigan, Patrick W.
2014-01-01
Background Facing frequent stigma and discrimination, many people with mental illness have to choose between secrecy and disclosure in different settings. Coming Out Proud (COP), a 3-week peer-led group intervention, offers support in this domain in order to reduce stigma’s negative impact. Aims To examine COP’s efficacy to reduce negative stigma-related outcomes and to promote adaptive coping styles (Current Controlled Trials number: ISRCTN43516734). Method In a pilot randomised controlled trial, 100 participants with mental illness were assigned to COP or a treatment-as-usual control condition. Outcomes included self-stigma, empowerment, stigma stress, secrecy and perceived benefits of disclosure. Results Intention-to-treat analyses found no effect of COP on self-stigma or empowerment, but positive effects on stigma stress, disclosure-related distress, secrecy and perceived benefits of disclosure. Some effects diminished during the 3-week follow-up period. Conclusions Coming Out Proud has immediate positive effects on disclosure- and stigma stress-related variables and may thus alleviate stigma’s negative impact. PMID:24434073
Cultural Aspects of Secrecy in Global Economy
NASA Astrophysics Data System (ADS)
Serradell-Lopez, Enric; Cavaller, Victor
The main objective of this paper is to provide greater understanding of the nature of secrecy in firms. It presents an effort to develop some links between management of the secrecy and its relationship with culture. Using measures from Hofstede's work, we have linked some dimensions of national culture with CIS 3 UE survey database. The results show that some attributes of the culture as Masculinity and Uncertainty Avoidance have impact on the tendency of the firms for not to patent and maintain secrecy of their innovations.
Common Randomness Principles of Secrecy
ERIC Educational Resources Information Center
Tyagi, Himanshu
2013-01-01
This dissertation concerns the secure processing of distributed data by multiple terminals, using interactive public communication among themselves, in order to accomplish a given computational task. In the setting of a probabilistic multiterminal source model in which several terminals observe correlated random signals, we analyze secure…
Secure communication via an energy-harvesting untrusted relay in the presence of an eavesdropper
NASA Astrophysics Data System (ADS)
Tuan, Van Phu; Kong, Hyung Yun
2018-02-01
This article studies a secure communication of a simultaneous wireless information and power transfer system in which an energy-constrained untrusted relay, which harvests energy from the wireless signals, helps the communication between the source and destination and is able to decode the source's confidential signal. Additionally, the source's confidential signal is also overheard by a passive eavesdropper. To create positive secrecy capacity, a destination-assisted jamming signal that is completely cancelled at the destination is adopted. Moreover, the jamming signal is also exploited as an additional energy source. To evaluate the secrecy performance, analytical expressions for the secrecy outage probability (SOP) and the average secrecy capacity are derived. Moreover, a high-power approximation for the SOP is presented. The accuracy of the analytical results is verified by Monte Carlo simulations. Numerical results provide valuable insights into the effect of various system parameters, such as the energy-harvesting efficiency, secrecy rate threshold, power-splitting ratio, transmit powers, and locations of the relay and eavesdropper, on the secrecy performance.
12 CFR 326.8 - Bank Secrecy Act compliance.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Bank Secrecy Act compliance. 326.8 Section 326.8 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY MINIMUM SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Procedures for...
12 CFR 326.8 - Bank Secrecy Act compliance.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Bank Secrecy Act compliance. 326.8 Section 326.8 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY MINIMUM SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Procedures for...
17 CFR 42.2 - Compliance with Bank Secrecy Act.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Compliance with Bank Secrecy...-MONEY LAUNDERING, TERRORIST FINANCING General Provisions § 42.2 Compliance with Bank Secrecy Act. Every futures commission merchant and introducing broker shall comply with the applicable provisions of the Bank...
ERIC Educational Resources Information Center
Cohen, Steven
This document, a curriculum guide, grew out of a symposium on the role of secrecy in U.S. foreign policy. The curriculum examines ways in which citizens get information about the government and how government secrecy influences that information. Students analyze covert U.S. involvement in such places as Iran, Guatemala, and Cuba, and consider the…
78 FR 78513 - Bank Secrecy Act Advisory Group; Solicitation of Application for Membership
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-26
... DEPARTMENT OF THE TREASURY Financial Crimes Enforcement Network Bank Secrecy Act Advisory Group; Solicitation of Application for Membership AGENCY: Financial Crimes Enforcement Network (``FinCEN''), Treasury... institutions and trade groups for membership on the Bank Secrecy Act Advisory Group. New members will be...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-26
... Activities; Proposed Information Collection; Comment Request; Bank Secrecy Act/Money Laundering Risk... entitled, ``Bank Secrecy Act/Money Laundering Risk Assessment,'' also known as the Money Laundering Risk... collection of information set forth in this document. Bank Secrecy Act/Money Laundering Risk Assessment (OMB...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-08
... Activities; Submission for OMB Review; Comment Request; Bank Secrecy Act/Money Laundering Risk Assessment... information collection titled ``Bank Secrecy Act/Money Laundering Risk Assessment,'' also known as the Money... for review and clearance. Bank Secrecy Act/Money Laundering Risk Assessment (OMB Control Number 1557...
17 CFR 42.2 - Compliance with Bank Secrecy Act.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Compliance with Bank Secrecy Act. 42.2 Section 42.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION ANTI-MONEY LAUNDERING, TERRORIST FINANCING General Provisions § 42.2 Compliance with Bank Secrecy Act. Every...
ERIC Educational Resources Information Center
Almas, Alisa N.; Grusec, Joan E.; Tackett, Jennifer L.
2011-01-01
The relations between maternal parenting characteristics, child disclosure and secrecy, and child outcomes (positive and negative strategies for coping with distress), were examined in a study of 140 children (10-12-year-olds) and their mothers. Child disclosure and secrecy were shown to be distinct but related constructs with authoritativeness…
A New Three Dimensional Based Key Generation Technique in AVK
NASA Astrophysics Data System (ADS)
Banerjee, Subhasish; Dutta, Manash Pratim; Bhunia, Chandan Tilak
2017-08-01
In modern era, ensuring high order security becomes one and only objective of computer networks. From the last few decades, many researchers have given their contributions to achieve the secrecy over the communication channel. In achieving perfect security, Shannon had done the pioneer work on perfect secret theorem and illustrated that secrecy of the shared information can be maintained if the key becomes variable in nature instead of static one. In this regard, a key generation technique has been proposed where the key can be changed every time whenever a new block of data needs to be exchanged. In our scheme, the keys not only vary in bit sequences but also in size. The experimental study is also included in this article to prove the correctness and effectiveness of our proposed technique.
Adler, Adir; Ben-Ari, Adital
2017-01-01
The phenomenon of mixed-orientation marriages, in which one of the partners is straight and the other is non-straight, is invisible, yet not insignificant. Focusing on gay and bisexual men who are married to straight women, this article was designed to explore one of the essential themes in their relationship: the dynamics between secrecy and openness regarding the men's sexual orientation and gay practices. Based on the phenomenological paradigm, 38 men and eight women of mixed-orientation marriages in Israel were interviewed and shared their subjective life reality. Six patterns of secrecy and openness were identified, including complete secrecy, conspiracy of silence, initiated concealment (of the husband and wife), disloyalty/violation of the agreement, selective sharing, and complete openness. The findings challenge the idea that secrecy is detrimental and openness is beneficial in the context of mixed-orientation marriages. Findings are discussed within the framework of the dialectical approach.
From classified to commonplace: the trajectory of the hydrogen bomb 'secret'.
Wellerstein, Alex
2008-06-01
The secret of the hydrogen bomb went from being an icon of nuclear secrecy to something that could be widely reproduced on the Internet and in children's textbooks. The rise and fall of the H-bomb secret reveals both changing attitudes towards state secrecy in general and the contingent nature of secrecy, depending on an imagined threat as guidance.
12 CFR 741.214 - Report of crime or catastrophic act and Bank Secrecy Act compliance.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Report of crime or catastrophic act and Bank Secrecy Act compliance. 741.214 Section 741.214 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION... Unions § 741.214 Report of crime or catastrophic act and Bank Secrecy Act compliance. Any credit union...
22 CFR 120.10 - Technical data.
Code of Federal Regulations, 2013 CFR
2013-04-01
... software as defined in § 120.10(a)(4), which is required for the design, development, production... by an invention secrecy order; (4) Software as defined in § 121.8(f) of this subchapter directly... information in the public domain as defined in § 120.11. It also does not include basic marketing information...
22 CFR 120.10 - Technical data.
Code of Federal Regulations, 2011 CFR
2011-04-01
... software as defined in § 120.10(a)(4), which is required for the design, development, production... by an invention secrecy order; (4) Software as defined in § 121.8(f) of this subchapter directly... information in the public domain as defined in § 120.11. It also does not include basic marketing information...
22 CFR 120.10 - Technical data.
Code of Federal Regulations, 2012 CFR
2012-04-01
... software as defined in § 120.10(a)(4), which is required for the design, development, production... by an invention secrecy order; (4) Software as defined in § 121.8(f) of this subchapter directly... information in the public domain as defined in § 120.11. It also does not include basic marketing information...
22 CFR 120.10 - Technical data.
Code of Federal Regulations, 2014 CFR
2014-04-01
... software as defined in § 120.10(a)(4), which is required for the design, development, production... invention secrecy order; or (4) Software as defined in § 121.8(f) of this subchapter directly related to..., and universities or information in the public domain as defined in § 120.11 of this subchapter. It...
Freedom of Speech Newsletter, May 1976.
ERIC Educational Resources Information Center
Allen, Winfred G., Jr., Ed.
This issue of the "Freedom of Speech Newsletter" contains three articles. "Big Brother, 1976--Judges and the Gag Order" by Miles Clark examines constitutional censorship of the media and government secrecy. "Democratic Rights: A Socialist View" by Kipp Dawson argues that "the rulers of the United States have never granted the American people any…
Secrets from friends and parents: longitudinal links with depression and antisocial behavior.
Laird, Robert D; Bridges, Brittanee J; Marsee, Monica A
2013-08-01
Keeping secrets from parents is associated with depression and antisocial behavior. The current study tested whether keeping secrets from best friends is similarly linked to maladjustment, and whether associations between secrecy and maladjustment are moderated by the quality of the friendship. Adolescents (N = 181; 51% female, 48% white, non-Hispanic, 45% African American) reported their secrecy from parents and best friends, the quality of their parent-adolescent relationships and best friendships, and their depression and antisocial behavior at ages 12 and 13. Keeping more secrets from best friends was associated with more depression, but not with more antisocial behavior, when controlling for earlier adjustment, secrecy from parents, and the quality of the friendship. For girls associations between maladjustment and secrecy were conditioned by the quality of the relationships and whether secrets were kept from parents and friends. Discussion argues for expanding the study of secrecy in adolescence beyond the parent-child dyad. Copyright © 2013 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
van den Heuvel, Charles; Weingart, Scott B; Spelt, Nils; Nellen, Henk
2016-01-01
Science in the early modern world depended on openness in scholarly communication. On the other hand, a web of commercial, political, and religious conflicts required broad measures of secrecy and confidentiality; similar measures were integral to scholarly rivalries and plagiarism. This paper analyzes confidentiality and secrecy in intellectual and technological knowledge exchange via letters and drawings. We argue that existing approaches to understanding knowledge exchange in early modern Europe--which focus on the Republic of Letters as a unified entity of corresponding scholars--can be improved upon by analyzing multilayered networks of communication. We describe a data model to analyze circles of confidence and cultures of secrecy in intellectual and technological knowledge exchanges. Finally, we discuss the outcomes of a first experiment focusing on the question of how personal and professional/official relationships interact with confidentiality and secrecy, based on a case study of the correspondence of Hugo Grotius.
Mental illness stigma, secrecy and suicidal ideation.
Oexle, N; Ajdacic-Gross, V; Kilian, R; Müller, M; Rodgers, S; Xu, Z; Rössler, W; Rüsch, N
2017-02-01
Whether the public stigma associated with mental illness negatively affects an individual, largely depends on whether the person has been labelled 'mentally ill'. For labelled individuals concealing mental illness is a common strategy to cope with mental illness stigma, despite secrecy's potential negative consequences. In addition, initial evidence points to a link between stigma and suicidality, but quantitative data from community samples are lacking. Based on previous literature about mental illness stigma and suicidality, as well as about the potential influence of labelling processes and secrecy, a theory-driven model linking perceived mental illness stigma and suicidal ideation by a mediation of secrecy and hopelessness was established. This model was tested separately among labelled and unlabelled persons using data derived from a Swiss cross-sectional population-based study. A large community sample of people with elevated psychiatric symptoms was examined by interviews and self-report, collecting information on perceived stigma, secrecy, hopelessness and suicidal ideation. Participants who had ever used mental health services were considered as labelled 'mentally ill'. A descriptive analysis, stratified logistic regression models and a path analysis testing a three-path mediation effect were conducted. While no significant differences between labelled and unlabelled participants were observed regarding perceived stigma and secrecy, labelled individuals reported significantly higher frequencies of suicidal ideation and feelings of hopelessness. More perceived stigma was associated with suicidal ideation among labelled, but not among unlabelled individuals. In the path analysis, this link was mediated by increased secrecy and hopelessness. Results from this study indicate that among persons labelled 'mentally ill', mental illness stigma is a contributor to suicidal ideation. One explanation for this association is the relation perceived stigma has with secrecy, which introduces negative emotional consequences. If our findings are replicated, they would suggest that programmes empowering people in treatment for mental illness to cope with anticipated and experienced discrimination as well as interventions to reduce public stigma within society could improve suicide prevention.
10 CFR 725.23 - Terms and conditions of access.
Code of Federal Regulations, 2010 CFR
2010-01-01
... enrichment of special nuclear material any U.S. patent or any U.S. patent application (otherwise in condition... application and all claims for just compensation under section 173 of the Atomic Energy Act of 1954, with... 35 U.S. Code by reason of the imposition of any secrecy order on any patent application, and all...
10 CFR 725.23 - Terms and conditions of access.
Code of Federal Regulations, 2011 CFR
2011-01-01
... enrichment of special nuclear material any U.S. patent or any U.S. patent application (otherwise in condition... application and all claims for just compensation under section 173 of the Atomic Energy Act of 1954, with... 35 U.S. Code by reason of the imposition of any secrecy order on any patent application, and all...
Silence and Memories of War: An Autoethnographic Exploration of Family Secrecy.
Rober, Peter; Rosenblatt, Paul C
2017-03-01
A personal journey and a scientific challenge, this is an autoethnographic study about my own family's secrecy. I knew my grandfather had been a German prisoner of war during World War II. We all knew. But nobody talked about it. Then one day I decided I wanted to do systematic research on the issue of family secrecy around my grandfather's war experiences. Researching one's own family can be called autoethnography. It could be said that autoethnography is an approach to research that aims to describe and systemically analyze (graphy) personal experience (auto) to understand social and cultural phenomena (ethno). This scientific approach is quite new in the field of family therapy. This study has been an important personal quest, but it also led to important reflections on silences in families, on my own professional development, and on methodological issues concerning autoethnographical research. For one thing, it highlights some of the positive aspects of family secrecy and silences, and invites us-when confronted with family secrecy in clinical practice-to carefully consider the potential destructive and life-giving aspects of the silence. © 2015 Family Process Institute.
[Professional secrecy and the divulgence of information in the veterinary profession].
Van der Made, H N
1987-03-01
Aspects of professional secrecy as applied to the veterinary profession are examined. The origin and the modern basis of this precept are referred to. Consideration is given to its application in the Veterinary and Paraveterinary Professions Act, the common law liability of the veterinarian employed in industry, the veterinarian negotiating the purchase of a practice, and its application to moral, ethical and contractual obligations. The need to dispense with professional secrecy in emergency situations is examined, as well as an approach for the discussion of clinical cases amongst colleagues, publication of such cases in scientific journals and the application in a situation where a veterinarian is being sued by a client. Professional secrecy is also examined where the veterinarian is employed in the Public Service and where an obligation arises to give evidence in civil and criminal court proceedings.
2012-01-01
Summary Professional secrecy of doctors became an issue of considerable medico-legal and political debate in the late nineteenth and early twentieth centuries in both Germany and England, although the legal preconditions for this debate were quite different in the two countries. While in Germany medical confidentiality was a legal obligation and granted in court, no such statutory recognition of doctors’ professional secrecy existed in England. This paper is a comparative analysis of medical secrecy in three key areas - divorce trials, venereal disease and abortion - in both countries. Based on sources from the period between c.1870 and 1939, our paper shows how doctors tried to define the scope of professional secrecy as an integral part of their professional honour in relation to important matters of public health. PMID:21077462
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-07
... effectiveness of its anti-money laundering and counter-terrorist financing policies. \\1\\ These customers are... enforcement purposes. \\6\\ See section 402 of the Money Laundering Suppression Act of 1994 (the ``Money...\\ 31 U.S.C. 5311. \\4\\ Treasury Order 180-01 (Sept. 26, 2002). \\5\\ 31 U.S.C. 5318(h)(2). The Money...
76 FR 18365 - Fair Credit Reporting Act and Bank Secrecy Act Compliance
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-04
... Asked Questions, and the FFIEC Bank Secrecy Act/Anti-Money Laundering Examination Manual. (iii... credit union, its officials, employees, and agents to the assessment of civil money penalties or other...
Are You Pregnant and Thinking about Adoption?
... stories . O.J. Howard Publishing. Siegel, D.H., & Smith, S.L. (2012). Openness in adoption: From secrecy and ... from- secrecy- and- stigma- to- knowledge- and- connections/ Smith, S. (2007). Safeguarding the rights and well-being of ...
Secrecy, Simultaneous Discovery, and the Theory of Nuclear Reactors
ERIC Educational Resources Information Center
Weart, Spencer
1977-01-01
Discusses the simultaneous discovery of the four-factor formula in various countries, the influence of secrecy in preventing the sharing of discovery, and the resultant direction in the development of nuclear reactor theory. (SL)
40 CFR 350.16 - Address to send trade secrecy claims and petitions requesting disclosure.
Code of Federal Regulations, 2013 CFR
2013-07-01
... SECRECY CLAIMS FOR EMERGENCY PLANNING AND COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET... chemical identities claimed as trade secret are posted on the following EPA Program Web sites, http://www...
40 CFR 350.16 - Address to send trade secrecy claims and petitions requesting disclosure.
Code of Federal Regulations, 2014 CFR
2014-07-01
... SECRECY CLAIMS FOR EMERGENCY PLANNING AND COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET... chemical identities claimed as trade secret are posted on the following EPA Program Web sites, http://www...
12 CFR 563.180 - Suspicious Activity Reports and other reports and statements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... transaction related to a money laundering activity or a violation of the Bank Secrecy Act. (2) Definitions... more that involve potential money laundering or violations of the Bank Secrecy Act. Any transaction...
The semantics of secrecy: young children's classification of secret content.
Anagnostaki, Lida; Wright, Michael J; Bourchier-Sutton, Alison J
2010-01-01
The authors explored whether young children can distinguish potential secrets from nonsecrets by their content, as can older children, adolescents, and adults. Ninety children, 4, 5, and 6 years old, rated the secrecy of items from an adult-validated list of personal information about an age- and gender-appropriate puppet. Two factors of the children's data corresponded to the adult categories of nonsecrets and secrets, and a third factor corresponded to surprises. All ages rated surprises as significantly more secret than nonsecret items; however, the surprise items contained linguistic cues to secrecy. A tendency to rate nonsecrets as secret decreased with age, but only the 6-year-olds rated secrets other than surprises as significantly more secret than nonsecrets. Thus, children acquire the implicit rules defining secret content from a somewhat later age than that reported for the cognitive or behavioral capacities for secrecy.
Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai
2017-11-21
Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation-the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.
Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai
2017-01-01
Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions. PMID:29160861
An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers.
Zapateiro De la Hoz, Mauricio; Acho, Leonardo; Vidal, Yolanda
2015-01-01
Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. Chaos-based encryption techniques are being widely studied as part of the problem because of the highly unpredictable and random-look nature of the chaotic signals. In this paper we propose a digital-based communication system that uses the logistic map which is a mathematically simple model that is chaotic under certain conditions. The input message signal is modulated using a simple Delta modulator and encrypted using a logistic map. The key signal is also encrypted using the same logistic map with different initial conditions. In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. The proposed scheme is experimentally tested using Arduino shields which are simple yet powerful development kits that allows for the implementation of the communication system for testing purposes.
NASA Astrophysics Data System (ADS)
Quang Nguyen, Sang; Kong, Hyung Yun
2016-11-01
In this article, the presence of multi-hop relaying, eavesdropper and co-channel interference (CCI) in the same system model is investigated. Specifically, the effect of CCI on a secured multi-hop relaying network is studied, in which the source communicates with the destination via multi-relay-hopping under the presence of an eavesdropper and CCI at each node. The optimal relay at each cluster is selected to help forward the message from the source to the destination. We apply two relay selection approaches to such a system model, i.e. the optimal relay is chosen based on (1) the maximum channel gain from the transmitter to all relays in the desired cluster and (2) the minimum channel gain from the eavesdropper to all relays in each cluster. For the performance evaluation and comparison, we derived the exact closed form of the secrecy outage probability of the two approaches. That analysis is verified by Monte Carlo simulation. Finally, the effects of the number of hops, the transmit power at the source, relays and the external sources, the distance between the external sources and each node in the system, and the location of the eavesdropper are presented and discussed.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-09
... FEDERAL DEPOSIT INSURANCE CORPORATION Agency Information Collection Activities: Proposed Collection Renewal; Comment Request Re: Procedures for Monitoring Bank Secrecy Act Compliance AGENCY: Federal... agencies to take this opportunity to comment on renewal of its Procedures for Monitoring Bank Secrecy Act...
75 FR 6434 - Procedures for Monitoring Secrecy Act Compliance
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-09
... Act commonly known as the `Bank Secrecy Act' (``BSA''). The Money Laundering Control Act of 1986... Deposit Insurance Act, which applies to savings associations. Specifically, Section 1359 of the Anti-Drug... examine savings association procedures periodically to ensure their effectiveness; OTS is therefore...
78 FR 23916 - Secrecy and License To Export
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-23
... DEPARTMENT OF COMMERCE Patent and Trademark Office Secrecy and License To Export ACTION: Proposed collection; comment request. SUMMARY: The United States Patent and Trademark Office (USPTO), as part of its continuing effort to reduce paperwork and respondent burden, invites the general public and other Federal...
40 CFR 350.11 - Review of claim.
Code of Federal Regulations, 2014 CFR
2014-07-01
... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.11 Review of... also inform the submitter of his right to claim any trade secret or confidential business information... proper procedure for claiming trade secrecy for trade secret or confidential business information...
40 CFR 350.5 - Assertion of claims of trade secrecy.
Code of Federal Regulations, 2011 CFR
2011-07-01
... COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy... (d)(3), the submitter may claim as trade secret the specific chemical identity of any chemical... local emergency planning committee, with the chemical identity or identities claimed trade secret...
40 CFR 350.5 - Assertion of claims of trade secrecy.
Code of Federal Regulations, 2012 CFR
2012-07-01
... COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy... (d)(3), the submitter may claim as trade secret the specific chemical identity of any chemical... local emergency planning committee, with the chemical identity or identities claimed trade secret...
40 CFR 350.11 - Review of claim.
Code of Federal Regulations, 2011 CFR
2011-07-01
... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.11 Review of... also inform the submitter of his right to claim any trade secret or confidential business information... proper procedure for claiming trade secrecy for trade secret or confidential business information...
40 CFR 350.5 - Assertion of claims of trade secrecy.
Code of Federal Regulations, 2010 CFR
2010-07-01
... COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy... (d)(3), the submitter may claim as trade secret the specific chemical identity of any chemical... local emergency planning committee, with the chemical identity or identities claimed trade secret...
40 CFR 350.11 - Review of claim.
Code of Federal Regulations, 2010 CFR
2010-07-01
... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.11 Review of... also inform the submitter of his right to claim any trade secret or confidential business information... proper procedure for claiming trade secrecy for trade secret or confidential business information...
40 CFR 350.11 - Review of claim.
Code of Federal Regulations, 2012 CFR
2012-07-01
... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.11 Review of... also inform the submitter of his right to claim any trade secret or confidential business information... proper procedure for claiming trade secrecy for trade secret or confidential business information...
40 CFR 350.5 - Assertion of claims of trade secrecy.
Code of Federal Regulations, 2014 CFR
2014-07-01
... COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy... (d)(3), the submitter may claim as trade secret the specific chemical identity of any chemical... local emergency planning committee, with the chemical identity or identities claimed trade secret...
40 CFR 350.11 - Review of claim.
Code of Federal Regulations, 2013 CFR
2013-07-01
... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.11 Review of... also inform the submitter of his right to claim any trade secret or confidential business information... proper procedure for claiming trade secrecy for trade secret or confidential business information...
40 CFR 350.5 - Assertion of claims of trade secrecy.
Code of Federal Regulations, 2013 CFR
2013-07-01
... COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy... (d)(3), the submitter may claim as trade secret the specific chemical identity of any chemical... local emergency planning committee, with the chemical identity or identities claimed trade secret...
Openness versus Secrecy in Scientific Research Abstract
Resnik, David B.
2009-01-01
Openness is one of the most important principles in scientific inquiry, but there are many good reasons for maintaining secrecy in research, ranging from the desire to protect priority, credit, and intellectual property, to the need to safeguard the privacy of research participants or minimize threats to national or international security. This article examines the clash between openness and secrecy in science in light of some recent developments in information technology, business, and politics, and makes some practical suggestions for resolving conflicts between openness and secrecy. “By academic freedom I understand the right to search for the truth and to publish and teach what one holds to be true. This right also implies a duty; one must not conceal any part of what one has recognized to be true. It is evident that any restriction of academic freedom serves to restrain the dissemination of knowledge, thereby impeding rational judgment and action.” Albert Einstein, quotation inscribed on his statute in front of the National Academy of Sciences, Washington, DC. PMID:21113394
Associations Between Secret-Keeping and Quality of Life in Older Adults.
Maas, Joyce; Wismeijer, Andreas A J; Van Assen, Marcel A L M
2018-01-01
This study examined the effects of secrecy on quality of life in a sample consisting of older adults (>50 years; N = 301). Three key components of secrecy were examined with the Tilburg Secrecy Scale-25 (TSS25; possession of a secret, self-concealment, and cognitive preoccupation). The TSS25 distinguishes between the tendency to conceal personal information (self-concealment) and the tendency to worry or ruminate about the secret (cognitive preoccupation), thereby enabling investigation of the effects of secrecy on quality of life in detail. Confirming previous findings in younger samples, we found a positive effect of possession of a secret on quality of life, after controlling for both TSS25's self-concealment and cognitive preoccupation. This suggests that keeping secrets may have a positive association with quality of life in older adults as well, as long as they do not have the tendency to self-conceal and are not cognitively preoccupied with their secret.
Openness versus Secrecy in Scientific Research Abstract.
Resnik, David B
2006-02-01
Openness is one of the most important principles in scientific inquiry, but there are many good reasons for maintaining secrecy in research, ranging from the desire to protect priority, credit, and intellectual property, to the need to safeguard the privacy of research participants or minimize threats to national or international security. This article examines the clash between openness and secrecy in science in light of some recent developments in information technology, business, and politics, and makes some practical suggestions for resolving conflicts between openness and secrecy."By academic freedom I understand the right to search for the truth and to publish and teach what one holds to be true. This right also implies a duty; one must not conceal any part of what one has recognized to be true. It is evident that any restriction of academic freedom serves to restrain the dissemination of knowledge, thereby impeding rational judgment and action."Albert Einstein, quotation inscribed on his statute in front of the National Academy of Sciences, Washington, DC.
75 FR 19463 - Procedures for Monitoring Bank Secrecy Act Compliance
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-14
... `Bank Secrecy Act' (``BSA''). The Money Laundering Control Act of 1986 further augmented the BSA's... savings associations. Specifically, Section 1359 of the Anti-Drug Abuse Act of 1986, Public Law 99-570... of Thrift Supervision (``OTS'') is charged with the responsibility to examine savings association...
Constraints on gene patent protection fuel secrecy concerns: a qualitative study
Guerrini, Christi J; McGuire, Amy L; Majumder, Mary A; Bollinger, Juli M; Rowan, Paul J
2017-01-01
Abstract Concern is mounting that innovators are responding to recent changes in patent eligibility by increasingly choosing to protect their discoveries as trade secrets. Due to the clandestine nature of trade secrets, it is impossible to quantify the extent to which innovators actually elect to protect their inventions as trade secrets rather than patents. Nevertheless, interest in each strategy may be gauged through qualitative means. We conducted semi-structured interviews of legal and scientific experts (n = 30) to understand the effect of recent patent eligibility changes on interest in patenting and trade secrecy of genetic innovations. Interview data indicate that secrecy may have increased in strategic appeal relative to patent protection in some areas of genetic innovation, although the actual election of secrecy strategies is often limited as a practical matter. The data also suggest that the burden of navigating the new intellectual property landscape may be falling disproportionately on those who translate gene-based discoveries into clinical applications. Some interviewees expressed concern about the normative implications of secrecy on advancements in and access to genetic medicine. Our findings are potentially relevant to policy proposals intended to restore some of the legal protection that was lost as a result of recent changes to patent eligibility, including amending the federal patent statute and expanding regulatory exclusivities for some genetic technologies. PMID:29868184
12 CFR 208.63 - Procedures for monitoring Bank Secrecy Act compliance.
Code of Federal Regulations, 2010 CFR
2010-01-01
... compliance. 208.63 Section 208.63 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM MEMBERSHIP OF STATE BANKING INSTITUTIONS IN THE FEDERAL RESERVE SYSTEM (REGULATION H) Miscellaneous Requirements § 208.63 Procedures for monitoring Bank Secrecy Act compliance. (a) Purpose. This...
40 CFR 350.7 - Substantiating claims of trade secrecy.
Code of Federal Regulations, 2010 CFR
2010-07-01
... COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy... chemical identity claimed as trade secret, and indicate whether these measures will continue in the future. (2) Have you disclosed the information claimed as trade secret to any other person (other than a...
40 CFR 350.7 - Substantiating claims of trade secrecy.
Code of Federal Regulations, 2011 CFR
2011-07-01
... COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy... chemical identity claimed as trade secret, and indicate whether these measures will continue in the future. (2) Have you disclosed the information claimed as trade secret to any other person (other than a...
40 CFR 350.7 - Substantiating claims of trade secrecy.
Code of Federal Regulations, 2014 CFR
2014-07-01
... COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy... chemical identity claimed as trade secret, and indicate whether these measures will continue in the future. (2) Have you disclosed the information claimed as trade secret to any other person (other than a...
40 CFR 350.7 - Substantiating claims of trade secrecy.
Code of Federal Regulations, 2012 CFR
2012-07-01
... COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy... chemical identity claimed as trade secret, and indicate whether these measures will continue in the future. (2) Have you disclosed the information claimed as trade secret to any other person (other than a...
40 CFR 350.7 - Substantiating claims of trade secrecy.
Code of Federal Regulations, 2013 CFR
2013-07-01
... COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy... chemical identity claimed as trade secret, and indicate whether these measures will continue in the future. (2) Have you disclosed the information claimed as trade secret to any other person (other than a...
75 FR 2929 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-19
... soliciting comments concerning an information collection titled ``Bank Secrecy Act/Money Laundering Risk Assessment'' (a.k.a. Money Laundering Risk (MLR) System). The OCC also gives notice that it has sent the... approval for the following information collection: Title: Bank Secrecy Act/Anti-Money Laundering Risk...
The Curse of Interesting Times.
ERIC Educational Resources Information Center
Krug, Judith F.
The Watergate scandal has profoundly shaken the confidence of the American people in their government. One aspect of Watergate which can be immediately corrected is that of secrecy. In the abolition of secrecy and the defense of intellectual freedom, librarians have a role to play. American librarianship has taken upon itself the task of providing…
Disclosure and Secrecy in Adolescent-Parent Relationships
ERIC Educational Resources Information Center
Smetana, Judith G.; Metzger, Aaron; Gettman, Denise C.; Campione-Barr, Nicole
2006-01-01
Beliefs about parents' legitimate authority and adolescents' obligations to disclose to parents and actual disclosure and secrecy in different domains were examined in 276 ethnically diverse, lower middle-class 9th and 12th graders (Ms= 14.62 and 17.40 years) and their parents (n=249). Adolescents were seen as more obligated to disclose prudential…
ERIC Educational Resources Information Center
Diezmann, Carmel M.
2018-01-01
Many Australian universities have prioritised improving discipline performance on the national research assessment--Excellence for Research in Australia. However, a "culture of secrecy" pervades "Excellence in Research for Australia" (ERA). There are no specified criteria for the assignment of ratings on a 5-point scale ranging…
Corsano, Paola; Musetti, Alessandro; Caricati, Luca; Magnani, Barbara
2017-07-01
The tendency to keep secrets in adolescents has been studied in particular in their relationships with their parents and associated with psychosocial disadvantages. The current study focused on peer relationships and investigated the effects of friendship quality, loneliness in a multidimensional perspective, and self-esteem on secrecy from friends. Italian adolescents (N = 457; 47% male; 100% white) aged between 13 and 19 years (M = 16.11; SD = 1.53) reported their secrecy from friends, peer and parent-related loneliness, aversion and affinity for aloneness, their self-esteem and the quality of their relationships with their friends. The results showed that peer-related loneliness, affinity for aloneness and self-esteem in particular affect keeping secrets from friends, independent of the participant's gender. Moreover, peer-related loneliness and affinity for aloneness mediated the relationship between self-esteem and secrecy. The data were discussed in the light of adolescence developmental tasks. Copyright © 2017 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
Dollars, lobbying, and secrecy: how campaign contributions and lobbying affect public policy.
Seymour, Whitney North; Seymour, Gabriel North
2013-01-01
Public policy is too often determined not by the merits of the case but, rather, by individuals, corporations, and even countries who buy influence and alter public policy for the benefit of only a few. As a wrap-up for this conference on "Corporate Interference with Science and Health: Fracking, Food and Wireless," it is our intent to provide a personal story of how money can buy favors and determine policies that are often counter to the public interest and can even lead to failure to protect the health of the public. Given our background in law specific to the US, the basis of our evidence comes from legal rulings as well as legislative actions that have had an impact on policies in the US. While the specifics of governments vary, related activities surrounding money, lobbying, who knows who, and how decisions are made in secret to benefit a few are events that occur everywhere.
Engaging adolescent girls in transactional sex through compensated dating.
