Sample records for key differences exist

  1. Key strategies to improve systems for managing patient complaints within health facilities - what can we learn from the existing literature?

    PubMed

    Mirzoev, Tolib; Kane, Sumit

    2018-01-01

    Information from patient complaints - a widely accepted measure of patient satisfaction with services - can inform improvements in service quality, and contribute towards overall health systems performance. While analyses of data from patient complaints received much emphasis, there is limited published literature on key interventions to improve complaint management systems. The objectives are two-fold: first, to synthesise existing evidence and provide practical options to inform future policy and practice and, second, to identify key outstanding gaps in the existing literature to inform agenda for future research. We report results of review of the existing literature. Peer-reviewed published literature was searched in OVID Medline, OVID Global Health and PubMed. In addition, relevant citations from the reviewed articles were followed up, and we also report grey literature from the UK and the Netherlands. Effective interventions can improve collection of complaints (e.g. establishing easy-to-use channels and raising patients' awareness of these), analysis of complaint data (e.g. creating structures and spaces for analysis and learning from complaints data), and subsequent action (e.g. timely feedback to complainants and integrating learning from complaints into service quality improvement). No one single measure can be sufficient, and any intervention to improve patient complaint management system must include different components, which need to be feasible, effective, scalable, and sustainable within local context. Effective interventions to strengthen patient complaints systems need to be: comprehensive, integrated within existing systems, context-specific and cognizant of the information asymmetry and the unequal power relations between the key actors. Four gaps in the published literature represent an agenda for future research: limited understanding of contexts of effective interventions, absence of system-wide approaches, lack of evidence from low- and

  2. Key strategies to improve systems for managing patient complaints within health facilities – what can we learn from the existing literature?

    PubMed Central

    2018-01-01

    ABSTRACT Background: Information from patient complaints – a widely accepted measure of patient satisfaction with services – can inform improvements in service quality, and contribute towards overall health systems performance. While analyses of data from patient complaints received much emphasis, there is limited published literature on key interventions to improve complaint management systems. Objectives: The objectives are two-fold: first, to synthesise existing evidence and provide practical options to inform future policy and practice and, second, to identify key outstanding gaps in the existing literature to inform agenda for future research. Methods: We report results of review of the existing literature. Peer-reviewed published literature was searched in OVID Medline, OVID Global Health and PubMed. In addition, relevant citations from the reviewed articles were followed up, and we also report grey literature from the UK and the Netherlands. Results: Effective interventions can improve collection of complaints (e.g. establishing easy-to-use channels and raising patients’ awareness of these), analysis of complaint data (e.g. creating structures and spaces for analysis and learning from complaints data), and subsequent action (e.g. timely feedback to complainants and integrating learning from complaints into service quality improvement). No one single measure can be sufficient, and any intervention to improve patient complaint management system must include different components, which need to be feasible, effective, scalable, and sustainable within local context. Conclusions: Effective interventions to strengthen patient complaints systems need to be: comprehensive, integrated within existing systems, context-specific and cognizant of the information asymmetry and the unequal power relations between the key actors. Four gaps in the published literature represent an agenda for future research: limited understanding of contexts of effective interventions

  3. The emotional importance of key: do Beatles songs written in different keys convey different emotional tones?

    PubMed

    Whissel, R; Whissel, C

    2000-12-01

    Lyrics from 155 songs written by the Lennon-McCartney team were scored using the Dictionary of Affect in Language. Resultant scores (pleasantness, activation, and imagery of words) were compared across key signatures using one way analyses of variance. Words from songs written in minor keys were less pleasant and less active than those from songs written in major keys. Words from songs written in the key of F scored extremely low on all three measures. Lyrics from the keys of C, D, and G were relatively active in tone. Results from Dictionary scoring were compared with assignments of character to keys made more than one century ago and with current musicians' opinions.

  4. The existence of solutions of q-difference-differential equations.

    PubMed

    Wang, Xin-Li; Wang, Hua; Xu, Hong-Yan

    2016-01-01

    By using the Nevanlinna theory of value distribution, we investigate the existence of solutions of some types of non-linear q-difference differential equations. In particular, we generalize the Rellich-Wittich-type theorem and Malmquist-type theorem about differential equations to the case of q-difference differential equations (system).

  5. Differences exist across insurance schemes in China post-consolidation

    PubMed Central

    Yi, Danhui; Wang, Xiaojun; Jiang, Yan; Wang, Yu; Liu, Xinchun

    2017-01-01

    Background In China, the basic insurance system consists of three schemes: the UEBMI (Urban Employee Basic Medical Insurance), URBMI (Urban Resident Basic Medical Insurance), and NCMS (New Cooperative Medical Scheme), across which significant differences have been observed. Since 2009, the central government has been experimenting with consolidating these schemes in selected areas. This study examines whether differences still exist across schemes after the consolidation. Methods A survey was conducted in the city of Suzhou, collecting data on subjects 45 years old and above with at least one inpatient or outpatient treatment during a period of twelve months. Analysis on 583 subjects was performed comparing subjects’ characteristics across insurance schemes. A resampling-based method was applied to compute the predicted gross medical cost, OOP (out-of-pocket) cost, and insurance reimbursement rate. Results Subjects under different insurance schemes differ in multiple aspects. For inpatient treatments, subjects under the URBMI have the highest observed and predicted gross and OOP costs, while those under the UEBMI have the lowest. For outpatient treatments, subjects under the UEBMI and URBMI have comparable costs, while those under the NCMS have much lower costs. Subjects under the NCMS also have a much lower reimbursement rate. Conclusions Differences still exist across schemes in medical costs and insurance reimbursement rate post-consolidation. Further investigations are needed to identify the causes, and interventions are needed to eliminate such differences. PMID:29125837

  6. Differences exist across insurance schemes in China post-consolidation.

    PubMed

    Li, Yang; Zhao, Yinjun; Yi, Danhui; Wang, Xiaojun; Jiang, Yan; Wang, Yu; Liu, Xinchun; Ma, Shuangge

    2017-01-01

    In China, the basic insurance system consists of three schemes: the UEBMI (Urban Employee Basic Medical Insurance), URBMI (Urban Resident Basic Medical Insurance), and NCMS (New Cooperative Medical Scheme), across which significant differences have been observed. Since 2009, the central government has been experimenting with consolidating these schemes in selected areas. This study examines whether differences still exist across schemes after the consolidation. A survey was conducted in the city of Suzhou, collecting data on subjects 45 years old and above with at least one inpatient or outpatient treatment during a period of twelve months. Analysis on 583 subjects was performed comparing subjects' characteristics across insurance schemes. A resampling-based method was applied to compute the predicted gross medical cost, OOP (out-of-pocket) cost, and insurance reimbursement rate. Subjects under different insurance schemes differ in multiple aspects. For inpatient treatments, subjects under the URBMI have the highest observed and predicted gross and OOP costs, while those under the UEBMI have the lowest. For outpatient treatments, subjects under the UEBMI and URBMI have comparable costs, while those under the NCMS have much lower costs. Subjects under the NCMS also have a much lower reimbursement rate. Differences still exist across schemes in medical costs and insurance reimbursement rate post-consolidation. Further investigations are needed to identify the causes, and interventions are needed to eliminate such differences.

  7. Device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Hänggi, Esther

    2010-12-01

    In this thesis, we study two approaches to achieve device-independent quantum key distribution: in the first approach, the adversary can distribute any system to the honest parties that cannot be used to communicate between the three of them, i.e., it must be non-signalling. In the second approach, we limit the adversary to strategies which can be implemented using quantum physics. For both approaches, we show how device-independent quantum key distribution can be achieved when imposing an additional condition. In the non-signalling case this additional requirement is that communication is impossible between all pairwise subsystems of the honest parties, while, in the quantum case, we demand that measurements on different subsystems must commute. We give a generic security proof for device-independent quantum key distribution in these cases and apply it to an existing quantum key distribution protocol, thus proving its security even in this setting. We also show that, without any additional such restriction there always exists a successful joint attack by a non-signalling adversary.

  8. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources.

    PubMed

    Song, Ting-Ting; Qin, Su-Juan; Wen, Qiao-Yan; Wang, Yu-Kun; Jia, Heng-Yue

    2015-10-16

    In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation.

  9. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources

    PubMed Central

    Song, Ting-Ting; Qin, Su-Juan; Wen, Qiao-Yan; Wang, Yu-Kun; Jia, Heng-Yue

    2015-01-01

    In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation. PMID:26471947

  10. Experimentally feasible quantum-key-distribution scheme using qubit-like qudits and its comparison with existing qubit- and qudit-based protocols

    NASA Astrophysics Data System (ADS)

    Chau, H. F.; Wang, Qinan; Wong, Cardythy

    2017-02-01

    Recently, Chau [Phys. Rev. A 92, 062324 (2015), 10.1103/PhysRevA.92.062324] introduced an experimentally feasible qudit-based quantum-key-distribution (QKD) scheme. In that scheme, one bit of information is phase encoded in the prepared state in a 2n-dimensional Hilbert space in the form (|i > ±|j >) /√{2 } with n ≥2 . For each qudit prepared and measured in the same two-dimensional Hilbert subspace, one bit of raw secret key is obtained in the absence of transmission error. Here we show that by modifying the basis announcement procedure, the same experimental setup can generate n bits of raw key for each qudit prepared and measured in the same basis in the noiseless situation. The reason is that in addition to the phase information, each qudit also carries information on the Hilbert subspace used. The additional (n -1 ) bits of raw key comes from a clever utilization of this extra piece of information. We prove the unconditional security of this modified protocol and compare its performance with other existing provably secure qubit- and qudit-based protocols on market in the one-way classical communication setting. Interestingly, we find that for the case of n =2 , the secret key rate of this modified protocol using nondegenerate random quantum code to perform one-way entanglement distillation is equal to that of the six-state scheme.

  11. Learning Styles of ICT Specialisation Students: Do Differences in Disciplines Exist?

    ERIC Educational Resources Information Center

    de Salas, Kristy; Lewis, Ian; Dermoudy, Julian

    2014-01-01

    Within existing ICT degrees there is a widely-held belief that content must be tailored for different "kinds" of students--often two differing student groups: a technical group requiring detailed Computer Science knowledge and a separate group requiring less technical, more strategic ICT knowledge and skills. Our institution has produced…

  12. Co-existence of Functionally Different Vesicular Neurotransmitter Transporters.

    PubMed

    Münster-Wandowski, Agnieszka; Zander, Johannes-Friedrich; Richter, Karin; Ahnert-Hilger, Gudrun

    2016-01-01

    The vesicular transmitter transporters VGLUT, VGAT, VMAT2 and VAChT, define phenotype and physiological properties of neuronal subtypes. VGLUTs concentrate the excitatory amino acid glutamate, VGAT the inhibitory amino acid GABA, VMAT2 monoamines, and VAChT acetylcholine (ACh) into synaptic vesicle (SV). Following membrane depolarization SV release their content into the synaptic cleft. A strict segregation of vesicular transporters is mandatory for the precise functioning of synaptic communication and of neuronal circuits. In the last years, evidence accumulates that subsets of neurons express more than one of these transporters leading to synaptic co-release of different and functionally opposing transmitters and modulation of synaptic plasticity. Synaptic co-existence of transporters may change during pathological scenarios in order to ameliorate misbalances in neuronal activity. In addition, evidence increases that transporters also co-exist on the same vesicle providing another layer of regulation. Generally, vesicular transmitter loading relies on an electrochemical gradient ΔμH(+) driven by the proton ATPase rendering the lumen of the vesicle with respect to the cytosol positive (Δψ) and acidic (ΔpH). While the activity of VGLUT mainly depends on the Δψ component, VMAT, VGAT and VAChT work best at a high ΔpH. Thus, a vesicular synergy of transporters depending on the combination may increase or decrease the filling of SV with the principal transmitter. We provide an overview on synaptic co-existence of vesicular transmitter transporters including changes in the excitatory/inhibitory balance under pathological conditions. Additionally, we discuss functional aspects of vesicular synergy of transmitter transporters.

  13. Co-existence of Functionally Different Vesicular Neurotransmitter Transporters

    PubMed Central

    Münster-Wandowski, Agnieszka; Zander, Johannes-Friedrich; Richter, Karin; Ahnert-Hilger, Gudrun

    2016-01-01

    The vesicular transmitter transporters VGLUT, VGAT, VMAT2 and VAChT, define phenotype and physiological properties of neuronal subtypes. VGLUTs concentrate the excitatory amino acid glutamate, VGAT the inhibitory amino acid GABA, VMAT2 monoamines, and VAChT acetylcholine (ACh) into synaptic vesicle (SV). Following membrane depolarization SV release their content into the synaptic cleft. A strict segregation of vesicular transporters is mandatory for the precise functioning of synaptic communication and of neuronal circuits. In the last years, evidence accumulates that subsets of neurons express more than one of these transporters leading to synaptic co-release of different and functionally opposing transmitters and modulation of synaptic plasticity. Synaptic co-existence of transporters may change during pathological scenarios in order to ameliorate misbalances in neuronal activity. In addition, evidence increases that transporters also co-exist on the same vesicle providing another layer of regulation. Generally, vesicular transmitter loading relies on an electrochemical gradient ΔμH+ driven by the proton ATPase rendering the lumen of the vesicle with respect to the cytosol positive (Δψ) and acidic (ΔpH). While the activity of VGLUT mainly depends on the Δψ component, VMAT, VGAT and VAChT work best at a high ΔpH. Thus, a vesicular synergy of transporters depending on the combination may increase or decrease the filling of SV with the principal transmitter. We provide an overview on synaptic co-existence of vesicular transmitter transporters including changes in the excitatory/inhibitory balance under pathological conditions. Additionally, we discuss functional aspects of vesicular synergy of transmitter transporters. PMID:26909036

  14. Hypothesis on two different functionalities co-existing in frontal lobe of human brains.

    PubMed

    Wang, Jue

    2013-09-01

    Human frontal lobe is a key area from where our cognition, memory and emotion display or function. In medical case study, there are patients with social dysfunctions, lack of passion or emotion as result of their frontal lobe damage caused by pathological changes, traumatic damage, and brain tumor remove operations. The syndrome of frontal lobe damage remains at large unanswered medically. From early stage of pregnancy, there exists lobe layers, nerve combine, and neurons synaptic, indicating a completion of growth of functionality inside frontal lobe. However, this completion of growth does not match the growth of human intelligence. Human infants only start and complete their cognition and memory functionality one full year after their birth which is marked by huge amount of neurons synaptic inside their frontal lobe, which is not part of a continual growth of originally developed functions. By reasoning on pathological changes of frontal lobe, a hypothesis was established that two individually functional mechanisms co-existed inside one frontal lobe. This neuron system is particularly for human beings. Copyright © 2013 Elsevier Ltd. All rights reserved.

  15. Interaction Studies of Withania Somnifera's Key Metabolite Withaferin A with Different Receptors Assoociated with Cardiovascular Disease.

    PubMed

    Ravindran, Rekha; Sharma, Nitika; Roy, Sujata; Thakur, Ashoke R; Ganesh, Subhadra; Kumar, Sriram; Devi, Jamuna; Rajkumar, Johanna

    2015-01-01

    Withania somnifera commonly known as Ashwagandha in India is used in many herbal formulations to treat various cardiovascular diseases. The key metabolite of this plant, Withaferin A was analyzed for its molecular mechanism through docking studies on different targets of cardiovascular disease. Six receptor proteins associated with cardiovascular disease were selected and interaction studies were performed with Withaferin A using AutoDock Vina. CORINA was used to model the small molecules and HBAT to compute the hydrogen bonding. Among the six targets, β1- adrenergic receptors, HMG-CoA and Angiotensinogen-converting enzyme showed significant interaction with Withaferin A. Pharmacophore modeling was done using PharmaGist to understand the pharmacophoric potential of Withaferin A. Clustering of Withaferin A with different existing drug molecules for cardiovascular disease was performed with ChemMine based on structural similarity and physicochemical properties. The ability of natural active component, Withaferin A to interact with different receptors associated with cardiovascular disease was elucidated with various modeling techniques. These studies conclusively revealed Withaferin A as a potent lead compound against multiple targets associated with cardiovascular disease.

  16. Fadeout in an Early Mathematics Intervention: Constraining Content or Pre-existing Differences?

    PubMed Central

    Bailey, Drew H.; Nguyen, Tutrang; Jenkins, Jade Marcus; Domina, Thurston; Clements, Douglas H.; Sarama, Julie S.

    2016-01-01

    A robust finding across research on early childhood educational interventions is that the treatment effect diminishes over time, with children not receiving the intervention eventually catching up to children who did. One popular explanation for fadeout of early mathematics interventions is that elementary school teachers may not teach the kind of advanced content that children are prepared for after receiving the intervention, so lower-achieving children in the control groups of early mathematics interventions catch up to the higher-achieving children in the treatment groups. An alternative explanation is that persistent individual differences in children’s long-term mathematical development result more from relatively stable pre-existing differences in their skills and environments than from the direct effects of previous knowledge on later knowledge. We tested these two hypotheses using data from an effective preschool mathematics intervention previously known to show a diminishing treatment effect over time. We compared the intervention group to a matched subset of the control group with a similar mean and variance of scores at the end of treatment. We then tested the relative contributions of factors that similarly constrain learning in children from treatment and control groups with the same level of post-treatment achievement and pre-existing differences between these two groups to the fadeout of the treatment effect over time. We found approximately 72% of the fadeout effect to be attributable to pre-existing differences between children in treatment and control groups with the same level of achievement at post-test. These differences were fully statistically attenuated by children’s prior academic achievement. PMID:27505700

  17. Limitations on quantum key repeaters.

    PubMed

    Bäuml, Stefan; Christandl, Matthias; Horodecki, Karol; Winter, Andreas

    2015-04-23

    A major application of quantum communication is the distribution of entangled particles for use in quantum key distribution. Owing to noise in the communication line, quantum key distribution is, in practice, limited to a distance of a few hundred kilometres, and can only be extended to longer distances by use of a quantum repeater, a device that performs entanglement distillation and quantum teleportation. The existence of noisy entangled states that are undistillable but nevertheless useful for quantum key distribution raises the question of the feasibility of a quantum key repeater, which would work beyond the limits of entanglement distillation, hence possibly tolerating higher noise levels than existing protocols. Here we exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key. As a consequence, we give examples of states suitable for quantum key distribution but unsuitable for the most general quantum key repeater protocol.

  18. Existence of entire solutions of some non-linear differential-difference equations.

    PubMed

    Chen, Minfeng; Gao, Zongsheng; Du, Yunfei

    2017-01-01

    In this paper, we investigate the admissible entire solutions of finite order of the differential-difference equations [Formula: see text] and [Formula: see text], where [Formula: see text], [Formula: see text] are two non-zero polynomials, [Formula: see text] is a polynomial and [Formula: see text]. In addition, we investigate the non-existence of entire solutions of finite order of the differential-difference equation [Formula: see text], where [Formula: see text], [Formula: see text] are two non-constant polynomials, [Formula: see text], m , n are positive integers and satisfy [Formula: see text] except for [Formula: see text], [Formula: see text].

  19. Systems test facilities existing capabilities compilation

    NASA Technical Reports Server (NTRS)

    Weaver, R.

    1981-01-01

    Systems test facilities (STFS) to test total photovoltaic systems and their interfaces are described. The systems development (SD) plan is compilation of existing and planned STFs, as well as subsystem and key component testing facilities. It is recommended that the existing capabilities compilation is annually updated to provide and assessment of the STF activity and to disseminate STF capabilities, status and availability to the photovoltaics program.

  20. Same pattern, different mechanism: Locking onto the role of key species in seafloor ecosystem process

    PubMed Central

    Woodin, Sarah Ann; Volkenborn, Nils; Pilditch, Conrad A.; Lohrer, Andrew M.; Wethey, David S.; Hewitt, Judi E.; Thrush, Simon F.

    2016-01-01

    Seafloor biodiversity is a key mediator of ecosystem functioning, but its role is often excluded from global budgets or simplified to black boxes in models. New techniques allow quantification of the behavior of animals living below the sediment surface and assessment of the ecosystem consequences of complex interactions, yielding a better understanding of the role of seafloor animals in affecting key processes like primary productivity. Combining predictions based on natural history, behavior of key benthic species and environmental context allow assessment of differences in functioning and process, even when the measured ecosystem property in different systems is similar. Data from three sedimentary systems in New Zealand illustrate this. Analysis of the behaviors of the infaunal ecosystem engineers in each system revealed three very different mechanisms driving ecosystem function: density and excretion, sediment turnover and surface rugosity, and hydraulic activities and porewater bioadvection. Integrative metrics of ecosystem function in some cases differentiate among the systems (gross primary production) and in others do not (photosynthetic efficiency). Analyses based on behaviors and activities revealed important ecosystem functional differences and can dramatically improve our ability to model the impact of stressors on ecosystem and global processes. PMID:27230562

  1. Same pattern, different mechanism: Locking onto the role of key species in seafloor ecosystem process.

    PubMed

    Woodin, Sarah Ann; Volkenborn, Nils; Pilditch, Conrad A; Lohrer, Andrew M; Wethey, David S; Hewitt, Judi E; Thrush, Simon F

    2016-05-27

    Seafloor biodiversity is a key mediator of ecosystem functioning, but its role is often excluded from global budgets or simplified to black boxes in models. New techniques allow quantification of the behavior of animals living below the sediment surface and assessment of the ecosystem consequences of complex interactions, yielding a better understanding of the role of seafloor animals in affecting key processes like primary productivity. Combining predictions based on natural history, behavior of key benthic species and environmental context allow assessment of differences in functioning and process, even when the measured ecosystem property in different systems is similar. Data from three sedimentary systems in New Zealand illustrate this. Analysis of the behaviors of the infaunal ecosystem engineers in each system revealed three very different mechanisms driving ecosystem function: density and excretion, sediment turnover and surface rugosity, and hydraulic activities and porewater bioadvection. Integrative metrics of ecosystem function in some cases differentiate among the systems (gross primary production) and in others do not (photosynthetic efficiency). Analyses based on behaviors and activities revealed important ecosystem functional differences and can dramatically improve our ability to model the impact of stressors on ecosystem and global processes.

  2. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    NASA Astrophysics Data System (ADS)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  3. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    NASA Astrophysics Data System (ADS)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  4. Tight finite-key analysis for quantum cryptography

    PubMed Central

    Tomamichel, Marco; Lim, Charles Ci Wen; Gisin, Nicolas; Renner, Renato

    2012-01-01

    Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously established. One significant problem is that the security of the final key strongly depends on the number, M, of signals exchanged between the legitimate parties. Yet, existing security proofs are often only valid asymptotically, for unrealistically large values of M. Another challenge is that most security proofs are very sensitive to small differences between the physical devices used by the protocol and the theoretical model used to describe them. Here we show that these gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies. PMID:22252558

  5. Tight finite-key analysis for quantum cryptography.

    PubMed

    Tomamichel, Marco; Lim, Charles Ci Wen; Gisin, Nicolas; Renner, Renato

    2012-01-17

    Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously established. One significant problem is that the security of the final key strongly depends on the number, M, of signals exchanged between the legitimate parties. Yet, existing security proofs are often only valid asymptotically, for unrealistically large values of M. Another challenge is that most security proofs are very sensitive to small differences between the physical devices used by the protocol and the theoretical model used to describe them. Here we show that these gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies.

  6. Public key infrastructure for DOE security research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aiken, R.; Foster, I.; Johnston, W.E.

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-keymore » infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.« less

  7. [Key informers. When and How?].

    PubMed

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  8. KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer on Smartphones

    DTIC Science & Technology

    2011-05-01

    format data to exchange because contact information can be exported to V- Cards using existing APIs. For these reasons it was chosen as the medium to... Card format allows customization of this field. The service provider field serves to identify the app the key is for and the username field stores the...public key data. A sample V- Card field looks like Listing 1 below. IMPP;TextSecure

  9. Target Organ Metabolism, Toxicity, and Mechanisms of Trichloroethylene and Perchloroethylene: Key Similarities, Differences, and Data Gaps

    PubMed Central

    Cichocki, Joseph A.; Guyton, Kathryn Z.; Guha, Neela; Chiu, Weihsueh A.

    2016-01-01

    Trichloroethylene (TCE) and perchloroethylene or tetrachloroethylene (PCE) are high–production volume chemicals with numerous industrial applications. As a consequence of their widespread use, these chemicals are ubiquitous environmental contaminants to which the general population is commonly exposed. It is widely assumed that TCE and PCE are toxicologically similar; both are simple olefins with three (TCE) or four (PCE) chlorines. Nonetheless, despite decades of research on the adverse health effects of TCE or PCE, few studies have directly compared these two toxicants. Although the metabolic pathways are qualitatively similar, quantitative differences in the flux and yield of metabolites exist. Recent human health assessments have uncovered some overlap in target organs that are affected by exposure to TCE or PCE, and divergent species- and sex-specificity with regard to cancer and noncancer hazards. The objective of this minireview is to highlight key similarities, differences, and data gaps in target organ metabolism and mechanism of toxicity. The main anticipated outcome of this review is to encourage research to 1) directly compare the responses to TCE and PCE using more sensitive biochemical techniques and robust statistical comparisons; 2) more closely examine interindividual variability in the relationship between toxicokinetics and toxicodynamics for TCE and PCE; 3) elucidate the effect of coexposure to these two toxicants; and 4) explore new mechanisms for target organ toxicity associated with TCE and/or PCE exposure. PMID:27511820

  10. Multi-party quantum key agreement protocol secure against collusion attacks

    NASA Astrophysics Data System (ADS)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  11. Neurogenesis in the Developing and Adult Brain—Similarities and Key Differences

    PubMed Central

    Götz, Magdalena; Nakafuku, Masato; Petrik, David

    2017-01-01

    Adult neurogenesis in the mammalian brain is often viewed as a continuation of neurogenesis at earlier, developmental stages. Here, we will critically review the extent to which this is the case highlighting similarities as well as key differences. Although many transcriptional regulators are shared in neurogenesis at embryonic and adult stages, recent findings on the molecular mechanisms by which these neuronal fate determinants control fate acquisition and maintenance have revealed profound differences between development and adulthood. Importantly, adult neurogenesis occurs in a gliogenic environment, hence requiring adult-specific additional and unique mechanisms of neuronal fate specification and maintenance. Thus, a better understanding of the molecular logic for continuous adult neurogenesis provides important clues to develop strategies to manipulate endogenous stem cells for the purpose of repair. PMID:27235475

  12. Target Organ Metabolism, Toxicity, and Mechanisms of Trichloroethylene and Perchloroethylene: Key Similarities, Differences, and Data Gaps.

    PubMed

    Cichocki, Joseph A; Guyton, Kathryn Z; Guha, Neela; Chiu, Weihsueh A; Rusyn, Ivan; Lash, Lawrence H

    2016-10-01

    Trichloroethylene (TCE) and perchloroethylene or tetrachloroethylene (PCE) are high-production volume chemicals with numerous industrial applications. As a consequence of their widespread use, these chemicals are ubiquitous environmental contaminants to which the general population is commonly exposed. It is widely assumed that TCE and PCE are toxicologically similar; both are simple olefins with three (TCE) or four (PCE) chlorines. Nonetheless, despite decades of research on the adverse health effects of TCE or PCE, few studies have directly compared these two toxicants. Although the metabolic pathways are qualitatively similar, quantitative differences in the flux and yield of metabolites exist. Recent human health assessments have uncovered some overlap in target organs that are affected by exposure to TCE or PCE, and divergent species- and sex-specificity with regard to cancer and noncancer hazards. The objective of this minireview is to highlight key similarities, differences, and data gaps in target organ metabolism and mechanism of toxicity. The main anticipated outcome of this review is to encourage research to 1) directly compare the responses to TCE and PCE using more sensitive biochemical techniques and robust statistical comparisons; 2) more closely examine interindividual variability in the relationship between toxicokinetics and toxicodynamics for TCE and PCE; 3) elucidate the effect of coexposure to these two toxicants; and 4) explore new mechanisms for target organ toxicity associated with TCE and/or PCE exposure. Copyright © 2016 by The American Society for Pharmacology and Experimental Therapeutics.

  13. No regularity singularities exist at points of general relativistic shock wave interaction between shocks from different characteristic families.

    PubMed

    Reintjes, Moritz; Temple, Blake

    2015-05-08

    We give a constructive proof that coordinate transformations exist which raise the regularity of the gravitational metric tensor from C 0,1 to C 1,1 in a neighbourhood of points of shock wave collision in general relativity. The proof applies to collisions between shock waves coming from different characteristic families, in spherically symmetric spacetimes. Our result here implies that spacetime is locally inertial and corrects an error in our earlier Proc. R. Soc. A publication, which led us to the false conclusion that such coordinate transformations, which smooth the metric to C 1,1 , cannot exist. Thus, our result implies that regularity singularities (a type of mild singularity introduced in our Proc. R. Soc. A paper) do not exist at points of interacting shock waves from different families in spherically symmetric spacetimes. Our result generalizes Israel's celebrated 1966 paper to the case of such shock wave interactions but our proof strategy differs fundamentally from that used by Israel and is an extension of the strategy outlined in our original Proc. R. Soc. A publication. Whether regularity singularities exist in more complicated shock wave solutions of the Einstein-Euler equations remains open.

  14. No regularity singularities exist at points of general relativistic shock wave interaction between shocks from different characteristic families

    PubMed Central

    Reintjes, Moritz; Temple, Blake

    2015-01-01

    We give a constructive proof that coordinate transformations exist which raise the regularity of the gravitational metric tensor from C0,1 to C1,1 in a neighbourhood of points of shock wave collision in general relativity. The proof applies to collisions between shock waves coming from different characteristic families, in spherically symmetric spacetimes. Our result here implies that spacetime is locally inertial and corrects an error in our earlier Proc. R. Soc. A publication, which led us to the false conclusion that such coordinate transformations, which smooth the metric to C1,1, cannot exist. Thus, our result implies that regularity singularities (a type of mild singularity introduced in our Proc. R. Soc. A paper) do not exist at points of interacting shock waves from different families in spherically symmetric spacetimes. Our result generalizes Israel's celebrated 1966 paper to the case of such shock wave interactions but our proof strategy differs fundamentally from that used by Israel and is an extension of the strategy outlined in our original Proc. R. Soc. A publication. Whether regularity singularities exist in more complicated shock wave solutions of the Einstein–Euler equations remains open. PMID:27547092

  15. Multiparty quantum key agreement protocol based on locally indistinguishable orthogonal product states

    NASA Astrophysics Data System (ADS)

    Jiang, Dong-Huan; Xu, Guang-Bao

    2018-07-01

    Based on locally indistinguishable orthogonal product states, we propose a novel multiparty quantum key agreement (QKA) protocol. In this protocol, the private key information of each party is encoded as some orthogonal product states that cannot be perfectly distinguished by local operations and classical communications. To ensure the security of the protocol with small amount of decoy particles, the different particles of each product state are transmitted separately. This protocol not only can make each participant fairly negotiate a shared key, but also can avoid information leakage in the maximum extent. We give a detailed security proof of this protocol. From comparison result with the existing QKA protocols, we can know that the new protocol is more efficient.

  16. An application of different dioids in public key cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Durcheva, Mariana I., E-mail: mdurcheva66@gmail.com

    2014-11-18

    Dioids provide a natural framework for analyzing a broad class of discrete event dynamical systems such as the design and analysis of bus and railway timetables, scheduling of high-throughput industrial processes, solution of combinatorial optimization problems, the analysis and improvement of flow systems in communication networks. They have appeared in several branches of mathematics such as functional analysis, optimization, stochastic systems and dynamic programming, tropical geometry, fuzzy logic. In this paper we show how to involve dioids in public key cryptography. The main goal is to create key – exchange protocols based on dioids. Additionally the digital signature scheme ismore » presented.« less

  17. Efficient multiparty quantum key agreement with collective detection.

    PubMed

    Huang, Wei; Su, Qi; Liu, Bin; He, Yuan-Hang; Fan, Fan; Xu, Bing-Jie

    2017-11-10

    As a burgeoning branch of quantum cryptography, quantum key agreement is a kind of key establishing processes where the security and fairness of the established common key should be guaranteed simultaneously. However, the difficulty on designing a qualified quantum key agreement protocol increases significantly with the increase of the number of the involved participants. Thus far, only few of the existing multiparty quantum key agreement (MQKA) protocols can really achieve security and fairness. Nevertheless, these qualified MQKA protocols are either too inefficient or too impractical. In this paper, an MQKA protocol is proposed with single photons in travelling mode. Since only one eavesdropping detection is needed in the proposed protocol, the qubit efficiency and measurement efficiency of it are higher than those of the existing ones in theory. Compared with the protocols which make use of the entangled states or multi-particle measurements, the proposed protocol is more feasible with the current technologies. Security and fairness analysis shows that the proposed protocol is not only immune to the attacks from external eavesdroppers, but also free from the attacks from internal betrayers.

  18. Entropy driven key-lock assembly.

    PubMed

    Odriozola, G; Jiménez-Angeles, F; Lozada-Cassou, M

    2008-09-21

    The effective interaction between a sphere with an open cavity (lock) and a spherical macroparticle (key), both immersed in a hard sphere fluid, is studied by means of Monte Carlo simulations. As a result, a two-dimensional map of the key-lock effective interaction potential is constructed, which leads to the proposal of a self-assembling mechanism: There exists trajectories through which the key-lock pair could assemble avoiding trespassing potential barriers. Hence, solely the entropic contribution can induce their self-assembling even in the absence of attractive forces. This study points out the solvent contribution within the underlying mechanisms of substrate-protein assemblydisassembly processes, which are important steps of the enzyme catalysis and protein mediated transport.