Cheung, Chau-Kiu; Jia, Xinshan; Li, Jessica Chi-Mei; Lee, Tak-Yan
2016-10-01
Transactional sex through so-called compensated dating in adolescent girls is a problem in need of public concern. Compensated dating typically involves the use of information communication technology to advertise, search, bargain, and eventually arrange for transactional sex. The technology enables the sexual partners to maintain privacy and secrecy in transactional sex. Such secrecy necessitates the girls' disclosure about their life experiences in order to address the concern. The disclosure is the focus of the present qualitative study of 27 girls practicing the dating in Hong Kong, China. Based on the disclosure, the study presents a grounded theory that epitomizes engagement in compensated dating by referential choice. Such a referential choice theory unravels that choice with reference to the family push and social norms sustains the engagement. Meanwhile, the choice rests on expectancy and reinforcement from experiential learning about compensated dating. The theory thus implies ways to undercut the engagement through diverting the referential choice of the dating. Copyright © 2016 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers
Zapateiro De la Hoz, Mauricio; Vidal, Yolanda
2015-01-01
Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. Chaos-based encryption techniques are being widely studied as part of the problem because of the highly unpredictable and random-look nature of the chaotic signals. In this paper we propose a digital-based communication system that uses the logistic map which is a mathematically simple model that is chaotic under certain conditions. The input message signal is modulated using a simple Delta modulator and encrypted using a logistic map. The key signal is also encrypted using the same logistic map with different initial conditions. In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. The proposed scheme is experimentally tested using Arduino shields which are simple yet powerful development kits that allows for the implementation of the communication system for testing purposes. PMID:26413563
Gender Differences in Keeping Secrets from Parents in Adolescence
ERIC Educational Resources Information Center
Keijsers, Loes; Branje, Susan J. T.; Frijns, Tom; Finkenauer, Catrin; Meeus, Wim
2010-01-01
The current longitudinal study examined adolescent gender differences in the developmental changes and relational correlates of secrecy from parents. For 4 successive years, starting in the second year of junior high (mean age at Time 1 = 13.2 years, SD = 0.51), 149 male and 160 female Dutch adolescents reported on secrecy from their parents and…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-15
...; Amendment to the Bank Secrecy Act Regulations; Defining Mutual Funds as Financial Institutions; Extension of... those provisions in 31 CFR 103.33 that apply to mutual funds. On April 14, 2010, FinCEN issued a final rule that included mutual funds within the general definition of ``financial institution'' in...
Shared Secrets versus Secrets Kept Private Are Linked to Better Adolescent Adjustment
ERIC Educational Resources Information Center
Frijns, Tom; Finkenauer, Catrin; Keijsers, Loes
2013-01-01
It is a household notion that secrecy is bad while sharing is good. But what about shared secrets? The present research adopts a functional analysis of sharing secrets, arguing that it should negate harmful consequences generally associated with secrecy and serves important interpersonal functions in adolescence. A survey study among 790 Dutch…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-28
... Iran as a Jurisdiction of Primary Money Laundering Concern AGENCY: Financial Crimes Enforcement Network... Republic of Iran (``Iran'') is a jurisdiction of primary money laundering concern pursuant to 31 U.S.C... Act amends the anti- money laundering provisions of the Bank Secrecy Act (``BSA''), codified at 12 U.S...
ERIC Educational Resources Information Center
Einsiedel, Edna F.
Despite a tradition of government secrecy, Canada recently adopted freedom of information legislation. Reflecting greater public and media interest in the issue of public access to information and government secrecy, Bill C-34, the Access to Information Act, received royal assent in 1982, as did a privacy act, enacted to protect the complementary…
NASA Astrophysics Data System (ADS)
Boche, Holger; Cai, Minglai; Deppe, Christian; Nötzel, Janis
2017-10-01
We analyze arbitrarily varying classical-quantum wiretap channels. These channels are subject to two attacks at the same time: one passive (eavesdropping) and one active (jamming). We elaborate on our previous studies [H. Boche et al., Quantum Inf. Process. 15(11), 4853-4895 (2016) and H. Boche et al., Quantum Inf. Process. 16(1), 1-48 (2016)] by introducing a reduced class of allowable codes that fulfills a more stringent secrecy requirement than earlier definitions. In addition, we prove that non-symmetrizability of the legal link is sufficient for equality of the deterministic and the common randomness assisted secrecy capacities. Finally, we focus on analytic properties of both secrecy capacities: We completely characterize their discontinuity points and their super-activation properties.
Disclosure and secrecy in adolescent-parent relationships.
Smetana, Judith G; Metzger, Aaron; Gettman, Denise C; Campione-Barr, Nicole
2006-01-01
Beliefs about parents' legitimate authority and adolescents' obligations to disclose to parents and actual disclosure and secrecy in different domains were examined in 276 ethnically diverse, lower middle-class 9th and 12th graders (Ms=14.62 and 17.40 years) and their parents (n=249). Adolescents were seen as more obligated to disclose prudential issues and less obligated to disclose personal than moral, conventional, and multifaceted issues; parents viewed adolescents as more obligated to disclose to parents than adolescents perceived themselves to be. Adolescents disclosed more to mothers than to fathers, particularly regarding personal issues, but mothers overestimated girls' disclosure. Greater trust, perceived obligations to disclose, and, for personal issues, more parental acceptance and psychological control predicted more disclosure and less secrecy.
ERIC Educational Resources Information Center
Bourke, Jaron
Harvard Watch asserts that withholding essential information from public scrutiny is not uncommon at Harvard University. Maintaining that Harvard has reversed its position from extolling the virtues of public disclosure to one of imposing secrecy, the document suggests that this about face is linked to the university's recent collaboration with…
31 CFR 1.36 - Systems exempt in whole or in part from provisions of 5 U.S.C. 552a and this part.
Code of Federal Regulations, 2012 CFR
2012-07-01
... .003 Bank Secrecy Act Reports System. (2) The Department hereby exempts the systems of records listed... Activity Reporting System. FinCEN .003 Bank Secrecy Act Reports System. (2) The Department hereby exempts...) and (k) and § 1.23(c), the Department of the Treasury hereby exempts the systems of records identified...
31 CFR 1.36 - Systems exempt in whole or in part from provisions of 5 U.S.C. 552a and this part.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Activity Reporting System. FinCEN .003 Bank Secrecy Act Reports System. (2) The Department hereby exempts... System. FinCEN .003 Bank Secrecy Act Reports System. (2) The Department hereby exempts the systems of...) and (k) and § 1.23(c), the Department of the Treasury hereby exempts the systems of records identified...
Quantum cryptography using coherent states: Randomized encryption and key generation
NASA Astrophysics Data System (ADS)
Corndorf, Eric
With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic objectives of key generation and direct data-encryption, a new quantum cryptographic principle is demonstrated wherein keyed coherent-state signal sets are employed. Taking advantage of the fundamental and irreducible quantum-measurement noise of coherent states, these schemes do not require the users to measure the influence of an attacker. Experimental key-generation and data encryption schemes based on these techniques, which are compatible with today's WDM fiber-optic telecommunications infrastructure, are implemented and analyzed.
Sensitive Security Information (SSI) and Transportation Security: Background and Controversies
2004-02-05
with airport security procedures, employee accountability, passenger screening, and airport secrecy agreements. In January 2003, the Dallas/Fort... Airport Security Flaws Bring Criticism,” Los Angeles Times, July 2, 2002, p. A8. 16 Charles Piller and Ricardo Alonso-Zaldivar, “A Suspect Computer...Secrecy in Airport Security Contract Criticized,” Des Moines Register, Sept. 27, 2003, p. 1A; James Andrews, “Here in Tristate, Security’s Tighter
Secrecy and Democracy: The Conflict between American Ideals and American Institutions
2014-05-22
challenge to the necessity of secrecy are the ideals of transparency and publicity. Modern society, particularly in America , has conceived of...Haven CT: Yale University Press, 2011), 47-54. See also Jeffrey Rosen, The Unwanted Gaze: The Destruction of Privacy in America (New York: Vintage Books...Disappearance of Social Capital in America ,” PS: Political Science and Politics 28, no. 4 (December 1995): 664-683. 36
A Secure Multicast Framework in Large and High-Mobility Network Groups
NASA Astrophysics Data System (ADS)
Lee, Jung-San; Chang, Chin-Chen
With the widespread use of Internet applications such as Teleconference, Pay-TV, Collaborate tasks, and Message services, how to construct and distribute the group session key to all group members securely is becoming and more important. Instead of adopting the point-to-point packet delivery, these emerging applications are based upon the mechanism of multicast communication, which allows the group member to communicate with multi-party efficiently. There are two main issues in the mechanism of multicast communication: Key Distribution and Scalability. The first issue is how to distribute the group session key to all group members securely. The second one is how to maintain the high performance in large network groups. Group members in conventional multicast systems have to keep numerous secret keys in databases, which makes it very inconvenient for them. Furthermore, in case that a member joins or leaves the communication group, many involved participants have to change their own secret keys to preserve the forward secrecy and the backward secrecy. We consequently propose a novel version for providing secure multicast communication in large network groups. Our proposed framework not only preserves the forward secrecy and the backward secrecy but also possesses better performance than existing alternatives. Specifically, simulation results demonstrate that our scheme is suitable for high-mobility environments.
Guo, Hua; Zheng, Yandong; Zhang, Xiyong; Li, Zhoujun
2016-01-01
In resource-constrained wireless networks, resources such as storage space and communication bandwidth are limited. To guarantee secure communication in resource-constrained wireless networks, group keys should be distributed to users. The self-healing group key distribution (SGKD) scheme is a promising cryptographic tool, which can be used to distribute and update the group key for the secure group communication over unreliable wireless networks. Among all known SGKD schemes, exponential arithmetic based SGKD (E-SGKD) schemes reduce the storage overhead to constant, thus is suitable for the the resource-constrained wireless networks. In this paper, we provide a new mechanism to achieve E-SGKD schemes with backward secrecy. We first propose a basic E-SGKD scheme based on a known polynomial-based SGKD, where it has optimal storage overhead while having no backward secrecy. To obtain the backward secrecy and reduce the communication overhead, we introduce a novel approach for message broadcasting and self-healing. Compared with other E-SGKD schemes, our new E-SGKD scheme has the optimal storage overhead, high communication efficiency and satisfactory security. The simulation results in Zigbee-based networks show that the proposed scheme is suitable for the resource-restrained wireless networks. Finally, we show the application of our proposed scheme. PMID:27136550
Villalobos Solís, Myriam; Smetana, Judith G; Comer, Jessamy
2015-08-01
Disclosure and secrecy with mothers and best friends about personal, bad behavior, and multifaceted (e.g., staying out late) activities were examined using daily diaries among 102 ethnically diverse, urban middle adolescents (M = 15.18 years, SD = .89). Adolescents disclosed more and kept fewer secrets from best friends than from mothers and more frequently disclosed and kept secrets about their personal than their bad behavior and multifaceted activities. Better daily relationship quality was associated with more disclosure about personal and multifaceted activities and less secrecy about bad behaviors for both mothers and best friends. Overall, when mothers solicited information, adolescents disclosed more but also kept more secrets from them, whereas best friends' solicitation was mostly associated with more disclosure. Copyright © 2015 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
Applications for Subvocal Speech
NASA Technical Reports Server (NTRS)
Jorgensen, Charles; Betts, Bradley
2007-01-01
A research and development effort now underway is directed toward the use of subvocal speech for communication in settings in which (1) acoustic noise could interfere excessively with ordinary vocal communication and/or (2) acoustic silence or secrecy of communication is required. By "subvocal speech" is meant sub-audible electromyographic (EMG) signals, associated with speech, that are acquired from the surface of the larynx and lingual areas of the throat. Topics addressed in this effort include recognition of the sub-vocal EMG signals that represent specific original words or phrases; transformation (including encoding and/or enciphering) of the signals into forms that are less vulnerable to distortion, degradation, and/or interception; and reconstruction of the original words or phrases at the receiving end of a communication link. Potential applications include ordinary verbal communications among hazardous- material-cleanup workers in protective suits, workers in noisy environments, divers, and firefighters, and secret communications among law-enforcement officers and military personnel in combat and other confrontational situations.
Kowialiewski, Benjamin; Majerus, Steve
2016-01-01
Several models in the verbal domain of short-term memory (STM) consider a dissociation between item and order processing. This view is supported by data demonstrating that different types of time-based interference have a greater effect on memory for the order of to-be-remembered items than on memory for the items themselves. The present study investigated the domain-generality of the item versus serial order dissociation by comparing the differential effects of time-based interfering tasks, such as rhythmic interference and articulatory suppression, on item and order processing in verbal and musical STM domains. In Experiment 1, participants had to maintain sequences of verbal or musical information in STM, followed by a probe sequence, this under different conditions of interference (no-interference, rhythmic interference, articulatory suppression). They were required to decide whether all items of the probe list matched those of the memory list (item condition) or whether the order of the items in the probe sequence matched the order in the memory list (order condition). In Experiment 2, participants performed a serial order probe recognition task for verbal and musical sequences ensuring sequential maintenance processes, under no-interference or rhythmic interference conditions. For Experiment 1, serial order recognition was not significantly more impacted by interfering tasks than was item recognition, this for both verbal and musical domains. For Experiment 2, we observed selective interference of the rhythmic interference condition on both musical and verbal order STM tasks. Overall, the results suggest a similar and selective sensitivity to time-based interference for serial order STM in verbal and musical domains, but only when the STM tasks ensure sequential maintenance processes. PMID:27992565
Gorin, Simon; Kowialiewski, Benjamin; Majerus, Steve
2016-01-01
Several models in the verbal domain of short-term memory (STM) consider a dissociation between item and order processing. This view is supported by data demonstrating that different types of time-based interference have a greater effect on memory for the order of to-be-remembered items than on memory for the items themselves. The present study investigated the domain-generality of the item versus serial order dissociation by comparing the differential effects of time-based interfering tasks, such as rhythmic interference and articulatory suppression, on item and order processing in verbal and musical STM domains. In Experiment 1, participants had to maintain sequences of verbal or musical information in STM, followed by a probe sequence, this under different conditions of interference (no-interference, rhythmic interference, articulatory suppression). They were required to decide whether all items of the probe list matched those of the memory list (item condition) or whether the order of the items in the probe sequence matched the order in the memory list (order condition). In Experiment 2, participants performed a serial order probe recognition task for verbal and musical sequences ensuring sequential maintenance processes, under no-interference or rhythmic interference conditions. For Experiment 1, serial order recognition was not significantly more impacted by interfering tasks than was item recognition, this for both verbal and musical domains. For Experiment 2, we observed selective interference of the rhythmic interference condition on both musical and verbal order STM tasks. Overall, the results suggest a similar and selective sensitivity to time-based interference for serial order STM in verbal and musical domains, but only when the STM tasks ensure sequential maintenance processes.
Tolentino, Jerlyn C; Pirogovsky, Eva; Luu, Trinh; Toner, Chelsea K; Gilbert, Paul E
2012-05-21
Two experiments tested the effect of temporal interference on order memory for fixed and random sequences in young adults and nondemented older adults. The results demonstrate that temporal order memory for fixed and random sequences is impaired in nondemented older adults, particularly when temporal interference is high. However, temporal order memory for fixed sequences is comparable between older adults and young adults when temporal interference is minimized. The results suggest that temporal order memory is less efficient and more susceptible to interference in older adults, possibly due to impaired temporal pattern separation.
Obtaining tight bounds on higher-order interferences with a 5-path interferometer
NASA Astrophysics Data System (ADS)
Kauten, Thomas; Keil, Robert; Kaufmann, Thomas; Pressl, Benedikt; Brukner, Časlav; Weihs, Gregor
2017-03-01
Within the established theoretical framework of quantum mechanics, interference always occurs between pairs of paths through an interferometer. Higher order interferences with multiple constituents are excluded by Born’s rule and can only exist in generalized probabilistic theories. Thus, high-precision experiments searching for such higher order interferences are a powerful method to distinguish between quantum mechanics and more general theories. Here, we perform such a test in an optical multi-path interferometer, which avoids crucial systematic errors, has access to the entire phase space and is more stable than previous experiments. Our results are in accordance with quantum mechanics and rule out the existence of higher order interference terms in optical interferometry to an extent that is more than four orders of magnitude smaller than the expected pairwise interference, refining previous bounds by two orders of magnitude.
2002-01-01
Manhattan project , gaseous diffusion plant, or even a weapons program. It will be used heavily in chapters 4 and 5. Both The Making of the Atomic Bomb...requirement for secrecy surrounding the Manhattan project and the lingering requirement for secrecy regarding nuclear weapons design. The application to the...another MANHATTAN Project ” to produce a nuclear device (McPhee 1973, 123-4, 136). Scientists who worked on the Manhattan Project maintain that
Developmental changes in parent-child communication throughout adolescence.
Keijsers, Loes; Poulin, François
2013-12-01
This study examined how parent-child communication regarding adolescent unsupervised activities develops over the course of adolescence. We used questionnaire data from 390 adolescents (58% girls; 90% European Canadian) who were followed from age 12 to 19. Latent growth curve modeling revealed curvilinear developmental changes that differed for boys and girls. From age 14 to 19 (but not from age 12 to 14) a linear decrease in parental control was found for both genders. For girls, parent-child communication decreased in early adolescence, as indicated by decreasing parental solicitation, decreasing adolescent disclosure, and increasing secrecy. Girls' communication with parents intensified in middle adolescence, as indicated by increasing parental solicitation, increasing adolescent disclosure, and decreasing adolescent secrecy. For boys, disclosure declined in early adolescence, but secrecy and solicitation were stable throughout adolescence. Parental knowledge decreased from age 12 to 19 for both genders but was temporarily stable for middle adolescent girls. The meaning of these developmental changes, their timing, and gender differences are discussed. PsycINFO Database Record (c) 2013 APA, all rights reserved.
A critical examination of factors that might encourage secrecy
NASA Astrophysics Data System (ADS)
Tough, Allen
If a signal is detected someday from extraterrestrial intelligence, several factors might encourage complete and immediate secrecy. As a result, all data might be restricted to the receiving facility or nation instead of being shared promptly with SETI scientists around the world. Seven factors seem particularly like to encourage secrecy: (1) the belief that people may panic; (2) the fear of a negative impact on religion, science, and culture; (3) embarrassment; (4) the individual and national competitive urge; (5) avoiding a harmful premature reply; (6) a national trade or military advantage; and (7) the fear of a Trojan Horse. Three steps might alleviate the particularly difficult factors (numbers 4, 5, 6): an international treaty for immediate sharing of possible signals with SETI scientists in several other countries; implementation and frequent use of an actual network of scientists for such sharing; and further study of the possible need for partial restriction of data about the location and channel of a suspected signal.
[On the way to the secret of Freudian psychoanalysis. From Emmy von N. to "Totem and taboo"].
Rand, N; Torok, M
1993-09-01
The authors approach the work of Sigmund Freud by regarding the theory and history of psychoanalysis in terms of a feature that they have in common, namely secrecy. This proclivity towards secrecy, which stands in contradiction to the psychoanalytic principle of total frankness and demystification, is illustrated by a number of examples-the suggestion made by Jones to Ferenczi and Freud in 1911 for the "formation of a secret committee to supervise the development of psychoanalysis"; the censorship practised by Jones in connection with the use of the Freud Archives; and the case history of Emmy von N., where Freud assumes the role of depositary for the memories communicated by his patient under hypnosis and observes strict secrecy about them. The authors give a particularly detailed account of the evidence of the "secret of psychoanalysis" to be traced in Totem and Taboo, which they elucidate with the aid of a reading of Shakespeare's Tempest.
A Secure Key Distribution System of Quantum Cryptography Based on the Coherent State
NASA Technical Reports Server (NTRS)
Guo, Guang-Can; Zhang, Xiao-Yu
1996-01-01
The cryptographic communication has a lot of important applications, particularly in the magnificent prospects of private communication. As one knows, the security of cryptographic channel depends crucially on the secrecy of the key. The Vernam cipher is the only cipher system which has guaranteed security. In that system the key must be as long as the message and most be used only once. Quantum cryptography is a method whereby key secrecy can be guaranteed by a physical law. So it is impossible, even in principle, to eavesdrop on such channels. Quantum cryptography has been developed in recent years. Up to now, many schemes of quantum cryptography have been proposed. Now one of the main problems in this field is how to increase transmission distance. In order to use quantum nature of light, up to now proposed schemes all use very dim light pulses. The average photon number is about 0.1. Because of the loss of the optical fiber, it is difficult for the quantum cryptography based on one photon level or on dim light to realize quantum key-distribution over long distance. A quantum key distribution based on coherent state is introduced in this paper. Here we discuss the feasibility and security of this scheme.
The second-order interference of two independent single-mode He-Ne lasers
NASA Astrophysics Data System (ADS)
Liu, Jianbin; Le, Mingnan; Bai, Bin; Wang, Wentao; Chen, Hui; Zhou, Yu; Li, Fu-li; Xu, Zhuo
2015-09-01
The second-order spatial and temporal interference patterns with two independent single-mode continuous-wave He-Ne lasers are observed when these two lasers are incident to two adjacent input ports of a 1:1 non-polarizing beam splitter, respectively. Two-photon interference based on the superposition principle in Feynman's path integral theory is employed to interpret the experimental results. The conditions to observe the second-order interference pattern with two independent single-mode continuous-wave lasers are discussed. It is concluded that frequency stability is important to observe the second-order interference pattern with two independent light beams.
Youth secrets are associated with poorer sleep and asthma symptoms via negative affect.
Imami, Ledina; Zilioli, Samuele; Tobin, Erin T; Saleh, Daniel J; Kane, Heidi S; Slatcher, Richard B
2017-05-01
Among older children and adolescents, keeping secrets from parents is consistently associated with lower levels of psychological well-being. Further, concealing one's thoughts and emotions has been associated with poor physical health outcomes in adults. However, it remains an open question whether secret-keeping is associated with poorer health and health-related behaviors (such as sleep) among youth and, if those hypothesized links exist, what the psychological mechanisms might be. We investigated the associations among youth secrecy towards parents, daily asthma symptoms and daily sleep behaviors in a sample of low-income youth with asthma aged 10-17 and tested negative affect as a possible mediator of these associations. One hundred and seventy two youths reported the extent to which they kept secrets towards parents over a period of four days. Asthma symptoms, nighttime awakenings, sleep onset latency, and subjective sleep quality were assessed with daily diaries completed by youths. More frequent secret-keeping was associated with more severe asthma symptoms, lower ratings of sleep quality and greater number of nighttime awakenings. Secrecy was also associated with increased negative affect, which accounted for the associations between secrecy and number of awakenings and daytime asthma symptoms. These findings remained significant after controlling for youth age and other relevant demographic factors. Our findings suggest that secrecy towards parents can have consequential health outcomes for youth with asthma and point to the importance of investigating affective processes as mediators of the influence of secret-keeping on youth health. Copyright © 2017 Elsevier Inc. All rights reserved.
Secrecy as embodied practice: beyond the confessional imperative.
Hardon, Anita; Posel, Deborah
2012-01-01
This introduction to this special issue of Culture, Health & Sexuality aims to intervene critically in debates in public health about sexual rights and ways of de-stigmatising HIV/AIDS, in which silence and secrets are seen to undermine well-being and perpetuate stigma. It presents key insights from collaborative studies on HIV/AIDS and youth sexual health, arguing that advocates of disclosure and sexual rights need to think more contextually and tactically in promoting truth-telling. The authors aim to enhance current thinking on secrecy, which examines it primarily as a social practice, by emphasising the centrality of the body and the experience of embodiment in the making and unmaking of secrets. To understand secrecy as embodied practice requires understanding how it simultaneously involves the body as subject - as the basis from which we experience the world - and the body as object - that can be actively manipulated, silenced and 'done'. The authors show how tensions emerge when bodies reveal reproductive mishaps and describe how the dissonances are resolved through a variety of silencing practices. The paper ends by discussing the implications of these insights for sexual-health programmes.
Shim, Kyusung; Do, Nhu Tri; An, Beongku
2017-01-01
In this paper, we study the physical layer security (PLS) of opportunistic scheduling for uplink scenarios of multiuser multirelay cooperative networks. To this end, we propose a low-complexity, yet comparable secrecy performance source relay selection scheme, called the proposed source relay selection (PSRS) scheme. Specifically, the PSRS scheme first selects the least vulnerable source and then selects the relay that maximizes the system secrecy capacity for the given selected source. Additionally, the maximal ratio combining (MRC) technique and the selection combining (SC) technique are considered at the eavesdropper, respectively. Investigating the system performance in terms of secrecy outage probability (SOP), closed-form expressions of the SOP are derived. The developed analysis is corroborated through Monte Carlo simulation. Numerical results show that the PSRS scheme significantly improves the secure ability of the system compared to that of the random source relay selection scheme, but does not outperform the optimal joint source relay selection (OJSRS) scheme. However, the PSRS scheme drastically reduces the required amount of channel state information (CSI) estimations compared to that required by the OJSRS scheme, specially in dense cooperative networks. PMID:28212286
Don't ask or tell: Pay secrecy policies in U.S. workplaces.
Rosenfeld, Jake
2017-07-01
How widespread are workplace rules against discussing wages and salaries in the U.S.? And what are the core correlates of whether or not an employer prohibits or discourages this type of speech? Using a unique dataset that includes a measure of whether workers are prohibited or discouraged from discussing pay, this article investigates the prevalence of pay secrecy policies, and what worker- and workplace-level characteristics are associated with these rules. Key findings reveal that these policies are commonplace, despite being illegal, and that they are concentrated in more "coercive" rather than "enabling" organizations. These more coercive workplaces are disproportionately in the private sector, lack union representation, and have managers that are generally punitive in their approach and unaccommodating of employees. Findings also indicate that the greater discretion pay secrecy provides managers does not result in discriminatory application of these rules to women, racial/ethnic minorities, or immigrants. The article concludes with a call for data collection efforts that would allow researchers to analyze the consequences of this widespread managerial practice. Copyright © 2017 Elsevier Inc. All rights reserved.
Elliot, Rosemary
2014-09-01
This paper explores the close links in medical understandings of miscarriage and abortion in the first half of the twentieth century in Britain. In the absence of a clear legal framework for abortion, and the secrecy surrounding the practice, medical literature suggests contradictory and confused views about women presenting with clinical signs of pregnancy loss. On one hand, there was a lack of clarity as to whether pregnancy loss was natural or induced, with a clear tendency to assume that symptoms of miscarriage were the result of criminal interference gone wrong. On the other hand, women who did not present for treatment when miscarriage was underway were accused of neglecting their unborn children. The paper suggests that discourses around pregnancy loss were class-based, distrustful of female patients, and shaped by the wider context of fertility decline and concerns about infant mortality. The close historical connection between miscarriage and abortion offers some insight into why both the pro-life movement and miscarriage support advocates today draw on similar imagery and rhetoric about early fetal loss. Copyright © 2012 Elsevier Ltd. All rights reserved.
Ussher, Jane M; Perz, Janette; Metusela, Christine; Hawkey, Alexandra J; Morrow, Marina; Narchal, Renu; Estoesta, Jane
2017-10-01
In Australia and Canada, the sexual health needs of migrant and refugee women have been of increasing concern, because of their underutilization of sexual health services and higher rate of sexual health problems. Previous research on migrant women's sexual health has focused on their higher risk of difficulties, or barriers to service use, rather than their construction or understanding of sexuality and sexual health, which may influence service use and outcomes. Further, few studies of migrant and refugee women pay attention to the overlapping role of culture, gender, class, and ethnicity in women's understanding of sexual health. This qualitative study used an intersectional framework to explore experiences and constructions of sexual embodiment among 169 migrant and refugee women recently resettled in Sydney, Australia and Vancouver, Canada, from Afghanistan, Iraq, Somalia, South Sudan, Sudan, Sri Lanka, India, and South America, utilizing a combination of individual interviews and focus groups. Across all of the cultural groups, participants described a discourse of shame, associated with silence and secrecy, as the dominant cultural and religious construction of women's sexual embodiment. This was evident in constructions of menarche and menstruation, the embodied experience that signifies the transformation of a girl into a sexual woman; constructions of sexuality, including sexual knowledge and communication, premarital virginity, sexual pain, desire, and consent; and absence of agency in fertility control and sexual health. Women were not passive in relation to a discourse of sexual shame; a number demonstrated active resistance and negotiation in order to achieve a degree of sexual agency, yet also maintain cultural and religious identity. Identifying migrant and refugee women's experiences and constructions of sexual embodiment are essential for understanding sexual subjectivity, and provision of culturally safe sexual health information in order to improve well-being and facilitate sexual agency.
76 FR 10234 - Amendment to the Bank Secrecy Act Regulations-Reports of Foreign Financial Accounts
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-24
...FinCEN is issuing this final rule to amend the Bank Secrecy Act (BSA) regulations regarding reports of foreign financial accounts. The rule addresses the scope of the persons that are required to file reports of foreign financial accounts. The rule further specifies the types of accounts that are reportable, and provides filing relief in the form of exemptions for certain persons with signature or other authority over foreign financial accounts. Finally, the rule adopts provisions intended to prevent persons subject to the rule from avoiding their reporting requirement.
ERIC Educational Resources Information Center
Tolentino, Jerlyn C.; Pirogovsky, Eva; Luu, Trinh; Toner, Chelsea K.; Gilbert, Paul E.
2012-01-01
Two experiments tested the effect of temporal interference on order memory for fixed and random sequences in young adults and nondemented older adults. The results demonstrate that temporal order memory for fixed and random sequences is impaired in nondemented older adults, particularly when temporal interference is high. However, temporal order…
Weigelt, E; Scherb, H
1992-11-01
The regulations applicable to research in occupational epidemiology are the federal data protection (confidentiality) law (BDSG), the social welfare code (SGB), medical professional secrecy regulations and the federal statistics law (BStatG). The SGB, medical professional secrecy, and BStatG codes take precedence over BDSG rulings. This paper discusses BDSG and SGB. Medical professional secrecy and BStatG will be the topic of another publication (Datenschutz and Datenzugang II). The BDSG permits processing and utilization of personal data only if 1. this is permitted by BDSG or a law with higher priority, or 2. if the individual concerned has given her or his informed consent. According to the BDSG private research institutes can have access to personal data collected within non-public institutions only via section 28 (2) without consent of the individual. The "research paragraph" section 40 governs the processing and utilisation of personal data by research institutions. As a rule, the SGB permits access to epidemiological data sources only with the informed consent of the individuals concerned. The exception is section 75 SGBX. This paragraph permits disclosure of personal data without the individual's consent by the relevant public institution only if public interest considerably outweighs the private concerns. To our knowledge, however, this clause has had no practical significance. The concept of "informed consent" is discussed in detail, including the requirements for a legal form for informed consent. The legal codes of the BDSG, professional secrecy, and BStatG permit the transfer of personal data if the individuals concerned remain anonymous. This paper deals in detail with the concept of "anonymity".(ABSTRACT TRUNCATED AT 250 WORDS)
Biodefense research: can secrecy and safety coexist?
Kahn, Laura H
2004-01-01
Over the next 10 years, the United States will spend 6 billion US dollars to develop countermeasures against biological and chemical weapons. Much of this research on highly virulent pathogens will be done in academic settings around the country. This article explores the challenges in ensuring secrecy to protect national security while accommodating the right of local communities to have access to safety information regarding select agents and laboratory-acquired infections. Secrecy has been defended as being vital for protecting national security. Problems with secrecy can include the misinterpretation of intentions, particularly in laboratories located in nuclear weapons design facilities, and the restricted access to information relevant to public health and safety. While federal select agent legislation requires laboratories to have emergency plans in place with first responders, these plans do not necessarily include public health professionals, who will be responsible for any future public health action, such as quarantine, surveillance, or mass vaccinations, in the unlikely event that a laboratory-acquired infection spreads into a community. Laboratory-acquired infections do occur, even with the best safety mechanisms in place; however, the epidemiology of the incidence and severity of these infections are not known since there is no national surveillance reporting system. Evidence suggests that many of these infections occur in the absence of an actual laboratory accident. The best emergency plans and surveillance systems are only as good as the participation and vigilance of the laboratory workers themselves. Thus, laboratory workers have a responsibility to themselves and others to report all laboratory accidents and spills, regardless how minor. In addition, they should have a lower threshold than normal in seeking medical attention when feeling ill, and their physicians should be aware of what pathogens they work with to reduce the risk of a delay in diagnosis.
Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa
2017-05-16
In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.
Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa
2017-01-01
In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks. PMID:28509841
Lightweight and scalable secure communication in VANET
NASA Astrophysics Data System (ADS)
Zhu, Xiaoling; Lu, Yang; Zhu, Xiaojuan; Qiu, Shuwei
2015-05-01
To avoid a message to be tempered and forged in vehicular ad hoc network (VANET), the digital signature method is adopted by IEEE1609.2. However, the costs of the method are excessively high for large-scale networks. The paper efficiently copes with the issue with a secure communication framework by introducing some lightweight cryptography primitives. In our framework, point-to-point and broadcast communications for vehicle-to-infrastructure (V2I) and vehicle-to-vehicle (V2V) are studied, mainly based on symmetric cryptography. A new issue incurred is symmetric key management. Thus, we develop key distribution and agreement protocols for two-party key and group key under different environments, whether a road side unit (RSU) is deployed or not. The analysis shows that our protocols provide confidentiality, authentication, perfect forward secrecy, forward secrecy and backward secrecy. The proposed group key agreement protocol especially solves the key leak problem caused by members joining or leaving in existing key agreement protocols. Due to aggregated signature and substitution of XOR for point addition, the average computation and communication costs do not significantly increase with the increase in the number of vehicles; hence, our framework provides good scalability.
The teacher-disciple tradition and secret teaching in Chinese medicine.
Solos, Ioannis; Liang, Yuan; Yue, Guang-xin
2014-01-01
The ancient teacher-disciple tradition is regarded as one of the most celebrated practices within the Chinese medicine world. Such traditions of secrecy, private wisdom and honor are deeply rooted in the theories of Confucianism. This paper only explores the surface of this ancient culture, by investigating relevant popular ancient texts and common Chinese proverbs, as well as utilizing personal experiences, in order to reflect on how the ancient Chinese perceived such practices within their own society and how secret teaching was passed on from teacher to student, including the revelation of secret formulas and their importance and how that tradition differs from our modern-day perspectives. Various rare manuscripts from the author's personal library are employed in order to provide relative examples of the importance of secret knowledge, and how these secrets applied in the traditional healing.
Xiong, Hailiang; Zhang, Wensheng; Xu, Hongji; Du, Zhengfeng; Tang, Huaibin; Li, Jing
2017-05-25
With the rapid development of wireless communication systems and electronic techniques, the limited frequency spectrum resources are shared with various wireless devices, leading to a crowded and challenging coexistence circumstance. Cognitive radio (CR) and ultra-wide band (UWB), as sophisticated wireless techniques, have been considered as significant solutions to solve the harmonious coexistence issues. UWB wireless sensors can share the spectrum with primary user (PU) systems without harmful interference. The in-band interference of UWB systems should be considered because such interference can severely affect the transmissions of UWB wireless systems. In order to solve the in-band interference issues for UWB wireless sensor networks (WSN), a novel in-band narrow band interferences (NBIs) elimination scheme is proposed in this paper. The proposed narrow band interferences suppression scheme is based on a novel complex-coefficient adaptive notch filter unit with a single constrained zero-pole pair. Moreover, in order to reduce the computation complexity of the proposed scheme, an adaptive complex-coefficient iterative method based on two-order Taylor series is designed. To cope with multiple narrow band interferences, a linear cascaded high order adaptive filter and a cyclic cascaded high order matrix adaptive filter (CCHOMAF) interference suppression algorithm based on the basic adaptive notch filter unit are also presented. The theoretical analysis and numerical simulation results indicate that the proposed CCHOMAF algorithm can achieve better performance in terms of average bit error rate for UWB WSNs. The proposed in-band NBIs elimination scheme can significantly improve the reception performance of low-cost and low-power UWB wireless systems.
Xiong, Hailiang; Zhang, Wensheng; Xu, Hongji; Du, Zhengfeng; Tang, Huaibin; Li, Jing
2017-01-01
With the rapid development of wireless communication systems and electronic techniques, the limited frequency spectrum resources are shared with various wireless devices, leading to a crowded and challenging coexistence circumstance. Cognitive radio (CR) and ultra-wide band (UWB), as sophisticated wireless techniques, have been considered as significant solutions to solve the harmonious coexistence issues. UWB wireless sensors can share the spectrum with primary user (PU) systems without harmful interference. The in-band interference of UWB systems should be considered because such interference can severely affect the transmissions of UWB wireless systems. In order to solve the in-band interference issues for UWB wireless sensor networks (WSN), a novel in-band narrow band interferences (NBIs) elimination scheme is proposed in this paper. The proposed narrow band interferences suppression scheme is based on a novel complex-coefficient adaptive notch filter unit with a single constrained zero-pole pair. Moreover, in order to reduce the computation complexity of the proposed scheme, an adaptive complex-coefficient iterative method based on two-order Taylor series is designed. To cope with multiple narrow band interferences, a linear cascaded high order adaptive filter and a cyclic cascaded high order matrix adaptive filter (CCHOMAF) interference suppression algorithm based on the basic adaptive notch filter unit are also presented. The theoretical analysis and numerical simulation results indicate that the proposed CCHOMAF algorithm can achieve better performance in terms of average bit error rate for UWB WSNs. The proposed in-band NBIs elimination scheme can significantly improve the reception performance of low-cost and low-power UWB wireless systems. PMID:28587085
EPR experiment and 2-photon interferometry: Report of a 2-photon interference experiment
NASA Technical Reports Server (NTRS)
Shih, Y. H.; Rubin, M. H.; Sergienko, A. V.
1992-01-01
After a very brief review of the historical Einstein, Podolsky, and Rosen (EPR) experiments, a new two-photon interference type EPR experiment is reported. A two-photon state was generated by optical parametric down conversion. Pairs of light quanta with degenerate frequency but divergent directions of propagation were sent to two independent Michelson interferometers. First and second order interference effectors were studied. Different than other reports, we observed that the second order interference visibility vanished when the optical path difference of the interferometers were much less than the coherence length of the pumping laser beam. However, we also observed that the second order interference behaved differently depending on whether the interferometers were set at equal or different optical path differences.
The Chymistry of "The Learned Dr Plot" (1640-96).
Roos, Anna Marie
2014-01-01
In the seventeenth century, there were developing norms of openness in the presentation of scientific knowledge that were at odds with traditions of secrecy among chymists, particularly practitioners of chrysopoeia, or the transmutation of metals. This chapter analyzes how Dr. Robert Plot, the first professor of chymistry at Oxford, negotiated these boundaries within an institutional context. I first delineate his chymical and experimental practice, which incorporated procedures from medieval alchemical sources, particularly the Lullian corpus, as well as more novel practices from seventeenth-century chymistry. Then, I analyze how personal and institutional ambitions and economic considerations shaped to what extent Plot negotiated the boundaries between secrecy and the public dissemination of chymical knowledge.
High-chroma visual cryptography using interference color of high-order retarder films
NASA Astrophysics Data System (ADS)
Sugawara, Shiori; Harada, Kenji; Sakai, Daisuke
2015-08-01
Visual cryptography can be used as a method of sharing a secret image through several encrypted images. Conventional visual cryptography can display only monochrome images. We have developed a high-chroma color visual encryption technique using the interference color of high-order retarder films. The encrypted films are composed of a polarizing film and retarder films. The retarder films exhibit interference color when they are sandwiched between two polarizing films. We propose a stacking technique for displaying high-chroma interference color images. A prototype visual cryptography device using high-chroma interference color is developed.
Modes of (in)tolerance: South African Muslims and same-sex relationships.
Bonthuys, Elsje; Erlank, Natasha
2012-01-01
In this study we interviewed members of a small, predominantly Muslim community in Johannesburg, South Africa, in order to ascertain attitudes towards people who engage in same-sex practices. We were interested in ascertaining whether community perceptions of homosexuality match the common (Western) assumption that Islam is profoundly homophobic. Our research, while preliminary, shows that although most people condemn same-sex practices on the grounds of religious principle, they also in practice did not act upon these views. Respondents held different views on whether a person is gay or lesbian as result of same-sex behaviour, on the one hand, or same-sex desire, on the other hand. This distinction accords with what was, for them, the difficulty of proving the same-sex practices had occurred given strict Muslim standards of proof. Community attitudes to homosexuality usually involve denial and secrecy in order to maintain the social fabric of daily life and relationships between community members.
van Berkel, D; Candido, A; Pijffers, W H
2007-06-01
The object of the study was to investigate secrecy in non-anonymous egg donation, to explore some characteristics of this kind of egg donation arrangement and the relationship of the recipient with her non-genetic child. Forty-four egg recipients and 62 IVF patients with a child conceived through egg donation and/or IVF were recruited. A semi-structured questionnaire was sent to all the participants. Chi-square and T-tests were used to examine the differences between the groups. There were no significant differences on the following aspects. The same high proportion of egg donation mothers (77%) and IVF mothers (87%) had the intention of telling their child about the conception but most women thought disclosure at a later time preferable. Two thirds of the recipients and IVF mothers said the way of conception had no influence on the relationship with their child. The two groups differed however in their argumentation about secrecy and named different feelings. Egg donation mothers expressed more denial and showed more defensive reactions, anxieties and uncertainty. It is suggested that recognition of a certain difference between a natural conception and egg donation could be helpful in early disclosure and could help to diminish anxieties in egg donation mothers.
Doppler Radar Vital Signs Detection Method Based on Higher Order Cyclostationary.
Yu, Zhibin; Zhao, Duo; Zhang, Zhiqiang
2017-12-26
Due to the non-contact nature, using Doppler radar sensors to detect vital signs such as heart and respiration rates of a human subject is getting more and more attention. However, the related detection-method research meets lots of challenges due to electromagnetic interferences, clutter and random motion interferences. In this paper, a novel third-order cyclic cummulant (TOCC) detection method, which is insensitive to Gaussian interference and non-cyclic signals, is proposed to investigate the heart and respiration rate based on continuous wave Doppler radars. The k -th order cyclostationary properties of the radar signal with hidden periodicities and random motions are analyzed. The third-order cyclostationary detection theory of the heart and respiration rate is studied. Experimental results show that the third-order cyclostationary approach has better estimation accuracy for detecting the vital signs from the received radar signal under low SNR, strong clutter noise and random motion interferences.
NASA Astrophysics Data System (ADS)
Barnea, A. Ronny; Cheshnovsky, Ori; Even, Uzi
2018-02-01
Interference experiments have been paramount in our understanding of quantum mechanics and are frequently the basis of testing the superposition principle in the framework of quantum theory. In recent years, several studies have challenged the nature of wave-function interference from the perspective of Born's rule—namely, the manifestation of so-called high-order interference terms in a superposition generated by diffraction of the wave functions. Here we present an experimental test of multipath interference in the diffraction of metastable helium atoms, with large-number counting statistics, comparable to photon-based experiments. We use a variation of the original triple-slit experiment and accurate single-event counting techniques to provide a new experimental bound of 2.9 ×10-5 on the statistical deviation from the commonly approximated null third-order interference term in Born's rule for matter waves. Our value is on the order of the maximal contribution predicted for multipath trajectories by Feynman path integrals.
A secure RFID authentication protocol adopting error correction code.
Chen, Chien-Ming; Chen, Shuai-Min; Zheng, Xinying; Chen, Pei-Yu; Sun, Hung-Min
2014-01-01
RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.
A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.
Farash, Mohammad Sabzinejad; Nawaz, Omer; Mahmood, Khalid; Chaudhry, Shehzad Ashraf; Khan, Muhammad Khurram
2016-07-01
To enhance the quality of healthcare in the management of chronic disease, telecare medical information systems have increasingly been used. Very recently, Zhang and Qi (J. Med. Syst. 38(5):47, 32), and Zhao (J. Med. Syst. 38(5):46, 33) separately proposed two authentication schemes for telecare medical information systems using radio frequency identification (RFID) technology. They claimed that their protocols achieve all security requirements including forward secrecy. However, this paper demonstrates that both Zhang and Qi's scheme, and Zhao's scheme could not provide forward secrecy. To augment the security, we propose an efficient RFID authentication scheme using elliptic curves for healthcare environments. The proposed RFID scheme is secure under common random oracle model.
Social and cognitive factors associated with children’s secret-keeping for a parent
Gordon, Heidi M.; Lyon, Thomas D.; Lee, Kang
2014-01-01
This study examined children’s secret-keeping for a parent and its relationship to trust, theory of mind, secrecy endorsement, and executive functioning (EF). Children (N = 107) between 4 and 12 years of age participated in a procedure wherein parents broke a toy and asked children to promise secrecy. Responses to open-ended and direct questions were examined. Overall, secret-keeping increased with age and promising to keep the secret was related to fewer disclosures in open-ended questioning. Children who kept the secret in direct questioning exhibited greater trust and better parental ratings of EF than children who disclosed the secret. Findings highlight the importance of both social and cognitive factors in secret-keeping development. PMID:25291258
[Legal secrecy: abortion in Puerto Rico from 1937 to 1970].
Marchand-Arias, R E
1998-03-01
The essay discusses abortion in Puerto Rico from 1937 to 1970, concentrating in its legal status as well as its social practice. The research documents the contradictions between the legality of the procedure and a social practice characterized by secrecy. The essay discusses the role of the Clergy Consultation Service on Abortion in promoting the legal practice of absortion in Puerto Rico. It also discusses the ambivalent role of medical doctors who, despite being legally authorized to perform abortions to protect the life and health of women, refused to perform the procedure arguing abortion was illegal. The essay concludes with a brief discussion on perceptions of illegality regarding abortion, emphasizing the contradictions between the practice of abortion and that of sterilization in Puerto Rico.
A Secure RFID Authentication Protocol Adopting Error Correction Code
Zheng, Xinying; Chen, Pei-Yu
2014-01-01
RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance. PMID:24959619
Hong, Peilong; Li, Liming; Liu, Jianji; Zhang, Guoquan
2016-03-29
Young's double-slit or two-beam interference is of fundamental importance to understand various interference effects, in which the stationary phase difference between two beams plays the key role in the first-order coherence. Different from the case of first-order coherence, in the high-order optical coherence the statistic behavior of the optical phase will play the key role. In this article, by employing a fundamental interfering configuration with two classical point sources, we showed that the high- order optical coherence between two classical point sources can be actively designed by controlling the statistic behavior of the relative phase difference between two point sources. Synchronous position Nth-order subwavelength interference with an effective wavelength of λ/M was demonstrated, in which λ is the wavelength of point sources and M is an integer not larger than N. Interestingly, we found that the synchronous position Nth-order interference fringe fingerprints the statistic trace of random phase fluctuation of two classical point sources, therefore, it provides an effective way to characterize the statistic properties of phase fluctuation for incoherent light sources.
Higher-Order Interference in Extensions of Quantum Theory
NASA Astrophysics Data System (ADS)
Lee, Ciarán M.; Selby, John H.
2017-01-01
Quantum interference, manifest in the two slit experiment, lies at the heart of several quantum computational speed-ups and provides a striking example of a quantum phenomenon with no classical counterpart. An intriguing feature of quantum interference arises in a variant of the standard two slit experiment, in which there are three, rather than two, slits. The interference pattern in this set-up can be written in terms of the two and one slit patterns obtained by blocking one, or more, of the slits. This is in stark contrast with the standard two slit experiment, where the interference pattern cannot be written as a sum of the one slit patterns. This was first noted by Rafael Sorkin, who raised the question of why quantum theory only exhibits irreducible interference in the two slit experiment. One approach to this problem is to compare the predictions of quantum theory to those of operationally-defined `foil' theories, in the hope of determining whether theories that do exhibit higher-order interference suffer from pathological—or at least undesirable—features. In this paper two proposed extensions of quantum theory are considered: the theory of Density Cubes proposed by Dakić, Paterek and Brukner, which has been shown to exhibit irreducible interference in the three slit set-up, and the Quartic Quantum Theory of Życzkowski. The theory of Density Cubes will be shown to provide an advantage over quantum theory in a certain computational task and to posses a well-defined mechanism which leads to the emergence of quantum theory—analogous to the emergence of classical physics from quantum theory via decoherence. Despite this, the axioms used to define Density Cubes will be shown to be insufficient to uniquely characterise the theory. In comparison, Quartic Quantum Theory is a well-defined theory and we demonstrate that it exhibits irreducible interference to all orders. This feature of Życzkowski's theory is argued not to be a genuine phenomenon, but to arise from an ambiguity in the current definition of higher-order interference in operationally-defined theories. Thus, to begin to understand why quantum theory is limited to a certain kind of interference, a new definition of higher-order interference is needed that is applicable to, and makes good operational sense in, arbitrary operationally-defined theories.
Investigation of Interference Models for RFID Systems.
Zhang, Linchao; Ferrero, Renato; Gandino, Filippo; Rebaudengo, Maurizio
2016-02-04
The reader-to-reader collision in an RFID system is a challenging problem for communications technology. In order to model the interference between RFID readers, different interference models have been proposed, mainly based on two approaches: single and additive interference. The former only considers the interference from one reader within a certain range, whereas the latter takes into account the sum of all of the simultaneous interferences in order to emulate a more realistic behavior. Although the difference between the two approaches has been theoretically analyzed in previous research, their effects on the estimated performance of the reader-to-reader anti-collision protocols have not yet been investigated. In this paper, the influence of the interference model on the anti-collision protocols is studied by simulating a representative state-of-the-art protocol. The results presented in this paper highlight that the use of additive models, although more computationally intensive, is mandatory to improve the performance of anti-collision protocols.
Generation of a non-zero discord bipartite state with classical second-order interference.
Choi, Yujun; Hong, Kang-Hee; Lim, Hyang-Tag; Yune, Jiwon; Kwon, Osung; Han, Sang-Wook; Oh, Kyunghwan; Kim, Yoon-Ho; Kim, Yong-Su; Moon, Sung
2017-02-06
We report an investigation on quantum discord in classical second-order interference. In particular, we theoretically show that a bipartite state with D = 0.311 of discord can be generated via classical second-order interference. We also experimentally verify the theory by obtaining D = 0.197 ± 0.060 of non-zero discord state. Together with the fact that the nonclassicalities originated from physical constraints and information theoretic perspectives are not equivalent, this result provides an insight to understand the nature of quantum discord.
ADIPOQUINAS EN EL NIÑO SANO Y AFECTO DE OBESIDAD
Martos-Moreno, G.A.; Kopchick, J.J.; Argente, y J.
2015-01-01
El incremento universal de la prevalencia de obesidad en niños y adolescentes durante las últimas décadas, junto con la evidencia creciente de que el establecimiento de obesidad en etapas precoces de la vida está asociado con un incremento de la prevalencia de comorbilidades y del riesgo de muerte prematura, con gran repercusión económica en los sistemas sanitarios de los países occidentales, ha impulsado la investigación en este área. Estos estudios han remarcado la importante actividad endocrina del tejido adiposo, ejercida por medio de la síntesis y secreción de un gran número de péptidos y citoquinas, denominados adipoquinas. En esta revisión se resume el estado actual de los conocimientos, así como los estudios más relevantes, en relación con la dinámica de secreción de las principales adipoquinas en niños, centrándose en el control de la homeostasis energética, regulación metabólica (fundamentalmente, metabolismo de los hidratos de carbono) e inflamación. Asímismo, se analizan las particularidades de la síntesis, secreción y acciones de las adipoquinas desde el nacimiento hasta la adolescencia, reseñando el efecto que, sobre ellas, ejerce la instauración de la obesidad. PMID:23228441
Trading secrets: Jews and the early modern quest for clandestine knowledge.
Jütte, Daniel
2012-12-01
This essay explores the significance and function of secrecy and secret sciences in Jewish-Christian relations and in Jewish culture in the early modern period. It shows how the trade in clandestine knowledge and the practice of secret sciences became a complex, sometimes hazardous space for contact between Jews and Christians. By examining this trade, the essay clarifies the role of secrecy in the early modern marketplace of knowledge. The attribution of secretiveness to Jews was a widespread topos in early modern European thought. However, relatively little is known about the implications of such beliefs in science or in daily life. The essay pays special attention to the fact that trade in secret knowledge frequently offered Jews a path to the center of power, especially at court. Furthermore, it becomes clear that the practice of secret sciences, the trade in clandestine knowledge, and a mercantile agenda were often inextricably interwoven. Special attention is paid to the Italian-Jewish alchemist, engineer, and entrepreneur Abramo Colorni (ca. 1544-1599), whose career illustrates the opportunities provided by the marketplace of secrets at that time. Much scholarly (and less scholarly) attention has been devoted to whether and what Jews "contributed" to what is commonly called the "Scientific Revolution." This essay argues that the question is misdirected and that, instead, we should pay more attention to the distinctive opportunities offered by the early modern economy of secrecy.
Visibility-Based Hypothesis Testing Using Higher-Order Optical Interference
NASA Astrophysics Data System (ADS)
Jachura, Michał; Jarzyna, Marcin; Lipka, Michał; Wasilewski, Wojciech; Banaszek, Konrad
2018-03-01
Many quantum information protocols rely on optical interference to compare data sets with efficiency or security unattainable by classical means. Standard implementations exploit first-order coherence between signals whose preparation requires a shared phase reference. Here, we analyze and experimentally demonstrate the binary discrimination of visibility hypotheses based on higher-order interference for optical signals with a random relative phase. This provides a robust protocol implementation primitive when a phase lock is unavailable or impractical. With the primitive cost quantified by the total detected optical energy, optimal operation is typically reached in the few-photon regime.
Parenting Your Adopted Teenager
... and how they will look in the future (Smith, Howard, & Monroe, 2000), and adopted teens must consider ... best interest of your child. 3 Siegel, D., & Smith, S. (2012). Openness in adoption: From secrecy and stigma ...
Goicoechea, Héctor C; Olivieri, Alejandro C; Tauler, Romà
2010-03-01
Correlation constrained multivariate curve resolution-alternating least-squares is shown to be a feasible method for processing first-order instrumental data and achieve analyte quantitation in the presence of unexpected interferences. Both for simulated and experimental data sets, the proposed method could correctly retrieve the analyte and interference spectral profiles and perform accurate estimations of analyte concentrations in test samples. Since no information concerning the interferences was present in calibration samples, the proposed multivariate calibration approach including the correlation constraint facilitates the achievement of the so-called second-order advantage for the analyte of interest, which is known to be present for more complex higher-order richer instrumental data. The proposed method is tested using a simulated data set and two experimental data systems, one for the determination of ascorbic acid in powder juices using UV-visible absorption spectral data, and another for the determination of tetracycline in serum samples using fluorescence emission spectroscopy.
Optical interference with noncoherent states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sagi, Yoav; Firstenberg, Ofer; Fisher, Amnon
2003-03-01
We examine a typical two-source optical interference apparatus consisting of two cavities, a beam splitter, and two detectors. We show that field-field interference occurs even when the cavities are not initially in coherent states but rather in other nonclassical states. However, we find that the visibility of the second-order interference, that is, the expectation values of the detectors' readings, changes from 100%, when the cavities are prepared in coherent states, to zero visibility when they are initially in single Fock states. We calculate the fourth-order interference, and for the latter case find that it corresponds to a case where themore » currents oscillate with 100% visibility, but with a random phase for every experiment. Finally, we suggest an experimental realization of the apparatus with nonclassical sources.« less
Simulated performance of an order statistic threshold strategy for detection of narrowband signals
NASA Technical Reports Server (NTRS)
Satorius, E.; Brady, R.; Deich, W.; Gulkis, S.; Olsen, E.
1988-01-01
The application of order statistics to signal detection is becoming an increasingly active area of research. This is due to the inherent robustness of rank estimators in the presence of large outliers that would significantly degrade more conventional mean-level-based detection systems. A detection strategy is presented in which the threshold estimate is obtained using order statistics. The performance of this algorithm in the presence of simulated interference and broadband noise is evaluated. In this way, the robustness of the proposed strategy in the presence of the interference can be fully assessed as a function of the interference, noise, and detector parameters.
40 CFR 350.19 - Provision of information to States.
Code of Federal Regulations, 2010 CFR
2010-07-01
... COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy.... (b) The Governor of a State which receives access to trade secret information under this section may...
40 CFR 350.19 - Provision of information to States.
Code of Federal Regulations, 2012 CFR
2012-07-01
... COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy.... (b) The Governor of a State which receives access to trade secret information under this section may...
40 CFR 350.19 - Provision of information to States.
Code of Federal Regulations, 2011 CFR
2011-07-01
... COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy.... (b) The Governor of a State which receives access to trade secret information under this section may...
40 CFR 350.19 - Provision of information to States.
Code of Federal Regulations, 2013 CFR
2013-07-01
... COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy.... (b) The Governor of a State which receives access to trade secret information under this section may...
40 CFR 350.19 - Provision of information to States.
Code of Federal Regulations, 2014 CFR
2014-07-01
... COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy.... (b) The Governor of a State which receives access to trade secret information under this section may...
Social and cognitive factors associated with children's secret-keeping for a parent.
Gordon, Heidi M; Lyon, Thomas D; Lee, Kang
2014-01-01
This study examined children's secret-keeping for a parent and its relation to trust, theory of mind, secrecy endorsement, and executive functioning (EF). Children (N = 107) between 4 and 12 years of age participated in a procedure wherein parents broke a toy and asked children to promise secrecy. Responses to open-ended and direct questions were examined. Overall, secret-keeping increased with age and promising to keep the secret was related to fewer disclosures in open-ended questioning. Children who kept the secret in direct questioning exhibited greater trust and better parental ratings of EF than children who disclosed the secret. Findings highlight the importance of both social and cognitive factors in secret-keeping development. © 2014 The Authors. Child Development © 2014 Society for Research in Child Development, Inc.
NASA Astrophysics Data System (ADS)
Nikulin, Vladimir V.; Hughes, David H.; Malowicki, John; Bedi, Vijit
2015-05-01
Free-space optical communication channels offer secure links with low probability of interception and detection. Despite their point-to-point topology, additional security features may be required in privacy-critical applications. Encryption can be achieved at the physical layer by using quantized values of photons, which makes exploitation of such quantum communication links extremely difficult. One example of such technology is keyed communication in quantum noise, a novel quantum modulation protocol that offers ultra-secure communication with competitive performance characteristics. Its utilization relies on specific coherent measurements to decrypt the signal. The process of measurements is complicated by the inherent and irreducible quantum noise of coherent states. This problem is different from traditional laser communication with coherent detection; therefore continuous efforts are being made to improve the measurement techniques. Quantum-based encryption systems that use the phase of the signal as the information carrier impose aggressive requirements on the accuracy of the measurements when an unauthorized party attempts intercepting the data stream. Therefore, analysis of the secrecy of the data becomes extremely important. In this paper, we present the results of a study that had a goal of assessment of potential vulnerability of the running key. Basic results of the laboratory measurements are combined with simulation studies and statistical analysis that can be used for both conceptual improvement of the encryption approach and for quantitative comparison of secrecy of different quantum communication protocols.
Implementing Diffie-Hellman key exchange using quantum EPR pairs
NASA Astrophysics Data System (ADS)
Mandal, Sayonnha; Parakh, Abhishek
2015-05-01
This paper implements the concepts of perfect forward secrecy and the Diffie-Hellman key exchange using EPR pairs to establish and share a secret key between two non-authenticated parties and transfer messages between them without the risk of compromise. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. This makes BB84-based quantum cryptography protocol unsuitable for network computing environments. Diffie-Hellman does not require the two parties to be mutually authenticated to each other, yet it can provide a basis for a number of authenticated protocols, most notably the concept of perfect forward secrecy. The work proposed in this paper provides a new direction in utilizing quantum EPR pairs in quantum key exchange. Although, classical cryptography boasts of efficient and robust protocols like the Diffie-Hellman key exchange, in the current times, with the advent of quantum computing they are very much vulnerable to eavesdropping and cryptanalytic attacks. Using quantum cryptographic principles, however, these classical encryption algorithms show more promise and a more robust and secure structure for applications. The unique properties of quantum EPR pairs also, on the other hand, go a long way in removing attacks like eavesdropping by their inherent nature of one particle of the pair losing its state if a measurement occurs on the other. The concept of perfect forward secrecy is revisited in this paper to attribute tighter security to the proposed protocol.
Mental illness, stigma, and the media.
Benbow, Alastair
2007-01-01
Society is ingrained with prejudice toward mental illness, and sufferers are often widely perceived to be dangerous or unpredictable. Reinforcement of these popular myths through the media can perpetuate the stigma surrounding mental illness, precipitating shame, self-blame, and secrecy, all of which discourage affected individuals from seeking treatment. Efforts aimed at countering stigma in mental illness are faced with the challenge of centuries of discrimination and must, therefore, replace existing stereotypes with coverage of positive outcomes, as a first step in achieving the daunting task of overcoming these negative stereotypes. Long-term anti-stigma campaigns that encompass human-rights-based, normalization, and educational approaches are needed. The involvement of the media is essential for success, but, in order for the media to be used effectively, its motivations and limitations must first be recognized and understood.
25 CFR 11.1212 - Consequences of disobedience or interference.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 1 2010-04-01 2010-04-01 false Consequences of disobedience or interference. 11.1212 Section 11.1212 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Child Protection and Domestic Violence Procedures § 11.1212...
25 CFR 11.1212 - Consequences of disobedience or interference.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 25 Indians 1 2011-04-01 2011-04-01 false Consequences of disobedience or interference. 11.1212 Section 11.1212 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Child Protection and Domestic Violence Procedures § 11.1212...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-20
.... SUPPLEMENTARY INFORMATION: The Annunzio-Wylie Anti-Money Laundering Act of 1992 required the Secretary of the... Trade Groups--International (1 vacancy). Industry Trade Groups--Money Services Businesses (1 vacancy...
76 FR 72764 - Bank Secrecy Act Advisory Group; Solicitation of Application for Membership
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-25
... INFORMATION: The Annunzio-Wylie Anti-Money Laundering Act of 1992 required the Secretary of the Treasury to... Representatives--Money Services Businesses (1 vacancy). Organizations may nominate themselves, but applications...
28 CFR 541.13 - Prohibited acts and disciplinary severity scale.
Code of Federal Regulations, 2010 CFR
2010-07-01
... personal safety; e.g., hack-saw blade) A. Recommend parole date rescission or retardation.B. Forfeit earned... disrupts or interferes with the security or orderly running of the institution or the Bureau of Prisons... interferes with the security or orderly running of the institution or the Bureau of Prisons. (Conduct must be...
Optical interference fringe reduction in frequency-modulation spectroscopy experiments
NASA Astrophysics Data System (ADS)
Hjelme, Dag Roar; Neegard, Steinar; Vartdal, Erling
1995-08-01
We show both theoretically and experimentally that interference fringe signals can always be suppressed to improve the signal-to-noise ratio, provided that the modulation frequency is of the order of the absorption linewidth or higher. Suppression of optical interference fringes by more than 1 order of magnitude and signal-to-noise ratio enhancement of more than 13 dB is demonstrated by use of a proper choice of laser modulation frequency. A further fringe reduction of 10 dB is possible by adjustment of the local oscillator phase.
Code of Federal Regulations, 2010 CFR
2010-07-01
... limitations on the scope, method, time and place for discovery, and provisions for protecting the secrecy of... designated documents or objects, not privileged, specifically identified, and their relevance and materiality...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-26
... Collection; Comment Request; Bank Secrecy Act Suspicious Activity Report Database Proposed Data Fields.'' The...; c. Commercial paper; d. Credit card; e. Debit card; f. Forex transactions; g. Futures/Options on...
Inhorn, Marcia C
2004-06-01
Worldwide, male infertility contributes to more than half of all cases of childlessness; yet, it is a reproductive health problem that is poorly studied and understood. This article examines the problem of male infertility in two Middle Eastern locales, Cairo, Egypt, and Beirut, Lebanon, where men may be at increased risk of male infertility because of environmental and behavioral factors. It is argued that male infertility may be particularly problematic for Middle Eastern men in their pronatalist societies; there, both virility and fertility are typically tied to manhood. Thus, male infertility is a potentially emasculating condition, surrounded by secrecy and stigma. Furthermore, the new reproductive technology called intracytoplasmic sperm injection (ICSI), designed specifically to overcome male infertility, may paradoxically create additional layers of stigma and secrecy, due to the complex moral and marital dilemmas associated with Islamic restrictions on third-party donation of gametes.
Bud, Robert
2014-01-01
This paper uses a case study from the Cold War to reflect on the meaning at the time of the term 'Pure Science'. In 1961, four senior scientists from Britain's biological warfare centre at Porton Down visited Moscow both attending an International Congress and visiting Russian microbiological and biochemical laboratories. The reports of the British scientists in talking about a limited range of topics encountered in the Soviet Union expressed qualities of openness, sociologists of the time associated with pure science. The paper reflects on the discourses of "Pure Science", secrecy and security in the Cold War. Using Bakhtin's approach, I suggest the cordial communication between scientists from opposing sides can be seen in terms of the performance, or speaking, of one language among several at their disposal. Pure science was the language they were allowed to share outside their institutions, and indeed political blocs.
The Secret of Intrafamilial Child Sexual Abuse: Who Keeps It and How?
Tener, Dafna
2018-01-01
This article analyzes how women survivors of intrafamilial child sexual abuse perceive the family members who took part in keeping it secret and their tactics for doing so. Analysis of 20 in-depth interviews with Jewish Israeli women revealed unique ways of guarding the secret. These were attributed to the perpetrator, the mother and the family. Secret-keeping tactics included presenting a normative public identity or an unstable psychological identity, presenting multiple personas, reframing the abuse, concealing any trace of the secret after it was disclosed, as if the abuse had never happened, and making a monument of the abuser. These tactics are discussed in the context of silencing, the interpersonal relations orientation model, and the wider concepts of secrecy in society. Implications for professional practice and for society are considered, and new attitudes toward intrafamilial child sexual abuse secrecy are suggested.
Auction-based Security Game for Multiuser Cooperative Networks
NASA Astrophysics Data System (ADS)
Wang, An; Cai, Yueming; Yang, Wendong; Cheng, Yunpeng
2013-04-01
In this paper, we develop an auction-based algorithm to allocate the relay power efficiently to improve the system secrecy rate in a cooperative network, where several source-destination pairs and one cooperative relay are involved. On the one hand, the cooperative relay assists these pairs to transmit under a peak power constraint. On the other hand, the relay is untrusty and is also a passive eavesdropper. The whole auction process is completely distributed and no instantaneous channel state information exchange is needed. We also prove the existence and uniqueness of the Nash Equilibrium (NE) for the proposed power auction game. Moreover, the Pareto optimality is also validated. Simulation results show that our proposed auction-based algorithm can effectively improve the system secrecy rate. Besides, the proposed auction-based algorithm can converge to the unique NE point within a finite number of iterations. More interestingly, we also find that the proposed power auction mechanism is cheat-proof.
Metzger, Aaron; Wakschlag, Lauren S; Anderson, Ryan; Darfler, Anne; Price, Juliette; Flores, Zujeil; Mermelstein, Robin
2013-08-01
The present study examined smoking-specific and general parenting predictors of in vivo observed patterns of parent-adolescent discussion concerning adolescents' cigarette smoking experiences and associations between these observed patterns and 24-month longitudinal trajectories of teen cigarette smoking behavior (nonsmokers, current experimenters, escalators). Parental solicitation, adolescent disclosure, and adolescent information management were coded from direct observations of 528 video-recorded parent-adolescent discussions about cigarette smoking with 344 teens (M age = 15.62 years) with a history of smoking experimentation (321 interactions with mothers, 207 interactions with fathers). Adolescent initiation of discussions concerning their own smoking behavior (21% of interactions) was predicted by lower levels of maternal observed disapproval of cigarette smoking and fewer teen-reported communication problems with mothers. Maternal initiation in discussions (35% of interactions) was associated with higher levels of family rules about illicit substance use. Three categories of adolescent information management (full disclosure, active secrecy, incomplete strategies) were coded by matching adolescents' confidential self-reported smoking status with their observed spontaneous disclosures and responses to parental solicitations. Fully disclosing teens reported higher quality communication with their mothers (more open, less problematic). Teens engaged in active secrecy with their mothers when families had high levels of parental rules about illicit substance use and when mothers expressed lower levels of expectancies that their teen would smoke in the future. Adolescents were more likely to escalate their smoking over 2 years if their parents initiated the discussion of adolescent smoking behavior (solicited) and if adolescents engaged in active secrecy. (PsycINFO Database Record (c) 2013 APA, all rights reserved).
Metzger, Aaron; Wakschlag, Lauren S.; Anderson, Ryan; Darfler, Anne; Price, Juliette; Flores, Zujeil; Mermelstein, Robin
2013-01-01
The present study examined smoking-specific and general parenting predictors of in vivo observed patterns of parent–adolescent discussion concerning adolescents’ cigarette smoking experiences and associations between these observed patterns and 24-month longitudinal trajectories of teen cigarette smoking behavior (nonsmokers, current experimenters, escalators). Parental solicitation, adolescent disclosure, and adolescent information management were coded from direct observations of 528 video-recorded parent–adolescent discussions about cigarette smoking with 344 teens (M age = 15.62 years) with a history of smoking experimentation (321 interactions with mothers, 207 interactions with fathers). Adolescent initiation of discussions concerning their own smoking behavior (21% of interactions) was predicted by lower levels of maternal observed disapproval of cigarette smoking and fewer teen-reported communication problems with mothers. Maternal initiation in discussions (35% of interactions) was associated with higher levels of family rules about illicit substance use. Three categories of adolescent information management (full disclosure, active secrecy, incomplete strategies) were coded by matching adolescents’ confidential self-reported smoking status with their observed spontaneous disclosures and responses to parental solicitations. Fully disclosing teens reported higher quality communication with their mothers (more open, less problematic). Teens engaged in active secrecy with their mothers when families had high levels of parental rules about illicit substance use and when mothers expressed lower levels of expectancies that their teen would smoke in the future. Adolescents were more likely to escalate their smoking over 2 years if their parents initiated the discussion of adolescent smoking behavior (solicited) and if adolescents engaged in active secrecy. PMID:23148939
... fewer tools for communicating their feelings. Surviving After Suicide Fact Sheet 3 Children are especially vulnerable to feelings of guilt and ... to take care of them. Secrecy about the suicide in the hopes of protecting children may cause further complications. Explain the situation and ...
Substantiation To Accompany Claims of Trade Secrecy Under EPCRA
This form is required under the Emergency Planning and Community Right-to-Know Act. Facility must be able to describe safeguarding measures, disclosure history, and why the specific chemical identity is a secret of interest to competitors.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-19
... exempting certain categories of prepaid access products and services posing lower risks of money laundering... applicable to Money Services Businesses with regard to stored value or prepaid access. More specifically, the...
On the origin and removal of interference patterns in coated multimode fibres
NASA Astrophysics Data System (ADS)
Padilla Michel, Yazmin; Pulwer, Silvio; Saffari, Pouneh; Ksianzou, Viachaslau; Schrader, Sigurd
2016-07-01
In this study, we present the experimental investigations on interference patterns, such as those already reported in VIMOS-IFU, and up to now no appropriate explanation has been presented. These interference patterns are produced in multimode fibres coated with acrylate or polyimide, which is the preferred coating material for the fibres used in IFUs. Our experiments show that, under specific conditions, cladding modes interact with the coating and produce interference. Our results show that the conditions at which the fibre is held during data acquisition has an impact in the output spectrum. Altering the positioning conditions of the fibre leads to the changes into the interference pattern, therefore, fibres should be carefully manipulated in order to minimise this potential problem and improve the performance of these instruments. Finally we present a simple way of predicting and modelling this interference produced from the visible to the near infrared spectra. This model can be included in the data reduction pipeline in order to remove the interference patterns. These results should be of interest for the optimisation of the data reduction pipelines of instruments using optical fibres. Considering these results will benefit innovations and developments of high performance fibre systems.