  19. Entropy driven key-lock assembly

    NASA Astrophysics Data System (ADS)

    Odriozola, G.; Jiménez-Ángeles, F.; Lozada-Cassou, M.

    2008-09-01

    The effective interaction between a sphere with an open cavity (lock) and a spherical macroparticle (key), both immersed in a hard sphere fluid, is studied by means of Monte Carlo simulations. As a result, a two-dimensional map of the key-lock effective interaction potential is constructed, which leads to the proposal of a self-assembling mechanism: There exists trajectories through which the key-lock pair could assemble avoiding trespassing potential barriers. Hence, solely the entropic contribution can induce their self-assembling even in the absence of attractive forces. This study points out the solvent contribution within the underlying mechanisms of substrate-protein assembly/disassembly processes, which are important steps of the enzyme catalysis and protein mediated transport.

  20. Performance of device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Cao, Zhu; Zhao, Qi; Ma, Xiongfeng

    2016-07-01

    Quantum key distribution provides information-theoretically-secure communication. In practice, device imperfections may jeopardise the system security. Device-independent quantum key distribution solves this problem by providing secure keys even when the quantum devices are untrusted and uncharacterized. Following a recent security proof of the device-independent quantum key distribution, we improve the key rate by tightening the parameter choice in the security proof. In practice where the system is lossy, we further improve the key rate by taking into account the loss position information. From our numerical simulation, our method can outperform existing results. Meanwhile, we outline clear experimental requirements for implementing device-independent quantum key distribution. The maximal tolerable error rate is 1.6%, the minimal required transmittance is 97.3%, and the minimal required visibility is 96.8 % .

  1. Gender differences exist in the hip joint moments of healthy older walkers.

    PubMed

    Boyer, Katherine A; Beaupre, Gary S; Andriacchi, Thomas P

    2008-12-05

    Gender differences in the incidence of symptomatic hip osteoarthritis (OA), changes in hip cartilage volume and hip joint space and rates hip arthroplasty of older people are reported in the literature. As the rate of progression of OA is in part mechanically modulated it is possible that this gender bias may be related to inherent differences (if they exist) in walking mechanics between older males and females. The purpose of this study was to examine potential mechanisms for gender differences in hip joint mechanics during walking by testing the hypotheses that females would exhibit higher hip flexion, adduction and internal rotation moments but not significantly greater normalized ground reaction forces (GRFs). Forty-two healthy subjects (21 male, 21 female), ages 50-79yr were recruited for gait analysis. In support of the hypotheses, greater external hip adduction and internal rotation along with hip extension moments were found for females compared to males after normalizing for body size for all self-selected walking speeds. Differences in walking style (kinematics) were the main determinants in the joint kinetic differences as no differences in the normalized GRFs were found. As external joint moments are surrogate measures of the joint contact forces, the results of this study suggest the hip joint stress for the female population is higher compared to male population. This is in favor of a hypothesis that the increased joint contact stress in a female population could contribute to a greater joint degeneration at the hip in females as compared with males.

  2. A broadcast-based key agreement scheme using set reconciliation for wireless body area networks.

    PubMed

    Ali, Aftab; Khan, Farrukh Aslam

    2014-05-01

    Information and communication technologies have thrived over the last few years. Healthcare systems have also benefited from this progression. A wireless body area network (WBAN) consists of small, low-power sensors used to monitor human physiological values remotely, which enables physicians to remotely monitor the health of patients. Communication security in WBANs is essential because it involves human physiological data. Key agreement and authentication are the primary issues in the security of WBANs. To agree upon a common key, the nodes exchange information with each other using wireless communication. This information exchange process must be secure enough or the information exchange should be minimized to a certain level so that if information leak occurs, it does not affect the overall system. Most of the existing solutions for this problem exchange too much information for the sake of key agreement; getting this information is sufficient for an attacker to reproduce the key. Set reconciliation is a technique used to reconcile two similar sets held by two different hosts with minimal communication complexity. This paper presents a broadcast-based key agreement scheme using set reconciliation for secure communication in WBANs. The proposed scheme allows the neighboring nodes to agree upon a common key with the personal server (PS), generated from the electrocardiogram (EKG) feature set of the host body. Minimal information is exchanged in a broadcast manner, and even if every node is missing a different subset, by reconciling these feature sets, the whole network will still agree upon a single common key. Because of the limited information exchange, if an attacker gets the information in any way, he/she will not be able to reproduce the key. The proposed scheme mitigates replay, selective forwarding, and denial of service attacks using a challenge-response authentication mechanism. The simulation results show that the proposed scheme has a great deal of

  3. Experimental quantum key distribution with source flaws

    NASA Astrophysics Data System (ADS)

    Xu, Feihu; Wei, Kejin; Sajeed, Shihan; Kaiser, Sarah; Sun, Shihai; Tang, Zhiyuan; Qian, Li; Makarov, Vadim; Lo, Hoi-Kwong

    2015-09-01

    Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be proven to be secure in practice. Here, we perform an experiment that shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments, and our theory can be applied to general discrete-variable QKD systems. These features constitute a step towards secure QKD with imperfect devices.

  4. Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management

    NASA Astrophysics Data System (ADS)

    Sridevi, B.; Sivaranjani, S.; Rajaram, S.

    2013-01-01

    In all walks of life the way of communication is transformed by the rapid growth of wireless communication and its pervasive use. A wireless network which is fixed and richer in bandwidth is specified as IEEE 802.16, promoted and launched by an industrial forum is termed as Worldwide Interoperability for Microwave Access (WiMAX). This technology enables seamless delivery of wireless broadband service for fixed and/or mobile users. The obscurity is the long delay which occurs during the handoff management in every network. Mobile WiMAX employs an authenticated key management protocol as a part of handoff management in which the Base Station (BS) controls the distribution of keying material to the Mobile Station (MS). The protocol employed is Privacy Key Management Version 2- Extensible Authentication Protocol (PKMV2-EAP) which is responsible for the normal and periodical authorization of MSs, reauthorization as well as key refreshing. Authorization key (AK) and Traffic Encryption key (TEK) plays a vital role in key exchange. When the lifetime of key expires, MS has to request for a new key to BS which in turn leads to repetition of authorization, authentication as well as key exchange. To avoid service interruption during reauthorization , two active keys are transmitted at the same time by BS to MS. The consequences of existing work are hefty amount of bandwidth utilization, time consumption and large storage. It is also endured by Man in the Middle attack and Impersonation due to lack of security in key exchange. This paper designs an automatic mutual refreshing of keys to minimize bandwidth utilization, key storage and time consumption by proposing Previous key and Iteration based Key Refreshing Function (PKIBKRF). By integrating PKIBKRF in key generation, the simulation results indicate that 21.8% of the bandwidth and storage of keys are reduced and PKMV2 mutual authentication time is reduced by 66.67%. The proposed work is simulated with Qualnet model and

  5. Non-resonant electromagnetic energy harvester for car-key applications

    NASA Astrophysics Data System (ADS)

    Li, X.; Hehn, T.; Thewes, M.; Kuehne, I.; Frey, A.; Scholl, G.; Manoli, Y.

    2013-12-01

    This paper presents a novel non-resonant electromagnetic energy harvester for application in a remote car-key, to extend the lifetime of the battery or even to realize a fully energy autonomous, maintenance-free car-key product. Characteristic for a car-key are low frequency and large amplitude motions during normal daily operation. The basic idea of this non-resonant generator is to use a round flat permanent magnet moving freely in a round flat cavity, which is packaged on both sides by printed circuit boards embedded with multi-layer copper coils. The primary goal of this structure is to easily integrate the energy harvester with the existing electrical circuit module into available commercial car-key designs. The whole size of the energy harvester is comparable to a CR2032 coin battery. To find out the best power-efficient and optimal design, several magnets with different dimensions and magnetizations, and various layouts of copper coils were analysed and built up for prototype testing. Experimental results show that with an axially magnetized NdFeB magnet and copper coils of design variant B a maximum open circuit voltage of 1.1V can be observed.

  6. Measurement-device-independent semiquantum key distribution

    NASA Astrophysics Data System (ADS)

    He, Jinjun; Li, Qin; Wu, Chunhui; Chan, Wai Hong; Zhang, Shengyu

    Semiquantum key distribution (SQKD) allows two parties to share a common string when one of them is quantum and the other has rather limited quantum capability. Almost all existing SQKD protocols have been proved to be robust in theory, namely that if an eavesdropper tries to gain information, he will inevitably induce some detectable errors. However, ideal devices do not exist in reality and their imperfection may result in side-channel attacks, which can be used by an adversary to get some information on the secret key string. In this paper, we design a measurement-device-independent SQKD protocol for the first time, which can remove the threat of all detector side-channel attacks and show that it is also robust. In addition, we discuss the possible use of the proposed protocol in real-world applications and in QKD networks.

  7. Counterfactual Quantum Deterministic Key Distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wang, Jian; Tang, Chao-Jing

    2013-01-01

    We propose a new counterfactual quantum cryptography protocol concerning about distributing a deterministic key. By adding a controlled blocking operation module to the original protocol [T.G. Noh, Phys. Rev. Lett. 103 (2009) 230501], the correlation between the polarizations of the two parties, Alice and Bob, is extended, therefore, one can distribute both deterministic keys and random ones using our protocol. We have also given a simple proof of the security of our protocol using the technique we ever applied to the original protocol. Most importantly, our analysis produces a bound tighter than the existing ones.

  8. Enhanced diffie-hellman algorithm for reliable key exchange

    NASA Astrophysics Data System (ADS)

    Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj

    2017-11-01

    The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.

  9. The distinction between key ideas in teaching school physics and key ideas in the discipline of physics

    NASA Astrophysics Data System (ADS)

    Deng, Zongyi

    2001-05-01

    The distinction between key ideas in teaching a high school science and key ideas in the corresponding discipline of science has been largely ignored in scholarly discourse about what science teachers should teach and about what they should know. This article clarifies this distinction through exploring how and why key ideas in teaching high school physics differ from key ideas in the discipline of physics. Its theoretical underpinnings include Dewey's (1902/1990) distinction between the psychological and the logical and Harré's (1986) epistemology of science. It analyzes how and why the key ideas in teaching color, the speed of light, and light interference at the high school level differ from the key ideas at the disciplinary level. The thesis is that key ideas in teaching high school physics can differ from key ideas in the discipline in some significant ways, and that the differences manifest Dewey's distinction. As a result, the article challenges the assumption of equating key ideas in teaching a high school science with key ideas in the corresponding discipline of science, and the assumption that having a college degree in science is sufficient to teach high school science. Furthermore, the article expands the concept of pedagogical content knowledge by arguing that key ideas in teaching high school physics constitute an essential component.

  10. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  11. Pre-existing differences in motivation for food and sensitivity to cocaine-induced locomotion in obesity-prone rats.

    PubMed

    Vollbrecht, Peter J; Nobile, Cameron W; Chadderdon, Aaron M; Jutkiewicz, Emily M; Ferrario, Carrie R

    2015-12-01

    Obesity is a significant problem in the United States, with roughly one third of adults having a body mass index (BMI) over thirty. Recent evidence from human studies suggests that pre-existing differences in the function of mesolimbic circuits that mediate motivational processes may promote obesity and hamper weight loss. However, few preclinical studies have examined pre-existing neurobehavioral differences related to the function of mesolimbic systems in models of individual susceptibility to obesity. Here, we used selectively bred obesity-prone and obesity-resistant rats to examine 1) the effect of a novel "junk-food" diet on the development of obesity and metabolic dysfunction, 2) over-consumption of "junk-food" in a free access procedure, 3) motivation for food using instrumental procedures, and 4) cocaine-induced locomotor activity as an index of general mesolimbic function. As expected, eating a sugary, fatty, "junk-food" diet exacerbated weight gain and increased fasted insulin levels only in obesity-prone rats. In addition, obesity-prone rats continued to over-consume junk-food during discrete access testing, even when this same food was freely available in the home cage. Furthermore, when asked to press a lever to obtain food in an instrumental task, rates of responding were enhanced in obesity-prone versus obesity-resistant rats. Finally, obesity-prone rats showed a stronger locomotor response to 15 mg/kg cocaine compared to obesity-resistant rats prior to any diet manipulation. This enhanced sensitivity to this dose of cocaine is indicative of basal differences in the function of mesolimbic circuits in obesity-prone rats. We speculate that pre-existing differences in motivational systems may contribute to over-consumption and enhanced motivation in susceptible individuals. Copyright © 2015 Elsevier Inc. All rights reserved.

  12. Pre-existing differences in motivation for food and sensitivity to cocaine-induced locomotion in obesity-prone rats

    PubMed Central

    Vollbrecht, Peter J.; Nobile, Cameron W.; Chadderdon, Aaron M.; Jutkiewicz, Emily M.; Ferrario, Carrie R.

    2015-01-01

    Obesity is a significant problem in the United States, with roughly one third of adults having a body mass index (BMI) over thirty. Recent evidence from human studies suggests that pre-existing differences in the function of mesolimbic circuits that mediate motivational processes may promote obesity and hamper weight loss. However, few preclinical studies have examined pre-existing neurobehavioral differences related to the function of mesolimbic systems in models of individual susceptibility to obesity. Here, we used selectively bred obesity-prone and obesity-resistant rats to examine 1) the effect of a novel “junk-food” diet on the development of obesity and metabolic dysfunction, 2) over-consumption of “junk-food” in a free access procedure, 3) motivation for food using instrumental procedures, and 4) cocaine-induced locomotor activity as an index of general mesolimbic function. As expected, eating a sugary, fatty, “junk-food” diet exacerbated weight gain and increased fasted insulin levels only in obesity-prone rats. In addition, obesity-prone rats continued to over-consume junk-food during discrete access testing, even when this same food was freely available in the home cage. Furthermore, when asked to press a lever to obtain food in an instrumental task, rates of responding were enhanced in obesity-prone versus obesity-resistant rats. Finally, obesity-prone rats showed a stronger locomotor response to 15 mg/kg cocaine compared to obesity-resistant rats prior to any diet manipulation. This enhanced sensitivity to this dose of cocaine is indicative of basal differences in the function of mesolimbic circuits in obesity-prone rats. We speculate that pre-existing differences in motivational systems may contribute to over-consumption and enhanced motivation in susceptible individuals. PMID:26423787

  13. Bound entangled states with a private key and their classical counterpart.

    PubMed

    Ozols, Maris; Smith, Graeme; Smolin, John A

    2014-03-21

    Entanglement is a fundamental resource for quantum information processing. In its pure form, it allows quantum teleportation and sharing classical secrets. Realistic quantum states are noisy and their usefulness is only partially understood. Bound-entangled states are central to this question--they have no distillable entanglement, yet sometimes still have a private classical key. We present a construction of bound-entangled states with a private key based on classical probability distributions. From this emerge states possessing a new classical analogue of bound entanglement, distinct from the long-sought bound information. We also find states of smaller dimensions and higher key rates than previously known. Our construction has implications for classical cryptography: we show that existing protocols are insufficient for extracting private key from our distributions due to their "bound-entangled" nature. We propose a simple extension of existing protocols that can extract a key from them.