Coplanar three-beam interference and phase edge dislocations
NASA Astrophysics Data System (ADS)
Patorski, Krzysztof; SłuŻewski, Łukasz; Trusiak, Maciej; Pokorski, Krzysztof
2016-12-01
We present a comprehensive analysis of grating three-beam interference to discover a broad range of the ratio of amplitudes A of +/-1 diffraction orders and the zero order amplitude C providing phase edge dislocations. We derive a condition A/C > 0.5 for the occurrence of phase edge dislocations in three-beam interference self-image planes. In the boundary case A/C = 0.5 singularity conditions are met in those planes (once per interference field period), but the zero amplitude condition is not accompanied by an abrupt phase change. For A/C > 0.5 two adjacent singularities in a single field period show opposite sign topological charges. The occurrence of edge dislocations for selected values of A/C was verified by processing fork fringes obtained by introducing the fourth beam in the plane perpendicular to the one containing three coplanar diffraction orders. Two fork pattern processing methods are described, 2D CWT (two-dimensional continuous wavelet transform) and 2D spatial differentiation.
Near-Field Noise Source Localization in the Presence of Interference
NASA Astrophysics Data System (ADS)
Liang, Guolong; Han, Bo
In order to suppress the influence of interference sources on the noise source localization in the near field, the near-field broadband source localization in the presence of interference is studied. Oblique projection is constructed with the array measurements and the steering manifold of interference sources, which is used to filter the interference signals out. 2D-MUSIC algorithm is utilized to deal with the data in each frequency, and then the results of each frequency are averaged to achieve the positioning of the broadband noise sources. The simulations show that this method suppresses the interference sources effectively and is capable of locating the source which is in the same direction with the interference source.
NASA Astrophysics Data System (ADS)
Niestegge, Gerd
2014-09-01
In quantum mechanics, the selfadjoint Hilbert space operators play a triple role as observables, generators of the dynamical groups and statistical operators defining the mixed states. One might expect that this is typical of Hilbert space quantum mechanics, but it is not. The same triple role occurs for the elements of a certain ordered Banach space in a much more general theory based upon quantum logics and a conditional probability calculus (which is a quantum logical model of the Lueders-von Neumann measurement process). It is shown how positive groups, automorphism groups, Lie algebras and statistical operators emerge from one major postulate - the non-existence of third-order interference (third-order interference and its impossibility in quantum mechanics were discovered by R. Sorkin in 1994). This again underlines the power of the combination of the conditional probability calculus with the postulate that there is no third-order interference. In two earlier papers, its impact on contextuality and nonlocality had already been revealed.
Frequency Management Engineering Principles--Spectrum Measurements (Reference Order 6050.23).
1982-08-01
Interference 22 (a) Dielectric Heater Example 22 (b) High Power FM Interference Examle 22 (c) Radar Interference Example 22 (d) ARSR Interference Example...Localizer 23 (i) Dielectric Heaters 23 (j) High Power TV/FM 23 (k) Power Line Noise 23 (1) Incidental Radiating Devices 23 (m) Super-regenerative...employing broad band power amplifiers or and random spectrum analyzer instabilities traveling wave tubes. The "cleanest" spectrums create drift problems
NASA Astrophysics Data System (ADS)
Agarwal, G. S.; von Zanthier, J.; Skornia, C.; Walther, H.
2002-05-01
The different behavior of first-order interferences and second-order correlations are investigated for the case of two coherently excited atoms. For intensity measurements this problem is in many respects equivalent to Young's double-slit experiment and was investigated in an experiment by Eichmann et al. [Phys. Rev. Lett. 70, 2359 (1993)] and later analyzed in detail by Itano et al. [Phys. Rev. A 57, 4176 (1998)]. Our results show that in cases where the intensity interferences disappear the intensity-intensity correlations can display an interference pattern with a visibility of up to 100%. The contrast depends on the polarization selected for the detection and is independent of the strength of the driving field. The nonclassical nature of the calculated intensity-intensity correlations is also discussed.
The Female Experience of Sibling Incest.
ERIC Educational Resources Information Center
Canavan, Margaret M.; And Others
1992-01-01
Calls occurrence of sibling incest underrecognized. Presents four cases of females who experienced sibling incest to illustrate problem areas, including issues of enforced secrecy, interpersonal power differentials, influences on sexual development, individual after effects, disturbances in family dynamics, and gender-based differences in…
ERIC Educational Resources Information Center
Fogle, Pamela W.
1991-01-01
Public relations issues arising from the University of Utah's controversial announcement of research claiming achievement of nuclear fusion at room temperature are discussed. They include problems occurring before and after the initial press conference, secrecy vs. openness, research ethics, and effects lasting past the original incident and…
ERIC Educational Resources Information Center
Press, Eyal; Washburn, Jennifer
2000-01-01
Examines the trend of increasing collaboration between American universities and corporations, including issues such as the academic-industrial complex, secrecy and science, the university as a business/commercial enterprise, who controls the research agenda, downsizing the humanities, and on-line marketing of course material. Expresses concerns…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-08
... a currently approved information collection. Affected Public: Businesses and other for-profit... currently approved information collection. Affected Public: Businesses and other for-profit institutions... information collection. Affected Public: Businesses and other for-profit institutions. [[Page 33414
Sibling Incest: A Hong Kong Experience.
ERIC Educational Resources Information Center
Tsun, O. K. Angela
1999-01-01
Presents a case study of a Hong Kong Chinese adult survivor of brother-sister incest. Discusses her symptoms, feelings toward incest, parental response at disclosures, and implications for practice. Also discusses Chinese cultural influences that affect the family and lead to secrecy and shame. (CR)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-24
..., 31 CFR 1010.350(d), the citation to ``31 CFR 1010(hhh)'' should have read ``31 CFR 1010.100(hhh... 1010.100(hhh). * * * * * Dated: June 21, 2011. Charles M. Steele, Deputy Director, Financial Crimes...
Rhetorical Tension in the Bureaucratic University
ERIC Educational Resources Information Center
Cunningham, Joseph
2017-01-01
The managed university functions as the prominent organizational paradigm in higher education. Returning to Max Weber's original analysis of bureaucracy, several fundamental characteristics of the managed university come to surface, including the emphasis on specialization, hierarchy, and secrecy. Among these characteristics is the importance of…
The Curious National Security Pendulum: Openness and/or Censorship.
ERIC Educational Resources Information Center
Marwick, Christine M.
1979-01-01
Lawsuits illustrate the increasing concern over national security in regulating the security classification system, and government attitudes toward information have shifted from secrecy to openness to censorship. The Central Intelligence Agency's suppression of unclassified printed information is a case in point. (SW)
Demi, Libertario; Viti, Jacopo; Kusters, Lieneke; Guidi, Francesco; Tortoli, Piero; Mischi, Massimo
2013-11-01
The speed of sound in the human body limits the achievable data acquisition rate of pulsed ultrasound scanners. To overcome this limitation, parallel beamforming techniques are used in ultrasound 2-D and 3-D imaging systems. Different parallel beamforming approaches have been proposed. They may be grouped into two major categories: parallel beamforming in reception and parallel beamforming in transmission. The first category is not optimal for harmonic imaging; the second category may be more easily applied to harmonic imaging. However, inter-beam interference represents an issue. To overcome these shortcomings and exploit the benefit of combining harmonic imaging and high data acquisition rate, a new approach has been recently presented which relies on orthogonal frequency division multiplexing (OFDM) to perform parallel beamforming in transmission. In this paper, parallel transmit beamforming using OFDM is implemented for the first time on an ultrasound scanner. An advanced open platform for ultrasound research is used to investigate the axial resolution and interbeam interference achievable with parallel transmit beamforming using OFDM. Both fundamental and second-harmonic imaging modalities have been considered. Results show that, for fundamental imaging, axial resolution in the order of 2 mm can be achieved in combination with interbeam interference in the order of -30 dB. For second-harmonic imaging, axial resolution in the order of 1 mm can be achieved in combination with interbeam interference in the order of -35 dB.
Electromagnetic interference in electrical systems of motor vehicles
NASA Astrophysics Data System (ADS)
Dziubiński, M.; Drozd, A.; Adamiec, M.; Siemionek, E.
2016-09-01
Electronic ignition system affects the electronic equipment of the vehicle by electric and magnetic fields. The measurement of radio electromagnetic interference originating from the ignition system affecting the audiovisual test bench was carried out with a variable speed of the ignition system. The paper presents measurements of radio electromagnetic interference in automobiles. In order to determine the level of electromagnetic interference, the audiovisual test bench was equipped with a set of meters for power consumption and assessment of the level of electromagnetic interference. Measurements of the electromagnetic interference level within the audiovisual system were performed on an experimental test bench consisting of the ignition system, starting system and charging system with an alternator and regulator.
Lived Experiences of College-Age Transsexual Individuals
ERIC Educational Resources Information Center
Goodrich, Kristopher M.
2012-01-01
This article reviews the lived experiences of 4 college-age transsexual individuals. A qualitative study using grounded theory was conducted to investigate their experiences influencing their later educational persistence. Results suggested that level of discomfort, perceived social supports, level of secrecy, and academic achievement all affected…
The Physical Burdens of Secrecy
ERIC Educational Resources Information Center
Slepian, Michael L.; Masicampo, E. J.; Toosi, Negin R.; Ambady, Nalini
2012-01-01
The present work examined whether secrets are experienced as physical burdens, thereby influencing perception and action. Four studies examined the behavior of people who harbored important secrets, such as secrets concerning infidelity and sexual orientation. People who recalled, were preoccupied with, or suppressed an important secret estimated…
Obsessive-Compulsive Disorder. [Revised.
ERIC Educational Resources Information Center
Strock, Margaret
This booklet provides an overview of the causes, symptoms, and incidence of obsessive-compulsive disorder (OCD) and addresses the key features of OCD, including obsessions, compulsions, realizations of senselessness, resistance, and shame and secrecy. Research findings into the causes of OCD are reviewed which indicate that the brains of…
Recantation in Child Sexual Abuse Cases.
ERIC Educational Resources Information Center
Rieser, Margaret
1991-01-01
Reviews the literature on children's retraction of their disclosure of having been sexually abused. The evidence indicates that very few lied originally. The circumstances that underlie recantation, including false allegations, secrecy, denial, lack of support, pressure to recant, societal attitudes, and intervening events, are discussed, and…
40 CFR 350.16 - Address to send trade secrecy claims and petitions requesting disclosure.
Code of Federal Regulations, 2012 CFR
2012-07-01
....epa.gov/ceppo and http://www.epa.gov/tri. Any subsequent changes to the address and location will be...) 424-9346 or (703) 412-9810, TDD (800) 553-7672, http://www.epa.gov/epaoswer/hotline/ to obtain this...
40 CFR 350.16 - Address to send trade secrecy claims and petitions requesting disclosure.
Code of Federal Regulations, 2011 CFR
2011-07-01
....epa.gov/ceppo and http://www.epa.gov/tri. Any subsequent changes to the address and location will be...) 424-9346 or (703) 412-9810, TDD (800) 553-7672, http://www.epa.gov/epaoswer/hotline/ to obtain this...
Patenting the bomb: nuclear weapons, intellectual property, and technological control.
Wellerstein, Alex
2008-03-01
During the course of the Manhattan Project, the U.S. government secretly attempted to acquire a monopoly on the patent rights for inventions used in the production of nuclear weapons and nuclear energy. The use of patents as a system of control, while common for more mundane technologies, would seem at first glance to conflict with the regimes of secrecy that have traditionally been associated with nuclear weapons. In explaining the origins and operations of the Manhattan Project patent system, though, this essay argues that the utilization of patents was an ad hoc attempt at legal control of the atomic bomb by Manhattan Project administrators, focused on the monopolistic aspects of the patent system and preexisting patent secrecy legislation. From the present perspective, using patents as a method of control for such weapons seems inadequate, if not unnecessary; but at the time, when the bomb was a new and essentially unregulated technology, patents played an important role in the thinking of project administrators concerned with meaningful postwar control of the bomb.
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks
Wang, Changji; Yuan, Yuan; Wu, Jiayuan
2017-01-01
Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication. PMID:28632171
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.
Wang, Changji; Yuan, Yuan; Wu, Jiayuan
2017-06-20
Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.
Secrets and disclosure in donor conception.
Frith, Lucy; Blyth, Eric; Crawshaw, Marilyn; van den Akker, Olga
2018-01-01
This article considers the disclosure, sharing and exchange of information on being donor conceived within families, drawing on data from a study undertaken with donor-conceived adults registered with UK Donor Link (a voluntary DNA-linking register). This paper considers the narratives of how respondents found out they were donor-conceived and what events triggered disclosure of this information. This paper then goes on to examine the role secrecy played in their family life and uses the concept of 'display' to explore how secrecy affected their relationships with their immediate and extended family. Secrets are notoriously 'leaky' and we found complex patterns of knowing and uncertainty about whom in the family knew that the person was donor-conceived. We argue that what is kept secret and from whom provides insights into the multifaceted web of social relationships that can be created by donor-conception, and how knowledge can be managed and controlled in attempts to display and maintain family narratives of biogenetic connection. © 2017 Foundation for the Sociology of Health & Illness.
Secret Sharing of a Quantum State.
Lu, He; Zhang, Zhen; Chen, Luo-Kan; Li, Zheng-Da; Liu, Chang; Li, Li; Liu, Nai-Le; Ma, Xiongfeng; Chen, Yu-Ao; Pan, Jian-Wei
2016-07-15
Secret sharing of a quantum state, or quantum secret sharing, in which a dealer wants to share a certain amount of quantum information with a few players, has wide applications in quantum information. The critical criterion in a threshold secret sharing scheme is confidentiality: with less than the designated number of players, no information can be recovered. Furthermore, in a quantum scenario, one additional critical criterion exists: the capability of sharing entangled and unknown quantum information. Here, by employing a six-photon entangled state, we demonstrate a quantum threshold scheme, where the shared quantum secrecy can be efficiently reconstructed with a state fidelity as high as 93%. By observing that any one or two parties cannot recover the secrecy, we show that our scheme meets the confidentiality criterion. Meanwhile, we also demonstrate that entangled quantum information can be shared and recovered via our setting, which shows that our implemented scheme is fully quantum. Moreover, our experimental setup can be treated as a decoding circuit of the five-qubit quantum error-correcting code with two erasure errors.
Pyle, Tara M; Bridges, Ana J
2012-12-01
Background and aims Research indicates that excessive pornography use can negatively impact romantic relationships. However, it is unclear whether these negative outcomes are different than negative outcomes produced by other compulsive or addictive behaviors, such as drug use. This study compared perceptions of relationship outcomes from either a romantic partner's excessive marijuana or pornography use. Furthermore, this study experimentally manipulated four factors potentially related to perceptions of relationship satisfaction and addictive behavior. Methods A total of 186 college-aged women read 16 scenarios describing heterosexual romantic relationships in which one partner used either pornography or marijuana. Each scenario varied on four variables: relationship commitment, secrecy of partner's behavior, frequency of partner's behavior, and context of partner's behavior. Results Results suggest that partner pornography and marijuana use are perceived to impact romantic relationships similarly and are influenced by similar factors, such as greater frequency, higher secrecy, and partner's availability for interaction. Conclusions Such findings are consistent with recommendations by professionals that compulsive pornography use be considered worthy of treatment intervention.
An entangled-LED-driven quantum relay over 1 km
NASA Astrophysics Data System (ADS)
Varnava, Christiana; Stevenson, R. Mark; Nilsson, Jonas; Skiba-Szymanska, Joanna; Dzurňák, Branislav; Lucamarini, Marco; Penty, Richard V.; Farrer, Ian; Ritchie, David A.; Shields, Andrew J.
2016-03-01
Quantum cryptography allows confidential information to be communicated between two parties, with secrecy guaranteed by the laws of nature alone. However, upholding guaranteed secrecy over networks poses a further challenge, as classical receive-and-resend routing nodes can only be used conditional of trust by the communicating parties, which arguably diminishes the value of the underlying quantum cryptography. Quantum relays offer a potential solution by teleporting qubits from a sender to a receiver, without demanding additional trust from end users. Here we demonstrate the operation of a quantum relay over 1 km of optical fibre, which teleports a sequence of photonic quantum bits to a receiver by utilising entangled photons emitted by a semiconductor light-emitting diode. The average relay fidelity of the link is 0.90±0.03, exceeding the classical bound of 0.75 for the set of states used, and sufficiently high to allow error correction. The fundamentally low multiphoton emission statistics and the integration potential of the source present an appealing platform for future quantum networks.
[Lossless ECG compression algorithm with anti- electromagnetic interference].
Guan, Shu-An
2005-03-01
Based on the study of ECG signal features, a new lossless ECG compression algorithm is put forward here. We apply second-order difference operation with anti- electromagnetic interference to original ECG signals and then, compress the result by the escape-based coding model. In spite of serious 50Hz-interference, the algorithm is still capable of obtaining a high compression ratio.
Interference Fringes of Solar Acoustic Waves around Sunspots
NASA Astrophysics Data System (ADS)
Chou, Dean-Yi; Zhao, Hui; Yang, Ming-Hsu; Liang, Zhi-Chao
2012-10-01
Solar acoustic waves are scattered by a sunspot due to the interaction between the acoustic waves and the sunspot. The sunspot, excited by the incident wave, generates the scattered wave. The scattered wave is added to the incident wave to form the total wave around the sunspot. The interference fringes between the scattered wave and the incident wave are visible in the intensity of the total wave because the coherent time of the incident wave is of the order of a wave period. The strength of the interference fringes anti-correlates with the width of temporal spectra of the incident wave. The separation between neighboring fringes increases with the incident wavelength and the sunspot size. The strength of the fringes increases with the radial order n of the incident wave from n = 0 to n = 2, and then decreases from n = 2 to n = 5. The interference fringes play a role analogous to holograms in optics. This study suggests the feasibility of using the interference fringes to reconstruct the scattered wavefields of the sunspot, although the quality of the reconstructed wavefields is sensitive to the noise and errors in the interference fringes.
Research for the jamming mechanism of high-frequency laser to the laser seeker
NASA Astrophysics Data System (ADS)
Zheng, Xingyuan; Zhang, Haiyang; Wang, Yunping; Feng, Shuang; Zhao, Changming
2013-08-01
High-frequency laser will be able to enter the enemy laser signal processing systems without encoded identification and a copy. That makes it one of the research directions of new interference sources. In order to study the interference mechanism of high-frequency laser to laser guided weapons. According to the principle of high-frequency laser interference, a series of related theoretical models such as a semi-active laser seeker coded identification model, a time door model, multi-signal processing model and a interference signal modulation processing model are established. Then seeker interfere with effective 3σ criterion is proposed. Based on this, the study of the effect of multi-source interference and signal characteristics of the effect of high repetition frequency laser interference are key research. According to the simulation system testing, the results show that the multi-source interference and interference signal frequency modulation can effectively enhance the interference effect. While the interference effect of the interference signal amplitude modulation is not obvious. The research results will provide the evaluation of high-frequency laser interference effect and provide theoretical references for high-frequency laser interference system application.
Arshad, Hamed; Teymoori, Vahid; Nikooghadam, Morteza; Abbassi, Hassan
2015-08-01
Telecare medicine information systems (TMISs) aim to deliver appropriate healthcare services in an efficient and secure manner to patients. A secure mechanism for authentication and key agreement is required to provide proper security in these systems. Recently, Bin Muhaya demonstrated some security weaknesses of Zhu's authentication and key agreement scheme and proposed a security enhanced authentication and key agreement scheme for TMISs. However, we show that Bin Muhaya's scheme is vulnerable to off-line password guessing attacks and does not provide perfect forward secrecy. Furthermore, in order to overcome the mentioned weaknesses, we propose a new two-factor anonymous authentication and key agreement scheme using the elliptic curve cryptosystem. Security and performance analyses demonstrate that the proposed scheme not only overcomes the weaknesses of Bin Muhaya's scheme, but also is about 2.73 times faster than Bin Muhaya's scheme.
High-order dispersion effects in two-photon interference
NASA Astrophysics Data System (ADS)
Mazzotta, Zeudi; Cialdi, Simone; Cipriani, Daniele; Olivares, Stefano; Paris, Matteo G. A.
2016-12-01
Two-photon interference and Hong-Ou-Mandel (HOM) effect are relevant tools for quantum metrology and quantum information processing. In optical coherence tomography, the HOM effect is exploited to achieve high-resolution measurements with the width of the HOM dip being the main parameter. On the other hand, applications like dense coding require high-visibility performance. Here we address high-order dispersion effects in two-photon interference and study, theoretically and experimentally, the dependence of the visibility and the width of the HOM dip on both the pump spectrum and the downconverted photon spectrum. In particular, a spatial light modulator is exploited to experimentally introduce and manipulate a custom phase function to simulate the high-order dispersion effects. Overall, we show that it is possible to effectively introduce high-order dispersion effects on the propagation of photons and also to compensate for such effect. Our results clarify the role of the different dispersion phenomena and pave the way for optimization procedures in quantum technological applications involving PDC photons and optical fibers.
Policy Changes for Acquisition of Offensive Cyberspace Weapon Systems
2010-06-01
legal/ itunes /appstore/ca/terms.html. 1 April 2010. Retrieved 18 May 2010. Apple. iPhone Developer Program License Agreement. Apple, 22 January 2010...of cybersecurity program.” The Washington Post. 3 March 2010. OpenTheGovernment.org (OTG). “Secrecy Report Card : Quantitative Indicators of
40 CFR 350.21 - Adverse health effects.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 29 2012-07-01 2012-07-01 false Adverse health effects. 350.21 Section... RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.21 Adverse health effects. The Governor or State emergency response commission shall identify the...
40 CFR 350.21 - Adverse health effects.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 29 2013-07-01 2013-07-01 false Adverse health effects. 350.21 Section... RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.21 Adverse health effects. The Governor or State emergency response commission shall identify the...
40 CFR 350.21 - Adverse health effects.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 28 2011-07-01 2011-07-01 false Adverse health effects. 350.21 Section... RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.21 Adverse health effects. The Governor or State emergency response commission shall identify the...
40 CFR 350.21 - Adverse health effects.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Adverse health effects. 350.21 Section... RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.21 Adverse health effects. The Governor or State emergency response commission shall identify the...
40 CFR 350.21 - Adverse health effects.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 28 2014-07-01 2014-07-01 false Adverse health effects. 350.21 Section... RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.21 Adverse health effects. The Governor or State emergency response commission shall identify the...
Glasnost and Secrecy in the Soviet Military
1990-12-21
important event was the Chernobyl’ nuclear disaster , when the regime’s clumsy silence and disinformation were responsible for damage to the Soviet...always been treated as at. extralegal matter. A very important c, se of bureaucratic deception has been the nuclear disaster in Chernobyl and its
37 CFR 5.15 - Scope of license.
Code of Federal Regulations, 2010 CFR
2010-07-01
... through 130; or (ii) Restricted Data, sensitive nuclear technology or technology useful in the production... COMMERCE GENERAL SECRECY OF CERTAIN INVENTIONS AND LICENSES TO EXPORT AND FILE APPLICATIONS IN FOREIGN COUNTRIES Licenses for Foreign Exporting and Filing § 5.15 Scope of license. (a) Applications or other...
37 CFR 5.15 - Scope of license.
Code of Federal Regulations, 2011 CFR
2011-07-01
... through 130; or (ii) Restricted Data, sensitive nuclear technology or technology useful in the production... COMMERCE GENERAL SECRECY OF CERTAIN INVENTIONS AND LICENSES TO EXPORT AND FILE APPLICATIONS IN FOREIGN COUNTRIES Licenses for Foreign Exporting and Filing § 5.15 Scope of license. (a) Applications or other...
Restraints on Dissemination of Research Results.
ERIC Educational Resources Information Center
Taylor, Dalmas A.
1982-01-01
The issue of constraints on the publication of research results is discussed from the perspective of clashing values: free speech versus censorship in protection of national defense. The problems of secrecy as well as of disclosure are examined. Greater conflict between academe and military interests is foreseen. (MSE)
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...
12 CFR 21.3 - Security program.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices and...
Code of Federal Regulations, 2014 CFR
2014-07-01
... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.1 Definitions... secret. Sanitized means a version of a document from which information claimed as trade secret or... support of a claim that chemical identity is a trade secret. Title III means Title III of the Superfund...
Code of Federal Regulations, 2013 CFR
2013-07-01
... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.1 Definitions... secret. Sanitized means a version of a document from which information claimed as trade secret or... support of a claim that chemical identity is a trade secret. Title III means Title III of the Superfund...
40 CFR 350.9 - Initial action by EPA.
Code of Federal Regulations, 2011 CFR
2011-07-01
... RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims... determine whether chemical identity information claimed as trade secret is entitled to trade secret... disclosure of trade secret chemical identity or if EPA decides to initiate a determination of the validity of...
Code of Federal Regulations, 2012 CFR
2012-07-01
... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.1 Definitions... secret. Sanitized means a version of a document from which information claimed as trade secret or... support of a claim that chemical identity is a trade secret. Title III means Title III of the Superfund...
40 CFR 350.9 - Initial action by EPA.
Code of Federal Regulations, 2013 CFR
2013-07-01
... RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims... determine whether chemical identity information claimed as trade secret is entitled to trade secret... disclosure of trade secret chemical identity or if EPA decides to initiate a determination of the validity of...
40 CFR 350.9 - Initial action by EPA.
Code of Federal Regulations, 2012 CFR
2012-07-01
... RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims... determine whether chemical identity information claimed as trade secret is entitled to trade secret... disclosure of trade secret chemical identity or if EPA decides to initiate a determination of the validity of...
Code of Federal Regulations, 2011 CFR
2011-07-01
... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.1 Definitions... secret. Sanitized means a version of a document from which information claimed as trade secret or... support of a claim that chemical identity is a trade secret. Title III means Title III of the Superfund...
40 CFR 350.9 - Initial action by EPA.
Code of Federal Regulations, 2014 CFR
2014-07-01
... RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims... determine whether chemical identity information claimed as trade secret is entitled to trade secret... disclosure of trade secret chemical identity or if EPA decides to initiate a determination of the validity of...
40 CFR 350.9 - Initial action by EPA.
Code of Federal Regulations, 2010 CFR
2010-07-01
... RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims... determine whether chemical identity information claimed as trade secret is entitled to trade secret... disclosure of trade secret chemical identity or if EPA decides to initiate a determination of the validity of...
12 CFR 748.1 - Filing of reports.
Code of Federal Regulations, 2010 CFR
2010-01-01
... reason to suspect that any crime or any suspicious transaction related to money laundering activity or a... union must report any known or suspected crime or any suspicious transaction related to money laundering... or more that involve potential money laundering or violations of the Bank Secrecy Act. Any...
ERIC Educational Resources Information Center
Ogg, Kim
2001-01-01
Crime Stoppers of Houston is one of 800 similar citizen-driven hot-line programs operating in the United States, Canada, and Europe. Such programs increase community safety by offering cash rewards, a guarantee of secrecy, and speedy police response to callers. An adaptation for school-age youth is described. (MLH)
Hughes, Robert W; Marsh, John E
2017-04-01
A functional, perceptual-motor, account of serial short-term memory (STM) is examined by investigating the way in which an irrelevant spoken sequence interferes with verbal serial recall. Even with visual list-presentation, verbal serial recall is particularly susceptible to disruption by irrelevant spoken stimuli that have the same identity as-but that are order-incongruent with-the to-be-remembered items. We test the view that such interference is because of the obligatory perceptual organization of the spoken stimuli yielding a sequence that competes with a subvocal motor-plan assembled to support the reproduction of the to-be-remembered list. In support of this view, the interference can be eliminated without changing either the identities or objective serial order of the spoken stimuli but merely by promoting a subjective perceptual organization that strips them of their order-incongruent relation to the to-be-remembered list (Experiment 1). The interference is also eliminated if subvocal motor sequence-planning is impeded via articulatory suppression (Experiment 2). The results are in line with the view that performance-limits in verbal serial STM are because of having to exploit perceptual and motor processes for purposes for which they did not evolve, not the inherently limited capacity of structures or mechanisms dedicated to storage. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Inductive interference in rapid transit signaling systems. volume 2. suggested test procedures.
DOT National Transportation Integrated Search
1987-03-31
These suggested test procedures have been prepared in order to develop standard methods of analysis and testing to quantify and resolve issues of electromagnetic compatibility in rail transit operations. Electromagnetic interference, generated by rai...
Identifying and Assessing Effective Mechanisms for Technology Transfer
2007-03-01
There is a distinct manner in which civilian technology is protected; even though secrecy is one option, as is the case with the Coca - Cola formula...done with the appropriate dedicated resources. They also placed heavy emphasis on acquiring early sponsorship for the technology and be able to set
78 FR 4591 - Bank Secrecy Act Advisory Group; Solicitation of Application for Membership
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-22
.... ACTION: Notice and request for nominations. SUMMARY: FinCEN is inviting the public to nominate financial... FURTHER INFORMATION CONTACT: Ina Boston, Senior Advisor, Office of Outreach, Regulatory Policy and... organization's participation on the BSAAG will bring value to the group Organizations may nominate themselves...
37 CFR 5.19 - Export of technical data.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Export of technical data. 5..., DEPARTMENT OF COMMERCE GENERAL SECRECY OF CERTAIN INVENTIONS AND LICENSES TO EXPORT AND FILE APPLICATIONS IN FOREIGN COUNTRIES Licenses for Foreign Exporting and Filing § 5.19 Export of technical data. (a) Under...
12 CFR 748.1 - Filing of reports.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Bank Secrecy Act/Anti-Money Laundering Examination Manual. (iii) Compliance. Failure to file a SAR as... reason to suspect that any crime or any suspicious transaction related to money laundering activity or a... union must report any known or suspected crime or any suspicious transaction related to money laundering...
12 CFR 748.1 - Filing of reports.
Code of Federal Regulations, 2011 CFR
2011-01-01
... FFIEC Bank Secrecy Act/Anti-Money Laundering Examination Manual. (iii) Compliance. Failure to file a SAR... reason to suspect that any crime or any suspicious transaction related to money laundering activity or a... union must report any known or suspected crime or any suspicious transaction related to money laundering...
12 CFR 326.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...
12 CFR 326.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...
The Place of Education in Modernization Processes
ERIC Educational Resources Information Center
Benin, V. L.
2015-01-01
The article analyzes the latest steps taken by Russian authorities in reforming the system of education, and substantiates society's strongly felt need for the reforms to be liberated from bureaucratic dictatorship and secrecy. It demonstrates the close connection between the reform of education and the rapidly dropping quality of education,…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-16
... Extension for Three Years, Without Revision, of the Following Report Report title: Recordkeeping Requirements of Regulation H and Regulation K Associated with Bank Secrecy Act Compliance Programs. Agency form number: Reg K. OMB control number: 7100-0310. Frequency: Annually. Reporters: State member banks; Edge...
ERIC Educational Resources Information Center
Stuart, Reginald
2012-01-01
When officials at tuition-driven Fisk University raised the veil of secrecy a few years ago surrounding the university's financial condition, the details they laid out were less than encouraging. The Nashville-based university, home of the historic Jubilee Singers, was losing several million dollars a year and had not received any major private…
Institutions and Scholars Face Ethical Dilemmas over Pursuit of Research with Commercial Value.
ERIC Educational Resources Information Center
Mangan, Katherine S.
1987-01-01
Increased university efforts to help faculty members transfer the results of their research from the laboratory to the marketplace are posing ethical dilemmas for both institutions and scholars. Stanford's Office of Technology Licensing is cited, as are biotechnology developments, and secrecy and competitiveness issues. (LB)
Taming the Wild West: United States Nuclear Policy (1945-1961)
2015-06-12
Terms It is important to define a few terms and phrases used when discussing nuclear doctrine and strategy. While this list is not all- inclusive , it...in staging a demonstration or compromising the secrecy the Manhattan Project worked so hard to maintain. Therefore, the recommendation was to use
76 FR 64049 - Bank Secrecy Act Regulations: Definition of “Monetary Instrument”
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-17
..., and anti-money laundering program requirements on providers and sellers of prepaid access. While the..., stated: \\13\\ See Money Laundering Using New Payment Methods, Financial Action Task Force, October 2010... Money Laundering Strategy stated that prepaid access is ``* * * an emerging cash alternative for both...
75 FR 3967 - Bank Secrecy Act Advisory Group; Solicitation of Application for Membership
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-25
... INFORMATION: The Annunzio-Wylie Anti-Money Laundering Act of 1992 required the Secretary of the Treasury to...--Banking (1 vacancy) Industry Trade Groups--Casino (1 vacancy) Industry Trade Groups--Money Services... Groups--State (1 vacancy) Industry Representatives--Banking (3 vacancies) Industry Representatives--Money...
75 FR 75586 - Confidentiality of Suspicious Activity Reports
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-03
...] RIN 1550-AC26 Confidentiality of Suspicious Activity Reports AGENCY: The Office of Thrift Supervision... implementing the Bank Secrecy Act (BSA) governing the confidentiality of a suspicious activity report (SAR) to... corporations regulated by the OTS, to keep certain records and make certain reports that have been determined...
Threats and countermeasures for network security
NASA Technical Reports Server (NTRS)
Denning, Peter J.
1991-01-01
In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.
ERIC Educational Resources Information Center
Shea, Christopher
1994-01-01
A growing number of college students report that campus judicial systems are more concerned with political correctness than with fairness, or that the systems are unfair regardless of the discipline issue, and complain about the secrecy of proceedings. Shift from a paternalistic discipline policy to a legalistic one is seen. (MSE)
NASA Astrophysics Data System (ADS)
Nagarajan, K.; Shashidharan Nair, C. K.
2007-07-01
The channelled spectrum employing polarized light interference is a very convenient method for the study of dispersion of birefringence. However, while using this method, the absolute order of the polarized light interference fringes cannot be determined easily. Approximate methods are therefore used to estimate the order. One of the approximations is that the dispersion of birefringence across neighbouring integer order fringes is negligible. In this paper, we show how this approximation can cause errors. A modification is reported whereby the error in the determination of absolute fringe order can be reduced using fractional orders instead of integer orders. The theoretical background for this method supported with computer simulation is presented. An experimental arrangement implementing these modifications is described. This method uses a Constant Deviation Spectrometer (CDS) and a Soleil Babinet Compensator (SBC).
Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.
Li, Zhen; Jing, Tao; Ma, Liran; Huo, Yan; Qian, Jin
2016-03-07
The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric cryptography and asymmetric cryptography) may be compromised in CIoT networks, since these types of networks are heterogeneous. In this paper, we address the security issue in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative networks, we propose to employ cooperative jamming to achieve secrecy transmission. In the cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the signal to interference plus noise ratio (SINR) at the eavesdropper subject to the quality of service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the considered minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper. By using semi-definite programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme. The proposed auction framework jointly formulates the helper selection and the corresponding energy allocation problems under the constraint of the eavesdropper's SINR. By adopting the Vickrey auction, truthfulness and individual rationality can be guaranteed. Simulation results demonstrate the good performance of the cooperative jamming scheme and the auction framework.
Ariza, Pedro; Solesio-Jofre, Elena; Martínez, Johann H.; Pineda-Pardo, José A.; Niso, Guiomar; Maestú, Fernando; Buldú, Javier M.
2015-01-01
In this study we used graph theory analysis to investigate age-related reorganization of functional networks during the active maintenance of information that is interrupted by external interference. Additionally, we sought to investigate network differences before and after averaging network parameters between both maintenance and interference windows. We compared young and older adults by measuring their magnetoencephalographic recordings during an interference-based working memory task restricted to successful recognitions. Data analysis focused on the topology/temporal evolution of functional networks during both the maintenance and interference windows. We observed that: (a) Older adults require higher synchronization between cortical brain sites in order to achieve a successful recognition, (b) The main differences between age groups arise during the interference window, (c) Older adults show reduced ability to reorganize network topology when interference is introduced, and (d) Averaging network parameters leads to a loss of sensitivity to detect age differences. PMID:26029079
NASA Astrophysics Data System (ADS)
Schödel, R.
2015-08-01
Traceability of length measurements to the international system of units (SI) can be realized by using optical interferometry making use of well-known frequencies of monochromatic light sources mentioned in the Mise en Pratique for the realization of the metre. At some national metrology institutes, such as Physikalisch-Technische Bundesanstalt (PTB) in Germany, the absolute length of prismatic bodies (e.g. gauge blocks) is realized by so-called gauge-block interference comparators. At PTB, a number of such imaging phase-stepping interference comparators exist, including specialized vacuum interference comparators, each equipped with three highly stabilized laser light sources. The length of a material measure is expressed as a multiple of each wavelength. The large number of integer interference orders can be extracted by the method of exact fractions in which the coincidence of the lengths resulting from the different wavelengths is utilized as a criterion. The unambiguous extraction of the integer interference orders is an essential prerequisite for correct length measurements. This paper critically discusses coincidence criteria and their validity for three modes of absolute length measurements: 1) measurements under vacuum in which the wavelengths can be identified with the vacuum wavelengths, 2) measurements under air in which the air refractive index is obtained from environmental parameters using an empirical equation, and 3) measurements under air in which the air refractive index is obtained interferometrically by utilizing a vacuum cell placed along the measurement pathway. For case 3), which corresponds to PTB’s Kösters-Comparator for long gauge blocks, the unambiguous determination of integer interference orders related to the air refractive index could be improved by about a factor of ten when an ‘overall dispersion value,’ suggested in this paper, is used as coincidence criterion.
An in vivo and in silico approach to study cis-antisense: a short cut to higher order response
NASA Astrophysics Data System (ADS)
Courtney, Colleen; Varanasi, Usha; Chatterjee, Anushree
2014-03-01
Antisense interactions are present in all domains of life. Typically sense, antisense RNA pairs originate from overlapping genes with convergent face to face promoters, and are speculated to be involved in gene regulation. Recent studies indicate the role of transcriptional interference (TI) in regulating expression of genes in convergent orientation. Modeling antisense, TI gene regulation mechanisms allows us to understand how organisms control gene expression. We present a modeling and experimental framework to understand convergent transcription that combines the effects of transcriptional interference and cis-antisense regulation. Our model shows that combining transcriptional interference and antisense RNA interaction adds multiple-levels of regulation which affords a highly tunable biological output, ranging from first order response to complex higher-order response. To study this system we created a library of experimental constructs with engineered TI and antisense interaction by using face-to-face inducible promoters separated by carefully tailored overlapping DNA sequences to control expression of a set of fluorescent reporter proteins. Studying this gene expression mechanism allows for an understanding of higher order behavior of gene expression networks.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) Radio Astronomy and Radio Research Installations. In order to minimize harmful interference at the National Radio Astronomy Observatory site located at Green Bank, Pocahontas County, W. Va., and at the... Astronomy Observatory, Post Office Box No. 2, Green Bank, WV 24944, in writing, of the technical particulars...
Code of Federal Regulations, 2013 CFR
2013-10-01
... astronomy, research and receiving installations. 73.1030 Section 73.1030 Telecommunication FEDERAL... Broadcast Stations § 73.1030 Notifications concerning interference to radio astronomy, research and receiving installations. (a)(1) Radio astronomy and radio research installations. In order to minimize...
Code of Federal Regulations, 2011 CFR
2011-10-01
...) Radio Astronomy and Radio Research Installations. In order to minimize harmful interference at the National Radio Astronomy Observatory site located at Green Bank, Pocahontas County, W. Va., and at the... Astronomy Observatory, Post Office Box No. 2, Green Bank, WV 24944, in writing, of the technical particulars...
Code of Federal Regulations, 2014 CFR
2014-10-01
... astronomy, research and receiving installations. 73.1030 Section 73.1030 Telecommunication FEDERAL... Broadcast Stations § 73.1030 Notifications concerning interference to radio astronomy, research and receiving installations. (a)(1) Radio astronomy and radio research installations. In order to minimize...
Code of Federal Regulations, 2013 CFR
2013-10-01
...) Radio Astronomy and Radio Research Installations. In order to minimize harmful interference at the National Radio Astronomy Observatory site located at Green Bank, Pocahontas County, W. Va., and at the... Astronomy Observatory, Post Office Box No. 2, Green Bank, WV 24944, in writing, of the technical particulars...
Code of Federal Regulations, 2010 CFR
2010-10-01
... astronomy, research and receiving installations. 73.1030 Section 73.1030 Telecommunication FEDERAL... Broadcast Stations § 73.1030 Notifications concerning interference to radio astronomy, research and receiving installations. (a)(1) Radio astronomy and radio research installations. In order to minimize...
Code of Federal Regulations, 2014 CFR
2014-10-01
...) Radio Astronomy and Radio Research Installations. In order to minimize harmful interference at the National Radio Astronomy Observatory site located at Green Bank, Pocahontas County, W. Va., and at the... Astronomy Observatory, Post Office Box No. 2, Green Bank, WV 24944, in writing, of the technical particulars...
Code of Federal Regulations, 2012 CFR
2012-10-01
...) Radio Astronomy and Radio Research Installations. In order to minimize harmful interference at the National Radio Astronomy Observatory site located at Green Bank, Pocahontas County, W. Va., and at the... Astronomy Observatory, Post Office Box No. 2, Green Bank, WV 24944, in writing, of the technical particulars...
Code of Federal Regulations, 2011 CFR
2011-10-01
... astronomy, research and receiving installations. 73.1030 Section 73.1030 Telecommunication FEDERAL... Broadcast Stations § 73.1030 Notifications concerning interference to radio astronomy, research and receiving installations. (a)(1) Radio astronomy and radio research installations. In order to minimize...
Code of Federal Regulations, 2012 CFR
2012-10-01
... astronomy, research and receiving installations. 73.1030 Section 73.1030 Telecommunication FEDERAL... Broadcast Stations § 73.1030 Notifications concerning interference to radio astronomy, research and receiving installations. (a)(1) Radio astronomy and radio research installations. In order to minimize...
77 FR 29853 - Loan Guarantees for Projects That Employ Innovative Technologies
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-21
... Actions and Interference With Constitutionally Protected Property Rights'' The Department has determined, under Executive Order 12630, ``Governmental Actions and Interference with Constitutionally Protected Property Rights,'' 53 FR 8859 (March 18, 1988), that this rule would not result in any takings which might...
Echoic Memory Interference and Comprehension in a Foreign Language.
ERIC Educational Resources Information Center
Greenberg, Seth N.; Roscoe, Suzanne
1988-01-01
Study of echoic memory interference among students in college introductory Spanish and German courses revealed that students with weaker listening comprehension skills depended more upon vulnerable sensory codes in echoic memory, while students with stronger comprehension relied on stable higher-order codes. (Author/CB)
Path-separated electron interferometry in a scanning transmission electron microscope
NASA Astrophysics Data System (ADS)
Yasin, Fehmi S.; Harvey, Tyler R.; Chess, Jordan J.; Pierce, Jordan S.; McMorran, Benjamin J.
2018-05-01
We report a path-separated electron interferometer within a scanning transmission electron microscope. In this setup, we use a nanofabricated grating as an amplitude-division beamsplitter to prepare multiple spatially separated, coherent electron probe beams. We achieve path separations of 30 nm. We pass the +1 diffraction order probe through amorphous carbon while passing the 0th and ‑1 orders through vacuum. The probes are then made to interfere via imaging optics, and we observe an interference pattern at the CCD detector with up to 39.7% fringe visibility. We show preliminary experimental results in which the interference pattern was recorded during a 1D scan of the diffracted probes across a test phase object. These results qualitatively agree with a modeled interference predicted by an independent measurement of the specimen thickness. This experimental design can potentially be applied to phase contrast imaging and fundamental physics experiments, such as an exploration of electron wave packet coherence length.
Ingram, Nicolette S; Diakoumakos, Jessica V; Sinclair, Erin R; Crowe, Simon F
2016-01-01
This study investigated proactive and retroactive interference effects between the Wechsler Memory Scale-Fourth Edition (WMS-IV) using the flexible approach, and the Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV). One hundred and eighty nonclinical participants were assigned to a four (visual interference, verbal interference, visual and verbal interference, vs. no interference) by two (retroactive vs. proactive) between-subjects design. The administration order of the tests was counterbalanced (i.e., administration of the WAIS-IV prior to the WMS-IV, and the WAIS-IV administered during the delay interval of the WMS-IV). The WAIS-IV produced significant retroactive interference effects on the WMS-IV; however, no proactive interference effect was observed. The retroactive interference effect was dependent on material specificity. The results indicate that material presented within the delay of the WMS-IV can have a significant effect on subsequent delayed recall. Clinicians should carefully consider the effects associated with carry-over effects of these tests when using them in combination.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-28
... regulatory research into the operation of the prepaid industry, we have encountered a number of distinct...: (1) Establish written AML programs that are reasonably designed to prevent the MSB from being used to... limitations of descriptive terms are easily understood. The term ``stored value'' gained a foothold following...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-29
... exceptions to: (1) Establish written anti-money laundering (AML) programs that are reasonably designed to... activities and reasonably designed to prevent it from being used to facilitate money laundering and the... Payments Study \\21\\ noted that, of all forms of noncash payment methods included in its research, prepaid...
University Deals with Drug Companies Raise Concerns over Autonomy, Secrecy.
ERIC Educational Resources Information Center
Nicklin, Julie L.
1993-01-01
The large, exclusive research deal the Scripps Research Institute (California) made with one drug company has drawn criticism for conflict of interest. Critics fear researchers will focus more on marketing than on pure science and will protect corporate interests. Much of the deal-making is with foreign companies, sending profits overseas. (MSE)
The Shortchanged: Women and Minorities in Banking.
ERIC Educational Resources Information Center
Alexander, Rodney; Sapery, Elisabeth
The study by a team from the Council on Economic Priorities found: (1) that employment discrimination against minorities and women is endemic to commercial banking; (2) that a majority of the commercial banks studied are unwilling to permit public scrutiny of their employment and minority lending practices; and (3) that both the secrecy and the…
Bridging the Gap: Historical Analysis of Conventional and Unconventional Forces Integration
2006-06-01
people’s point of view. The Japanese restricted the individual liberties of the Burmese more than the British had when they were the colonial power...however, all too often in the past egoism , elitism, and the need for secrecy within units have created insurmountable barriers that have prevented the
Verifying Secrets and Relative Secrecy
2000-01-01
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given...value. For example, an ATM machine allows one to ask whether a string is the secret PIN of a (lost or stolen) ATM card. Yet such queries are prohibited
37 CFR 5.25 - Petition for retroactive license.
Code of Federal Regulations, 2010 CFR
2010-07-01
... invention of a pending application and no petition under § 1.181 has been filed, a final rejection of the..., DEPARTMENT OF COMMERCE GENERAL SECRECY OF CERTAIN INVENTIONS AND LICENSES TO EXPORT AND FILE APPLICATIONS IN... be renewed. Failure to renew the petition within the set time period will result in a final denial of...
75 FR 65805 - Transfer and Reorganization of Bank Secrecy Act Regulations
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-26
... lies not only with the products and services the covered institution offers, but also with the specific... bank routinely posts a particular transaction to its customer's account. (j) Commodity. Any good... service offered. (l) Contract of sale. Any sale, agreement of sale, or agreement to sell as described in...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-15
... request an appointment with the Disclosure Officer by telephoning (703) 905-5034 (not a toll-free call... terrorism, and to implement counter-money laundering programs and compliance procedures.\\2\\ Regulations... public comments received in response to this notice. \\4\\ BSA E-Filing is a free service provided by Fin...
Are All Latinas the Same?: Perceived Breast Cancer Screening Barriers and Facilitative Conditions
ERIC Educational Resources Information Center
Buki, Lydia P.; Borrayo, Evelinn A.; Feigal, Benjamin M.; Carrillo, Iris Y.
2004-01-01
In this article, we examine perceived breast cancer screening barriers and facilitative conditions for immigrant women from Mexico, Puerto Rico, Cuba, El Salvador, and South America (N=58). Focus groups conducted separately with women of each ancestry were analyzed using grounded theory methods. Identified barriers comprise secrecy, lack of…
76 FR 10516 - Transfer and Reorganization of Bank Secrecy Act Regulations-Technical Amendment.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-25
... concerning mutual funds and the other concerning the confidentiality of a report of suspicious activity (SAR... compliance date of the mutual fund rule. Additionally, the Chapter X Final Rule contained an inadvertent..., 2010, FinCEN issued a final rule to include mutual funds within the general definition of ``financial...
Code of Federal Regulations, 2013 CFR
2013-07-01
... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.17 Appeals. (a... determination of no trade secret. (1) If a submitter appeals from a determination by EPA under § 350.11(b)(2) that the specific chemical identity at issue is not a trade secret, the General Counsel shall make one...
Why Secrets Matter to Children
ERIC Educational Resources Information Center
Mogel, Wendy
2013-01-01
In this article, Wendy Mogel describes a time in a child's life that many parents need to be reminded of--"joyful secrecy." It is an essential part of growing up, just like the carefree days described in "The Adventures of Huckleberry Finn" (Mark Twain). Healthy children's development still requires it even if we are…
40 CFR 350.15 - Public petitions requesting disclosure of chemical identity claimed as trade secret.
Code of Federal Regulations, 2012 CFR
2012-07-01
... of chemical identity claimed as trade secret. 350.15 Section 350.15 Protection of Environment... TRADE SECRECY CLAIMS FOR EMERGENCY PLANNING AND COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET... chemical identity claimed as trade secret. (a) The public may request the disclosure of chemical identity...
40 CFR 350.15 - Public petitions requesting disclosure of chemical identity claimed as trade secret.
Code of Federal Regulations, 2011 CFR
2011-07-01
... of chemical identity claimed as trade secret. 350.15 Section 350.15 Protection of Environment... TRADE SECRECY CLAIMS FOR EMERGENCY PLANNING AND COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET... chemical identity claimed as trade secret. (a) The public may request the disclosure of chemical identity...
40 CFR 350.15 - Public petitions requesting disclosure of chemical identity claimed as trade secret.
Code of Federal Regulations, 2010 CFR
2010-07-01
... of chemical identity claimed as trade secret. 350.15 Section 350.15 Protection of Environment... TRADE SECRECY CLAIMS FOR EMERGENCY PLANNING AND COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET... chemical identity claimed as trade secret. (a) The public may request the disclosure of chemical identity...
40 CFR 350.15 - Public petitions requesting disclosure of chemical identity claimed as trade secret.
Code of Federal Regulations, 2014 CFR
2014-07-01
... of chemical identity claimed as trade secret. 350.15 Section 350.15 Protection of Environment... TRADE SECRECY CLAIMS FOR EMERGENCY PLANNING AND COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET... chemical identity claimed as trade secret. (a) The public may request the disclosure of chemical identity...
Code of Federal Regulations, 2014 CFR
2014-07-01
... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.17 Appeals. (a... determination of no trade secret. (1) If a submitter appeals from a determination by EPA under § 350.11(b)(2) that the specific chemical identity at issue is not a trade secret, the General Counsel shall make one...
Longitudinal Associations between Keeping a Secret and Psychosocial Adjustment in Adolescence
ERIC Educational Resources Information Center
Frijns, Tom; Finkenauer, Catrin
2009-01-01
Increasing bodies of evidence suggest that keeping secrets may be detrimental to well-being and adjustment, whereas confiding secrets may alleviate the detriments of secrecy and benefit well-being and adjustment. However, few studies have addressed the consequences of keeping and confiding secrets simultaneously, and even fewer have done so…
Code of Federal Regulations, 2012 CFR
2012-07-01
... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.17 Appeals. (a... determination of no trade secret. (1) If a submitter appeals from a determination by EPA under § 350.11(b)(2) that the specific chemical identity at issue is not a trade secret, the General Counsel shall make one...
40 CFR 350.15 - Public petitions requesting disclosure of chemical identity claimed as trade secret.
Code of Federal Regulations, 2013 CFR
2013-07-01
... of chemical identity claimed as trade secret. 350.15 Section 350.15 Protection of Environment... TRADE SECRECY CLAIMS FOR EMERGENCY PLANNING AND COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET... chemical identity claimed as trade secret. (a) The public may request the disclosure of chemical identity...
Code of Federal Regulations, 2011 CFR
2011-07-01
... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.17 Appeals. (a... determination of no trade secret. (1) If a submitter appeals from a determination by EPA under § 350.11(b)(2) that the specific chemical identity at issue is not a trade secret, the General Counsel shall make one...
Code of Federal Regulations, 2010 CFR
2010-07-01
... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.17 Appeals. (a... determination of no trade secret. (1) If a submitter appeals from a determination by EPA under § 350.11(b)(2) that the specific chemical identity at issue is not a trade secret, the General Counsel shall make one...
Secrecy: The Communication Dilemma of the CIA.
ERIC Educational Resources Information Center
Gibson, Dirk C.
1987-01-01
Explores the response of the CIA to public criticism when caught in the dilemma of having to put forth information to the public about its activities and yet carry out secret intelligence-gathering and covert operations. Concludes that its response, attempted cover-ups and censorship, failed due to this conflict in its position. (JC)
A Multisite Investigation of Binge Eating Behaviors in Children and Adolescents
ERIC Educational Resources Information Center
Tanofsky-Kraff, Marian; Goossens, Lien; Eddy, Kamryn T.; Ringham, Rebecca; Goldschmidt, Andrea; Yanovski, Susan Z.; Braet, Caroline; Marcus, Marsha D.; Wilfley, Denise E.; Olsen, Cara; Yanovski, Jack A.
2007-01-01
The phenomenology of childhood and adolescent loss of control (LOC) eating is unknown. The authors interviewed 445 youths to assess aspects of aberrant eating. LOC was associated with eating forbidden food before the episode; eating when not hungry; eating alone; and experiencing secrecy, negative emotions, and a sense of "numbing" while eating…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-14
... definition of mutual fund in the rule requiring mutual funds to establish anti-money laundering (``AML...-money laundering programs and compliance procedures.\\1\\ Regulations implementing the BSA appear at 31... transactions.\\7\\ \\5\\ Anti-Money Laundering Programs for Mutual Funds, 67 FR 21117 (April 29, 2002); Customer...
Securing medical research: a cybersecurity point of view.
Schneier, Bruce
2012-06-22
The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Reports. 326.4 Section 326.4 Banks and Banking... DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.4 Reports. The security officer for each insured nonmember bank shall report at least annually to the bank's board of...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Reports. 326.4 Section 326.4 Banks and Banking... DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.4 Reports. The security officer for each insured nonmember bank shall report at least annually to the bank's board of...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Reports. 326.4 Section 326.4 Banks and Banking... DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.4 Reports. The security officer for each insured nonmember bank shall report at least annually to the bank's board of...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Reports. 326.4 Section 326.4 Banks and Banking... DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.4 Reports. The security officer for each insured nonmember bank shall report at least annually to the bank's board of...
Sex and Secrecies: An Exploration of Students' Conceptualizations of Heteronormativity
ERIC Educational Resources Information Center
Cassar, Joanne
2015-01-01
Graffiti on the female students' lavatory doors of a higher education institution in Malta, most often describing sexual and romantic desires, demonstrates how students create alternative spaces beyond formal learning environments to acquire knowledge about sex and sexual orientation. This article presents a study of the writings that document the…
An improved method for determination of refractive index of absorbing films: A simulation study
NASA Astrophysics Data System (ADS)
Özcan, Seçkin; Coşkun, Emre; Kocahan, Özlem; Özder, Serhat
2017-02-01
In this work an improved version of the method presented by Gandhi was presented for determination of refractive index of absorbing films. In this method local maxima of consecutive interference order in transmittance spectrum are used. The method is based on the minimizing procedure leading to the determination of interference order accurately by using reasonable Cauchy parameters. It was tested on theoretically generated transmittance spectrum of absorbing film and the details of the minimization procedure were discussed.
Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.
Arshad, Hamed; Rasoolzadegan, Abbas
2016-11-01
Authentication and key agreement schemes play a very important role in enhancing the level of security of telecare medicine information systems (TMISs). Recently, Amin and Biswas demonstrated that the authentication scheme proposed by Giri et al. is vulnerable to off-line password guessing attacks and privileged insider attacks and also does not provide user anonymity. They also proposed an improved authentication scheme, claiming that it resists various security attacks. However, this paper demonstrates that Amin and Biswas's scheme is defenseless against off-line password guessing attacks and replay attacks and also does not provide perfect forward secrecy. This paper also shows that Giri et al.'s scheme not only suffers from the weaknesses pointed out by Amin and Biswas, but it also is vulnerable to replay attacks and does not provide perfect forward secrecy. Moreover, this paper proposes a novel authentication and key agreement scheme to overcome the mentioned weaknesses. Security and performance analyses show that the proposed scheme not only overcomes the mentioned security weaknesses, but also is more efficient than the previous schemes.
NASA Astrophysics Data System (ADS)
Brandt, Benedikt B.; Yannouleas, Constantine; Landman, Uzi
2018-05-01
Identification and understanding of the evolution of interference patterns in two-particle momentum correlations as a function of the strength of interatomic interactions are important in explorations of the nature of quantum states of trapped particles. Together with the analysis of two-particle spatial correlations, they offer the prospect of uncovering fundamental symmetries and structure of correlated many-body states, as well as opening vistas into potential control and utilization of correlated quantum states as quantum-information resources. With the use of the second-order density matrix constructed via exact diagonalization of the microscopic Hamiltonian, and an analytic Hubbard-type model, we explore here the systematic evolution of characteristic interference patterns in the two-body momentum and spatial correlation maps of two entangled ultracold fermionic atoms in a double well, for the entire attractive- and repulsive-interaction range. We uncover quantum-statistics-governed bunching and antibunching, as well as interaction-dependent interference patterns, in the ground and excited states, and interpret our results in light of the Hong-Ou-Mandel interference physics, widely exploited in photon indistinguishability testing and quantum-information science.
Acoustic and semantic interference effects in words and pictures.
Dhawan, M; Pellegrino, J W
1977-05-01
Interference effects for pictures and words were investigated using a probe-recall task. Word stimuli showed acoustic interference effects for items at the end of the list and semantic interference effects for items at the beginning of the list, similar to results of Kintsch and Buschke (1969). Picture stimuli showed large semantic interference effects at all list positions with smaller acoustic interference effects. The results were related to latency data on picture-word processing and interpreted in terms of the differential order, probability, and/or speed of access to acoustic and semantic levels of processing. A levels of processing explanation of picture-word retention differences was related to dual coding theory. Both theoretical positions converge on an explanation of picture-word retention differences as a function of the relative capacity for semantic or associative processing.
NASA Astrophysics Data System (ADS)
Milas, Vasilis; Koletta, Maria; Constantinou, Philip
2003-07-01
This paper provides the results of interference and compatibility studies in order to assess the sharing conditions between Fixed Satellite Service (FSS) and Fixed Service provided by High Altitude Platform Stations (HAPS) in the same operational frequency bands and discusses the most important operational parameters that have an impact on the interference calculations. To characterize interference phenomena between the two systems carrier to interference (C/I) ratios are evaluated. Simulation results under the scenario of a realistic deployment of HAPS and the use of different satellite configurations are presented. An interesting result derived from the simulations is that FSS/GSO Earth Stations and HAPS ground stations may coexist in the HAPS coverage area under certain considerations.
Flow interference in a variable porosity trisonic wind tunnel.
NASA Technical Reports Server (NTRS)
Davis, J. W.; Graham, R. F.
1972-01-01
Pressure data from a 20-degree cone-cylinder in a variable porosity wind tunnel for the Mach range 0.2 to 5.0 are compared to an interference free standard in order to determine wall interference effects. Four 20-degree cone-cylinder models representing an approximate range of percent blockage from one to six were compared to curve-fits of the interference free standard at each Mach number and errors determined at each pressure tap location. The average of the absolute values of the percent error over the length of the model was determined and used as the criterion for evaluating model blockage interference effects. The results are presented in the form of the percent error as a function of model blockage and Mach number.
Living with pulmonary hypertension: unique insights from an international ethnographic study
Kingman, Martha; Hinzmann, Barbara; Sweet, Oliver; Vachiéry, Jean-Luc
2014-01-01
Objectives To better understand the patient's perspective of pulmonary hypertension (PH), including the impact of living with PH, disease management and treatment. Design This qualitative ethnographic study collected observational video footage, supplemented by field notes and patient diaries to assess the impact of PH on the patient's life. Setting Patients were observed and filmed in their home for up to 6 h, capturing the environment, interactions and activities of everyday life. Participants Patients with pulmonary arterial hypertension (PAH) or chronic thromboembolic PH who were receiving PAH-specific medication were recruited through healthcare professionals (HCPs) and patient associations in seven countries across four continents. Sampling was purposive and subgroup analysis was not intended. Results Overall, 39 patients with PH were enrolled. Many patients had a poor understanding of PH and found their ‘invisible’ disease difficult to explain to others. An important finding was the secrecy surrounding PH. Feelings of insecurity and isolation were regularly reported, and many patients admitted to hiding their symptoms. The marked improvement in symptoms after therapy initiation made assessment of disease progression more difficult as patients compared their quality of life (QoL) against pretreatment levels. Extensive planning and adherence to daily routines were required in patients’ everyday life. Conclusions Ethnography was used for the first time, in several countries, to evaluate the patient's perception of living with PH. This approach revealed key findings that would not typically be uncovered using other qualitative techniques, including the secrecy surrounding PH, the difficulties in describing the disease and the challenges in assessing disease progression. A more tailored dissemination of information from HCPs and development of a simple and understandable PH definition may be beneficial in alleviating the secrecy reported by patients. A greater appreciation of how patients perceive their disease and QoL has the potential to improve PH management. PMID:24838724
Care and secrecy: being a mother of children living with HIV in Burkina Faso.
Hejoaka, Fabienne
2009-09-01
Home care has become a central component of the response to the HIV/AIDS epidemic, displacing caregiving work onto women. While increasing interest has been paid to HIV/AIDS care with a focus on ailing adults and orphan foster care, the issue of caring for children living with HIV has received little attention in the social sciences. Based on ethnographic material gathered in Burkina Faso between November 2005 and December 2006, the aim of this paper was to gain understanding of women who mother and care for children living with HIV in resource-limited countries. The study involved participant observation in community-based organizations in Burkina Faso and semi-structured interviews with 20 women mothering HIV-positive children as well as 15 children infected with HIV, aged between 8 and 18 years. In daily care mothers face many great challenges, ranging from the routine of pill-taking to disturbing discussions with children asking questions about their health or treatment. The results also show how HIV/AIDS-related stigma adds an additional layer to the burden of care, compelling mothers to deal with the tension between secrecy surrounding the disease and the openness required in providing care and receiving social support. As mothers live in fear of disclosure, they have to develop concealment strategies around children's treatment and the nature of the disease. Conversely, some mothers may share their secret with kin members, close relatives or their children to gain social support. As HIV/AIDS care is shaped by secrecy, these findings shed light on mothers' isolation in child care within a context of changing patterns of family bonds and lack of formal psychosocial support addressing child-related issues. Finally, women's engagement in child care invites us to look beyond the essentialist approach of women's vulnerability conveyed by international discourse to characterise the situation of women facing the HIV/AIDS impact.
Living with pulmonary hypertension: unique insights from an international ethnographic study.
Kingman, Martha; Hinzmann, Barbara; Sweet, Oliver; Vachiéry, Jean-Luc
2014-05-16
To better understand the patient's perspective of pulmonary hypertension (PH), including the impact of living with PH, disease management and treatment. This qualitative ethnographic study collected observational video footage, supplemented by field notes and patient diaries to assess the impact of PH on the patient's life. Patients were observed and filmed in their home for up to 6 h, capturing the environment, interactions and activities of everyday life. Patients with pulmonary arterial hypertension (PAH) or chronic thromboembolic PH who were receiving PAH-specific medication were recruited through healthcare professionals (HCPs) and patient associations in seven countries across four continents. Sampling was purposive and subgroup analysis was not intended. Overall, 39 patients with PH were enrolled. Many patients had a poor understanding of PH and found their 'invisible' disease difficult to explain to others. An important finding was the secrecy surrounding PH. Feelings of insecurity and isolation were regularly reported, and many patients admitted to hiding their symptoms. The marked improvement in symptoms after therapy initiation made assessment of disease progression more difficult as patients compared their quality of life (QoL) against pretreatment levels. Extensive planning and adherence to daily routines were required in patients' everyday life. Ethnography was used for the first time, in several countries, to evaluate the patient's perception of living with PH. This approach revealed key findings that would not typically be uncovered using other qualitative techniques, including the secrecy surrounding PH, the difficulties in describing the disease and the challenges in assessing disease progression. A more tailored dissemination of information from HCPs and development of a simple and understandable PH definition may be beneficial in alleviating the secrecy reported by patients. A greater appreciation of how patients perceive their disease and QoL has the potential to improve PH management. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Support interference of wind tunnel models: A selective annotated bibliography
NASA Technical Reports Server (NTRS)
Tuttle, M. H.; Gloss, B. B.
1981-01-01
This bibliography, with abstracts, consists of 143 citations arranged in chronological order by dates of publication. Selection of the citations was made for their relevance to the problems involved in understanding or avoiding support interference in wind tunnel testing throughout the Mach number range. An author index is included.
Support interference of wind tunnel models: A selective annotated bibliography
NASA Technical Reports Server (NTRS)
Tuttle, M. H.; Lawing, P. L.
1984-01-01
This bibliography, with abstracts, consists of 143 citations arranged in chronological order by dates of publication. Selection of the citations was made for their relevance to the problems involved in understanding or avoiding support interference in wind tunnel testing throughout the Mach number range. An author index is included.
25 CFR 11.405 - Interference with custody.
Code of Federal Regulations, 2010 CFR
2010-04-01
... judicial warrant, any orphan, neglected or delinquent child, mentally defective or insane person, or other... ORDER CODE Criminal Offenses § 11.405 Interference with custody. (a) Custody of children. A person commits a misdemeanor if he or she knowingly or recklessly takes or entices any child under the age of 18...
Coulomb Interactions in Hanbury Brown-Twiss Experiments with Electrons
ERIC Educational Resources Information Center
Shen, Kan
2009-01-01
This dissertation examines the effect of Coulomb interactions in Hanbury Brown-Twiss (HBT) type experiments with electrons. HBT experiments deal with intensity interference, which is related to the second-order correlation function of the particle field. This is an extension of the usual amplitude interference experiment, such as Young's…
NASA Technical Reports Server (NTRS)
Wilson, Jeffrey D.
2013-01-01
The Aeronautical Mobile Airport Communications System (AeroMACS), which is based upon the IEEE 802.16e mobile wireless standard, is expected to be implemented in the 5091 to 5150 MHz frequency band. As this band is also occupied by Mobile Satellite Service feeder uplinks, AeroMACS must be designed to avoid interference with this incumbent service. The aspects of AeroMACS operation that present potential interference are under analysis in order to enable the definition of standards that assure that such interference will be avoided. In this study, the cumulative interference power distribution at low Earth orbit from transmitters at global airports was simulated with the Visualyse Professional software. The dependence of the interference power on antenna distribution, gain patterns, duty cycle, and antenna tilt was simulated. As a function of these parameters, the simulation results are presented in terms of the limitations on transmitter power from global airports required to maintain the cumulative interference power under the established threshold.
Dependence of AeroMACS Interference on Airport Radiation Pattern Characteristics
NASA Technical Reports Server (NTRS)
Wilson, Jeffrey D.
2012-01-01
AeroMACS (Aeronautical Mobile Airport Communications System), which is based upon the IEEE 802.16e mobile wireless standard, is expected to be implemented in the 5091 to 5150 MHz frequency band. As this band is also occupied by Mobile Satellite Service (MSS) feeder uplinks, AeroMACS must be designed to avoid interference with this incumbent service. The aspects of AeroMACS operation that present potential interference are under analysis in order to enable the definition of standards that assure that such interference will be avoided. In this study, the cumulative interference power distribution at low earth orbit from AeroMACS transmitters at the 497 major airports in the contiguous United States was simulated with the Visualyse Professional software. The dependence of the interference power on the number of antenna beams per airport, gain patterns, and beam direction orientations was simulated. As a function of these parameters, the simulation results are presented in terms of the limitations on transmitter power required to maintain the cumulative interference power under the established threshold.
Dependence of AeroMACS Interference on Airport Radiation Pattern Characteristics
NASA Technical Reports Server (NTRS)
Wilson, Jeffrey D.
2012-01-01
AeroMACS (Aeronautical Mobile Airport Communications System), which is based upon the IEEE 802.16e mobile wireless standard, is expected to be implemented in the 5091-5150 MHz frequency band. As this band is also occupied by Mobile Satellite Service (MSS) feeder uplinks, AeroMACS must be designed to avoid interference with this incumbent service. The aspects of AeroMACS operation that present potential interference are under analysis in order to enable the definition of standards that assure that such interference will be avoided. In this study, the cumulative interference power distribution at low earth orbit from AeroMACS transmitters at the 497 major airports in the contiguous United States was simulated with the Visualyse Professional software. The dependence of the interference power on the number of antenna beams per airport, gain patterns, and beam direction orientations was simulated. As a function of these parameters, the simulation results are presented in terms of the limitations on transmitter power required to maintain the cumulative interference power under the established threshold.
NASA Astrophysics Data System (ADS)
Zhu, Wei; Chen, Qianghua; Wang, Yanghong; Luo, Huifu; Wu, Huan; Ma, Binwu
2018-06-01
In the laser self-mixing interference vibration measurement system, the self mixing interference signal is usually weak so that it can be hardly distinguished from the environmental noise. In order to solve this problem, we present a self-mixing interference optical path with a pre-feedback mirror, a pre-feedback mirror is added between the object and the collimator lens, corresponding feedback light enters into the inner cavity of the laser and the interference by the pre-feedback mirror occurs. The pre-feedback system is established after that. The self-mixing interference theoretical model with a pre-feedback based on the F-P model is derived. The theoretical analysis shows that the amplitude of the intensity of the interference signal can be improved by 2-4 times. The influence factors of system are also discussed. The experiment results show that the amplitude of the signal is greatly improved, which agrees with the theoretical analysis.
Interference effects on commonly used memory tasks.
Brophy, Linda M; Jackson, Martin; Crowe, Simon F
2009-02-01
This paper reports two studies which investigated the effect of interference on delayed recall scores of the WMS-III and other commonly used memory measures. In Study 1, participants completed the immediate and delayed components of the WMS-III, with or without the introduction of conceptually similar memory tasks between the recall trials. In Study 2, this order of administration was reversed, with the WMS-III subtests used as the interference items. The results indicated that the introduction of interference items during the delay negatively affected delayed recall performance on almost all sub-tests. In addition, equal effects of proactive and retroactive interference were demonstrated. These findings raise concerns regarding the standardization process for memory tasks and highlight the need to consider interference effects in clinical practice, and stand as a caution in the use of memory-related materials during the delay interval in memory testing.