  14. What is health systems responsiveness? Review of existing knowledge and proposed conceptual framework.

    PubMed

    Mirzoev, Tolib; Kane, Sumit

    2017-01-01

    Responsiveness is a key objective of national health systems. Responsive health systems anticipate and adapt to existing and future health needs, thus contributing to better health outcomes. Of all the health systems objectives, responsiveness is the least studied, which perhaps reflects lack of comprehensive frameworks that go beyond the normative characteristics of responsive services. This paper contributes to a growing, yet limited, knowledge on this topic. Herewith, we review the current frameworks for understanding health systems responsiveness and drawing on these, as well as key frameworks from the wider public services literature, propose a comprehensive conceptual framework for health systems responsiveness. This paper should be of interest to different stakeholders who are engaged in analysing and improving health systems responsiveness. Our review shows that existing knowledge on health systems responsiveness can be extended along the three areas. First, responsiveness entails an actual experience of people's interaction with their health system, which confirms or disconfirms their initial expectations of the system. Second, the experience of interaction is shaped by both the people and the health systems sides of this interaction. Third, different influences shape people's interaction with their health system, ultimately affecting their resultant experiences. Therefore, recognition of both people and health systems sides of interaction and their key determinants would enhance the conceptualisations of responsiveness. Our proposed framework builds on, and advances, the core frameworks in the health systems literature. It positions the experience of interaction between people and health system as the centrepiece and recognises the determinants of responsiveness experience both from the health systems (eg, actors, processes) and the people (eg, initial expectations) sides. While we hope to trigger further thinking on the conceptualisation of health system

  15. What is health systems responsiveness? Review of existing knowledge and proposed conceptual framework

    PubMed Central

    Mirzoev, Tolib; Kane, Sumit

    2017-01-01

    Responsiveness is a key objective of national health systems. Responsive health systems anticipate and adapt to existing and future health needs, thus contributing to better health outcomes. Of all the health systems objectives, responsiveness is the least studied, which perhaps reflects lack of comprehensive frameworks that go beyond the normative characteristics of responsive services. This paper contributes to a growing, yet limited, knowledge on this topic. Herewith, we review the current frameworks for understanding health systems responsiveness and drawing on these, as well as key frameworks from the wider public services literature, propose a comprehensive conceptual framework for health systems responsiveness. This paper should be of interest to different stakeholders who are engaged in analysing and improving health systems responsiveness. Our review shows that existing knowledge on health systems responsiveness can be extended along the three areas. First, responsiveness entails an actual experience of people’s interaction with their health system, which confirms or disconfirms their initial expectations of the system. Second, the experience of interaction is shaped by both the people and the health systems sides of this interaction. Third, different influences shape people’s interaction with their health system, ultimately affecting their resultant experiences. Therefore, recognition of both people and health systems sides of interaction and their key determinants would enhance the conceptualisations of responsiveness. Our proposed framework builds on, and advances, the core frameworks in the health systems literature. It positions the experience of interaction between people and health system as the centrepiece and recognises the determinants of responsiveness experience both from the health systems (eg, actors, processes) and the people (eg, initial expectations) sides. While we hope to trigger further thinking on the conceptualisation of health

  16. Multi-bit wavelength coding phase-shift-keying optical steganography based on amplified spontaneous emission noise

    NASA Astrophysics Data System (ADS)

    Wang, Cheng; Wang, Hongxiang; Ji, Yuefeng

    2018-01-01

    In this paper, a multi-bit wavelength coding phase-shift-keying (PSK) optical steganography method is proposed based on amplified spontaneous emission noise and wavelength selection switch. In this scheme, the assignment codes and the delay length differences provide a large two-dimensional key space. A 2-bit wavelength coding PSK system is simulated to show the efficiency of our proposed method. The simulated results demonstrate that the stealth signal after encoded and modulated is well-hidden in both time and spectral domains, under the public channel and noise existing in the system. Besides, even the principle of this scheme and the existence of stealth channel are known to the eavesdropper, the probability of recovering the stealth data is less than 0.02 if the key is unknown. Thus it can protect the security of stealth channel more effectively. Furthermore, the stealth channel will results in 0.48 dB power penalty to the public channel at 1 × 10-9 bit error rate, and the public channel will have no influence on the receiving of the stealth channel.

  17. Finite key analysis for symmetric attacks in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias

    2006-10-15

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less

  18. Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes

    NASA Astrophysics Data System (ADS)

    Tavallaei, Saeed Ebadi; Falahati, Abolfazl

    Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as "key escrow" in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.

  19. Commonalities and differences in the implementation of models of care for arthritis: key informant interviews from Canada.

    PubMed

    Cott, Cheryl A; Davis, Aileen M; Badley, Elizabeth M; Wong, Rosalind; Canizares, Mayilee; Li, Linda C; Jones, Allyson; Brooks, Sydney; Ahlwalia, Vandana; Hawker, Gillian; Jaglal, Susan; Landry, Michel; MacKay, Crystal; Mosher, Dianne

    2016-08-19

    Timely access to effective treatments for arthritis is a priority at national, provincial and regional levels in Canada due to population aging coupled with limited health human resources. Models of care for arthritis are being implemented across the country but mainly in local contexts, not from an evidence-informed policy or framework. The purpose of this study is to examine existing models of care for arthritis in Canada at the local level in order to identify commonalities and differences in their implementation that could point to important considerations for health policy and service delivery. Semi-structured key informant interviews were conducted with 70 program managers and/or care providers in three Canadian provinces identified through purposive and snowball sampling followed by more detailed examination of 6 models of care (two per province). Interviews were transcribed verbatim and analyzed thematically using a qualitative descriptive approach. Two broad models of care were identified for Total Joint Replacement and Inflammatory Arthritis. Commonalities included lack of complete and appropriate referrals from primary care physicians and lack of health human resources to meet local demands. Strategies included standardized referrals and centralized intake and triage using non-specialist health care professionals. Differences included the nature of the care and follow-up, the role of the specialist, and location of service delivery. Current models of care are mainly focused on Total Joint Replacement and Inflammatory Arthritis. Given the increasing prevalence of arthritis and that published data report only a small proportion of current service delivery is specialist care; provision of timely, appropriate care requires development, implementation and evaluation of models of care across the continuum of care.

  20. A Key Challenge in Global HRM: Adding New Insights to Existing Expatriate Spouse Adjustment Models

    ERIC Educational Resources Information Center

    Gupta, Ritu; Banerjee, Pratyush; Gaur, Jighyasu

    2012-01-01

    This study is an attempt to strengthen the existing knowledge about factors affecting the adjustment process of the trailing expatriate spouse and the subsequent impact of any maladjustment or expatriate failure. We conducted a qualitative enquiry using grounded theory methodology with 26 Indian spouses who had to deal with their partner's…

  1. Coherent one-way quantum key distribution

    NASA Astrophysics Data System (ADS)

    Stucki, Damien; Fasel, Sylvain; Gisin, Nicolas; Thoma, Yann; Zbinden, Hugo

    2007-05-01

    Quantum Key Distribution (QKD) consists in the exchange of a secrete key between two distant points [1]. Even if quantum key distribution systems exist and commercial systems are reaching the market [2], there are still improvements to be made: simplify the construction of the system; increase the secret key rate. To this end, we present a new protocol for QKD tailored to work with weak coherent pulses and at high bit rates [3]. The advantages of this system are that the setup is experimentally simple and it is tolerant to reduced interference visibility and to photon number splitting attacks, thus resulting in a high efficiency in terms of distilled secret bits per qubit. After having successfully tested the feasibility of the system [3], we are currently developing a fully integrated and automated prototype within the SECOQC project [4]. We present the latest results using the prototype. We also discuss the issue of the photon detection, which still remains the bottleneck for QKD.

  2. Key considerations in designing a speech brain-computer interface.

    PubMed

    Bocquelet, Florent; Hueber, Thomas; Girin, Laurent; Chabardès, Stéphan; Yvert, Blaise

    2016-11-01

    Restoring communication in case of aphasia is a key challenge for neurotechnologies. To this end, brain-computer strategies can be envisioned to allow artificial speech synthesis from the continuous decoding of neural signals underlying speech imagination. Such speech brain-computer interfaces do not exist yet and their design should consider three key choices that need to be made: the choice of appropriate brain regions to record neural activity from, the choice of an appropriate recording technique, and the choice of a neural decoding scheme in association with an appropriate speech synthesis method. These key considerations are discussed here in light of (1) the current understanding of the functional neuroanatomy of cortical areas underlying overt and covert speech production, (2) the available literature making use of a variety of brain recording techniques to better characterize and address the challenge of decoding cortical speech signals, and (3) the different speech synthesis approaches that can be considered depending on the level of speech representation (phonetic, acoustic or articulatory) envisioned to be decoded at the core of a speech BCI paradigm. Copyright © 2017 The Author(s). Published by Elsevier Ltd.. All rights reserved.

  3. Drug Lag and Key Regulatory Barriers in the Emerging Markets

    PubMed Central

    Wileman, Harriet; Mishra, Arun

    2010-01-01

    There have been numerous investigations targeted at identifying whether a drug lag exists in the mature markets of the US, EU and Japan. This work focuses on the emerging markets because of the potential they hold for the future of the pharmaceutical industry as a consequence of rapid economic and political development. The aims of this work are to ascertain whether a drug lag exists in the emerging markets and how it has changed over time from the 1960s to the 2000s. It will also highlight key regulatory barriers which may contribute to drug lag. The date of the marketing authorisation (MA) approval by the US Food and Drug Administration (FDA) was used as a reference point. A comparison against the company database regarding emerging market specific approval enabled the difference in time and thus the drug lag for that particular market to be calculated. This work concludes that the overall relative drug lag in the emerging markets has decreased over time and that there are seven key regulatory barriers which need to be targeted in order to make further improvements; ‘Western Approval’, local clinical development (LCD), Certificate of Pharmaceutical Product (CPP), Good Manufacturing Practice (GMP), pricing approval, document authentication and harmonisation. PMID:21829782

  4. Iris recognition based on key image feature extraction.

    PubMed

    Ren, X; Tian, Q; Zhang, J; Wu, S; Zeng, Y

    2008-01-01

    In iris recognition, feature extraction can be influenced by factors such as illumination and contrast, and thus the features extracted may be unreliable, which can cause a high rate of false results in iris pattern recognition. In order to obtain stable features, an algorithm was proposed in this paper to extract key features of a pattern from multiple images. The proposed algorithm built an iris feature template by extracting key features and performed iris identity enrolment. Simulation results showed that the selected key features have high recognition accuracy on the CASIA Iris Set, where both contrast and illumination variance exist.

  5. Secret Key Crypto Implementations

    NASA Astrophysics Data System (ADS)

    Bertoni, Guido Marco; Melzani, Filippo

    This chapter presents the algorithm selected in 2001 as the Advanced Encryption Standard. This algorithm is the base for implementing security and privacy based on symmetric key solutions in almost all new applications. Secret key algorithms are used in combination with modes of operation to provide different security properties. The most used modes of operation are presented in this chapter. Finally an overview of the different techniques of software and hardware implementations is given.

  6. Motivational differences between whole blood and plasma donors already exist before their first donation experience.

    PubMed

    Veldhuizen, Ingrid; van Dongen, Anne

    2013-08-01

    The demand for plasma products has increased rapidly. It is therefore important to understand donating behavior by plasma donors. This study investigates whether motivational differences between whole blood and plasma donors already exist at the beginning of a donor career. New donors (n = 4861) were invited to fill out a questionnaire before their first donation (response, 61%). The questionnaire assessed variables from the Theory of Planned Behavior (intention, self-efficacy, attitude, and norms), conscientiousness, and donation anxiety. Three years later it was determined who became whole blood or plasma donor. Multivariable linear regression analyses for intention were fitted separately for whole blood and plasma donors. A logistic regression analysis was executed to estimate the effect of intention at the beginning of a donor career on becoming a plasma donor. Plasma donors had a higher intention, self-efficacy, attitude, and conscientiousness and a lower anxiety than whole blood donors. In plasma and whole blood donors, both self-efficacy and cognitive attitude were positively related to intention but with different strength (plasma, β = 0.47 and β = 0.30; whole blood, β = 0.57 and β = 0.17). Having a high level of intention increased the odds of becoming a plasma donor (odds ratio, 1.33; 95% confidence interval, 1.12-1.59). Motivational differences already exist between future whole blood and plasma donors before their first donation. Although a feeling of self-efficacy is necessary for all new donors, more favorable cognitions are important for future plasma donors. Recruitment strategies for plasma donors should focus on attracting the more self-confident donors by highlighting the usefulness of plasma donation. © 2012 American Association of Blood Banks.

  7. Side-channel-free quantum key distribution.

    PubMed

    Braunstein, Samuel L; Pirandola, Stefano

    2012-03-30

    Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the relevant detectors and settings inside private spaces inaccessible while simultaneously acting as a Hilbert space filter to eliminate side-channel attacks. By using a quantum memory we find that we are able to bound the secret-key rate below by the entanglement-distillation rate computed over the distributed states.

  8. 3D Numerical Modeling of the Propagation of Hydraulic Fracture at Its Intersection with Natural (Pre-existing) Fracture

    NASA Astrophysics Data System (ADS)

    Dehghan, Ali Naghi; Goshtasbi, Kamran; Ahangari, Kaveh; Jin, Yan; Bahmani, Aram

    2017-02-01

    A variety of 3D numerical models were developed based on hydraulic fracture experiments to simulate the propagation of hydraulic fracture at its intersection with natural (pre-existing) fracture. Since the interaction between hydraulic and pre-existing fractures is a key condition that causes complex fracture patterns, the extended finite element method was employed in ABAQUS software to simulate the problem. The propagation of hydraulic fracture in a fractured medium was modeled in two horizontal differential stresses (Δ σ) of 5e6 and 10e6 Pa considering different strike and dip angles of pre-existing fracture. The rate of energy release was calculated in the directions of hydraulic and pre-existing fractures (G_{{frac}} /G_{{rock}}) at their intersection point to determine the fracture behavior. Opening and crossing were two dominant fracture behaviors during the hydraulic and pre-existing fracture interaction at low and high differential stress conditions, respectively. The results of numerical studies were compared with those of experimental models, showing a good agreement between the two to validate the accuracy of the models. Besides the horizontal differential stress, strike and dip angles of the natural (pre-existing) fracture, the key finding of this research was the significant effect of the energy release rate on the propagation behavior of the hydraulic fracture. This effect was more prominent under the influence of strike and dip angles, as well as differential stress. The obtained results can be used to predict and interpret the generation of complex hydraulic fracture patterns in field conditions.

  9. Experimental Measurement-Device-Independent Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S.; Fejer, M. M.; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei

    2013-09-01

    Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.

  10. Experimental measurement-device-independent quantum key distribution.

    PubMed

    Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun; Liang, Hao; Shentu, Guo-Liang; Wang, Jian; Cui, Ke; Yin, Hua-Lei; Liu, Nai-Le; Li, Li; Ma, Xiongfeng; Pelc, Jason S; Fejer, M M; Peng, Cheng-Zhi; Zhang, Qiang; Pan, Jian-Wei

    2013-09-27

    Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50 km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.

  11. Long-distance practical quantum key distribution by entanglement swapping.

    PubMed

    Scherer, Artur; Sanders, Barry C; Tittel, Wolfgang

    2011-02-14

    We develop a model for practical, entanglement-based long-distance quantum key distribution employing entanglement swapping as a key building block. Relying only on existing off-the-shelf technology, we show how to optimize resources so as to maximize secret key distribution rates. The tools comprise lossy transmission links, such as telecom optical fibers or free space, parametric down-conversion sources of entangled photon pairs, and threshold detectors that are inefficient and have dark counts. Our analysis provides the optimal trade-off between detector efficiency and dark counts, which are usually competing, as well as the optimal source brightness that maximizes the secret key rate for specified distances (i.e. loss) between sender and receiver.

  12. Data linkage between existing healthcare databases to support hospital epidemiology.

    PubMed

    García Álvarez, L; Aylin, P; Tian, J; King, C; Catchpole, M; Hassall, S; Whittaker-Axon, K; Holmes, A

    2011-11-01

    Enhancing the use of existing datasets within acute hospitals will greatly facilitate hospital epidemiology, surveillance, the monitoring of a variety of processes, outcomes and risk factors, and the provision of alert systems. Multiple overlapping data systems exist within National Health Service (NHS) hospitals in the UK, and many duplicate data recordings take place because of the lack of linkage and interfaces. This results in hospital-collected data not being used efficiently. The objective was to create an inventory of all existing systems, including administrative, management, human resources, microbiology, patient care and other platforms, to describe the data architecture that could contribute valuable information for a hospital epidemiology unit. These datasets were investigated as to how they could be used to generate surveillance data, key performance indicators and risk information that could be shared at board, clinical programme group, specialty and ward level. An example of an output of this integrated data platform and its application in influenza resilience planning and responsiveness is described. The development of metrics for staff absence and staffing levels may also be used as key indicators for risk-monitoring for infection prevention. This work demonstrates the value of such a data inventory and linkage and the importance of more sophisticated uses of existing NHS data, and innovative collaborative approaches to support clinical care, quality improvement, surveillance, emergency planning and research. Copyright © 2011 The Healthcare Infection Society. All rights reserved.

  13. Experimental quantum key distribution with finite-key security analysis for noisy channels.

    PubMed

    Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo

    2013-01-01

    In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

  14. Key properties of expert movement systems in sport : an ecological dynamics perspective.

    PubMed

    Seifert, Ludovic; Button, Chris; Davids, Keith

    2013-03-01

    This paper identifies key properties of expertise in sport predicated on the performer-environment relationship. Weaknesses of traditional approaches to expert performance, which uniquely focus on the performer and the environment separately, are highlighted by an ecological dynamics perspective. Key properties of expert movement systems include 'multi- and meta-stability', 'adaptive variability', 'redundancy', 'degeneracy' and the 'attunement to affordances'. Empirical research on these expert system properties indicates that skill acquisition does not emerge from the internal representation of declarative and procedural knowledge, or the imitation of expert behaviours to linearly reduce a perceived 'gap' separating movements of beginners and a putative expert model. Rather, expert performance corresponds with the ongoing co-adaptation of an individual's behaviours to dynamically changing, interacting constraints, individually perceived and encountered. The functional role of adaptive movement variability is essential to expert performance in many different sports (involving individuals and teams; ball games and outdoor activities; land and aquatic environments). These key properties signify that, in sport performance, although basic movement patterns need to be acquired by developing athletes, there exists no ideal movement template towards which all learners should aspire, since relatively unique functional movement solutions emerge from the interaction of key constraints.