Description and evaluation of an interference assessment for a slotted-wall wind tunnel
NASA Technical Reports Server (NTRS)
Kemp, William B., Jr.
1991-01-01
A wind-tunnel interference assessment method applicable to test sections with discrete finite-length wall slots is described. The method is based on high order panel method technology and uses mixed boundary conditions to satisfy both the tunnel geometry and wall pressure distributions measured in the slotted-wall region. Both the test model and its sting support system are represented by distributed singularities. The method yields interference corrections to the model test data as well as surveys through the interference field at arbitrary locations. These results include the equivalent of tunnel Mach calibration, longitudinal pressure gradient, tunnel flow angularity, wall interference, and an inviscid form of sting interference. Alternative results which omit the direct contribution of the sting are also produced. The method was applied to the National Transonic Facility at NASA Langley Research Center for both tunnel calibration tests and tests of two models of subsonic transport configurations.
78 FR 18473 - The Freedom of Information Act
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-27
... Order 12630 (Government Actions and Interference With Constitutionally Protected Property Rights) The... not impair private property rights. G. Executive Order 12866 (Regulatory Planning and Review) and...
Warwick, Sarah Jane
1989-01-01
This paper considers the justifications for adhering to a principle of confidentiality within medical practice. These are found to derive chiefly from respect for individual autonomy, the doctor/patient contract, and social utility. It is suggested that these will benefit more certainly if secrecy is rejected and the principle of confidentiality is removed from the area of health care. PMID:11644403
Open Up or Close Down: How Do Parental Reactions Affect Youth Information Management?
ERIC Educational Resources Information Center
Tilton-Weaver, Lauree; Kerr, Margaret; Pakalniskeine, Vilmante; Tokic, Ana; Salihovic, Selma; Stattin, Hakan
2010-01-01
The purpose of this study was to test a process model of youths' information management. Using three waves of longitudinal data collected from 982 youths, we modeled parents' positive and negative reactions to disclosure predicting youths' feelings about their parents, in turn predicting youths' disclosure and secrecy about their daily activities.…
ERIC Educational Resources Information Center
Nelkin, Dorothy
The controversial question of who controls research stands at the center of a growing number of legal and administrative disputes which raise critical issues of professional sovereignty, scientific secrecy, and proprietary rights. Although the idea of knowledge as property is not new, the scale and changing nature and structure of contemporary…
Cellphones in Classrooms Land Teachers on Online Video Sites
ERIC Educational Resources Information Center
Honawar, Vaishali
2007-01-01
Videos of teachers that students taped in secrecy are all over online sites like YouTube and MySpace. Angry teachers, enthusiastic teachers, teachers clowning around, singing, and even dancing are captured, usually with camera phones, for the whole world to see. Some students go so far as to create elaborately edited videos, shot over several…
Science and Its Discontents: An Evolutionary Tale. Research & Occasional Papers Series. CSHE.11.2008
ERIC Educational Resources Information Center
Kennedy, Donald
2008-01-01
This paper analyzes the roots and implications of conflict between the conduct of science and government predilections in the United States, including the security state and neoconservative control of Washington. Three major conflicts are discussed: the emergence of new security and secrecy regimes that seek control of science; religiously derived…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-21
... international terrorism.'' \\1\\ In addition, the Secretary is authorized to impose anti-money laundering (``AML... the MSB from being used to facilitate money laundering and the financing of terrorist activities; \\7... businesses posed a high risk of money laundering and terrorist financing. In 2006, FinCEN issued an advance...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-26
... annuity policy. Life insurance policies that have a cash surrender value are potential money laundering... laundering risk because they allow a money launderer to exchange illicit funds for an immediate or deferred... believes that these types of accounts present risks for money laundering. As with other types of financial...
Heavy Drinking and Suicide in Russia
ERIC Educational Resources Information Center
Pridemore, William Alex
2006-01-01
Russian levels of alcohol consumption and suicide are among the highest in the world. While observers have long suspected an association between the two, they were unable to investigate this hypothesis until recently due to past Soviet secrecy and thus a lack of data. This study took advantage of the newly available data during the post-Soviet era…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-26
... transition from a system originally designed for collecting paper forms to a modernized IT environment for... of DOEPs under the BSA. The DOEP will be an e-filed dynamic and interactive report used by all BSA... appropriate agencies and organizations as disclosed in FinCEN's Privacy Act System of Records Notice relating...
Secret Keepers: Children's Theory of Mind and Their Conception of Secrecy
ERIC Educational Resources Information Center
Colwell, Malinda J.; Corson, Kimberly; Sastry, Anuradha; Wright, Holly
2016-01-01
In this mixed methods study, semi-structured interviews were conducted with 3-5-year-olds (n?=?21) in a university-sponsored preschool programme and children completed a theory of mind (ToM) task. After grouping children into pass/no pass groups for the ToM tasks, analyses using interpretive phenomenology indicated that preschool children explain…
Code of Federal Regulations, 2014 CFR
2014-07-01
... TRADE SECRECY CLAIMS FOR EMERGENCY PLANNING AND COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET... the disclosure of chemical identity claimed as trade secret, and determinations by EPA of whether this information is entitled to trade secret treatment. Claims for confidentiality of the location of a hazardous...
Code of Federal Regulations, 2012 CFR
2012-07-01
... TRADE SECRECY CLAIMS FOR EMERGENCY PLANNING AND COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET... the disclosure of chemical identity claimed as trade secret, and determinations by EPA of whether this information is entitled to trade secret treatment. Claims for confidentiality of the location of a hazardous...
Code of Federal Regulations, 2011 CFR
2011-07-01
... TRADE SECRECY CLAIMS FOR EMERGENCY PLANNING AND COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET... the disclosure of chemical identity claimed as trade secret, and determinations by EPA of whether this information is entitled to trade secret treatment. Claims for confidentiality of the location of a hazardous...
Code of Federal Regulations, 2013 CFR
2013-07-01
... TRADE SECRECY CLAIMS FOR EMERGENCY PLANNING AND COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET... the disclosure of chemical identity claimed as trade secret, and determinations by EPA of whether this information is entitled to trade secret treatment. Claims for confidentiality of the location of a hazardous...
Code of Federal Regulations, 2010 CFR
2010-07-01
... TRADE SECRECY CLAIMS FOR EMERGENCY PLANNING AND COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET... the disclosure of chemical identity claimed as trade secret, and determinations by EPA of whether this information is entitled to trade secret treatment. Claims for confidentiality of the location of a hazardous...
The Phenomenon of Intrusive Thoughts in Yejide Kilanko's "Daughters Who Walk This Path"
ERIC Educational Resources Information Center
Dodhy, Shamaila
2017-01-01
Hegemonic masculinity, with patriarchal supremacy and female subservience are the norms of many African societies. Suffering in silence goes along with the traditional place of woman in African societies as they observe sexist hierarchy of power. Physical attack and its wounds flourish in an atmosphere of secrecy and silence. Silence to such…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-29
..., Federal Register notice they may be inspected, between 10 a.m. and 4 p.m., in the FinCEN reading room in...-Filing, which is provided free of charge, offers streamlined BSA information submission; faster routing... suspicious activity report (SAR) was received; Feedback reports to filers; Faster acknowledgement to money...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-16
... be inspected, between 10 a.m. and 4 p.m., in the FinCEN reading room in Vienna, VA. Persons wishing... submission; faster routing of information to law enforcement; greater data security and privacy compared with... suspicious activity report (SAR) was filed; Feedback reports to filers; Faster receipt for money services...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-25
... Exchange Co. Is a Financial Institution of Primary Money Laundering Concern AGENCY: Financial Crimes... a financial institution operating outside the United States that is of primary money laundering...-56. Title III of the USA PATRIOT Act amends the anti- money laundering provisions of the Bank Secrecy...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-06
... PATRIOT Act amends the anti- money laundering provisions of the Bank Secrecy Act (BSA), codified at 12 U.S..., detection, and prosecution of international money laundering and the financing of terrorism. Regulations... jurisdiction, institution, class of transaction, or type of account is of ``primary money laundering concern...
Looking Back at the Sputnik Era and Its Impact on Science Education
ERIC Educational Resources Information Center
Wissehr, Cathy; Concannon, Jim; Barrow, Lloyd H.
2011-01-01
Two years and seven months after the initiation of the U.S. satellite program, Soviet Russia launched a rocket north of the Caspian Sea carrying the now famous "Sputnik I" satellite. U.S. scientists were aware that Soviet Russia was planning on putting an artificial satellite into orbit; however, secrecy surrounding the timing and the…
Accidental Nuclear War: The Growing Peril. Part I [and] Part II.
ERIC Educational Resources Information Center
Newcombe, Alan, Ed.
1984-01-01
Two volumes designed to increase awareness of accidental nuclear war dangers are presented. The first of 5 sections in volume I proposes that although accidental war is preventable, the current arms race and secrecy about accidents and false alarms increase the possibility of an accidental war. Section 2 posits that decreased decision-making time…
Psychodynamics of the Ku Klux Klan.
ERIC Educational Resources Information Center
Salmony, Steven E.; Smoke, Richard
The Ku Klux Klan (KKK), characterized by disguises, secrecy, bigotry, and terror, came into power in the South after the Civil War. In some parts of the country the KKK, an extreme example of pathological group process, appears as strong and violent today as ever. Fromm (1941) noted that the basis of group psychology is the individual personality…
The Real-Time Wall Interference Correction System of the NASA Ames 12-Foot Pressure Wind Tunnel
NASA Technical Reports Server (NTRS)
Ulbrich, Norbert
1998-01-01
An improved version of the Wall Signature Method was developed to compute wall interference effects in three-dimensional subsonic wind tunnel testing of aircraft models in real-time. The method may be applied to a full-span or a semispan model. A simplified singularity representation of the aircraft model is used. Fuselage, support system, propulsion simulator, and separation wake volume blockage effects are represented by point sources and sinks. Lifting effects are represented by semi-infinite line doublets. The singularity representation of the test article is combined with the measurement of wind tunnel test reference conditions, wall pressure, lift force, thrust force, pitching moment, rolling moment, and pre-computed solutions of the subsonic potential equation to determine first order wall interference corrections. Second order wall interference corrections for pitching and rolling moment coefficient are also determined. A new procedure is presented that estimates a rolling moment coefficient correction for wings with non-symmetric lift distribution. Experimental data obtained during the calibration of the Ames Bipod model support system and during tests of two semispan models mounted on an image plane in the NASA Ames 12 ft. Pressure Wind Tunnel are used to demonstrate the application of the wall interference correction method.
Signatures of Hong-Ou-Mandel interference at microwave frequencies
NASA Astrophysics Data System (ADS)
Woolley, M. J.; Lang, C.; Eichler, C.; Wallraff, A.; Blais, A.
2013-10-01
Two-photon quantum interference at a beam splitter, commonly known as Hong-Ou-Mandel interference, is a fundamental demonstration of the quantum mechanical nature of electromagnetic fields and a key component of various quantum information processing protocols. The phenomenon was recently demonstrated with microwave-frequency photons by Lang et al (2013 Nature Phys. 9 345-8). This experiment employed circuit QED systems as sources of microwave photons, and was based on the measurement of second-order cross-correlation and auto-correlation functions of the microwave fields at the outputs of the beam splitter using linear detectors. Here we present the calculation of these correlation functions for the cases of inputs corresponding to: (i) trains of pulsed Gaussian or Lorentzian single microwave photons and (ii) resonant fluorescent microwave fields from continuously driven circuit QED systems. In both cases, the signature of two-photon quantum interference is a suppression of the second-order cross-correlation function for small delays. The experiment described in Lang et al (2013) was performed with trains of Lorentzian single photons, and very good agreement with experimental data is obtained. The results are relevant not only to interference experiments using circuit QED systems, but any such setup with highly controllable sources and time-resolved detection.
NASA Astrophysics Data System (ADS)
Ocko, B. M.; Pershan, P. S.; Safinya, C. R.; Chiang, L. Y.
1987-02-01
We report x-ray reflectivity measurements on the free surface of 4-n-heptylphenyl-4'-(4''-nitrobenzoyloxy)benzoate (DB7NO2) at the nematic to smectic-A phase transition, TNA=99.9 °C. The free surface in the nematic phase exhibits smecticlike ordering at two q vectors, one which is commensurate with the smectic-A monolayer q vector q2. The other q vector is incommensurate corresponding to ordering at ~0.59q2. The commensurate peak constructively interferes with the air-liquid interface while the incommensurate peak destructively interferes. These results are compared with bulk-phase x-ray scattering measurements.
Case Study of An Adopted Chinese Woman with Bulimia Nervosa: A Cultural and Transcultural Approach.
de Montgremier, Marion Vu-Augier; Chen, Liangliang; Chen, Jue; Moro, Marie Rose
2017-08-25
For a long time, eating disorders were considered as culture-bound syndromes, specific to Western countries. This theory has been refuted for anorexia, but few transcultural studies have been carried out on bulimia nervosa. As a result, knowledge concerning this disorder is limited. On the basis of a clinical case involving a bulimic Chinese girl, we attempt to demonstrate the impact of cultural factors on the disorder. We discuss the atypical characteristics of her symptom profile, in particular the absence of preoccupations concerning her appearance and the psycho-pathological impact of the secrecy surrounding her adoption. In this particular case, bulimia triggered a search for filiation and identity that could have later enabled her to restore harmonious family ties and to gain autonomy. We also examine the case in the context of adoption in China. This clinical case points out how important it is to take cultural factors into account and how useful a transcultural approach is in order to understand bulimia, and suggest effective methods of care.
Unconditional security of entanglement-based continuous-variable quantum secret sharing
NASA Astrophysics Data System (ADS)
Kogias, Ioannis; Xiang, Yu; He, Qiongyi; Adesso, Gerardo
2017-01-01
The need for secrecy and security is essential in communication. Secret sharing is a conventional protocol to distribute a secret message to a group of parties, who cannot access it individually but need to cooperate in order to decode it. While several variants of this protocol have been investigated, including realizations using quantum systems, the security of quantum secret sharing schemes still remains unproven almost two decades after their original conception. Here we establish an unconditional security proof for entanglement-based continuous-variable quantum secret sharing schemes, in the limit of asymptotic keys and for an arbitrary number of players. We tackle the problem by resorting to the recently developed one-sided device-independent approach to quantum key distribution. We demonstrate theoretically the feasibility of our scheme, which can be implemented by Gaussian states and homodyne measurements, with no need for ideal single-photon sources or quantum memories. Our results contribute to validating quantum secret sharing as a viable primitive for quantum technologies.
NASA Astrophysics Data System (ADS)
Siregar, H.; Junaeti, E.; Hayatno, T.
2017-03-01
Activities correspondence is often used by agencies or companies, so that institutions or companies set up a special division to handle issues related to the letter management. Most of the distribution of letters using electronic media, then the letter should be kept confidential in order to avoid things that are not desirable. Techniques that can be done to meet the security aspect is by using cryptography or by giving a digital signature. The addition of asymmetric and symmetric algorithms, i.e. RSA and AES algorithms, on the digital signature had been done in this study to maintain data security. The RSA algorithm was used during the process of giving digital signature, while the AES algorithm was used during the process of encoding a message that will be sent to the receiver. Based on the research can be concluded that the additions of AES and RSA algorithms on the digital signature meet four objectives of cryptography: Secrecy, Data Integrity, Authentication and Non-repudiation.
Laurent, G; Cao, W; Li, H; Wang, Z; Ben-Itzhak, I; Cocke, C L
2012-08-24
We experimentally demonstrate that atomic orbital parity mix interferences can be temporally controlled on an attosecond time scale. Electron wave packets are formed by ionizing argon gas with a comb of odd and even high-order harmonics, in the presence of a weak infrared field. Consequently, a mix of energy-degenerate even and odd parity states is fed in the continuum by one- and two-photon transitions. These interfere, leading to an asymmetric electron emission along the polarization vector. The direction of the emission can be controlled by varying the time delay between the comb and infrared field pulses. We show that such asymmetric emission provides information on the relative phase of consecutive odd and even order harmonics in the attosecond pulse train.
Forgetting in Immediate Serial Recall: Decay, Temporal Distinctiveness, or Interference?
ERIC Educational Resources Information Center
Oberauer, Klaus; Lewandowsky, Stephan
2008-01-01
Three hypotheses of forgetting from immediate memory were tested: time-based decay, decreasing temporal distinctiveness, and interference. The hypotheses were represented by 3 models of serial recall: the primacy model, the SIMPLE (scale-independent memory, perception, and learning) model, and the SOB (serial order in a box) model, respectively.…
Lifetime-vibrational interference effects in resonantly excited x-ray emission spectra of CO
DOE Office of Scientific and Technical Information (OSTI.GOV)
Skytt, P.; Glans, P.; Gunnelin, K.
1997-04-01
The parity selection rule for resonant X-ray emission as demonstrated for O{sub 2} and N{sub 2} can be seen as an effect of interference between coherently excited degenerate localized core states. One system where the core state degeneracy is not exact but somewhat lifted was previously studied at ALS, namely the resonant X-ray emission of amino-substituted benzene (aniline). It was shown that the X-ray fluorescence spectrum resulting from excitation of the C1s at the site of the {open_quotes}aminocarbon{close_quotes} could be described in a picture separating the excitation and the emission processes, whereas the spectrum corresponding to the quasi-degenerate carbons couldmore » not. Thus, in this case it was necessary to take interference effects between the quasi-degenerate intermediate core excited states into account in order to obtain agreement between calculations and experiment. The different vibrational levels of core excited states in molecules have energy splittings which are of the same order of magnitude as the natural lifetime broadening of core excitations in the soft X-ray range. Therefore, lifetime-vibrational interference effects are likely to appear and influence the band shapes in resonant X-ray emission spectra. Lifetime-vibrational interference has been studied in non-resonant X-ray emission, and in Auger spectra. In this report the authors discuss results of selectively excited soft X-ray fluorescence spectra of molecules, where they focus on lifetime-interference effects appearing in the band shapes.« less
NASA Astrophysics Data System (ADS)
Lebed', A. A.; Padusenko, E. A.; Roshchupkin, S. P.; Dubov, V. V.
2018-04-01
Electron-nucleus bremsstrahlung in the field of two moderately strong pulsed laser waves in the case of incommensurate frequencies is theoretically studied under resonant conditions. The process is studied in detail in a special kinematic region, where stimulated processes with correlated emission and absorption of photons of the first and second waves become predominant (parametric interference effect). The availability of this region is caused by interference of the first and second laser waves. The correspondence between the emission angle and the final-electron energy is established in this interference kinematic. In this case, the cross-sectional properties are determined by the multiphoton quantum interference parameter, which is proportional to the product of intensities of the first and second waves. The resonant differential cross section of electron-nucleus spontaneous bremsstrahlung with simultaneous registration of both emission angles of the spontaneous photon and the scattered electron can exceed by four or five orders of magnitude the corresponding cross section in the absence of an external field. It was shown for nonrelativistic electrons that the resonant cross section of the studied process in the field of two pulsed laser waves within the interference region in two order of magnitude may exceed corresponding cross sections at other scattering kinematics. The obtained results may be experimentally verified, for example, by scientific facilities at sources of pulsed laser radiation (such as SLAC, FAIR, XFEL, ELI).
Born’s rule as signature of a superclassical current algebra
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fussy, S.; Mesa Pascasio, J.; Institute for Atomic and Subatomic Physics, Vienna University of Technology, Operng. 9, 1040 Vienna
2014-04-15
We present a new tool for calculating the interference patterns and particle trajectories of a double-, three- and N-slit system on the basis of an emergent sub-quantum theory developed by our group throughout the last years. The quantum itself is considered as an emergent system representing an off-equilibrium steady state oscillation maintained by a constant throughput of energy provided by a classical zero-point energy field. We introduce the concept of a “relational causality” which allows for evaluating structural interdependences of different systems levels, i.e. in our case of the relations between partial and total probability density currents, respectively. Combined with themore » application of 21st century classical physics like, e.g., modern nonequilibrium thermodynamics, we thus arrive at a “superclassical” theory. Within this framework, the proposed current algebra directly leads to a new formulation of the guiding equation which is equivalent to the original one of the de Broglie–Bohm theory. By proving the absence of third order interferences in three-path systems it is shown that Born’s rule is a natural consequence of our theory. Considering the series of one-, double-, or, generally, of N-slit systems, with the first appearance of an interference term in the double slit case, we can explain the violation of Sorkin’s first order sum rule, just as the validity of all higher order sum rules. Moreover, the Talbot patterns and Talbot distance for an arbitrary N-slit device can be reproduced exactly by our model without any quantum physics tool. -- Highlights: •Calculating the interference patterns and particle trajectories of a double-, three- and N-slit system. •Deriving a new formulation of the guiding equation equivalent to the de Broglie–Bohm one. •Proving the absence of third order interferences and thus explaining Born’s rule. •Explaining the violation of Sorkin’s order sum rules. •Classical simulation of Talbot patterns and exact reproduction of Talbot distance for N slits.« less
Chromatic dispersion effects in ultra-low coherence interferometry
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lychagov, V V; Ryabukho, V P
2015-06-30
We consider the properties of an interference signal shift from zero-path-difference position in the presence of an uncompensated dispersive layer in one of the interferometer arms. It is experimentally shown that in using an ultra-low coherence light source, the formation of the interference signal is also determined by the group velocity dispersion, which results in a nonlinear dependence of the position of the interference signal on the geometrical thickness of the dispersive layer. The discrepancy in the dispersive layer and compensator refractive indices in the third decimal place is experimentally shown to lead to an interference signal shift that ismore » an order of magnitude greater than the pulse width. (interferometry)« less
Adaptive interference cancel filter for evoked potential using high-order cumulants.
Lin, Bor-Shyh; Lin, Bor-Shing; Chong, Fok-Ching; Lai, Feipei
2004-01-01
This paper is to present evoked potential (EP) processing using adaptive interference cancel (AIC) filter with second and high order cumulants. In conventional ensemble averaging method, people have to conduct repetitively experiments to record the required data. Recently, the use of AIC structure with second statistics in processing EP has proved more efficiency than traditional averaging method, but it is sensitive to both of the reference signal statistics and the choice of step size. Thus, we proposed higher order statistics-based AIC method to improve these disadvantages. This study was experimented in somatosensory EP corrupted with EEG. Gradient type algorithm is used in AIC method. Comparisons with AIC filter on second, third, fourth order statistics are also presented in this paper. We observed that AIC filter with third order statistics has better convergent performance for EP processing and is not sensitive to the selection of step size and reference input.
Quasiparticle interference in multiband superconductors with strong coupling
NASA Astrophysics Data System (ADS)
Dutt, A.; Golubov, A. A.; Dolgov, O. V.; Efremov, D. V.
2017-08-01
We develop a theory of the quasiparticle interference (QPI) in multiband superconductors based on the strong-coupling Eliashberg approach within the Born approximation. In the framework of this theory, we study dependencies of the QPI response function in the multiband superconductors with the nodeless s -wave superconductive order parameter. We pay special attention to the difference in the quasiparticle scattering between the bands having the same and opposite signs of the order parameter. We show that at the momentum values close to the momentum transfer between two bands, the energy dependence of the quasiparticle interference response function has three singularities. Two of these correspond to the values of the gap functions and the third one depends on both the gaps and the transfer momentum. We argue that only the singularity near the smallest band gap may be used as a universal tool to distinguish between the s++ and s± order parameters. The robustness of the sign of the response function peak near the smaller gap value, irrespective of the change in parameters, in both the symmetry cases is a promising feature that can be harnessed experimentally.
10 CFR 780.53 - Criteria for decisions for royalties, awards and compensation.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Application for Royalties and Awards Under Section 157 of the Atomic Energy Act of 1954 and Compensation Under Section 173 of the Atomic Energy Act of 1954 and the Invention Secrecy Act (35 U.S.C. 183) § 780.53... special nuclear material or atomic energy, the Board shall take into account the considerations set forth...
10 CFR 780.53 - Criteria for decisions for royalties, awards and compensation.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Application for Royalties and Awards Under Section 157 of the Atomic Energy Act of 1954 and Compensation Under Section 173 of the Atomic Energy Act of 1954 and the Invention Secrecy Act (35 U.S.C. 183) § 780.53... special nuclear material or atomic energy, the Board shall take into account the considerations set forth...
10 CFR 780.53 - Criteria for decisions for royalties, awards and compensation.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Application for Royalties and Awards Under Section 157 of the Atomic Energy Act of 1954 and Compensation Under Section 173 of the Atomic Energy Act of 1954 and the Invention Secrecy Act (35 U.S.C. 183) § 780.53... special nuclear material or atomic energy, the Board shall take into account the considerations set forth...
10 CFR 780.53 - Criteria for decisions for royalties, awards and compensation.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Application for Royalties and Awards Under Section 157 of the Atomic Energy Act of 1954 and Compensation Under Section 173 of the Atomic Energy Act of 1954 and the Invention Secrecy Act (35 U.S.C. 183) § 780.53... special nuclear material or atomic energy, the Board shall take into account the considerations set forth...
ERIC Educational Resources Information Center
Hobden, Sally
2014-01-01
Information on the HIV/AIDS epidemic in Southern Africa is often interpreted through a veil of secrecy and shame and, I argue, with flawed understanding of basic statistics. This research determined the levels of statistical literacy evident in 316 future Mathematical Literacy teachers' explanations of the median in the context of HIV/AIDS…
Understanding Patenting Decisions: A Classroom Exercise
ERIC Educational Resources Information Center
Bernard, John C.; Yiannaka, Amalia
2010-01-01
Although many students have some knowledge of patents, it can be difficult for them to understand the components of an innovator's decision-making process. Key issues, such as whether to patent or to use trade secrecy, how broad a scope to claim, and what to do in the event of patent infringement, can be difficult to grasp from a standard lecture.…
1984-06-01
apartheid policy and ensure Afrikaner control of the government through legislation and regulation. While a survey of the actual implementation of apartheid...from the government’s subse- quent actions that much of the defense legislation introduced 35 during early 1961 was aimed at strengthening internal...National Party. As the expression of Western European political liberalism, the Westminister system made it difficult to maintain government secrecy, and
The Impact of Mergers Inefficiency: A Case Study of Banking Status
2007-12-01
20 M. SWITZERLAND ...........................................................................................22 1. Due Diligence vs . Bank Secrecy...strength, held at the end of 2006, “The national consolidation of banks has produced stronger franchises and generated huge synergies for them while also...already set that foreign banks could have some form of ownership in Polish banks. However, after the 8 completion of the transaction, Poland’s
40 CFR 350.16 - Address to send trade secrecy claims and petitions requesting disclosure.
Code of Federal Regulations, 2010 CFR
2010-07-01
... chemical identities claimed as trade secret are posted on the following EPA Program Web sites, http://www.epa.gov/ceppo and http://www.epa.gov/tri. Any subsequent changes to the address and location will be...) 424-9346 or (703) 412-9810, TDD (800) 553-7672, http://www.epa.gov/epaoswer/hotline/ to obtain this...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-26
... transitions from a system originally designed for collecting paper forms to a modernized IT environment for... of CTRs under the BSA. The CTR will be an e- filed dynamic and interactive report used by all BSA... System of Records Notice relating to BSA Reports.\\3\\ \\3\\ Department of the Treasury bureaus such as Fin...
Code of Federal Regulations, 2014 CFR
2014-07-01
... determined to be non-trade secret; notice of intent to release chemical identity. 350.18 Section 350.18... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.18 Release of chemical identity determined to be non-trade secret; notice of intent to release chemical identity. (a...
Code of Federal Regulations, 2013 CFR
2013-07-01
... determined to be non-trade secret; notice of intent to release chemical identity. 350.18 Section 350.18... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.18 Release of chemical identity determined to be non-trade secret; notice of intent to release chemical identity. (a...
Code of Federal Regulations, 2012 CFR
2012-07-01
... determined to be non-trade secret; notice of intent to release chemical identity. 350.18 Section 350.18... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.18 Release of chemical identity determined to be non-trade secret; notice of intent to release chemical identity. (a...
Code of Federal Regulations, 2011 CFR
2011-07-01
... determined to be non-trade secret; notice of intent to release chemical identity. 350.18 Section 350.18... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.18 Release of chemical identity determined to be non-trade secret; notice of intent to release chemical identity. (a...
Code of Federal Regulations, 2010 CFR
2010-07-01
... determined to be non-trade secret; notice of intent to release chemical identity. 350.18 Section 350.18... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.18 Release of chemical identity determined to be non-trade secret; notice of intent to release chemical identity. (a...
Telling the Truth to Your Adopted or Foster Child: Making Sense of the Past.
ERIC Educational Resources Information Center
Keefer, Betsy; Schooler, Jayne E.
Many individuals who grew up as adopted or foster children felt that they were reared under the shadow of secrecy, silence, and shame, finding it difficult to build an identity and feel secure. Because of the connection to troublesome experiences that resulted in the adoption plan such as alcoholism or teen pregnancy, adoptive and foster parents…
ERIC Educational Resources Information Center
Hawk, Skyler T.; Keijsers, Loes; Frijns, Tom; Hale, William W., III; Branje, Susan; Meeus, Wim
2013-01-01
This 3-year, multi-informant study examined whether youths' perceptions of parental privacy invasion predicted lower parental knowledge over time, as a function of increased adolescent secrecy. Participants were 497 Dutch adolescents (Time 1 M = 13 years, SD = 0.5; 57% boys) and both parents. Higher youth-reported invasion predicted lower…
Post-Adoption Face-to-Face Contact with Birth Parents: Prospective Adopters' Views
ERIC Educational Resources Information Center
Turkington, Selina; Taylor, Brian J.
2009-01-01
The trend in adoption since the 1960s has been away from secrecy and towards greater openness; contact through an intermediary, and direct contact by letter, is now widely accepted. More controversial is the challenge of face-to-face contact with birth parents, and social workers involved in the decision-making process find themselves having to…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-25
.... For Exchange Is a Financial Institution of Primary Money Laundering Concern AGENCY: Financial Crimes... United States that is of primary money laundering concern. DATES: The finding referred to in this notice... the anti- money laundering provisions of the Bank Secrecy Act (``BSA''), codified at 12 U.S.C. 1829b...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-30
...; Imposition of Special Measure Against JSC CredexBank as a Financial Institution of Primary Money Laundering... for concluding that JSC CredexBank is a financial institution of primary money laundering concern...- money laundering provisions of the Bank Secrecy Act (BSA), codified at 12 U.S.C. 1829b, 12 U.S.C. 1951...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-07
... BSA and associated regulations.\\3\\ FinCEN is authorized to impose anti-money laundering (``AML... Code); (iii) Money laundering (as defined in section 1956 or 1957 of title 18 of the United States Code... money in the country in which issued; and (ii) A cashier's check (by whatever name called, including...
Relativistic quantum cryptography
DOE Office of Scientific and Technical Information (OSTI.GOV)
Molotkov, S. N., E-mail: molotkov@issp.ac.ru
2011-03-15
A new protocol of quantum key distribution is proposed to transmit keys through free space. Along with quantum-mechanical restrictions on the discernibility of nonorthogonal quantum states, the protocol uses additional restrictions imposed by special relativity theory. Unlike all existing quantum key distribution protocols, this protocol ensures key secrecy for a not strictly one-photon source of quantum states and an arbitrary length of a quantum communication channel.
Semicustom integrated circuits and the standard transistor array radix (STAR)
NASA Technical Reports Server (NTRS)
Edge, T. M.
1977-01-01
The development, application, pros and cons of the semicustom and custom approach to the integration of circuits are described. Improvements in terms of cost, reliability, secrecy, power, and size reduction are examined. Also presented is the standard transistor array radix, a semicustom approach to digital integrated circuits that offers the advantages of both custom and semicustom approaches to integration.
On the security of two remote user authentication schemes for telecare medical information systems.
Kim, Kee-Won; Lee, Jae-Dong
2014-05-01
The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.
Pafko, P; Mach, J
2013-08-01
The protection of personal information of patients and compulsory secrecy of the medical staff are very up-to-date issues, and to breach the laws means facing high sanctions. It is necessary for a doctor to know to whom he can disclose information. If the doctor does not obtain permission from the patient then he may provide information to the police only with permission from the court. The only exception is the case when the doctor acts according to the legal duty to report information about the time and place of provided medical treatment to a person who is being searched after by the police. The most common cases of breaching the compulsory secrecy are interactions during ward rounds with other co-patients and giving information over the phone to persons whose identity cannot be verified. In the event of a patient running away from the health facility and if there is a suspicion that his life may be threatened, the doctor is obliged to inform the Police of CR and a significant other who is entitled to obtain information and is recorded in the medical documentation, if there is one and it is possible to contact them.
Securing and sustaining employment: concerns of HIV patients in Singapore.
Tan, Si Ying; Ow Yong, Lai Meng; Foong, Jasmin Yuet Ee; Wong, Nicole Huay Sze; Chew, Li Ling; Koh, Yin Ling
2013-01-01
Employment sustainability is one of the most pressing issues inflicting people living with HIV (PLHIV). A qualitative approach was used to elucidate the perceived challenges in sustaining their employment and the perceived barriers in re-entering the workforce for HIV patients. In-depth interviews were conducted with 16 patients from an acute hospital in Singapore. The main challenges raised in sustaining employment were: (1) ability to ensure secrecy of diagnosis from employers, (2) ability to secure financial resources for treatment and sustenance, (3) ability to ensure stable health to meet job requirements, (4) ability to cognitively sit with the concerns of uncertainty and limitations in career, and (5) ability to work through discriminatory workplace practices. The perceived barriers in gaining workforce re-entry were: (1) fear of pre-employment medical screening and potential discriminatory practices at workplace, (2) concerns over health (frequent hospital admissions, physical weakness, and existing medical co-morbidities), and (3) psychosocial challenges (unstable accommodation, older age, financial issues, and trade skills limitation). The overarching factor that influences the success of sustaining and securing an employment among HIV patients is secrecy of the diagnosis. The individuals' health status, financial status and access to healthcare, and other psychosocial challenges further compound the issue.
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619
NASA Astrophysics Data System (ADS)
Trice, Justin; Favazza, Christopher; Kalyanaraman, Ramki; Sureshkumar, R.
2006-03-01
Irradiating ultrathin Co films (1 to 10 nm) by a short-pulsed UV laser leads to pattern formation with both short- and long-range order (SRO, LRO). Single beam irradiation produces SRO, while two-beam interference irradiation produces a quasi-2D arrangement of nanoparticles with LRO and SRO. The pattern formation primarily occurs in the molten phase. An estimate of the thermal behavior of the film/substrate composite following a laser pulse is presented. The thermal behavior includes the lifetime of the liquid phase and the thermal gradient during interference heating. Based on this evidence, the SRO is attributed to spinodal dewetting of the film while surface tension gradients induced by the laser interference pattern appear to influence LRO [1]. [1] C.Favazza, J.Trice, H.Krishna, R.Sureshkumar, and R.Kalyanaraman, unpublished.
Interference in astronomical speckle patterns
NASA Technical Reports Server (NTRS)
Breckinridge, J. B.
1976-01-01
Astronomical speckle patterns are examined in an atmospheric-optics context in order to determine what kind of image quality is to be expected from several different imaging techniques. The model used to describe the instantaneous complex field distribution across the pupil of a large telescope regards the pupil as a deep phase grating with a periodicity given by the size of the cell of uniform phase or the refractive index structure function. This model is used along with an empirical formula derived purely from the physical appearance of the speckle patterns to discuss the orders of interference in astronomical speckle patterns.