  15. Multiparty Quantum Key Agreement Based on Quantum Search Algorithm

    PubMed Central

    Cao, Hao; Ma, Wenping

    2017-01-01

    Quantum key agreement is an important topic that the shared key must be negotiated equally by all participants, and any nontrivial subset of participants cannot fully determine the shared key. To date, the embed modes of subkey in all the previously proposed quantum key agreement protocols are based on either BB84 or entangled states. The research of the quantum key agreement protocol based on quantum search algorithms is still blank. In this paper, on the basis of investigating the properties of quantum search algorithms, we propose the first quantum key agreement protocol whose embed mode of subkey is based on a quantum search algorithm known as Grover’s algorithm. A novel example of protocols with 5 – party is presented. The efficiency analysis shows that our protocol is prior to existing MQKA protocols. Furthermore it is secure against both external attack and internal attacks. PMID:28332610

  16. Comparison of key aroma compounds in five different types of Japanese soy sauces by aroma extract dilution analysis (AEDA).

    PubMed

    Kaneko, Shu; Kumazawa, Kenji; Nishimura, Osamu

    2012-04-18

    An investigation by the aroma extract dilution analysis (AEDA) technique of the aroma concentrate from five different types of Japanese soy sauces, categorized according to Japan Agricultural Standards as Koikuchi Shoyu (KS), Usukuchi Shoyu (US), Tamari Shoyu (TS), Sai-Shikomi Shoyu (SSS), and Shiro Shoyu (SS), revealed 25 key aroma compounds. Among them, 3-ethyl-1,2-cyclopentanedione and 2'-aminoacetophenone were identified in the soy sauces for the first time. Whereas 3-(methylthio)propanal (methional) and 3-hydroxy-4,5-dimethyl-2(5H)-furanone (sotolon) were detected in all of the soy sauce aroma concentrates as having high flavor dilution (FD) factors, 4-ethyl-2-methoxyphenol was detected as having a high FD factor in only four of the soy sauces (KS, US, TS, and SSS). Furthermore, 5(or 2)-ethyl-4-hydroxy-2(or 5)-methyl-3(2H)-furanone (4-HEMF) and 4-hydroxy-2,5-dimethyl-3(2H)-furanone (4-HDMF), which were thought to be the key odorants in KS, were detected in KS, US, TS, and SSS, but the FD factors widely varied among them. The sensory evaluations demonstrated that the aroma descriptions of a cooked potato-like note and a caramel-like/seasoning-like note were evaluated as high scores with no significant differences among the five soy sauces. On the other hand, a burnt/spicy note was evaluated as having high scores in KS, TS, and SSS, but it was evaluated as having a low score in SS. The comparative AEDA experiments and the auxiliary sensory experiments demonstrated that the five different types of Japanese soy sauces varied in their key aroma compounds and aroma characteristics, and the key aroma compounds in KS might not always be highly contributing in the other types of Japanese soy sauces.

  17. Novel secret key generation techniques using memristor devices

    NASA Astrophysics Data System (ADS)

    Abunahla, Heba; Shehada, Dina; Yeun, Chan Yeob; Mohammad, Baker; Jaoude, Maguy Abi

    2016-02-01

    This paper proposes novel secret key generation techniques using memristor devices. The approach depends on using the initial profile of a memristor as a master key. In addition, session keys are generated using the master key and other specified parameters. In contrast to existing memristor-based security approaches, the proposed development is cost effective and power efficient since the operation can be achieved with a single device rather than a crossbar structure. An algorithm is suggested and demonstrated using physics based Matlab model. It is shown that the generated keys can have dynamic size which provides perfect security. Moreover, the proposed encryption and decryption technique using the memristor based generated keys outperforms Triple Data Encryption Standard (3DES) and Advanced Encryption Standard (AES) in terms of processing time. This paper is enriched by providing characterization results of a fabricated microscale Al/TiO2/Al memristor prototype in order to prove the concept of the proposed approach and study the impacts of process variations. The work proposed in this paper is a milestone towards System On Chip (SOC) memristor based security.

  18. Initiation of growth hormone therapy in idiopathic short stature: do gender differences exist?

    PubMed

    Ben-Ari, Tal; Lebenthal, Yael; Phillip, Moshe; Lazar, Liora

    2015-01-01

    Growth hormone (GH) registries indicate that boys receive preferential GH treatment for idiopathic short stature (ISS). The aim was to determine whether age, auxological parameters, pubertal status, and target height differ between genders at GH initiation. Review of the computerized files of the endocrine department of a tertiary pediatric medical center identified 184 patients who started GH therapy for ISS between 2003-2011. Data on auxologic parameters, predicted height, parental height, and pubertal status were collected and compared between boys and girls. Boys accounted for a significantly higher percentage of the study group (65.8%, p<0.001). At onset of GH therapy, there were no significant differences between boys and girls in age (10.2±3.1 vs. 9.9±2.4 years), height-standard deviation score (SDS) (-2.64±0.5 vs. -2.79±0.5), body mass index-SDS[(-0.65±1.01) vs. (-0.80±1.13)], or pubertal status (66% vs. 63.5% prepubertal). Predicted height-SDS was significantly higher in boys (-1.95±1.05 vs. -2.56±0.73, p<0.001). Midparental height-SDS was similar in the two groups, as were paternal and maternal height. The similar age, height deficit, and pubertal status at onset of GH treatment in boys and girls suggests that gender differences do not exist. Male predominance may stem from family preferences to treat boys. Future studies are warranted to assess the psychosocial aspects in the decision to initiate therapy.

  19. RSA-Based Password-Authenticated Key Exchange, Revisited

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.

  20. Realizing the measure-device-independent quantum-key-distribution with passive heralded-single photon sources

    PubMed Central

    Wang, Qin; Zhou, Xing-Yu; Guo, Guang-Can

    2016-01-01

    In this paper, we put forward a new approach towards realizing measurement-device-independent quantum key distribution with passive heralded single-photon sources. In this approach, both Alice and Bob prepare the parametric down-conversion source, where the heralding photons are labeled according to different types of clicks from the local detectors, and the heralded ones can correspondingly be marked with different tags at the receiver’s side. Then one can obtain four sets of data through using only one-intensity of pump light by observing different kinds of clicks of local detectors. By employing the newest formulae to do parameter estimation, we could achieve very precise prediction for the two-single-photon pulse contribution. Furthermore, by carrying out corresponding numerical simulations, we compare the new method with other practical schemes of measurement-device-independent quantum key distribution. We demonstrate that our new proposed passive scheme can exhibit remarkable improvement over the conventional three-intensity decoy-state measurement-device-independent quantum key distribution with either heralded single-photon sources or weak coherent sources. Besides, it does not need intensity modulation and can thus diminish source-error defects existing in several other active decoy-state methods. Therefore, if taking intensity modulating errors into account, our new method will show even more brilliant performance. PMID:27759085

  1. Comparative Study of Human and Mouse Postsynaptic Proteomes Finds High Compositional Conservation and Abundance Differences for Key Synaptic Proteins

    PubMed Central

    Bayés, Àlex; Collins, Mark O.; Croning, Mike D. R.; van de Lagemaat, Louie N.; Choudhary, Jyoti S.; Grant, Seth G. N.

    2012-01-01

    Direct comparison of protein components from human and mouse excitatory synapses is important for determining the suitability of mice as models of human brain disease and to understand the evolution of the mammalian brain. The postsynaptic density is a highly complex set of proteins organized into molecular networks that play a central role in behavior and disease. We report the first direct comparison of the proteome of triplicate isolates of mouse and human cortical postsynaptic densities. The mouse postsynaptic density comprised 1556 proteins and the human one 1461. A large compositional overlap was observed; more than 70% of human postsynaptic density proteins were also observed in the mouse postsynaptic density. Quantitative analysis of postsynaptic density components in both species indicates a broadly similar profile of abundance but also shows that there is higher abundance variation between species than within species. Well known components of this synaptic structure are generally more abundant in the mouse postsynaptic density. Significant inter-species abundance differences exist in some families of key postsynaptic density proteins including glutamatergic neurotransmitter receptors and adaptor proteins. Furthermore, we have identified a closely interacting set of molecules enriched in the human postsynaptic density that could be involved in dendrite and spine structural plasticity. Understanding synapse proteome diversity within and between species will be important to further our understanding of brain complexity and disease. PMID:23071613

  2. Pre-existing differences and diet-induced alterations in striatal dopamine systems of obesity-prone rats.

    PubMed

    Vollbrecht, Peter J; Mabrouk, Omar S; Nelson, Andrew D; Kennedy, Robert T; Ferrario, Carrie R

    2016-03-01

    Interactions between pre-existing differences in mesolimbic function and neuroadaptations induced by consumption of fatty, sugary foods are thought to contribute to human obesity. This study examined basal and cocaine-induced changes in striatal neurotransmitter levels without diet manipulation and D2 /D3 dopamine receptor-mediated transmission prior to and after consumption of "junk-foods" in obesity-prone and obesity-resistant rats. Microdialysis and liquid chromatography-mass spectrometry were used to determine basal and cocaine-induced changes in neurotransmitter levels in real time with cocaine-induced locomotor activity. Sensitivity to the D2 /D3 dopamine receptor agonist quinpirole was examined before and after restricted junk-food exposure. Selectively bred obesity-prone and obesity-resistant rats were used. Cocaine-induced locomotion was greater in obesity-prone rats versus obesity-resistant rats prior to diet manipulation. Basal and cocaine-induced increases in dopamine and serotonin levels did not differ. Obesity-prone rats were more sensitive to the D2 receptor-mediated effects of quinpirole, and junk-food produced modest alterations in quinpirole sensitivity in obesity-resistant rats. These data show that mesolimbic systems differ prior to diet manipulation in susceptible versus resistant rats, and that consumption of fatty, sugary foods produce different neuroadaptations in these populations. These differences may contribute to enhanced food craving and an inability to limit food intake in susceptible individuals. © 2016 The Obesity Society.

  3. Data publication and dissemination of interactive keys under the open access model

    USDA-ARS?s Scientific Manuscript database

    The concepts of publication, citation and dissemination of interactive keys and other online keys are discussed and illustrated by a sample paper published in the present issue (doi: 10.3897/zookeys.21.271). The present model is based on previous experience with several existing examples of publishi...

  4. Feasibility of satellite quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bonato, C.; Tomaello, A.; Da Deppo, V.; Naletto, G.; Villoresi, P.

    2009-04-01

    In this paper, we present a novel analysis of the feasibility of quantum key distribution between a LEO satellite and a ground station. First of all, we study signal propagation through a turbulent atmosphere for uplinks and downlinks, discussing the contribution of beam spreading and beam wandering. Then we introduce a model for the background noise of the channel during night-time and day-time, calculating the signal-to-noise ratio for different configurations. We also discuss the expected error-rate due to imperfect polarization compensation in the channel. Finally, we calculate the expected key generation rate of a secure key for different configurations (uplink, downlink) and for different protocols (BB84 with and without decoy states, entanglement-based Ekert91 protocol).

  5. Non-Logical Discourse: Key to the Composing Process?

    ERIC Educational Resources Information Center

    Poulsen, Richard C.

    One niche in which scholars have not looked for keys to the composing process is the sometimes illusory but vital area of nonlogical discourse, which includes fantasy, hallucination, dream, reverie, vision, trance, and meditation. Abundant evidence exists about the genesis, importance, and use of nonlogical discourse, but this evidence comes…

  6. Functional diversity through the mean trait dissimilarity: resolving shortcomings with existing paradigms and algorithms.

    PubMed

    de Bello, Francesco; Carmona, Carlos P; Lepš, Jan; Szava-Kovats, Robert; Pärtel, Meelis

    2016-04-01

    While an increasing number of indices for estimating the functional trait diversity of biological communities are being proposed, there is a growing demand by ecologists to clarify their actual implications and simplify index selection. Several key indices relate to mean trait dissimilarity between species within biological communities. Among them, the most widely used include (a) the mean species pairwise dissimilarity (MPD) and (b) the Rao quadratic entropy (and related indices). These indices are often regarded as redundant and promote the unsubstantiated yet widely held view that Rao is a form of MPD. Worryingly, existing R functions also do not always simplify the use and differentiation of these indices. In this paper, we show various distinctions between these two indices that warrant mathematical and biological consideration. We start by showing an existing form of MPD that considers species abundances and is different from Rao both mathematically and conceptually. We then show that the mathematical relationship between MPD and Rao can be presented simply as Rao = MPD × Simpson, where the Simpson diversity index is defined as 1 - dominance. We further show that this relationship is maintained for both species abundances and presence/absence. This evidence dismantles the paradigm that the Rao diversity is an abundance-weighted form of MPD and indicates that both indices can differ substantially at low species diversities. We discuss the different interpretations of trait diversity patterns in biological communities provided by Rao and MPD and then provide a simple R function, called "melodic," which avoids the unintended results that arise from existing mainstream functions.

  7. NDE: A key to engine rotor life prediction

    NASA Technical Reports Server (NTRS)

    Doherty, J. E.

    1977-01-01

    A key ingredient in the establishment of safe life times for critical components is the means of reliably detecting flaws which may potentially exist. Currently used nondestructive evaluation procedures are successful in detecting life limiting defects; however, the development of automated and computer aided NDE technology permits even greater assurance of flight safety.

  8. Symmetric autocompensating quantum key distribution

    NASA Astrophysics Data System (ADS)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  9. Music performance and the perception of key.

    PubMed

    Thompson, W F; Cuddy, L L

    1997-02-01

    The effect of music performance on perceived key movement was examined. Listeners judged key movement in sequences presented without performance expression (mechanical) in Experiment 1 and with performance expression in Experiment 2. Modulation distance varied. Judgments corresponded to predictions based on the cycle of fifths and toroidal models of key relatedness, with the highest correspondence for performed versions with the toroidal model. In Experiment 3, listeners compared mechanical sequences with either performed sequences or modifications of performed sequences. Modifications preserved expressive differences between chords, but not between voices. Predictions from Experiments 1 and 2 held only for performed sequences, suggesting that differences between voices are informative of key movement. Experiment 4 confirmed that modifications did not disrupt musicality. Analyses of performances further suggested a link between performance expression and key.

  10. State Differences: The Key to Demographics.

    ERIC Educational Resources Information Center

    Hodgkinson, Harold

    1999-01-01

    This companion piece to a 1997 article examines United States demographic trends, such as diversity by age, "race" and U.S. Census racial classifications, wealth, transiency, suburbanization and sprawl, and immigration, focusing on differences among states and metro regions. Nothing, including achievement scores, social services, and…

  11. 77 FR 23425 - Revisions of Boundaries, Regulations and Zoning Scheme for Florida Keys National Marine Sanctuary...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-19

    ... Zoning Scheme for Florida Keys National Marine Sanctuary; Revisions of Fish and Wildlife Service and... Boundaries, Regulations and Zoning Scheme for Florida Keys National Marine Sanctuary and Key West and Great... sanctuary) boundaries, regulations and zoning scheme. This review of existing regulations and marine zoning...

  12. Assessing adaptation to the health risks of climate change: what guidance can existing frameworks provide?

    PubMed

    Füssel, Hans-Martin

    2008-02-01

    Climate change adaptation assessments aim at assisting policy-makers in reducing the health risks associated with climate change and variability. This paper identifies key characteristics of the climate-health relationship and of the adaptation decision problem that require consideration in climate change adaptation assessments. It then analyzes whether these characteristics are appropriately considered in existing guidelines for climate impact and adaptation assessment and in pertinent conceptual models from environmental epidemiology. The review finds three assessment guidelines based on a generalized risk management framework to be most useful for guiding adaptation assessments of human health. Since none of them adequately addresses all key challenges of the adaptation decision problem, actual adaptation assessments need to combine elements from different guidelines. Established conceptual models from environmental epidemiology are found to be of limited relevance for assessing and planning adaptation to climate change since the prevailing toxicological model of environmental health is not applicable to many climate-sensitive health risks.

  13. An assessment of key health indicators among emergency medical services professionals.

    PubMed

    Studnek, Jonathan R; Bentley, Melissa; Crawford, J Mac; Fernandez, Antonio R

    2010-01-01

    Ensuring the health and productivity of emergency medical services (EMS) professionals is important. However, there has been no known national baseline assessment of the health and wellness of EMS professionals in the United States. According to Healthy People 2010, top indicators of personal health include physical activity, body mass index (BMI), and smoking prevalence. The objectives of this study included quantifying existing health conditions and describing key health indicators among EMS professionals. It was hypothesized that work-life characteristics were associated with existing health conditions and key health indicators. Data utilized for this analysis were obtained from a 2007 questionnaire included in biennial national recertification packets. This questionnaire utilized validated items from the Behavioral Risk Factor Surveillance System (BRFSS) and the Longitudinal EMT Attributes and Demographics Study (LEADS). Along with common demographic characteristics, items inquired about existing health conditions (diabetes, asthma, hypertension, myocardial infarction, angina, stroke, and/or high blood cholesterol level), general health, physical activity, and smoking status. Descriptive analyses were performed utilizing chi-square tests, and logistic regression was utilized to describe associations between existing health conditions and the key health indicators. There were 58,435 individuals who became recertified in 2007, with 30,560 (52%) returning questionnaires. Individuals with missing data were removed, leaving 19,960 individual records. There were 4,681 (23.5%) individuals who reported at least one existing health condition. The mean BMI for the study participants was 27.69 kg/m(2). There were 5,742 (28.8%) individuals classified as having normal weight and 5,146 (25.8%) who were obese. The overwhelming majority of individuals did not meet the Centers for Disease Control and Prevention (CDC) recommendations for physical activity (15,022, 75.3%). There

  14. Study of structural reliability of existing concrete structures

    NASA Astrophysics Data System (ADS)

    Druķis, P.; Gaile, L.; Valtere, K.; Pakrastiņš, L.; Goremikins, V.