Determination of triclosan in antiperspirant gels by first-order derivative spectrophotometry.
Du, Lina; Li, Miao; Jin, Yiguang
2011-10-01
A first-order derivative UV spectrophotometric method was developed to determine triclosan, a broad-spectrum antimicrobial agent, in health care products containing fragrances which could interfere the determination as impurities. Different extraction methods were compared. Triclosan was extracted with chloroform and diluted with ethanol followed by the derivative spectrophotometric measurement. The interference of fragrances was completely eliminated. The calibration graph was found to be linear in the range of 7.5-45 microg x mL(-1). The method is simple, rapid, sensitive and proper to determine triclosan in fragrance-containing health care products.
ERIC Educational Resources Information Center
Foreman, Phillip
2009-01-01
Education administrators involved in construction initiatives unanimously agree that when it comes to change orders, less is more. Change orders have a negative rippling effect of driving up building costs and producing expensive project delays that often interfere with school operations and schedules. Some change orders are initiated by schools…
Edwards, Mark S; Burt, Jennifer S; Lipp, Ottmar V
2010-05-01
We investigated selective attention for masked and unmasked, threat, and positively valenced words, in high trait anxious (HTA) and low trait anxious (LTA) individuals using the emotional Stroop colour-naming task. State anxiety was varied within participants through the threat of electric shock. To investigate whether the sequencing of the state anxiety manipulation affected colour-naming latencies, the ordering of the shock threat and shock safe conditions was counterbalanced across participants. The results indicated that the ordering of the state anxiety manipulation moderated masked and unmasked threat bias effects. Specifically, relative to LTA individuals, HTA individuals showed a threat interference effect, but this effect was limited to those who performed under the threat of shock in the later stages of the experiment. Irrespective of exposure mode and state anxiety status, all individuals showed interference for threat in the early stages of the experiment, relative to a threat facilitation effect in the later stages of the experiment. For the unmasked trials alone, the data also revealed a significant threat interference effect for the HTA group relative to the LTA group in the shock threat condition, and this effect was evident irrespective of shock threat order. The results are discussed with respect to the automatic nature of emotional processing in anxiety.
Analysis of Tyman green detection system based on polarization interference
NASA Astrophysics Data System (ADS)
Huang, Yaolin; Wang, Min; Shao, Xiaoping; Kou, Yuanfeng
2018-02-01
The optical surface deviation of the lens can directly affect the quality of the optical system.In order to effectively and accurately detect the surface shape, an optical surface on-line detection system based on polarization interference technology is designed and developed. The system is based on Tyman-Green interference optical path, join the polarization interference measuring technology. Based on the theoretical derivation of the optical path and the ZEMAX software simulation, the experimental optical path is constructed. The parallel light is used to detect the concave lens. The parallel light is used as the light source, the size of the polarization splitting prism, detection radius of curvature, the relations between and among the size of the lens aperture, a detection range is given.
Levy-Gigi, Einat; Vakil, Eli
2012-01-01
The influence of contextual factors on encoding and retrieval in recognition memory was investigated using a retroactive interference paradigm. Participants were randomly assigned to four context conditions constructed by manipulating types of presentation modality (pictures vs words) for study, interference, and test stages, respectively (ABA, ABB, AAA, & AAB). In Experiment 1 we presented unrelated items in the study and interference stages, while in Experiment 2 each stage contained items from the same semantic category. The results demonstrate a dual role for context in memory processes-at encoding as well as at retrieval. In Experiment 1 there is a hierarchical order between the four context conditions, depending on both target-test and target-interference contextual similarity. Adding a categorical context in Experiment 2 helped to specify each list and therefore better distinguish between target and interferer information, and in some conditions compensated for their perceptual similarity.
Piccardi, L; Nori, R; Boccia, M; Barbetti, S; Verde, P; Guariglia, C; Ferlazzo, F
2015-08-01
In the present study, we used single- and dual-task conditions to investigate the nature of topographical working memory to better understand what type of task can hamper performance during navigation. During dual-task conditions, we considered four different sources of interference: motor (M), spatial motor (SM), verbal (i.e. articulatory suppression AS) and spatial environmental (SE). In order to assess the nature of topographical working memory, we used the Walking Corsi Test, asking the participants to perform two tasks simultaneously (M, SM, AS and SE). Our results showed that only spatial-environmental interference hampers the execution of a topographical working memory task, suggesting a task-domain-specific effect. We also found general gender differences in the topographical working memory capabilities: men were more proficient than women, regardless of the type of interferences. However, like men, women performed worse when a spatial-environmental interference was present.
Improved Phase-Mask Fabrication of Fiber Bragg Gratings
NASA Technical Reports Server (NTRS)
Grant, Joseph; Wang, Ying; Sharma, Anup
2004-01-01
An improved method of fabrication of Bragg gratings in optical fibers combines the best features of two prior methods: one that involves the use of a phase mask and one that involves interference between the two coherent laser beams. The improved method affords flexibility for tailoring Bragg wavelengths and bandwidths over wide ranges. A Bragg grating in an optical fiber is a periodic longitudinal variation in the index of refraction of the fiber core. The spatial period (Bragg wavelength) is chosen to obtain enhanced reflection of light of a given wavelength that would otherwise propagate relatively unimpeded along the core. Optionally, the spatial period of the index modulation can be made to vary gradually along the grating (such a grating is said to be chirped ) in order to obtain enhanced reflection across a wavelength band, the width of which is determined by the difference between the maximum and minimum Bragg wavelengths. In the present method as in both prior methods, a Bragg grating is formed by exposing an optical fiber to an ultraviolet-light interference field. The Bragg grating coincides with the pattern of exposure of the fiber core to ultraviolet light; in other words, the Bragg grating coincides with the interference fringes. Hence, the problem of tailoring the Bragg wavelength and bandwidth is largely one of tailoring the interference pattern and the placement of the fiber in the interference pattern. In the prior two-beam interferometric method, a single laser beam is split into two beams, which are subsequently recombined to produce an interference pattern at the location of an optical fiber. In the prior phase-mask method, a phase mask is used to diffract a laser beam mainly into two first orders, the interference between which creates the pattern to which an optical fiber is exposed. The prior two-beam interferometric method offers the advantage that the period of the interference pattern can be adjusted to produce gratings over a wide range of Bragg wavelengths, but offers the disadvantage that success depends on precise alignment and high mechanical stability. The prior phase-mask method affords the advantages of compactness of equipment and relative insensitivity to both misalignment and vibration, but does not afford adjustability of the Bragg wavelength. The present method affords both the flexibility of the prior two-beam interferometric method and the compactness and stability of the prior phase-mask method. In this method (see figure), a laser beam propagating along the x axis is normally incident on a phase mask that lies in the (y,z) plane. The phase of light propagating through the mask is modulated with a spatial periodicity, p, along the y axis chosen to diffract the laser light primarily to first order at the angle . (The zero-order laser light propagating along the x axis can be used for alignment and thereafter suppressed during exposure of the fiber.) The diffracted light passes through a concave cylindrical lens, which converts the flat diffracted wave fronts to cylindrical ones, as though the light emanated from a line source. Then two parallel flat mirrors recombine the diffracted beams to form an interference field equivalent to that of two coherent line sources at positions A and B (virtual sources). The interference pattern is a known function of the parameters of the apparatus and of position (x,y) in the interference field. Hence, the tilt, wavelength, and chirp of the Bragg grating can be chosen through suitable adjustments of the apparatus and/or of the position and orientation of the optical fiber. In particular, the Bragg wavelength can be adjusted by moving the fiber along the x axis, and the bandwidth can be modified over a wide range by changing the fiber tilt angle or by moving the phase mask and/or the fiber. Alignment is easy because the zero-order beam defines the x axis. The interference is relatively stable and insensitive to the mechanical vibration because of the gh symmetry and compactness of the apparatus, the fixed positions of the mirrors and lens, and the consequent fixed positions of the two virtual line sources, which are independent of the translations of the phase mask and the laser relative to the lens.
Soylu, Firat; Newman, Sharlene D
2016-02-01
Fingers are used as canonical representations for numbers across cultures. In previous imaging studies, it was shown that arithmetic processing activates neural resources that are known to participate in finger movements. Additionally, in one dual-task study, it was shown that anatomically ordered finger tapping disrupts addition and subtraction more than multiplication, possibly due to a long-lasting effect of early finger counting experiences on the neural correlates and organization of addition and subtraction processes. How arithmetic task difficulty and tapping complexity affect the concurrent performance is still unclear. If early finger counting experiences have bearing on the neural correlates of arithmetic in adults, then one would expect anatomically and non-anatomically ordered tapping to have different interference effects, given that finger counting is usually anatomically ordered. To unravel these issues, we studied how (1) arithmetic task difficulty and (2) the complexity of the finger tapping sequence (anatomical vs. non-anatomical ordering) affect concurrent performance and use of key neural circuits using a mixed block/event-related dual-task fMRI design with adult participants. The results suggest that complexity of the tapping sequence modulates interference on addition, and that one-digit addition (fact retrieval), compared to two-digit addition (calculation), is more affected from anatomically ordered tapping. The region-of-interest analysis showed higher left angular gyrus BOLD response for one-digit compared to two-digit addition, and in no-tapping conditions than dual tapping conditions. The results support a specific association between addition fact retrieval and anatomically ordered finger movements in adults, possibly due to finger counting strategies that deploy anatomically ordered finger movements early in the development.
Noise correction on LANDSAT images using a spline-like algorithm
NASA Technical Reports Server (NTRS)
Vijaykumar, N. L. (Principal Investigator); Dias, L. A. V.
1985-01-01
Many applications using LANDSAT images face a dilemma: the user needs a certain scene (for example, a flooded region), but that particular image may present interference or noise in form of horizontal stripes. During automatic analysis, this interference or noise may cause false readings of the region of interest. In order to minimize this interference or noise, many solutions are used, for instane, that of using the average (simple or weighted) values of the neighboring vertical points. In the case of high interference (more than one adjacent line lost) the method of averages may not suit the desired purpose. The solution proposed is to use a spline-like algorithm (weighted splines). This type of interpolation is simple to be computer implemented, fast, uses only four points in each interval, and eliminates the necessity of solving a linear equation system. In the normal mode of operation, the first and second derivatives of the solution function are continuous and determined by data points, as in cubic splines. It is possible, however, to impose the values of the first derivatives, in order to account for shapr boundaries, without increasing the computational effort. Some examples using the proposed method are also shown.
Quantum key distillation from Gaussian states by Gaussian operations.
Navascués, M; Bae, J; Cirac, J I; Lewestein, M; Sanpera, A; Acín, A
2005-01-14
We study the secrecy properties of Gaussian states under Gaussian operations. Although such operations are useless for quantum distillation, we prove that it is possible to distill a secret key secure against any attack from sufficiently entangled Gaussian states with nonpositive partial transposition. Moreover, all such states allow for key distillation, when Eve is assumed to perform finite-size coherent attacks before the reconciliation process.
2007-05-01
NIE), requested by Congress, prior to the House and Senate vote to authorize the President to use force against Iraq. Secretary of State Colin ... Bamford , The Puzzle Palace (London: Penguin Books, 1982), and David Kahn, Seizing the Enigma: The Race to Break the German U-Boat Codes 1939-1943
5. Credit USAF, ca. 1942. Original housed in the Photograph ...
5. Credit USAF, ca. 1942. Original housed in the Photograph Files, AFFTC/HO, Edwards AFB, California. View of Bell Aircraft XP-59A Airacomet in flight. This was the United States military's first jet propelled aircraft which was extensively flight tested in secrecy at the Muroc Flight Test Base (North Base). - Edwards Air Force Base, North Base, North Base Road, Boron, Kern County, CA
The psychosocial needs of lesbian, gay, bisexual, or transgender patients with cancer.
Margolies, Liz
2014-08-01
Because of discrimination and secrecy, lesbian, gay, bisexual, and transgender (LGBT) people have poorer health outcomes, which include an increased risk for certain cancers and additional challenges in cancer treatment and survivorship. The oncology nurse also should be aware of issues of LGBT sexuality and the impact that oncology treatment may have on the LGBT patient's immediate and long-term sexual functioning.
Intellectual Property Rights and International Trade
2007-12-20
to maintain its secrecy.1 Examples of trade secrets include blueprints, customer lists, and pricing information. While protection of patents and...is fragile or if the area of research is highly competitive . Copyright. Protection of copyrights in the United States is based on the Copyright Act...as Louis Vuitton bags or Rolex watches, or fake pharmaceutical products, such as popular brand -name prescription medicines. A related issue is the
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-18
... regulations in 12 CFR 326.8, and specific cross- references to the Customer Identification Program (``CIP''), 31 CFR 103.121, in 12 CFR 326.8, 12 CFR 334.82, and Appendix J to Part 334. The CIP regulation, which... of the Customer Identification Program (CIP) rules implementing 31 U.S.C. 5318(l) (31 CFR 1020.220...
Curing Analytic Pathologies: Pathways to Improved Intelligence Analysis
2005-12-01
reasoning balanced against deductive (hypothesis- based and evidence tested) reasoning . It extols the value of truly scientific modes of thinking, including...the age of information and globalization. We need to be more open on a lot of things, especially where the original reason for secrecy perishes quickly...been reasonably successful in meeting the challenges on the tactical battlefield of locating, identifying, and targeting adversary units for main
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-01
... Money Laundering Concern of November 25, 2003, issued pursuant to 31 U.S.C. 5318A of the Bank Secrecy... amends the anti-money laundering provisions of the BSA, codified at 12 U.S.C. 1829b, 12 U.S.C. 1951-1959..., or type of account is of ``primary money laundering concern,'' to require domestic financial...
ERIC Educational Resources Information Center
Soler, Mark; Breglio, Amy
2010-01-01
Any analysis of confidentiality laws begins with a discussion of the interests involved. Children and families involved in the juvenile justice system have important interests in keeping their records confidential, yet, at the same time, when youth under the care or custody of state or local agencies commit violent crimes, or are the victims of…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-31
... NATIONAL CREDIT UNION ADMINISTRATION 12 CFR Part 748 Security Program, Report of Suspected Crimes, Suspicious Transactions, Catastrophic Acts and Bank Secrecy Act Compliance CFR Correction In Title 12 of the Code of Federal Regulations, Parts 600 to 899, revised as of January 1, 2013, on page 963, in Sec. 748.2, the second paragraph (b)(2) is...
31 CFR 1.36 - Systems exempt in whole or in part from provisions of 5 U.S.C. 552a and this part.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Reporting System. FinCEN .003 Bank Secrecy Act Reports System. (2) The Department hereby exempts the systems...) and (k) and § 1.23(c), the Department of the Treasury hereby exempts the systems of records identified... the enforcement of criminal laws. Certain components of the Department of the Treasury have as their...
31 CFR 1.36 - Systems exempt in whole or in part from provisions of 5 U.S.C. 552a and this part.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Activity Reporting System. FinCEN .003 Bank Secrecy Act Reports System. (2) The Department hereby exempts...) and (k) and § 1.23(c), the Department of the Treasury hereby exempts the systems of records identified... enforcement of criminal laws. Certain components of the Department of the Treasury have as their principal...
Collaboration, Reputation, and Ethics in American Academic Life: Hans H. Gerth and C. Wright Mills.
ERIC Educational Resources Information Center
Oakes, Guy; Vidich, Arthur J.
Using the collaboration between sociologist C. Wright Mills and Hans H. Gerth and their studies of the work of Max Weber as a point of departure for a sustained discussion of academic ethics, this book explores how concealment, secrecy, and deception contribute to the building of academic reputation and how the balance of knowledge and power in a…
Brezinski, M E
2018-01-01
Optical coherence tomography has become an important imaging technology in cardiology and ophthalmology, with other applications under investigations. Major advances in optical coherence tomography (OCT) imaging are likely to occur through a quantum field approach to the technology. In this paper, which is the first part in a series on the topic, the quantum basis of OCT first order correlations is expressed in terms of full field quantization. Specifically first order correlations are treated as the linear sum of single photon interferences along indistinguishable paths. Photons and the electromagnetic (EM) field are described in terms of quantum harmonic oscillators. While the author feels the study of quantum second order correlations will lead to greater paradigm shifts in the field, addressed in part II, advances from the study of quantum first order correlations are given. In particular, ranging errors are discussed (with remedies) from vacuum fluctuations through the detector port, photon counting errors, and position probability amplitude uncertainty. In addition, the principles of quantum field theory and first order correlations are needed for studying second order correlations in part II.
NASA Technical Reports Server (NTRS)
Barry, R. K.; Satyapal, S.; Greenhouse, M. A.; Barclay, R.; Amato, D.; Arritt, B.; Brown, G.; Harvey, V.; Holt, C.; Kuhn, J.
2000-01-01
We discuss work in progress on a near-infrared tunable bandpass filter for the Goddard baseline wide field camera concept of the Next Generation Space Telescope (NGST) Integrated Science Instrument Module (ISIM). This filter, the Demonstration Unit for Low Order Cryogenic Etalon (DULCE), is designed to demonstrate a high efficiency scanning Fabry-Perot etalon operating in interference orders 1 - 4 at 30K with a high stability DSP based servo control system. DULCE is currently the only available tunable filter for lower order cryogenic operation in the near infrared. In this application, scanning etalons will illuminate the focal plane arrays with a single order of interference to enable wide field lower resolution hyperspectral imaging over a wide range of redshifts. We discuss why tunable filters are an important instrument component in future space-based observatories.
25 CFR 11.912 - Contempt of court.
Code of Federal Regulations, 2010 CFR
2010-04-01
... OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAW AND ORDER COURTS OF INDIAN OFFENSES AND LAW AND ORDER CODE Children's Court § 11.912 Contempt of court. Any willful disobedience or interference with any order of the children's court constitutes contempt of court which may be punished in accordance...
Fighting Status Inequalities: Non-domination vs Non-interference
Nielsen, Morten Ebbe Juul
2016-01-01
Status inequalities seem to play a fairly big role in creating inequalities in health. This article assumes that there can be good reasons to fight status inequalities in order to reduce inequalities in health. It examines whether the neorepublican ideal of non-dominance does a better job as a theoretical foil for this as compared to a liberal notion of non-interference. The article concludes that there is a prima facie case for incorporating non-dominance into our thinking about public health, but that it needs to go hand in hand with a more traditional liberal ideal of non-interference. PMID:27551298
Fighting Status Inequalities: Non-domination vs Non-interference.
Nielsen, Morten Ebbe Juul; Landes, Xavier
2016-07-01
Status inequalities seem to play a fairly big role in creating inequalities in health. This article assumes that there can be good reasons to fight status inequalities in order to reduce inequalities in health. It examines whether the neorepublican ideal of non-dominance does a better job as a theoretical foil for this as compared to a liberal notion of non-interference. The article concludes that there is a prima facie case for incorporating non-dominance into our thinking about public health, but that it needs to go hand in hand with a more traditional liberal ideal of non-interference.
Comparison of different shielding methods in acquisition of physiological signals.
Yanbing Jiang; Ning Ji; Hui Wang; Xueyu Liu; Yanjuan Geng; Peng Li; Shixiong Chen; Guanglin Li
2017-07-01
Power line interference in the surrounding environment could usually introduce many difficulties when collecting and analyzing physiological signals. Since power line interference is usually several orders of amplitude larger than the physiological electrical signals, methods of suppressing power line interference should be considered during the signal acquisition. Many studies used a hardware or software band-stop filter to suppress power line interference but it could easily cause attenuations and distortions to the signal of interest. In this study, two kinds of methods that used different signals to drive the shields of the electrodes were proposed to reduce the impacts of power line interference. Three channels of two physiological signals (ECG and EMG) were simultaneously collected when the electrodes were not shielded (No-Shield), shielded by ground signals (GND-Shield) and shielded by buffered signals of the corresponding electrodes (Active-Shield), respectively, on a custom hardware platform based on TI ADS1299. The results showed that power line interference would be significantly suppressed when using shielding approaches, and the Active-Shield method could achieve the best performance with a power line interference reduction up to 36dB. The study suggested that the Active-Shield method at the analog front-end was a great candidate to reduce power line interference in routine acquisitions of physiological signals.
Ma, Ili; Mies, Gabry W; Lambregts-Rommelse, Nanda N J; Buitelaar, Jan K; Cillessen, Antonius H N; Scheres, Anouk
2018-05-01
Interference control refers to the ability to selectively attend to certain information while ignoring distracting information. This ability can vary as a function of distractor relevance. Distractors that are particularly relevant to an individual may attract more attention than less relevant distractors. This is referred to as attention bias. Weak interference control and altered reward sensitivity are both important features of attention deficit hyperactivity disorder (ADHD). However, interference control is typically studied in isolation. This study integrates both. Youths (aged 9 to 17 years) with ADHD (n = 37, 25 boys) and typically-developing controls (n = 38, 20 boys) completed a Stroop task using appetitive words and matched neutral words to assess whether appetitive distractors diminished interference control more in youths with ADHD than controls. In order to test for specificity, aversive words were also included. As expected, appetitive words disrupted interference control but this effect was not stronger for youths with ADHD than the controls. Aversive words, on the other hand, facilitated interference control. Dimensional analyses revealed that this facilitation effect increased substantially as a function of ADHD symptom severity. Possible mechanisms for this effect include up-regulation of interference control as a function of induced negative mood, or as a function of increased effort. In conclusion, appetitive words do not lead to worse interference control in youths with ADHD compared with controls. Interference control was modulated in a valence-specific manner, concurrent with mood-induced effects on cognitive control.
Breining, Bonnie; Nozari, Nazbanou; Rapp, Brenda
2016-04-01
Past research has demonstrated interference effects when words are named in the context of multiple items that share a meaning. This interference has been explained within various incremental learning accounts of word production, which propose that each attempt at mapping semantic features to lexical items induces slight but persistent changes that result in cumulative interference. We examined whether similar interference-generating mechanisms operate during the mapping of lexical items to segments by examining the production of words in the context of others that share segments. Previous research has shown that initial-segment overlap amongst a set of target words produces facilitation, not interference. However, this initial-segment facilitation is likely due to strategic preparation, an external factor that may mask underlying interference. In the present study, we applied a novel manipulation in which the segmental overlap across target items was distributed unpredictably across word positions, in order to reduce strategic response preparation. This manipulation led to interference in both spoken (Exp. 1) and written (Exp. 2) production. We suggest that these findings are consistent with a competitive learning mechanism that applies across stages and modalities of word production.
NASA Astrophysics Data System (ADS)
Kim, Woo-Ju; Lee, Hak-Soon; Lee, Sang-Shin
2012-04-01
A compact silicon nitride grating coupler with flexible bandwidth was demonstrated taking advantage of a basic grating integrated with a serially connected multistage multimode interference (MMI) filter. The spectral response could be tailored by varying the order of the MMI filter, without affecting the basic grating structure. The dependence of the spectral response of the proposed device on the order of the MMI stage was thoroughly investigated. As regards the fabricated grating coupler with a four-stage MMI filter, the observed spectral bandwidth was efficiently altered from 53 to 21 nm in the ˜1550 nm spectral band.
Spatial mode filters realized with multimode interference couplers
NASA Astrophysics Data System (ADS)
Leuthold, J.; Hess, R.; Eckner, J.; Besse, P. A.; Melchior, H.
1996-06-01
Spatial mode filters based on multimode interference couplers (MMI's) that offer the possibility of splitting off antisymmetric from symmetric modes are presented, and realizations of these filters in InGaAsP / InP are demonstrated. Measured suppression of the antisymmetric first-order modes at the output for the symmetric mode is better than 18 dB. Such MMI's are useful for monolithically integrating mode filters with all-optical devices, which are controlled through an antisymmetric first-order mode. The filtering out of optical control signals is necessary for cascading all-optical devices. Another application is the improvement of on-off ratios in optical switches.
Calculation of two dimensional vortex/surface interference using panel methods
NASA Technical Reports Server (NTRS)
Maskew, B.
1980-01-01
The application of panel methods to the calculation of vortex/surface interference characteristics in two dimensional flow was studied over a range of situations starting with the simple case of a vortex above a plane and proceeding to the case of vortex separation from a prescribed point on a thick section. Low order and high order panel methods were examined, but the main factor influencing the accuracy of the solution was the distance between control stations in relation to the height of the vortex above the surface. Improvements over the basic solutions were demonstrated using a technique based on subpanels and an applied doublet distribution.
NASA Astrophysics Data System (ADS)
Matsumoto, Shigeaki; Toyooka, Satoru; Hoshino, Mitsuo
2002-09-01
In order to measure the total mass per unit area of dew droplets deposited on a metal plate in the dew-point hygrometer, the shape of a dew droplet deposited on a copper plate was measured accurately by using an interference microscope that employed a phase-shift technique. The microscope was constructed by adding a piezoelectric transducer to an usual interference microscope. A simple method that uses a conventional speaker horn and an optical fiber cable was introduced to depress speckle noise. The shape of a dew droplet deposited on the copper plate surface with 0.1 μm in average roughness was measured with an accuracy of +/-3nm. The mass of a dew droplet could be calculated numerically from the volume of its shape and was of the order of 10-9 g. The total mass of dew droplets deposited per unit area and the deposition velocity were obtained under a gentle wind. The total mass was the order of 10-5 g/cm2 at the beginning of deposition and the deposition velocity was ranged from 2x10-6 to 6x10-5 g/cm2.min.
Magnetic Field Sensing Based on Bi-Tapered Optical Fibers Using Spectral Phase Analysis.
Herrera-Piad, Luis A; Haus, Joseph W; Jauregui-Vazquez, Daniel; Sierra-Hernandez, Juan M; Estudillo-Ayala, Julian M; Lopez-Dieguez, Yanelis; Rojas-Laguna, Roberto
2017-10-20
A compact, magnetic field sensor system based on a short, bi-tapered optical fiber (BTOF) span lying on a magnetic tape was designed, fabricated, and characterized. We monitored the transmission spectrum from a broadband light source, which displayed a strong interference signal. After data collection, we applied a phase analysis of the interference optical spectrum. We here report the results on two fabricated, BTOFs with different interference spectrum characteristics; we analyzed the signal based on the interference between a high-order modal component and the core fiber mode. The sensor exhibited a linear response for magnetic field increments, and we achieved a phase sensitivity of around 0.28 rad/mT. The sensing setup presented remote sensing operation and low-cost transducer magnetic material.
Magnetic Field Sensing Based on Bi-Tapered Optical Fibers Using Spectral Phase Analysis
Herrera-Piad, Luis A.; Jauregui-Vazquez, Daniel; Sierra-Hernandez, Juan M.; Lopez-Dieguez, Yanelis
2017-01-01
A compact, magnetic field sensor system based on a short, bi-tapered optical fiber (BTOF) span lying on a magnetic tape was designed, fabricated, and characterized. We monitored the transmission spectrum from a broadband light source, which displayed a strong interference signal. After data collection, we applied a phase analysis of the interference optical spectrum. We here report the results on two fabricated, BTOFs with different interference spectrum characteristics; we analyzed the signal based on the interference between a high-order modal component and the core fiber mode. The sensor exhibited a linear response for magnetic field increments, and we achieved a phase sensitivity of around 0.28 rad/mT. The sensing setup presented remote sensing operation and low-cost transducer magnetic material. PMID:29053570
Leiken, Kimberly; McElree, Brian; Pylkkänen, Liina
2015-01-01
One of the most replicated findings in neurolinguistic literature on syntax is the increase of hemodynamic activity in the left inferior frontal gyrus (LIFG) in response to object relative (OR) clauses compared to subject relative clauses. However, behavioral studies have shown that ORs are primarily only costly when similarity-based interference is involved and recently, Leiken and Pylkkänen (2014) showed with magnetoencephalography (MEG) that an LIFG increase at an OR gap is also dependent on such interference. However, since ORs always involve a cue indicating an upcoming dependency formation, OR dependencies could be processed already prior to the gap-site and thus show no sheer dependency effects at the gap itself. To investigate the role of gap predictability in LIFG dependency effects, this MEG study compared ORs to verb phrase ellipsis (VPE), which was used as an example of a non-predictable dependency. Additionally, we explored LIFG sensitivity to filler-gap order by including right node raising structures, in which the order of filler and gap is reverse to that of ORs and VPE. Half of the stimuli invoked similarity-based interference and half did not. Our results demonstrate that LIFG effects of dependency can be elicited regardless of whether the dependency is predictable, the stimulus materials evoke similarity-based interference, or the filler precedes the gap. Thus, contrary to our own prior data, the current findings suggest a highly general role for the LIFG in dependency interpretation that is not limited to environments involving similarity-based interference. Additionally, the millisecond time-resolution of MEG allowed for a detailed characterization of the temporal profiles of LIFG dependency effects across our three constructions, revealing that the timing of these effects is somewhat construction-specific. PMID:26635655
Leiken, Kimberly; McElree, Brian; Pylkkänen, Liina
2015-01-01
One of the most replicated findings in neurolinguistic literature on syntax is the increase of hemodynamic activity in the left inferior frontal gyrus (LIFG) in response to object relative (OR) clauses compared to subject relative clauses. However, behavioral studies have shown that ORs are primarily only costly when similarity-based interference is involved and recently, Leiken and Pylkkänen (2014) showed with magnetoencephalography (MEG) that an LIFG increase at an OR gap is also dependent on such interference. However, since ORs always involve a cue indicating an upcoming dependency formation, OR dependencies could be processed already prior to the gap-site and thus show no sheer dependency effects at the gap itself. To investigate the role of gap predictability in LIFG dependency effects, this MEG study compared ORs to verb phrase ellipsis (VPE), which was used as an example of a non-predictable dependency. Additionally, we explored LIFG sensitivity to filler-gap order by including right node raising structures, in which the order of filler and gap is reverse to that of ORs and VPE. Half of the stimuli invoked similarity-based interference and half did not. Our results demonstrate that LIFG effects of dependency can be elicited regardless of whether the dependency is predictable, the stimulus materials evoke similarity-based interference, or the filler precedes the gap. Thus, contrary to our own prior data, the current findings suggest a highly general role for the LIFG in dependency interpretation that is not limited to environments involving similarity-based interference. Additionally, the millisecond time-resolution of MEG allowed for a detailed characterization of the temporal profiles of LIFG dependency effects across our three constructions, revealing that the timing of these effects is somewhat construction-specific.
NASA Technical Reports Server (NTRS)
Shih, Y. H.; Sergienko, A. V.; Rubin, M. H.
1993-01-01
A pair of correlated photons generated from parametric down conversion was sent to two independent Michelson interferometers. Second order interference was studied by means of a coincidence measurement between the outputs of two interferometers. The reported experiment and analysis studied this second order interference phenomena from the point of view of Einstein-Podolsky-Rosen paradox. The experiment was done in two steps. The first step of the experiment used 50 psec and 3 nsec coincidence time windows simultaneously. The 50 psec window was able to distinguish a 1.5 cm optical path difference in the interferometers. The interference visibility was measured to be 38 percent and 21 percent for the 50 psec time window and 22 percent and 7 percent for the 3 nsec time window, when the optical path difference of the interferometers were 2 cm and 4 cm, respectively. By comparing the visibilities between these two windows, the experiment showed the non-classical effect which resulted from an E.P.R. state. The second step of the experiment used a 20 psec coincidence time window, which was able to distinguish a 6 mm optical path difference in the interferometers. The interference visibilities were measured to be 59 percent for an optical path difference of 7 mm. This is the first observation of visibility greater than 50 percent for a two interferometer E.P.R. experiment which demonstrates nonclassical correlation of space-time variables.
Effects of nicotine on response inhibition and interference control.
Ettinger, Ulrich; Faiola, Eliana; Kasparbauer, Anna-Maria; Petrovsky, Nadine; Chan, Raymond C K; Liepelt, Roman; Kumari, Veena
2017-04-01
Nicotine is a cholinergic agonist with known pro-cognitive effects in the domains of alerting and orienting attention. However, its effects on attentional top-down functions such as response inhibition and interference control are less well characterised. Here, we investigated the effects of 7 mg transdermal nicotine on performance on a battery of response inhibition and interference control tasks. A sample of N = 44 healthy adult non-smokers performed antisaccade, stop signal, Stroop, go/no-go, flanker, shape matching and Simon tasks, as well as the attentional network test (ANT) and a continuous performance task (CPT). Nicotine was administered in a within-subjects, double-blind, placebo-controlled design, with order of drug administration counterbalanced. Relative to placebo, nicotine led to significantly shorter reaction times on a prosaccade task and on CPT hits but did not significantly improve inhibitory or interference control performance on any task. Instead, nicotine had a negative influence in increasing the interference effect on the Simon task. Nicotine did not alter inter-individual associations between reaction times on congruent trials and error rates on incongruent trials on any task. Finally, there were effects involving order of drug administration, suggesting practice effects but also beneficial nicotine effects when the compound was administered first. Overall, our findings support previous studies showing positive effects of nicotine on basic attentional functions but do not provide direct evidence for an improvement of top-down cognitive control through acute administration of nicotine at this dose in healthy non-smokers.
Serial-order learning impairment and hypersensitivity-to-interference in dyscalculia.
De Visscher, Alice; Szmalec, Arnaud; Van Der Linden, Lize; Noël, Marie-Pascale
2015-11-01
In the context of heterogeneity, the different profiles of dyscalculia are still hypothetical. This study aims to link features of mathematical difficulties to certain potential etiologies. First, we wanted to test the hypothesis of a serial-order learning deficit in adults with dyscalculia. For this purpose we used a Hebb repetition learning task. Second, we wanted to explore a recent hypothesis according to which hypersensitivity-to-interference hampers the storage of arithmetic facts and leads to a particular profile of dyscalculia. We therefore used interfering and non-interfering repeated sequences in the Hebb paradigm. A final test was used to assess the memory trace of the non-interfering sequence and the capacity to manipulate it. In line with our predictions, we observed that people with dyscalculia who show good conceptual knowledge in mathematics but impaired arithmetic fluency suffer from increased sensitivity-to-interference compared to controls. Secondly, people with dyscalculia who show a deficit in a global mathematical test suffer from a serial-order learning deficit characterized by a slow learning and a quick degradation of the memory trace of the repeated sequence. A serial-order learning impairment could be one of the explanations for a basic numerical deficit, since it is necessary for the number-word sequence acquisition. Among the different profiles of dyscalculia, this study provides new evidence and refinement for two particular profiles. Copyright © 2015 Elsevier B.V. All rights reserved.
1982-07-01
3%) were full-time, undergraduate black students (the target population). They were concentrated in three major areas: 23% were in the biological...with their overtones of secrecy and exclusiveness, contributed to the highly differentiated undergraduate student body, Athletes, variously esteemed as... undergraduate student enrollment. And, the black students were thinly distributed across disciplines. Furthermore, one-third of them did not live on campus
Multiprime Blum-Blum-Shub Pseudorandom Number Generator
2016-09-01
Cryptography , National Institute of Standards and Technology Tests 15. NUMBER OF PAGES 83 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18...1: Introduction Cryptography is a part of our daily lives. Many digital communications require secrecy and authentication over open channels such as...security, of which cryptography is an intrinsic part. Encryption is the process of transforming data, in the form of plaintext, into ciphertext using a
Building the H Bomb: a Personal History
NASA Astrophysics Data System (ADS)
Ford, Kenneth W.