    2017-10-01

    Structural reliability of buildings has become an important issue after the collapse of a shopping center in Riga 21.11.2013, caused the death of 54 people. The reliability of a building is the practice of designing, constructing, operating, maintaining and removing buildings in ways that ensure maintained health, ward suffered injuries or death due to use of the building. Evaluation and improvement of existing buildings is becoming more and more important. For a large part of existing buildings, the design life has been reached or will be reached in the near future. The structures of these buildings need to be reassessed in order to find out whether the safety requirements are met. The safety requirements provided by the Eurocodes are a starting point for the assessment of safety. However, it would be uneconomical to require all existing buildings and structures to comply fully with these new codes and corresponding safety levels, therefore the assessment of existing buildings differs with each design situation. This case study describes the simple and practical procedure of determination of minimal reliability index β of existing concrete structures designed by different codes than Eurocodes and allows to reassess the actual reliability level of different structural elements of existing buildings under design load.

  15. Understanding Achievement Differences between Schools in Ireland--Can Existing Data-Sets Help?

    ERIC Educational Resources Information Center

    Gilleece, Lorraine

    2014-01-01

    Recent years have seen an increased focus on school accountability in Ireland and calls for greater use to be made of student achievement data for monitoring student outcomes. In this paper, it is argued that existing data-sets in Ireland offer limited potential for the value-added modelling approaches used for accountability purposes in many…

  16. Key Reconciliation for High Performance Quantum Key Distribution

    PubMed Central

    Martinez-Mateo, Jesus; Elkouss, David; Martin, Vicente

    2013-01-01

    Quantum Key Distribution is carving its place among the tools used to secure communications. While a difficult technology, it enjoys benefits that set it apart from the rest, the most prominent is its provable security based on the laws of physics. QKD requires not only the mastering of signals at the quantum level, but also a classical processing to extract a secret-key from them. This postprocessing has been customarily studied in terms of the efficiency, a figure of merit that offers a biased view of the performance of real devices. Here we argue that it is the throughput the significant magnitude in practical QKD, specially in the case of high speed devices, where the differences are more marked, and give some examples contrasting the usual postprocessing schemes with new ones from modern coding theory. A good understanding of its implications is very important for the design of modern QKD devices. PMID:23546440

  17. KeyWare: an open wireless distributed computing environment

    NASA Astrophysics Data System (ADS)

    Shpantzer, Isaac; Schoenfeld, Larry; Grindahl, Merv; Kelman, Vladimir

    1995-12-01

    Deployment of distributed applications in the wireless domain lack equivalent tools, methodologies, architectures, and network management that exist in LAN based applications. A wireless distributed computing environment (KeyWareTM) based on intelligent agents within a multiple client multiple server scheme was developed to resolve this problem. KeyWare renders concurrent application services to wireline and wireless client nodes encapsulated in multiple paradigms such as message delivery, database access, e-mail, and file transfer. These services and paradigms are optimized to cope with temporal and spatial radio coverage, high latency, limited throughput and transmission costs. A unified network management paradigm for both wireless and wireline facilitates seamless extensions of LAN- based management tools to include wireless nodes. A set of object oriented tools and methodologies enables direct asynchronous invocation of agent-based services supplemented by tool-sets matched to supported KeyWare paradigms. The open architecture embodiment of KeyWare enables a wide selection of client node computing platforms, operating systems, transport protocols, radio modems and infrastructures while maintaining application portability.

  18. Cultural differences in end-of-life care.

    PubMed

    Vincent, J L

    2001-02-01

    The exact time of death for many intensive care unit patients is increasingly preceded by an end-of-life decision. Such decisions are fraught with ethical, religious, moral, cultural, and legal difficulties. Key questions surrounding this issue include the difference between withholding and withdrawing, when to withhold/withdraw, who should be involved in the decision-making process, what are the relevant legal precedents, etc. Cultural variations in attitude to such issues are perhaps expected between continents, but key differences also exist on a more local basis, for example, among the countries of Europe. Physicians need to be aware of the potential cultural differences in the attitudes not only of their colleagues, but also of their patients and families. Open discussion of these issues and some change in our attitude toward life and death are needed to enable such patients to have a pain-free, dignified death.

  19. Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing

    NASA Astrophysics Data System (ADS)

    Yu, Kun-Fei; Gu, Jun; Hwang, Tzonelih; Gope, Prosanta

    2017-08-01

    This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure-resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.

  20. Predicting Smartphone Operating System from Personality and Individual Differences.

    PubMed

    Shaw, Heather; Ellis, David A; Kendrick, Libby-Rae; Ziegler, Fenja; Wiseman, Richard

    2016-12-01

    Android and iPhone devices account for over 90 percent of all smartphones sold worldwide. Despite being very similar in functionality, current discourse and marketing campaigns suggest that key individual differences exist between users of these two devices; however, this has never been investigated empirically. This is surprising, as smartphones continue to gain momentum across a variety of research disciplines. In this article, we consider if individual differences exist between these two distinct groups. In comparison to Android users, we found that iPhone owners are more likely to be female, younger, and increasingly concerned about their smartphone being viewed as a status object. Key differences in personality were also observed with iPhone users displaying lower levels of Honesty-Humility and higher levels of emotionality. Following this analysis, we were also able to build and test a model that predicted smartphone ownership at above chance level based on these individual differences. In line with extended self-theory, the type of smartphone owned provides some valuable information about its owner. These findings have implications for the increasing use of smartphones within research particularly for those working within Computational Social Science and PsychoInformatics, where data are typically collected from devices and applications running a single smartphone operating system.

  1. Comparison of health-related quality of life among men with different co-existing severe mental disorders in treatment for substance use.

    PubMed

    Adan, Ana; Marquez-Arrico, Julia E; Gilchrist, Gail

    2017-10-23

    Patient-perceived health-related quality of life has become an important outcome in health care as an indicator of treatment effectiveness and recovery for patients with substance use disorder. As no study has assessed health-related quality of life among male patients with substance use disorder and co-existing severe mental illness, we compared health-related quality of life among patients with substance use disorder and the following severe mental illness diagnosis in Barcelona, Spain: schizophrenia, bipolar disorder, major depressive disorder, and examined the associations with clinically related variables. Additionally, we compared results for health-related quality of life in patients with substance use disorder and severe mental illness, with Spanish population norms. We assessed 107 substance use disorder male patients using the 36-Item Short Form Health Survey comparing results across three groups with: comorbid schizophrenia (n = 37), comorbid bipolar disorder (n = 34), and comorbid major depressive disorder (n = 36). Multiple analyses of variance were performed to explore health-related quality of life by the type of co-existing SMI and linear regression analyses examined clinical correlates for the 36-Item Short Form Health Survey dimensions for each group. There were differences in Physical Functioning, Vitality and the Physical Composite Scale among groups. Poorer Physical Functioning was observed for patients with comorbid schizophrenia (80.13±3.27) and major depressive disorder (81.97±3.11) compared with comorbid bipolar disorder patients (94.26±1.93). Patients with substance use disorder and schizophrenia presented lower scores in Vitality (41.6±2.80) than those with co-existing bipolar disorder (55.68±3.66) and major depressive disorder (53.63±2.92). Finally, results in the Physical Composite Scale showed lower scores for patients with comorbid schizophrenia (51.06±1.41) and major depressive disorder (51.99±1.87) than for those with

  2. The comparison and analysis of extracting video key frame

    NASA Astrophysics Data System (ADS)

    Ouyang, S. Z.; Zhong, L.; Luo, R. Q.

    2018-05-01

    Video key frame extraction is an important part of the large data processing. Based on the previous work in key frame extraction, we summarized four important key frame extraction algorithms, and these methods are largely developed by comparing the differences between each of two frames. If the difference exceeds a threshold value, take the corresponding frame as two different keyframes. After the research, the key frame extraction based on the amount of mutual trust is proposed, the introduction of information entropy, by selecting the appropriate threshold values into the initial class, and finally take a similar mean mutual information as a candidate key frame. On this paper, several algorithms is used to extract the key frame of tunnel traffic videos. Then, with the analysis to the experimental results and comparisons between the pros and cons of these algorithms, the basis of practical applications is well provided.

  3. Key-value store with internal key-value storage interface

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or moremore » batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.« less

  4. Morphological and physiological divergences within Quercus ilex support the existence of different ecotypes depending on climatic dryness

    PubMed Central

    Peguero-Pina, José Javier; Sancho-Knapik, Domingo; Barrón, Eduardo; Camarero, Julio Jesús; Vilagrosa, Alberto; Gil-Pelegrín, Eustaquio

    2014-01-01

    Background and Aims Several studies show apparently contradictory findings about the functional convergence within the Mediterranean woody flora. In this context, this study evaluates the variability of functional traits within holm oak (Quercus ilex) to elucidate whether provenances corresponding to different morphotypes represent different ecotypes locally adapted to the prevaling stress levels. Methods Several morphological and physiological traits were measured at leaf and shoot levels in 9-year-old seedlings of seven Q. ilex provenances including all recognized morphotypes. Plants were grown in a common garden for 9 years under the same environmental conditions to avoid possible biases due to site-specific characteristics. Key Results Leaf morphometry clearly separates holm oak provenances into ‘ilex’ (more elongated leaves with low vein density) and ‘rotundifolia’ (short and rounded leaves with high vein density) morphotypes. Moreover, these morphotypes represent two consistent and very contrasting functional types in response to dry climates, mainly in terms of leaf area, major vein density, leaf specific conductivity, resistance to drought-induced cavitation and turgor loss point. Conclusions The ‘ilex’ and ‘rotundifolia’ morphotypes correspond to different ecotypes as inferred from their contrasting functional traits. To the best of our knowledge, this is the first time that the combined use of morphological and physiological traits has provided support for the concept of these two holm oak morphotypes being regarded as two different species. PMID:24941998

  5. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    PubMed

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  6. Troglobitic invertebrates: improving the knowledge on the Brazilian subterranean biodiversity through an interactive multi-entry key.

    PubMed

    Parizotto, Daniele R; Pires, Amanda Ciprandi; Mise, Kleber Makoto; Ferreira, Rodrigo Lopes

    2017-12-19

    Troglobitic species are those organisms restricted to caves that frequently present unique morphological features related to these environments. In order to study its ecology, evolution and biogeography, it is first required to properly recognize them. However, especially in Brazil, the basic knowledge is still incipient, with few taxonomic studies such as identification keys for this group of organisms. In addition, since the troglobitic species belong to different taxonomic groups, the information to properly recognize them is often sparse and difficult to access. Considering this, an interactive multi entry taxonomic key available online is an interesting approach, as it makes identifications easier. This study aims to construct a multi-access interactive identification key to the troglobitic invertebrates of Brazil, using morphological characters obtained from literature and direct observations of specimens. The key was made in Lucid version 3.3, containing figures of most characters. It comprises seventy-eight species of troglobitic invertebrates that occur in Brazil, forming a matrix of 231 morphological characters and more than 200 images to support identification. The key is freely available online on lucid central (http://keys.lucidcentral.org/keys/v3/troglobitic_invertebrates/troglobitic_invertebrates.html). Since Brazilian laws regarding cave conservation has change in 2008, allowing even the destruction of caves, this multi-access identification key is step to reduce the existing taxonomic impediment and also an important tool for identification of troglobites, especially for non-specialists.

  7. Florida Keys

    NASA Image and Video Library

    2002-12-13

    The Florida Keys are a chain of islands, islets and reefs extending from Virginia Key to the Dry Tortugas for about 309 kilometers (192 miles). The keys are chiefly limestone and coral formations. The larger islands of the group are Key West (with its airport), Key Largo, Sugarloaf Key, and Boca Chica Key. A causeway extends from the mainland to Key West. This image was acquired on October 28, 2001, by the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) on NASA's Terra satellite. With its 14 spectral bands from the visible to the thermal infrared wavelength region, and its high spatial resolution of 15 to 90 meters (about 50 to 300 feet), ASTER images Earth to map and monitor the changing surface of our planet. http://photojournal.jpl.nasa.gov/catalog/PIA03890

  8. HIV epidemic among key populations in west Africa.

    PubMed

    Djomand, Gaston; Quaye, Silas; Sullivan, Patrick S

    2014-09-01

    Globally, HIV infection remains a significant issue for key populations such as men who have sex with men (MSM) and female sex workers. A review of recent articles was conducted for west African countries to assess the burden of disease among female sex workers and MSM, access to services and identify barriers to implementation of services for key populations. In west Africa, key populations engage in high-risk practices for the acquisition of HIV and other sexually transmitted infections. Available HIV prevalence data fluctuate across and within countries for both MSM and female sex workers and may be five to ten times as high as that of the general population. HIV prevalence varied from 15.9% in The Gambia to 68% in Benin among female sex workers, whereas it ranged from 9.8% in The Gambia to 34.9% in Nigeria for MSM. Yet, important data gaps exist, including key populations size estimations in several countries as well as HIV prevalence, incidence and other biomarkers of HIV risk. Because of sociocultural, legal, political and economic challenges, exacerbated by a poor health system infrastructure, the HIV response is not strategically directed toward programs for key populations in countries with concentrated epidemics. Noteworthy is the low coverage of prevention care and treatment interventions offered to key populations. Sufficient planning and political will with legal and structural frameworks that reconcile public health and human rights are needed to prioritize HIV prevention, care and treatment programming for key populations programs in west Africa.

  9. Increased Susceptibility to Chemical Toxicity with Pre-existing ...

    EPA Pesticide Factsheets

    Numerous host and environmental factors may modulate vulnerability and risk. An area of increasing interest to risk assessors is the potential for chemicals to interact with pre-existing diseases and aging that may yield cumulative damage, altered chemical response, and increased disease susceptibility. We evaluated the relationships between chemicals and pre-existing disease and identify the type of information needed to evaluate the relationships of interest. Key among these is the existence of a clinically relevant and easy to measure biomarker of disease risk which is also modulated by a particular chemical of interest. This biomarker may be a physiological, biochemical, or genetic indicator that corresponds to a phase of the disease process and may be an indicator of where an individual is on the continuum of disease or health status. The relationship between chemical exposure and a biomarker may then be used to predict how preexisting conditions may modify health risks of chemical exposures. Several case studies are explored to describe the toxic chemical, the clinical biomarker, the impacted disease and the evidence that the chemical enhances disease risk: fine particulate matter/decreased heart rate variability/increased cardiopulmonary events; cadmium/decreased glomerular filtration ate/increased chronic kidney disease; methyl mercury/decreased paraoxonase-1/increased cardiovascular risk; Trichloroethylene/increased anti-nuclear antibody/autoimmunit

  10. A Case Study of American and Chinese College Students' Motivation Differences in Online Learning Environment

    ERIC Educational Resources Information Center

    Zhao, Chunjuan; Mei, Zongxiang

    2016-01-01

    Motivating students has been a key challenge facing instructors in non-face-to-face instructional contexts. Existing researches into motivation in online learning environment have revealed that there are learning motivation differences among students from different cultural backgrounds. The purpose of this study is to identify whether American and…

  11. Secret-key expansion from covert communication

    NASA Astrophysics Data System (ADS)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  12. A novel key-frame extraction approach for both video summary and video index.

    PubMed

    Lei, Shaoshuai; Xie, Gang; Yan, Gaowei

    2014-01-01

    Existing key-frame extraction methods are basically video summary oriented; yet the index task of key-frames is ignored. This paper presents a novel key-frame extraction approach which can be available for both video summary and video index. First a dynamic distance separability algorithm is advanced to divide a shot into subshots based on semantic structure, and then appropriate key-frames are extracted in each subshot by SVD decomposition. Finally, three evaluation indicators are proposed to evaluate the performance of the new approach. Experimental results show that the proposed approach achieves good semantic structure for semantics-based video index and meanwhile produces video summary consistent with human perception.

  13. Memory-assisted quantum key distribution resilient against multiple-excitation effects

    NASA Astrophysics Data System (ADS)

    Lo Piparo, Nicolò; Sinclair, Neil; Razavi, Mohsen

    2018-01-01

    Memory-assisted measurement-device-independent quantum key distribution (MA-MDI-QKD) has recently been proposed as a technique to improve the rate-versus-distance behavior of QKD systems by using existing, or nearly-achievable, quantum technologies. The promise is that MA-MDI-QKD would require less demanding quantum memories than the ones needed for probabilistic quantum repeaters. Nevertheless, early investigations suggest that, in order to beat the conventional memory-less QKD schemes, the quantum memories used in the MA-MDI-QKD protocols must have high bandwidth-storage products and short interaction times. Among different types of quantum memories, ensemble-based memories offer some of the required specifications, but they typically suffer from multiple excitation effects. To avoid the latter issue, in this paper, we propose two new variants of MA-MDI-QKD both relying on single-photon sources for entangling purposes. One is based on known techniques for entanglement distribution in quantum repeaters. This scheme turns out to offer no advantage even if one uses ideal single-photon sources. By finding the root cause of the problem, we then propose another setup, which can outperform single memory-less setups even if we allow for some imperfections in our single-photon sources. For such a scheme, we compare the key rate for different types of ensemble-based memories and show that certain classes of atomic ensembles can improve the rate-versus-distance behavior.

  14. Function key and shortcut key use in airway facilities.

    DOT National Transportation Integrated Search

    2003-02-01

    This document provides information on the function keys and shortcut keys used by systems in the Federal Aviation Administration : Airway Facilities (AF) work environment. It includes a catalog of the function keys and shortcut keys used by each syst...

  15. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups

    NASA Astrophysics Data System (ADS)

    Desmedt, Yvo; Lange, Tanja; Burmester, Mike

    Task-specific groups are often formed in an ad-hoc manner within large corporate structures, such as companies. Take the following typical scenario: A director decides to set up a task force group for some specific project. An order is passed down the hierarchy where it finally reaches a manager who selects some employees to form the group. The members should communicate in a secure way and for efficiency, a symmetric encryption system is chosen. To establish a joint secret key for the group, a group key exchange (GKE) protocol is used. We show how to use an existing Public Key Infrastructure (PKI) to achieve authenticated GKE by modifying the protocol and particularly by including signatures.

  16. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    PubMed

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  17. The Problem of Existence

    DTIC Science & Technology

    1985-01-01

    envisionment) produced by GIZMO . ? In the envisionment, I s indicates the set of quantity—conditioned individuals that exists during a situa- tion...envisionment step by step . In START, the initial state, GIZMO deduces that heat flow occurs, since there is assumed to be a temperature difference between the...stov e GIZMO implements the basic operations of qualitative process theory, including an envisioner for makin g predictions and a program for

  18. "They Did Things Differently Then": Diversity and Challenge from Key Stage 1

    ERIC Educational Resources Information Center

    Bracey, Paul; Jackson, Darius; Gove-Humphries, Alison

    2011-01-01

    This paper is based on the premise that controversial issues related to diversity are an important aspect of teaching and learning with all pupils. It was stimulated by a newspaper article which criticised teaching Key Stage 1 (5-7-year-old children) about Grace O'Malley, an Irish Queen. We argue that sixteenth century Anglo-Irish relations can be…

  19. Multi-user quantum key distribution with entangled photons from an AlGaAs chip

    NASA Astrophysics Data System (ADS)

    Autebert, C.; Trapateau, J.; Orieux, A.; Lemaître, A.; Gomez-Carbonell, C.; Diamanti, E.; Zaquine, I.; Ducci, S.

    2016-12-01

    In view of real-world applications of quantum information technologies, the combination of miniature quantum resources with existing fibre networks is a crucial issue. Among such resources, on-chip entangled photon sources play a central role for applications spanning quantum communications, computing and metrology. Here, we use a semiconductor source of entangled photons operating at room temperature in conjunction with standard telecom components to demonstrate multi-user quantum key distribution, a core protocol for securing communications in quantum networks. The source consists of an AlGaAs chip-emitting polarisation entangled photon pairs over a large bandwidth in the main telecom band around 1550 nm without the use of any off-chip compensation or interferometric scheme; the photon pairs are directly launched into a dense wavelength division multiplexer (DWDM) and secret keys are distributed between several pairs of users communicating through different channels. We achieve a visibility measured after the DWDM of 87% and show long-distance key distribution using a 50-km standard telecom fibre link between two network users. These results illustrate a promising route to practical, resource-efficient implementations adapted to quantum network infrastructures.

  20. A Statewide Key Informant Survey and Social Indicators Analysis.

    ERIC Educational Resources Information Center

    Fleischer, Mitchell

    This needs assessment study of mental health needs of the elderly in Pennsylvania used a three-part approach. These parts were a review of existing data sources, an extensive key informant study, and a review of service delivery models. A recent study found a prevalence rate for mental illness in the elderly of 12.8%, more than 5% lower than the…

  1. Key Gaps for Enabling Plant Growth in Future Missions

    NASA Technical Reports Server (NTRS)

    Anderson, Molly; Motil, Brian; Barta, Dan; Fritsche, Ralph; Massa, Gioia; Quincy, Charlie; Romeyn, Matthew; Wheeler, Ray; Hanford, Anthony

    2017-01-01

    Growing plants to provide food or psychological benefits to crewmembers is a common vision for the future of human spaceflight, often represented in media and in serious concept studies. The complexity of controlled environment agriculture, and plant growth in microgravity have and continue to be the subject of dedicated scientific research. However, actually implementing these systems in a way that will be cost effective, efficient, and sustainable for future space missions is a complex, multi-disciplinary problem. Key questions exist in many areas: human medical research in nutrition and psychology, horticulture, plant physiology and microbiology, multi-phase microgravity fluid physics, hardware design and technology development, and system design, operations and mission planning. This paper describes key knowledge gaps identified by a multi-disciplinary working group within the National Aeronautics and Space Administration (NASA). It also begins to identify solutions to the simpler questions identified by the group based on work initiated in 2017. Growing plants to provide food or psychological benefits to crewmembers is a common vision for the future of human spaceflight, often represented in media and in serious concept studies. The complexity of controlled environment agriculture, and plant growth in microgravity have and continue to be the subject of dedicated scientific research. However, actually implementing these systems in a way that will be cost effective, efficient, and sustainable for future space missions is a complex, multi-disciplinary problem. Key questions exist in many areas: human medical research in nutrition and psychology, horticulture, plant physiology and microbiology, multi-phase microgravity fluid physics, hardware design and technology development, and system design, operations and mission planning. This paper describes key knowledge gaps identified by a multi-disciplinary working group within the National Aeronautics and Space

  2. On System Engineering a Barter-Based Re-allocation of Space System Key Development Resources

    NASA Astrophysics Data System (ADS)

    Kosmann, William J.

    developments has an average cost growth of 46.04%. As barter-based key development resource re-allocation has never been tried in a spacecraft development, no historical results exist, and an inference on the means test is not possible. A simulation of using barter-based resource re-allocation should be developed. The NetLogo instrument development simulation should be modified to account for spacecraft development market participant differences. The resulting agent-based barter-based spacecraft resource re-allocation simulation would then be used to determine if significant statistical evidence exists to prove a claim that using barter-based resource re-allocation will result in lower expected cost growth.

  3. Meiosis: An Overview of Key Differences from Mitosis

    PubMed Central

    Ohkura, Hiroyuki

    2015-01-01

    Meiosis is the specialized cell division that generates gametes. In contrast to mitosis, molecular mechanisms and regulation of meiosis are much less understood. Meiosis shares mechanisms and regulation with mitosis in many aspects, but also has critical differences from mitosis. This review highlights these differences between meiosis and mitosis. Recent studies using various model systems revealed differences in a surprisingly wide range of aspects, including cell-cycle regulation, recombination, postrecombination events, spindle assembly, chromosome–spindle interaction, and chromosome segregation. Although a great degree of diversity can be found among organisms, meiosis-specific processes, and regulation are generally conserved. PMID:25605710

  4. Do "placebo responders" exist?

    PubMed

    Kaptchuk, Ted J; Kelley, John M; Deykin, Aaron; Wayne, Peter M; Lasagna, Louis C; Epstein, Ingrid O; Kirsch, Irving; Wechsler, Michael E

    2008-07-01

    The placebo effect has been the subject of much controversy. For a scientific investigation of placebo effects to advance it is important to establish whether a placebo response in any particular illness is reliable - i.e., if there is a response to a single placebo administration there will also be a placebo response to the repeated administration of a similar placebo in similar conditions. A positive answer would allow more sophisticated clinical trial designs and more precise basic research experiments on the placebo effect. This article reviews experiments that used multiple administrations of placebo to answer the question "do reliable placebo responders exist?" This paper also examines the evidence for the existence of a consistent placebo responder, i.e. a person who responds to placebo in one situation will respond in another condition or using a different type of placebo ritual. Much of the existing evidence for these two questions was performed before 1967. This early evidence is contradictory, methodologically weak and is sufficiently old to be considered medical history. Since 1969, at least eight experiments exposed asthma patients to multiple administrations of placebo given with deceptive suggestions that the "treatment" was an active medication. While the results of this research are not unequivocal, and may not be equivalent to non-deceptive conditions, this line of inquiry suggests that if a reliable and consistent placebo response exists it could be detected within this population. Finally, this paper proposes one model to rigorously investigate the stability of placebo responses.

  5. Paper waste - recycling, incineration or landfilling? A review of existing life cycle assessments.

    PubMed

    Villanueva, A; Wenzel, H

    2007-01-01

    A review of existing life cycle assessments (LCAs) on paper and cardboard waste has been undertaken. The objectives of the review were threefold. Firstly, to see whether a consistent message comes out of published LCA literature on optimum disposal or recycling solutions for this waste type. Such message has implications for current policy formulation on material recycling and disposal in the EU. Secondly, to identify key methodological issues of paper waste management LCAs, and enlighten the influence of such issues on the conclusions of the LCA studies. Thirdly, in light of the analysis made, to discuss whether it is at all valid to use the LCA methodology in its current development state to guide policy decisions on paper waste. A total of nine LCA studies containing altogether 73 scenarios were selected from a thorough, international literature search. The selected studies are LCAs including comparisons of different management options for waste paper. Despite claims of inconsistency, the LCAs reviewed illustrate the environmental benefits in recycling over incineration or landfill options, for paper and cardboard waste. This broad consensus was found despite differences in geographic location and definitions of the paper recycling/disposal systems studied. A systematic exploration of the LCA studies showed, however, important methodological pitfalls and sources of error, mainly concerning differences in the definition of the system boundaries. Fifteen key assumptions were identified that cover the three paper cycle system areas: raw materials and forestry, paper production, and disposal/recovery. It was found that the outcome of the individual LCA studies largely depended on the choices made in some of these assumptions, most specifically the ones concerning energy use and generation, and forestry.

  6. Determining the effect of key climate drivers on global hydropower production

    NASA Astrophysics Data System (ADS)

    Galelli, S.; Ng, J. Y.; Lee, D.; Block, P. J.

    2017-12-01

    Accounting for about 17% of total global electrical power production, hydropower is arguably the world's main renewable energy source and a key asset to meet Paris climate agreements. A key component of hydropower production is water availability, which depends on both precipitation and multiple drivers of climate variability acting at different spatial and temporal scales. To understand how these drivers impact global hydropower production, we study the relation between four patterns of ocean-atmosphere climate variability (i.e., El Niño Southern Oscillation, Pacific Decadal Oscillation, North Atlantic Oscillation, and Atlantic Multidecadal Oscillation) and monthly time series of electrical power production for over 1,500 hydropower reservoirs—obtained via simulation with a high-fidelity dam model forced with 20th century climate conditions. Notably significant relationships between electrical power productions and climate variability are found in many climate sensitive regions globally, including North and South America, East Asia, West Africa, and Europe. Coupled interactions from multiple, simultaneous climate drivers are also evaluated. Finally, we highlight the importance of using these climate drivers as an additional source of information within reservoir operating rules where the skillful predictability of inflow exists.

  7. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    PubMed

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  8. Managing water resources infrastructure in the face of different values

    NASA Astrophysics Data System (ADS)

    Mostert, Erik

    Water resources infrastructure (WRI) plays a key role in water management. It can serve or negatively affect some seven to ten different and sometimes conflicting values. WRI management is therefore not a purely technical issue. Economic analyses can help to some extent, but only for values related to current human use. Multi-criteria analysis can cover all values, but in the end WRI management is not an analytical issue, but a governance issue. Different governance paradigms exist: markets, hierarchies and “third alternatives”, such as common pool resources management and network management. This article presents social learning as the most promising paradigm. Positive experiences with social learning have been described and guidance on putting social learning into practice exists. Nonetheless, there are no magic solutions for managing WRI in the face of different values.

  9. Single-photon quantum key distribution in the presence of loss

    NASA Astrophysics Data System (ADS)

    Curty, Marcos; Moroder, Tobias

    2007-05-01

    We investigate two-way and one-way single-photon quantum key distribution (QKD) protocols in the presence of loss introduced by the quantum channel. Our analysis is based on a simple precondition for secure QKD in each case. In particular, the legitimate users need to prove that there exists no separable state (in the case of two-way QKD), or that there exists no quantum state having a symmetric extension (one-way QKD), that is compatible with the available measurements results. We show that both criteria can be formulated as a convex optimization problem known as a semidefinite program, which can be efficiently solved. Moreover, we prove that the solution to the dual optimization corresponds to the evaluation of an optimal witness operator that belongs to the minimal verification set of them for the given two-way (or one-way) QKD protocol. A positive expectation value of this optimal witness operator states that no secret key can be distilled from the available measurements results. We apply such analysis to several well-known single-photon QKD protocols under losses.

  10. Password-only authenticated three-party key exchange with provable security in the standard model.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon; Won, Dongho

    2014-01-01

    Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.

  11. Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model

    PubMed Central

    Nam, Junghyun; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon

    2014-01-01

    Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks. PMID:24977229

  12. Patterns of Genetic Diversity and Co-Existence in Open Ocean Diatoms: the Effects of Water Mass Structure, Selection and Sex

    NASA Astrophysics Data System (ADS)

    Rynearson, T. A.; Chen, G.

    2016-02-01

    The open ocean North Atlantic spring bloom influences regional ecology and global biogeochemistry. Diatoms dominate the peak of the bloom and significantly impact productivity and export of organic carbon from the bloom. Despite their key role in a yearly event with global impacts, the genetic diversity and population structure of diatoms that comprise this open ocean bloom are unknown. Here we investigated the population genetics of the diatom Thalassiosira gravida sampled during the 2008 North Atlantic Bloom Experiment using newly-developed microsatellite markers. Here, we show that the genetic diversity of open ocean diatoms is high and that their population structure differs dramatically from coastal diatoms. High levels of genetic diversity were observed across all water samples and did not change during the bloom. Four genetically distinct populations were identified but were not associated with different water masses, depths or time points during the bloom. Instead, all four populations co-existed within samples, spanning different water masses, stages of the bloom and depths of over >300 m. The pattern of genetically distinct, co-existing populations in the open ocean contrasts dramatically with coastal habitats, where distinct populations have not been observed to co-exist at the same time and place. It is likely that populations originate via transport from disparate locations combined with overwintering capacity in the water column or sediments. The pattern of co-existence suggests that the open ocean may serve as a gene pool that harbors different populations that are then available for selection to act upon, which may contribute to the ecological and biogeochemical success of diatoms and influence their long-term evolutionary survival.

  13. Group Key Agreement Efficient in Communication

    DTIC Science & Technology

    2003-10-14

    Selected Areas in Communications, 17(9), September 1999. [13] David Chaum . Zero-knowledge undeniable signatures . In I.B. Damgard, editor, Advances in...sender with some sufficiently strong public key signature method such as DSA or RSA (and using a long-term private key).1 All receivers are required...to verify signatures on all received messages and check the aforementioned fields. Consequently, our security model is different from some recent

  14. Schizoaffective disorder diagnosed according to different diagnostic criteria--systematic literature search and meta-analysis of key clinical characteristics and heterogeneity.

    PubMed

    Pagel, Tobias; Franklin, Jeremy; Baethge, Christopher

    2014-03-01

    Schizoaffective disorder is viewed as a heterogeneous diagnosis among psychotic illnesses. Different diagnostic systems differ in their definition with DSM (-IIIR, -IV, and -V) providing a narrower definition than RDC and ICD-10. It is unclear whether this difference is reflected in patient samples diagnosed according to different diagnostic systems. Exploratory study based on a systematic review of studies of schizoaffective disorder samples diagnosed by either RDC and ICD-10 (group of "broad criteria") or DSM-IIIR and -IV ("narrow criteria"); comparison (by Mann-Whitney-U-tests) of key characteristics, such as age, number of hospitalizations, or scores in psychometric tests, between more broadly and more narrowly defined schizoaffective disorder samples using standard deviations as a measurement of heterogeneity as well as weighted means and percentages. To reduce selection bias only studies including schizoaffective patient samples together with affective disorder and schizophrenia samples were selected. 55 studies were included, 14 employing RDC, 4 ICD-10, 20 DSM-IIIR, and 17 DSM-IV. Thirteen characteristics were compared: patients diagnosed according to broader criteria had fewer previous hospitalizations (2.2 vs. 5.4) and were both less often male (42 vs. 51%) and married (21 vs. 40%). Heterogeneity was similar in both groups but slightly higher in RDC and ICD-10 samples than in DSM-IIIR and -IV-samples: +4% regarding demographic and clinical course data and +13% regarding psychometric tests (pooled SD). Secular trends and different designs may have confounded the results and limit generalizability. Some comparisons were underpowered. Differences in diagnostic criteria are reflected in key characteristics of samples. The association of larger heterogeneity with wider diagnostic criteria supports employing standard deviations as a measurement of heterogeneity. Copyright © 2013 Elsevier B.V. All rights reserved.