2015-03-01
The Table of Contents for the book is as follows: * Preface * A Note on Secrecy * Prologue * The Big Idea * The Protagonists * The Choice * The Scientists, the Officials, and the President * Nuclear Energy * Some Physics * Going West * A New World * The Classical Super * Calculating and Testing * Constructing Matterhorn * Academia Cowers * New Mexico, New York, and New Jersey * The Garwin Design * Climbing Matterhorn * More Than a Boy * Epilogue * Acknowledgments * End Notes * Bibliography * Index
Wireless Network Security Using Randomness
2012-06-19
370/412 6/2007 Soliman .......................... 380/44 9/2004 Miyake et al ................. 7041201 6/2006 Mauro...8,204,224 B2 Jun .19,2012 (45) Date of Patent: UfHER PUBLICATIONS Shannon, C.E., "Communication Theory of Secrecy Systems," Bell System Technical...MA, Jun . 27, 2001, 14 pages. "Hamming code," Wikipedia page, available at http://en.wikipedia. org!wiki!Hamming_code, printed Sep. 21,2010,7 pages
Su, Yishan; Han, Guangyao; Fu, Xiaomei; Xu, Naishen; Jin, Zhigang
2017-04-06
Physical layer security is an attractive security mechanism, which exploits the randomness characteristics of wireless transmission channel to achieve security. However, it is hampered by the limitation of the channel condition that the main channel must be better than the eavesdropper channel. To alleviate the limitation, cooperative communication is introduced. Few studies have investigated the physical layer security of the relay transmission model. In this paper, we performed some experiments to evaluate the physical layer security of a cooperative communication system, with a relay operating in decode-and-forward (DF) cooperative mode, selfish and malicious behavior in real non-ideal transmission environment. Security performance is evaluated in terms of the probability of non-zero secrecy capacity. Experiments showed some different results compared to theoretical simulation: (1) to achieve the maximum secrecy capacity, the optimal relay power according to the experiments result is larger than that of ideal theoretical results under both cooperative and selfish behavior relay; (2) the relay in malicious behavior who forwards noise to deteriorate the main channel may deteriorate the eavesdropper channel more seriously than the main channel; (3) the optimal relay positions under cooperative and selfish behavior relay cases are both located near the destination because of non-ideal transmission.
ERIC Educational Resources Information Center
Lewandowsky, Stephan; Murdock, Bennet B., Jr.
1989-01-01
An extension to Murdock's Theory of Distributed Associative Memory, based on associative chaining between items, is presented. The extended theory is applied to several serial order phenomena, including serial list learning, delayed recall effects, partial report effects, and buildup and release from proactive interference. (TJH)
NASA Technical Reports Server (NTRS)
Rogge, R. L.
1974-01-01
Strut support interference investigations were conducted on an 0.004-(-) scale representation of the space shuttle launch vehicle in order to determine transonic and supersonic model support interference effects for use in a future exhaust plume effects study. Strut configurations were also tested. Orbiter, external tank, and solid rocket booster pressures were recorded at Mach numbers 0.9, 1.2, 1.5, and 2.0. Angle of attack and angle of sideslip were varied between plus or minus 4 degrees in 2 degree increments. Parametric variations consisted only of the strut configurations.
Kim, Joongheon; Kim, Jong-Kook
2016-01-01
This paper addresses the computation procedures for estimating the impact of interference in 60 GHz IEEE 802.11ad uplink access in order to construct visual big-data database from randomly deployed surveillance camera sensing devices. The acquired large-scale massive visual information from surveillance camera devices will be used for organizing big-data database, i.e., this estimation is essential for constructing centralized cloud-enabled surveillance database. This performance estimation study captures interference impacts on the target cloud access points from multiple interference components generated by the 60 GHz wireless transmissions from nearby surveillance camera devices to their associated cloud access points. With this uplink interference scenario, the interference impacts on the main wireless transmission from a target surveillance camera device to its associated target cloud access point with a number of settings are measured and estimated under the consideration of 60 GHz radiation characteristics and antenna radiation pattern models.
Park, Kyunghyun; Kim, Docyong; Ha, Suhyun; Lee, Doheon
2015-01-01
As pharmacodynamic drug-drug interactions (PD DDIs) could lead to severe adverse effects in patients, it is important to identify potential PD DDIs in drug development. The signaling starting from drug targets is propagated through protein-protein interaction (PPI) networks. PD DDIs could occur by close interference on the same targets or within the same pathways as well as distant interference through cross-talking pathways. However, most of the previous approaches have considered only close interference by measuring distances between drug targets or comparing target neighbors. We have applied a random walk with restart algorithm to simulate signaling propagation from drug targets in order to capture the possibility of their distant interference. Cross validation with DrugBank and Kyoto Encyclopedia of Genes and Genomes DRUG shows that the proposed method outperforms the previous methods significantly. We also provide a web service with which PD DDIs for drug pairs can be analyzed at http://biosoft.kaist.ac.kr/targetrw.
FIVQ algorithm for interference hyper-spectral image compression
NASA Astrophysics Data System (ADS)
Wen, Jia; Ma, Caiwen; Zhao, Junsuo
2014-07-01
Based on the improved vector quantization (IVQ) algorithm [1] which was proposed in 2012, this paper proposes a further improved vector quantization (FIVQ) algorithm for LASIS (Large Aperture Static Imaging Spectrometer) interference hyper-spectral image compression. To get better image quality, IVQ algorithm takes both the mean values and the VQ indices as the encoding rules. Although IVQ algorithm can improve both the bit rate and the image quality, it still can be further improved in order to get much lower bit rate for the LASIS interference pattern with the special optical characteristics based on the pushing and sweeping in LASIS imaging principle. In the proposed algorithm FIVQ, the neighborhood of the encoding blocks of the interference pattern image, which are using the mean value rules, will be checked whether they have the same mean value as the current processing block. Experiments show the proposed algorithm FIVQ can get lower bit rate compared to that of the IVQ algorithm for the LASIS interference hyper-spectral sequences.
Case Study of An Adopted Chinese Woman with Bulimia Nervosa: A Cultural and Transcultural Approach
de MONTGREMIER, Marion Vu-Augier; CHEN, Liangliang; CHEN, Jue; MORO, Marie Rose
2017-01-01
Summary For a long time, eating disorders were considered as culture-bound syndromes, specific to Western countries. This theory has been refuted for anorexia, but few transcultural studies have been carried out on bulimia nervosa. As a result, knowledge concerning this disorder is limited. On the basis of a clinical case involving a bulimic Chinese girl, we attempt to demonstrate the impact of cultural factors on the disorder. We discuss the atypical characteristics of her symptom profile, in particular the absence of preoccupations concerning her appearance and the psycho-pathological impact of the secrecy surrounding her adoption. In this particular case, bulimia triggered a search for filiation and identity that could have later enabled her to restore harmonious family ties and to gain autonomy. We also examine the case in the context of adoption in China. This clinical case points out how important it is to take cultural factors into account and how useful a transcultural approach is in order to understand bulimia, and suggest effective methods of care. PMID:28955146
The architecture of the management system of complex steganographic information
NASA Astrophysics Data System (ADS)
Evsutin, O. O.; Meshcheryakov, R. V.; Kozlova, A. S.; Solovyev, T. M.
2017-01-01
The aim of the study is to create a wide area information system that allows one to control processes of generation, embedding, extraction, and detection of steganographic information. In this paper, the following problems are considered: the definition of the system scope and the development of its architecture. For creation of algorithmic maintenance of the system, classic methods of steganography are used to embed information. Methods of mathematical statistics and computational intelligence are used to identify the embedded information. The main result of the paper is the development of the architecture of the management system of complex steganographic information. The suggested architecture utilizes cloud technology in order to provide service using the web-service via the Internet. It is meant to provide streams of multimedia data processing that are streams with many sources of different types. The information system, built in accordance with the proposed architecture, will be used in the following areas: hidden transfer of documents protected by medical secrecy in telemedicine systems; copyright protection of online content in public networks; prevention of information leakage caused by insiders.
NASA Astrophysics Data System (ADS)
Beganović, Anel; Beć, Krzysztof B.; Henn, Raphael; Huck, Christian W.
2018-05-01
The applicability of two elimination techniques for interferences occurring in measurements with cells of short pathlength using Fourier transform near-infrared (FT-NIR) spectroscopy was evaluated. Due to the growing interest in the field of vibrational spectroscopy in aqueous biological fluids (e.g. glucose in blood), aqueous solutions of D-(+)-glucose were prepared and split into a calibration set and an independent validation set. All samples were measured with two FT-NIR spectrometers at various spectral resolutions. Moving average smoothing (MAS) and fast Fourier transform filter (FFT filter) were applied to the interference affected FT-NIR spectra in order to eliminate the interference pattern. After data pre-treatment, partial least squares regression (PLSR) models using different NIR regions were constructed using untreated (interference affected) spectra and spectra treated with MAS and FFT filter. The prediction of the independent validation set revealed information about the performance of the utilized interference elimination techniques, as well as the different NIR regions. The results showed that the combination band of water at approx. 5200 cm-1 is of great importance since its performance was superior to the one of the so-called first overtone of water at approx. 6800 cm-1. Furthermore, this work demonstrated that MAS and FFT filter are fast and easy-to-use techniques for the elimination of interference fringes in FT-NIR transmittance spectroscopy.
Interference in the gg→h→γγ On-Shell Rate and the Higgs Boson Total Width.
Campbell, John; Carena, Marcela; Harnik, Roni; Liu, Zhen
2017-11-03
We consider interference between the Higgs signal and QCD background in gg→h→γγ and its effect on the on-shell Higgs rate. The existence of sizable strong phases leads to destructive interference of about 2% of the on-shell cross section in the standard model. This effect can be enhanced by beyond the standard model physics. In particular, since it scales differently from the usual rates, the presence of interference allows indirect limits to be placed on the Higgs width in a novel way, using on-shell rate measurements. Our study motivates further QCD calculations to reduce uncertainties. We discuss possible width-sensitive observables, both using total and differential rates and find that the HL-LHC can potentially indirectly constrain widths of order tens of MeV.
The rde-1 gene, RNA interference, and transposon silencing in C. elegans.
Tabara, H; Sarkissian, M; Kelly, W G; Fleenor, J; Grishok, A; Timmons, L; Fire, A; Mello, C C
1999-10-15
Double-stranded (ds) RNA can induce sequence-specific inhibition of gene function in several organisms. However, both the mechanism and the physiological role of the interference process remain mysterious. In order to study the interference process, we have selected C. elegans mutants resistant to dsRNA-mediated interference (RNAi). Two loci, rde-1 and rde-4, are defined by mutants strongly resistant to RNAi but with no obvious defects in growth or development. We show that rde-1 is a member of the piwi/sting/argonaute/zwille/eIF2C gene family conserved from plants to vertebrates. Interestingly, several, but not all, RNAi-deficient strains exhibit mobilization of the endogenous transposons. We discuss implications for the mechanism of RNAi and the possibility that one natural function of RNAi is transposon silencing.
Measurement of the configuration of a concave surface by the interference of reflected light
NASA Technical Reports Server (NTRS)
Kumazawa, T.; Sakamoto, T.; Shida, S.
1985-01-01
A method whereby a concave surface is irradiated with coherent light and the resulting interference fringes yield information on the concave surface is described. This method can be applied to a surface which satisfies the following conditions: (1) the concave face has a mirror surface; (2) the profile of the face is expressed by a mathematical function with a point of inflection. In this interferometry, multilight waves reflected from the concave surface interfere and make fringes wherever the reflected light propagates. Interference fringe orders. Photographs of the fringe patterns for a uniformly loaded thin silicon plate clamped at the edge are shown experimentally. The experimental and the theoretical values of the maximum optical path difference show good agreement. This simple method can be applied to obtain accurate information on concave surfaces.
Advanced experimental techniques for transonic wind tunnels - Final lecture
NASA Technical Reports Server (NTRS)
Kilgore, Robert A.
1987-01-01
A philosophy of experimental techniques is presented, suggesting that in order to be successful, one should like what one does, have the right tools, stick to the job, avoid diversions, work hard, interact with people, be informed, keep it simple, be self sufficient, and strive for perfection. Sources of information, such as bibliographies, newsletters, technical reports, and technical contacts and meetings are recommended. It is pointed out that adaptive-wall test sections eliminate or reduce wall interference effects, and magnetic suspension and balance systems eliminate support-interference effects, while the problem of flow quality remains with all wind tunnels. It is predicted that in the future it will be possible to obtain wind tunnel results at the proper Reynolds number, and the effects of flow unsteadiness, wall interference, and support interference will be eliminated or greatly reduced.
Brezinski, ME
2018-01-01
Optical coherence tomography has become an important imaging technology in cardiology and ophthalmology, with other applications under investigations. Major advances in optical coherence tomography (OCT) imaging are likely to occur through a quantum field approach to the technology. In this paper, which is the first part in a series on the topic, the quantum basis of OCT first order correlations is expressed in terms of full field quantization. Specifically first order correlations are treated as the linear sum of single photon interferences along indistinguishable paths. Photons and the electromagnetic (EM) field are described in terms of quantum harmonic oscillators. While the author feels the study of quantum second order correlations will lead to greater paradigm shifts in the field, addressed in part II, advances from the study of quantum first order correlations are given. In particular, ranging errors are discussed (with remedies) from vacuum fluctuations through the detector port, photon counting errors, and position probability amplitude uncertainty. In addition, the principles of quantum field theory and first order correlations are needed for studying second order correlations in part II. PMID:29863177
Mitigating Cyber Security Risk in Satellite Ground Systems
2015-04-01
because cyber security in government remains shrouded in secrecy. However, using the Defense Operational Test and Evaluation Office’s (DOT& E ) FY14...report on cybersecurity one grasps the seriousness of the problem. DOT& E reported only 85% of networks in DoD were compliant with the cyber...security regulations discussed later in this paper. Not until compliance is near 100% could DOT& E conceive with confidence that DoD networks were safe
JPRS Report, Proliferation Issues
1992-10-30
systemChina, the potential is there for enormous profits to be is marketed as a high-speed target drone , that can be usedmade. for training anti-aircraft and...maintenance support equipment, fully transportable by modernisation of older weapons systems. During the arms road, sea and air. The drone can be controlled...said the whole issue was and speculation. The Drone goes on display at the DEXSA shrouded in secrecy. Exposition, the report concludes. He said the
2010-04-01
conventional aircrews pierce the veil of secrecy and truly learn about the SOF missions, capabilities, and limitations. These select aviators then walk...operators and 316 SOF banding together with local militias in Afghanistan and using airpower to defeat the Taliban and destroy Al Qaeda. 2 The...wing conventional aircraft. Named the Afghan Model, after its development in OEF, this strategy pairs SOF with indigenous fighters and overwhelming
Targeted Killing as an Element of U.S. Foreign Policy in the War On Terror
2006-05-25
terrorists. Given the level of secrecy and lack of transparency involved in this policy and its implementation, how can we judge the moral and legal ...killing’ morally justifiable and legal under both US domestic and international law? Can the United States maintain international legitimacy while...Rights Law and International Humanitarian Law to determine the legality of a policy of targeted killing. iii TABLE OF CONTENTS INTRODUCTION
JPRS Report, Proliferation Issues
1993-04-23
talks with nator of Faction Fatherland, General Lieutenant Gen - Ukraine. nadiy Benov declared that the START-2 Treaty "is draw- "Recently," he noted...borders were in English 13 Apr 93 p 13 recently equipped with radioactive detectors, although, [Report by Matthias Lifkens in Vilnius: "Safety Fear...members." Now for some figures: by 1933, when our chemical gen - Fedorov on Abuses in Secrecy on CW erals took over all the experience from the Germans, a
2006-05-31
York: McGraw-Hill, 2003), p 121. 103 Gortner, Mahler, and Nicholson, p 74. 104 Robert B. Denhardt, Theories of Public Organization. (Belmont, CA...Uninformed: Government Secrecy in the 1980’s. New York: Pilgrim Press, 1984. Denhardt, Robert B. Theories of Public Organization. Belmont, CA: Brooks/Cole...Fixing Intelligence: For a More Secure America. New Haven, CT: Yale University Press, 2003. Odom, William E. and Robert Dujarric. America’s Inadvertent
Two-center interference effects in (e, 2e) ionization of H2 and CO2 at large momentum transfer
NASA Astrophysics Data System (ADS)
Yamazaki, Masakazu; Nakajima, Isao; Satoh, Hironori; Watanabe, Noboru; Jones, Darryl; Takahashi, Masahiko
2015-09-01
In recent years, there has been considerable interest in understanding quantum mechanical interference effects in molecular ionization. Since this interference appears as a consequence of coherent electron emission from the different molecular centers, it should depend strongly on the nature of the ionized molecular orbital. Such molecular orbital patterns can be investigated by means of binary (e, 2e) spectroscopy, which is a kinematically-complete electron-impact ionization experiment performed under the high-energy Bethe ridge conditions. In this study, two-center interference effects in the (e, 2e) cross sections of H2 and CO2 at large momentum transfer are demonstrated with a high-statistics experiment, in order to elucidate the relationship between molecular orbital patterns and the interference structure. It is shown that the two-center interference is highly sensitive to the phase, spatial pattern, symmetry of constituent atomic orbital, and chemical bonding nature of the molecular orbital. This work was partially supported by Grant-in-Aids for Scientific Research (S) (No. 20225001) and for Young Scientists (B) (No. 21750005) from the Ministry of Education, Culture, Sports, Science and Technology.
NASA Astrophysics Data System (ADS)
Bi, Yiming; Tang, Liang; Shan, Peng; Xie, Qiong; Hu, Yong; Peng, Silong; Tan, Jie; Li, Changwen
2014-08-01
Interference such as baseline drift and light scattering can degrade the model predictability in multivariate analysis of near-infrared (NIR) spectra. Usually interference can be represented by an additive and a multiplicative factor. In order to eliminate these interferences, correction parameters are needed to be estimated from spectra. However, the spectra are often mixed of physical light scattering effects and chemical light absorbance effects, making it difficult for parameter estimation. Herein, a novel algorithm was proposed to find a spectral region automatically that the interesting chemical absorbance and noise are low, that is, finding an interference dominant region (IDR). Based on the definition of IDR, a two-step method was proposed to find the optimal IDR and the corresponding correction parameters estimated from IDR. Finally, the correction was performed to the full spectral range using previously obtained parameters for the calibration set and test set, respectively. The method can be applied to multi target systems with one IDR suitable for all targeted analytes. Tested on two benchmark data sets of near-infrared spectra, the performance of the proposed method provided considerable improvement compared with full spectral estimation methods and comparable with other state-of-art methods.
A Single-Case Study of Resiliency After Extreme Incest in an Old Order Amish Family.
McGuigan, William M; Stephenson, Sarah J
2015-01-01
This exploratory research brief presents a single case study of the resiliency of "Mary B." She grew up in an Old Order Amish family where isolation, secrecy, and patriarchy masked repeated sexual assaults by her older brothers that began at age 7. By the age of 20, Mary alleged she had been raped on more than 200 separate occasions by members of her Amish family. After years of pleading with her mother and church officials to intervene, she sought therapy outside the Amish community. This led to three of her brothers being incarcerated. Her family disowned her and she was banned from the Amish community, leaving with an 8th grade education and little more than the clothes she was wearing. In less than 2 years, Mary had moved to a new town, completed her GED, obtained a car and driving license, maintained a small home, and worked as a certified nursing assistant. She consented to tape recorded interviews and completed several quantitative diagnostic measures. Scores on the diagnostic measures placed her within the normal range on self-esteem, competency, depression, stress, social support, and life skills. Analysis of interviews revealed Mary rebounded from her past by reframing her experiences. Themes identified within the interviews supported 6 of the 7 types of resiliencies (insight, independence, initiative, relationships, humor, and morality) outlined in the therapeutic Challenge Model.
A New Reassigned Spectrogram Method in Interference Detection for GNSS Receivers.
Sun, Kewen; Jin, Tian; Yang, Dongkai
2015-09-02
Interference detection is very important for Global Navigation Satellite System (GNSS) receivers. Current work on interference detection in GNSS receivers has mainly focused on time-frequency (TF) analysis techniques, such as spectrogram and Wigner-Ville distribution (WVD), where the spectrogram approach presents the TF resolution trade-off problem, since the analysis window is used, and the WVD method suffers from the very serious cross-term problem, due to its quadratic TF distribution nature. In order to solve the cross-term problem and to preserve good TF resolution in the TF plane at the same time, in this paper, a new TF distribution by using a reassigned spectrogram has been proposed in interference detection for GNSS receivers. This proposed reassigned spectrogram method efficiently combines the elimination of the cross-term provided by the spectrogram itself according to its inherent nature and the improvement of the TF aggregation property achieved by the reassignment method. Moreover, a notch filter has been adopted in interference mitigation for GNSS receivers, where receiver operating characteristics (ROCs) are used as metrics for the characterization of interference mitigation performance. The proposed interference detection method by using a reassigned spectrogram is evaluated by experiments on GPS L1 signals in the disturbing scenarios in comparison to the state-of-the-art TF analysis approaches. The analysis results show that the proposed interference detection technique effectively overcomes the cross-term problem and also keeps good TF localization properties, which has been proven to be valid and effective to enhance the interference Sensors 2015, 15 22168 detection performance; in addition, the adoption of the notch filter in interference mitigation has shown a significant acquisition performance improvement in terms of ROC curves for GNSS receivers in jamming environments.
A New Reassigned Spectrogram Method in Interference Detection for GNSS Receivers
Sun, Kewen; Jin, Tian; Yang, Dongkai
2015-01-01
Interference detection is very important for Global Navigation Satellite System (GNSS) receivers. Current work on interference detection in GNSS receivers has mainly focused on time-frequency (TF) analysis techniques, such as spectrogram and Wigner–Ville distribution (WVD), where the spectrogram approach presents the TF resolution trade-off problem, since the analysis window is used, and the WVD method suffers from the very serious cross-term problem, due to its quadratic TF distribution nature. In order to solve the cross-term problem and to preserve good TF resolution in the TF plane at the same time, in this paper, a new TF distribution by using a reassigned spectrogram has been proposed in interference detection for GNSS receivers. This proposed reassigned spectrogram method efficiently combines the elimination of the cross-term provided by the spectrogram itself according to its inherent nature and the improvement of the TF aggregation property achieved by the reassignment method. Moreover, a notch filter has been adopted in interference mitigation for GNSS receivers, where receiver operating characteristics (ROCs) are used as metrics for the characterization of interference mitigation performance. The proposed interference detection method by using a reassigned spectrogram is evaluated by experiments on GPS L1 signals in the disturbing scenarios in comparison to the state-of-the-art TF analysis approaches. The analysis results show that the proposed interference detection technique effectively overcomes the cross-term problem and also keeps good TF localization properties, which has been proven to be valid and effective to enhance the interference detection performance; in addition, the adoption of the notch filter in interference mitigation has shown a significant acquisition performance improvement in terms of ROC curves for GNSS receivers in jamming environments. PMID:26364637
Desse, Jean-Michel; Olchewsky, François
2018-04-15
This Letter proposes a dual-reference digital holographic interferometer for analyzing the high refractive index encountered in transonic and supersonic flows. For that, a Wollaston prism is inserted in the reference arm in order to simultaneously generate two orthogonally polarized reference waves. As a consequence, recorded interferograms contain two crossed and perpendicular interference patterns that give two orders fully separated in the Fourier spectrum. It is then possible to analyze a transparent object regardless of the orientation of the refractive index gradient using the two phase maps reconstructed with each of the two first interference orders. Fusion of the phase maps yields a single phase map in which the phase singularities are removed. Experimental results demonstrate the suitability of the proposed approach for analyzing shock waves in the unsteady wake flow around a circular cylinder at Mach 0.75.
Well-ordered polymer nano-fibers with self-cleaning property by disturbing crystallization process.
Yang, Qin; Luo, Zhuangzhu; Tan, Sheng; Luo, Yimin; Wang, Yunjiao; Zhang, Zhaozhu; Liu, Weimin
2014-01-01
Bionic self-cleaning surfaces with well-ordered polymer nano-fibers are firstly fabricated by disturbing crystallization during one-step coating-curing process. Orderly thin (100 nm) and long (5-10 μm) polymer nano-fibers with a certain direction are fabricated by external macroscopic force (F blow) interference introduced by H2 gas flow, leading to superior superhydrophobicity with a water contact angle (WCA) of 170° and a water sliding angle (WSA) of 0-1°. In contrast, nano-wires and nano-bridges (1-8 μm in length/10-80 nm in width) are generated by "spinning/stretching" under internal microscopic force (F T) interference due to significant temperature difference in the non-uniform cooling medium. The findings provide a novel theoretical basis for controllable polymer "bionic lotus" surface and will further promote practical application in many engineering fields such as drag-reduction and anti-icing.
Well-ordered polymer nano-fibers with self-cleaning property by disturbing crystallization process
NASA Astrophysics Data System (ADS)
Yang, Qin; Luo, Zhuangzhu; Tan, Sheng; Luo, Yimin; Wang, Yunjiao; Zhang, Zhaozhu; Liu, Weimin
2014-07-01
Bionic self-cleaning surfaces with well-ordered polymer nano-fibers are firstly fabricated by disturbing crystallization during one-step coating-curing process. Orderly thin (100 nm) and long (5-10 μm) polymer nano-fibers with a certain direction are fabricated by external macroscopic force ( F blow) interference introduced by H2 gas flow, leading to superior superhydrophobicity with a water contact angle (WCA) of 170° and a water sliding angle (WSA) of 0-1°. In contrast, nano-wires and nano-bridges (1-8 μm in length/10-80 nm in width) are generated by "spinning/stretching" under internal microscopic force ( F T) interference due to significant temperature difference in the non-uniform cooling medium. The findings provide a novel theoretical basis for controllable polymer "bionic lotus" surface and will further promote practical application in many engineering fields such as drag-reduction and anti-icing.
NASA Astrophysics Data System (ADS)
Limeng, Zhang; Dan, Lu; Zhaosong, Li; Biwei, Pan; Lingjuan, Zhao
2016-12-01
The design, fabrication and characterization of a fundamental/first-order mode converter based on multimode interference coupler on InP substrate were reported. Detailed optimization of the device parameters were investigated using 3D beam propagation method. In the experiments, the fabricated mode converter realized mode conversion from the fundamental mode to the first-order mode in the wavelength range of 1530-1565 nm with excess loss less than 3 dB. Moreover, LP01 and LP11 fiber modes were successfully excited from a few-mode fiber by using the device. This InP-based mode converter can be a possible candidate for integrated transceivers for future mode-division multiplexing system. Project supported by the National Basic Research Program of China (No. 2014CB340102) and in part by the National Natural Science Foundation of China (Nos. 61274045, 61335009).
In-situ laser nano-patterning for ordered InAs/GaAs(001) quantum dot growth
NASA Astrophysics Data System (ADS)
Zhang, Wei; Shi, Zhenwu; Huo, Dayun; Guo, Xiaoxiang; Zhang, Feng; Chen, Linsen; Wang, Qinhua; Zhang, Baoshun; Peng, Changsi
2018-04-01
A study of in-situ laser interference nano-patterning on InGaAs wetting layers was carried out during InAs/GaAs (001) quantum dot molecular beam epitaxy growth. Periodic nano-islands with heights of a few atomic layers were obtained via four-beam laser interference irradiation on the InGaAs wetting layer at an InAs coverage of 0.9 monolayer. The quantum dots nucleated preferentially at edges of nano-islands upon subsequent deposition of InAs on the patterned surface. When the nano-islands are sufficiently small, the patterned substrate could be spontaneously re-flattened and an ordered quantum dot array could be produced on the smooth surface. This letter discusses the mechanisms of nano-patterning and ordered quantum dot nucleation in detail. This study provides a potential technique leading to site-controlled, high-quality quantum dot fabrication.
Luckert, Claudia; Hessel, Stefanie; Lampen, Alfonso; Braeuning, Albert
2015-10-15
Reporter gene assays are widely used for the assessment of transcription factor activation following xenobiotic exposure of cells. A critical issue with such assays is the possibility of interference of test compounds with the test system, for example, by direct inhibition of the reporter enzyme. Here we show that the pyrrolizidine alkaloid heliotrine interferes with reporter signals derived from GAL4-based nuclear receptor transactivation assays by a mechanism independent of luciferase enzyme inhibition. These data highlight the necessity to conduct proper control experiments in order to avoid perturbation of reporter assays by test chemicals. Copyright © 2015 Elsevier Inc. All rights reserved.
Effects of proton irradiation on thin-film materials for optical filters
NASA Astrophysics Data System (ADS)
Scaglione, Salvatore; Piegari, Angela; Sytchkova, Anna; Jakšić, Milko
2017-11-01
The behaviour of interference optical filters for space applications has been investigated under low energy proton irradiation. In order to understand the behaviour of the interference coating subjected to proton irradiation, the interaction of protons with coating and substrate was simulated by the SRIM code. A beam of protons of 60 KeV with an integrated fluence of 1013 p+/cm2 was used. The spectral transmittances of fused silica, TiO2 and HfO2 single layers and interference coatings were measured before and after irradiation and, according to simulations, no significant effects were detected in the visible-near infrared spectrum, while some variations appeared at shorter wavelengths.
EMGAN: A computer program for time and frequency domain reduction of electromyographic data
NASA Technical Reports Server (NTRS)
Hursta, W. N.
1975-01-01
An experiment in electromyography utilizing surface electrode techniques was developed for the Apollo-Soyuz test project. This report describes the computer program, EMGAN, which was written to provide first order data reduction for the experiment. EMG signals are produced by the membrane depolarization of muscle fibers during a muscle contraction. Surface electrodes detect a spatially summated signal from a large number of muscle fibers commonly called an interference pattern. An interference pattern is usually so complex that analysis through signal morphology is extremely difficult if not impossible. It has become common to process EMG interference patterns in the frequency domain. Muscle fatigue and certain myopathic conditions are recognized through changes in muscle frequency spectra.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) Refusing to consider any motion or other action that is not filed in a timely manner. ... action or for other misconduct that interferes with the speedy, orderly or fair conduct of the hearing... the proceedings; (e) Dismissal of the action; (f) Entering a decision by default; (g) Ordering the...
Interference in the g g → h → γ γ On-Shell Rate and the Higgs Boson Total Width
DOE Office of Scientific and Technical Information (OSTI.GOV)
Campbell, John; Carena, Marcela; Harnik, Roni
We consider interference between the Higgs signal and QCD background inmore » $$gg\\rightarrow h \\rightarrow \\gamma\\gamma$$ and its effect on the on-shell Higgs rate. The existence of sizable strong phases leads to destructive interference of about 2% of the on-shell cross section in the Standard Model. This effect can be enhanced by beyond the standard model physics. In particular, since it scales differently from the usual rates, the presence of interference allows indirect limits to be placed on the Higgs width in a novel way, using on-shell rate measurements. Our study motivates further QCD calculations to reduce uncertainties. We discuss potential width-sensitive observables, both using total and differential rates and find that the HL-LHC can potentially indirectly probe widths of order tens of MeV.« less
Large-scale fabrication of vertically aligned ZnO nanowire arrays
Wang, Zhong L; Das, Suman; Xu, Sheng; Yuan, Dajun; Guo, Rui; Wei, Yaguang; Wu, Wenzhuo
2013-02-05
In a method for growing a nanowire array, a photoresist layer is placed onto a nanowire growth layer configured for growing nanowires therefrom. The photoresist layer is exposed to a coherent light interference pattern that includes periodically alternately spaced dark bands and light bands along a first orientation. The photoresist layer exposed to the coherent light interference pattern along a second orientation, transverse to the first orientation. The photoresist layer developed so as to remove photoresist from areas corresponding to areas of intersection of the dark bands of the interference pattern along the first orientation and the dark bands of the interference pattern along the second orientation, thereby leaving an ordered array of holes passing through the photoresist layer. The photoresist layer and the nanowire growth layer are placed into a nanowire growth environment, thereby growing nanowires from the nanowire growth layer through the array of holes.
Interband interference effects at the edge of a multiband chiral p -wave superconductor
NASA Astrophysics Data System (ADS)
Zhang, Jia-Long; Huang, Wen; Sigrist, Manfred; Yao, Dao-Xin
2017-12-01
Chiral superconductors support chiral edge modes and potentially spontaneous edge currents at their boundaries. Motivated by the putative multiband chiral p -wave superconductor Sr2RuO4 , we study the influence of the interference between different bands at the edges, which may appear in the presence of moderate edge disorder or in edge tunneling measurements. We show that interband interference can strongly modify the measurable quantities at the edges when the order parameter exhibits phase difference between the bands. This is illustrated by investigating the edge dispersion and the edge current distribution in the presence of interband mixing, as well as the conductance at a tunneling junction. The results are discussed in connection with the putative chiral p -wave superconductor Sr2RuO4 . In passing, we also discuss similar interference effects in multiband models with other pairing symmetries.
Wang, Jiacheng; Zhou, Hu; Zhuang, Jiandong; Liu, Qian
2013-01-01
Ordered mesoporous carbons (OMCs), obtained by nanocasting using ordered mesoporous silicas (OMSs) as hard templates, exhibit unique arrangements of ordered regular nanopore/nanowire mesostructures. Here, we used nanocasting combined with hot-pressing to prepare 10 wt% OMC/OMS/SiO2 ternary composites possessing various carbon mesostructure configurations of different dimensionalities (1D isolated CS41 carbon nanowires, 2D hexagonal CMK-3 carbon, and 3D cubic CMK-1 carbon). The electric/dielectric properties and electromagnetic interference (EMI) shielding efficiency (SE) of the composites were influenced by spatial configurations of carbon networks. The complex permittivity and the EMI SE of the composites in the X-band frequency range decreased for the carbon mesostructures in the following order: CMK-3-filled > CMK-1-filled > CS41-filled. Our study provides technical directions for designing and preparing high-performance EMI shielding materials. Our OMC-based silica composites can be used for EMI shielding, especially in high-temperature or corrosive environments, owing to the high stability of the OMC/OMS fillers and the SiO2 matrix. Related shielding mechanisms are also discussed. PMID:24248277
Chang, Yue-Yue; Wu, Hai-Long; Fang, Huan; Wang, Tong; Liu, Zhi; Ouyang, Yang-Zi; Ding, Yu-Jie; Yu, Ru-Qin
2018-06-15
In this study, a smart and green analytical method based on the second-order calibration algorithm coupled with excitation-emission matrix (EEM) fluorescence was developed for the determination of rhodamine dyes illegally added into chilli samples. The proposed method not only has the advantage of high sensitivity over the traditional fluorescence method but also fully displays the "second-order advantage". Pure signals of analytes were successfully extracted from severely interferential EEMs profiles via using alternating trilinear decomposition (ATLD) algorithm even in the presence of common fluorescence problems such as scattering, peak overlaps and unknown interferences. It is worth noting that the unknown interferents can denote different kinds of backgrounds, not only refer to a constant background. In addition, the method using interpolation method could avoid the information loss of analytes of interest. The use of "mathematical separation" instead of complicated "chemical or physical separation" strategy can be more effective and environmentally friendly. A series of statistical parameters including figures of merit and RSDs of intra- (≤1.9%) and inter-day (≤6.6%) were calculated to validate the accuracy of the proposed method. Furthermore, the authoritative method of HPLC-FLD was adopted to verify the qualitative and quantitative results of the proposed method. Compared with the two methods, it also showed that the ATLD-EEMs method has the advantages of accuracy, rapidness, simplicity and green, which is expected to be developed as an attractive alternative method for simultaneous and interference-free determination of rhodamine dyes illegally added into complex matrices. Copyright © 2018. Published by Elsevier B.V.