  15. Robotic tele-existence

    NASA Technical Reports Server (NTRS)

    Tachi, Susumu; Arai, Hirohiko; Maeda, Taro

    1989-01-01

    Tele-existence is an advanced type of teleoperation system that enables a human operator at the controls to perform remote manipulation tasks dexterously with the feeling that he or she exists in the remote anthropomorphic robot in the remote environment. The concept of a tele-existence is presented, the principle of the tele-existence display method is explained, some of the prototype systems are described, and its space application is discussed.

  16. Experimental quantum key distribution at 1.3 gigabit-per-second secret-key rate over a 10 dB loss channel

    NASA Astrophysics Data System (ADS)

    Zhang, Zheshen; Chen, Changchen; Zhuang, Quntao; Wong, Franco N. C.; Shapiro, Jeffrey H.

    2018-04-01

    Quantum key distribution (QKD) enables unconditionally secure communication ensured by the laws of physics, opening a promising route to security infrastructure for the coming age of quantum computers. QKD’s demonstrated secret-key rates (SKRs), however, fall far short of the gigabit-per-second rates of classical communication, hindering QKD’s widespread deployment. QKD’s low SKRs are largely due to existing single-photon-based protocols’ vulnerability to channel loss. Floodlight QKD (FL-QKD) boosts SKR by transmitting many photons per encoding, while offering security against collective attacks. Here, we report an FL-QKD experiment operating at a 1.3 Gbit s‑1 SKR over a 10 dB loss channel. To the best of our knowledge, this is the first QKD demonstration that achieves a gigabit-per-second-class SKR, representing a critical advance toward high-rate QKD at metropolitan-area distances.

  17. Quantum-locked key distribution at nearly the classical capacity rate.

    PubMed

    Lupo, Cosmo; Lloyd, Seth

    2014-10-17

    Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security criteria for quantum cryptography quantified by two entropic quantities: the Holevo information and the accessible information. We show that the latter becomes a sensible security criterion if an upper bound on the coherence time of the eavesdropper's quantum memory is known. Under this condition, we introduce a protocol for secret key generation through a memoryless qudit channel. For channels with enough symmetry, such as the d-dimensional erasure and depolarizing channels, this protocol allows secret key generation at an asymptotic rate as high as the classical capacity minus one bit.

  18. Illustrated Key to Skins and Skulls of Bats in the Southeastern and Mid-Atlantic States

    Treesearch

    Michael A. Menzel; Jennifer M. Menzel; Steven B. Castleberry; James Ozier; W. Mark Ford; John W. Edwards

    2002-01-01

    In teaching students and technicians how to identify the skins and skulls of southeastern bats in the field and laboratory, it was necessary to develop an illustrated key that makes identification both easy and reliable. Many of the existing keys are poorly illustrated, include bat species that are not applicable, and/or contain univariate discriminatory measurements...

  19. Activation and desensitization of ionotropic glutamate receptors by selectively triggering pre-existing motions.

    PubMed

    Krieger, James; Lee, Ji Young; Greger, Ingo H; Bahar, Ivet

    2018-02-23

    Ionotropic glutamate receptors (iGluRs) are ligand-gated ion channels that are key players in synaptic transmission and plasticity. They are composed of four subunits, each containing four functional domains, the quaternary packing and collective structural dynamics of which are important determinants of their molecular mechanism of function. With the explosion of structural studies on different members of the family, including the structures of activated open channels, the mechanisms of action of these central signaling machines are now being elucidated. We review the current state of computational studies on two major members of the family, AMPA and NMDA receptors, with focus on molecular simulations and elastic network model analyses that have provided insights into the coupled movements of extracellular and transmembrane domains. We describe the newly emerging mechanisms of activation, allosteric signaling and desensitization, as mainly a selective triggering of pre-existing soft motions, as deduced from computational models and analyses that leverage structural data on intact AMPA and NMDA receptors in different states. Copyright © 2018 The Authors. Published by Elsevier B.V. All rights reserved.

  20. Completely device-independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Aguilar, Edgar A.; Ramanathan, Ravishankar; Kofler, Johannes; Pawłowski, Marcin

    2016-08-01

    Quantum key distribution (QKD) is a provably secure way for two distant parties to establish a common secret key, which then can be used in a classical cryptographic scheme. Using quantum entanglement, one can reduce the necessary assumptions that the parties have to make about their devices, giving rise to device-independent QKD (DIQKD). However, in all existing protocols to date the parties need to have an initial (at least partially) random seed as a resource. In this work, we show that this requirement can be dropped. Using recent advances in the fields of randomness amplification and randomness expansion, we demonstrate that it is sufficient for the message the parties want to communicate to be (partially) unknown to the adversaries—an assumption without which any type of cryptography would be pointless to begin with. One party can use her secret message to locally generate a secret sequence of bits, which can then be openly used by herself and the other party in a DIQKD protocol. Hence our work reduces the requirements needed to perform secure DIQKD and establish safe communication.

  1. Practical security analysis of continuous-variable quantum key distribution with jitter in clock synchronization

    NASA Astrophysics Data System (ADS)

    Xie, Cailang; Guo, Ying; Liao, Qin; Zhao, Wei; Huang, Duan; Zhang, Ling; Zeng, Guihua

    2018-03-01

    How to narrow the gap of security between theory and practice has been a notoriously urgent problem in quantum cryptography. Here, we analyze and provide experimental evidence of the clock jitter effect on the practical continuous-variable quantum key distribution (CV-QKD) system. The clock jitter is a random noise which exists permanently in the clock synchronization in the practical CV-QKD system, it may compromise the system security because of its impact on data sampling and parameters estimation. In particular, the practical security of CV-QKD with different clock jitter against collective attack is analyzed theoretically based on different repetition frequencies, the numerical simulations indicate that the clock jitter has more impact on a high-speed scenario. Furthermore, a simplified experiment is designed to investigate the influence of the clock jitter.

  2. The clinicopathologic differences in papillary thyroid carcinoma with or without co-existing chronic lymphocytic thyroiditis.

    PubMed

    Yoon, Yeo-Hoon; Kim, Hak Joon; Lee, Jin Woo; Kim, Jin Man; Koo, Bon Seok

    2012-03-01

    The goal of this study is to determine the clinicopathologic differences in patients with papillary thyroid carcinoma (PTC) with or without chronic lymphocytic thyroiditis (CLT). We reviewed the medical records of 195 consecutive PTC patients who underwent total thyroidectomy and bilateral central lymph node dissection from April 2008 to March 2010. The differences in clinicopathologic factors, such as age, gender, size of primary tumor, perithyroidal invasion, lymphovascular invasion, capsular invasion, and central lymph node (CLN) metastasis, were analyzed in PTC patients with or without CLT. Among 195 patients, 56 (28.7%) had co-existing CLT. Patients with CLT had the following characteristics as compared to patients without CLT: significantly younger, female predominance, smaller tumor size, and lower incidence of capsular invasion (p = 0.038, 0.006, 0.037, and 0.026, respectively). Also, patients with CLT (12.5%) had a significantly lower incidence of CLN metastases than patients without CLT (28.1%; p = 0.025) based on univariate analysis. Moreover, multivariate analysis showed that younger age (p = 0.042, odds ratio = 1.033) and female gender (p = 0.012, odds ratio = 6.865) are independent clinical factors in patients with CLT compared to patients without CLT. CLT was shown to be commonly associated with PTC. Compared to patients with PTC without CLT, patients with CLT were younger with a female predominance, which are the most important and well-known prognostic variables for thyroid cancer mortality.

  3. Available nitrogen is the key factor influencing soil microbial functional gene diversity in tropical rainforest.

    PubMed

    Cong, Jing; Liu, Xueduan; Lu, Hui; Xu, Han; Li, Yide; Deng, Ye; Li, Diqiang; Zhang, Yuguang

    2015-08-20

    Tropical rainforests cover over 50% of all known plant and animal species and provide a variety of key resources and ecosystem services to humans, largely mediated by metabolic activities of soil microbial communities. A deep analysis of soil microbial communities and their roles in ecological processes would improve our understanding on biogeochemical elemental cycles. However, soil microbial functional gene diversity in tropical rainforests and causative factors remain unclear. GeoChip, contained almost all of the key functional genes related to biogeochemical cycles, could be used as a specific and sensitive tool for studying microbial gene diversity and metabolic potential. In this study, soil microbial functional gene diversity in tropical rainforest was analyzed by using GeoChip technology. Gene categories detected in the tropical rainforest soils were related to different biogeochemical processes, such as carbon (C), nitrogen (N) and phosphorus (P) cycling. The relative abundance of genes related to C and P cycling detected mostly derived from the cultured bacteria. C degradation gene categories for substrates ranging from labile C to recalcitrant C were all detected, and gene abundances involved in many recalcitrant C degradation gene categories were significantly (P < 0.05) different among three sampling sites. The relative abundance of genes related to N cycling detected was significantly (P < 0.05) different, mostly derived from the uncultured bacteria. The gene categories related to ammonification had a high relative abundance. Both canonical correspondence analysis and multivariate regression tree analysis showed that soil available N was the most correlated with soil microbial functional gene structure. Overall high microbial functional gene diversity and different soil microbial metabolic potential for different biogeochemical processes were considered to exist in tropical rainforest. Soil available N could be the key factor in shaping the

  4. Key Concepts in Microbial Oceanography

    NASA Astrophysics Data System (ADS)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  5. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    NASA Astrophysics Data System (ADS)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  6. Measuring Input Thresholds on an Existing Board

    NASA Technical Reports Server (NTRS)

    Kuperman, Igor; Gutrich, Daniel G.; Berkun, Andrew C.

    2011-01-01

    A critical PECL (positive emitter-coupled logic) interface to Xilinx interface needed to be changed on an existing flight board. The new Xilinx input interface used a CMOS (complementary metal-oxide semiconductor) type of input, and the driver could meet its thresholds typically, but not in worst-case, according to the data sheet. The previous interface had been based on comparison with an external reference, but the CMOS input is based on comparison with an internal divider from the power supply. A way to measure what the exact input threshold was for this device for 64 inputs on a flight board was needed. The measurement technique allowed an accurate measurement of the voltage required to switch a Xilinx input from high to low for each of the 64 lines, while only probing two of them. Directly driving an external voltage was considered too risky, and tests done on any other unit could not be used to qualify the flight board. The two lines directly probed gave an absolute voltage threshold calibration, while data collected on the remaining 62 lines without probing gave relative measurements that could be used to identify any outliers. The PECL interface was forced to a long-period square wave by driving a saturated square wave into the ADC (analog to digital converter). The active pull-down circuit was turned off, causing each line to rise rapidly and fall slowly according to the input s weak pull-down circuitry. The fall time shows up as a change in the pulse width of the signal ready by the Xilinx. This change in pulse width is a function of capacitance, pulldown current, and input threshold. Capacitance was known from the different trace lengths, plus a gate input capacitance, which is the same for all inputs. The pull-down current is the same for all inputs including the two that are probed directly. The data was combined, and the Excel solver tool was used to find input thresholds for the 62 lines. This was repeated over different supply voltages and

  7. Monitoring HIV Prevention Programme Outcomes among Key Populations in Kenya: Findings from a National Survey

    PubMed Central

    Musyoki, Helgar; Anthony, John; Kioko, Japheth; Kaosa, Shem; Ogwang, Bernard E.; Githuka, George; Sirengo, Martin; Birir, Sarah; Blanchard, James F.; Muraguri, Nicholas; Isac, Shajy; Moses, Stephen

    2015-01-01

    In preparation for the implementation of the Kenya AIDS Strategic Framework 2014/15-2018/19, the Kenya National AIDS and STI Control Programme facilitated a national polling booth survey as part of a baseline assessment of HIV-related risk behaviours among FSWs, MSM, and PWID, and their utilization of existing preventive interventions, as well as structural factors that may influence KPs’ vulnerability to HIV. The survey was conducted among “key populations” (female sex workers, men who have sex with men, and people who inject drugs) to understand current HIV risk and prevention behaviours, utilization of existing programmes and services, and experiences of violence. In total, 3,448 female sex workers, 1,308 men who have sex with men, and 690 people who inject drugs were randomly selected to participate in polling booth survey sessions from seven priority sites. Survey responses were aggregated and descriptive statistics derived. In general, reported condom use among all key populations was quite high with paying clients, and lower with regular, non-paying partners. Many participants reported unavailability of condoms or clean injecting equipment within the past month. Exposure to, and utilization of, existing HIV prevention services varied significantly among the groups, and was reported least commonly by female sex workers. Encouragingly, approximately three-quarters of all key population members reported receiving an HIV test in the past three months. All key population groups reported experiencing high levels of physical and sexual violence from partners/clients, and/or arrest and violence by law enforcement officials. Although some of the findings are encouraging, there is room for improvement in HIV prevention programmes and services for key populations across Kenya. PMID:26313642

  8. Existence and non-uniqueness of similarity solutions of a boundary-layer problem

    NASA Technical Reports Server (NTRS)

    Hussaini, M. Y.; Lakin, W. D.

    1986-01-01

    A Blasius boundary value problem with inhomogeneous lower boundary conditions f(0) = 0 and f'(0) = - lambda with lambda strictly positive was considered. The Crocco variable formulation of this problem has a key term which changes sign in the interval of interest. It is shown that solutions of the boundary value problem do not exist for values of lambda larger than a positive critical value lambda. The existence of solutions is proven for 0 lambda lambda by considering an equivalent initial value problem. It is found however that for 0 lambda lambda, solutions of the boundary value problem are nonunique. Physically, this nonuniqueness is related to multiple values of the skin friction.

  9. Existence and non-uniqueness of similarity solutions of a boundary layer problem

    NASA Technical Reports Server (NTRS)

    Hussaini, M. Y.; Lakin, W. D.

    1984-01-01

    A Blasius boundary value problem with inhomogeneous lower boundary conditions f(0) = 0 and f'(0) = - lambda with lambda strictly positive was considered. The Crocco variable formulation of this problem has a key term which changes sign in the interval of interest. It is shown that solutions of the boundary value problem do not exist for values of lambda larger than a positive critical value lambda. The existence of solutions is proven for 0 lambda lambda by considering an equivalent initial value problem. It is found however that for 0 lambda lambda, solutions of the boundary value problem are nonunique. Physically, this nonuniqueness is related to multiple values of the skin friction.

  10. Strategies for Supporting Physician-Scientists in Faculty Roles: A Narrative Review With Key Informant Consultations.

    PubMed

    Lingard, Lorelei; Zhang, Peter; Strong, Michael; Steele, Margaret; Yoo, John; Lewis, James

    2017-10-01

    Physician-scientists are a population in decline globally. Solutions to reverse this decline often have focused on the training pipeline. Less attention has been paid to reducing attrition post training, when physician-scientists take up faculty roles. However, this period is a known time of vulnerability because of the pressures of clinical duties and the long timeline to securing independent research funding. This narrative review explored existing knowledge regarding how best to support physician-scientists for success in their faculty roles. The authors searched the Medline, Embase, ERIC, and Cochrane Library databases for articles published from 2000 to 2016 on this topic and interviewed key informants in 2015 to solicit their input on the review results. The authors reviewed 78 articles and interviewed 16 key informants. From the literature, they developed a framework of organizational (facilitate mentorship, foster community, value the physician-scientist role, minimize financial barriers) and individual (develop professional and research skills) strategies for supporting physician-scientists. They also outlined key knowledge gaps representing topics either rarely or never addressed in the reviewed articles (percent research time, structural hypocrisy, objective assessment, group metrics, professional identity). The key informants confirmed the identified strategies and discussed how the gaps were particularly important and impactful. This framework offers a basis for assessing an organization's existing support strategies, identifying outstanding needs, and developing targeted programming. The identified gaps require attention, as they threaten to undermine the benefits of existing support strategies.

  11. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae)1

    PubMed Central

    Attigala, Lakshmi; De Silva, Nuwan I.; Clark, Lynn G.

    2016-01-01

    Premise of the study: Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. Methods and Results: A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). Conclusions: WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus. PMID:27144109

  12. Process improvement to enhance existing stroke team activity toward more timely thrombolytic treatment.

    PubMed

    Cho, Han-Jin; Lee, Kyung Yul; Nam, Hyo Suk; Kim, Young Dae; Song, Tae-Jin; Jung, Yo Han; Choi, Hye-Yeon; Heo, Ji Hoe

    2014-10-01

    Process improvement (PI) is an approach for enhancing the existing quality improvement process by making changes while keeping the existing process. We have shown that implementation of a stroke code program using a computerized physician order entry system is effective in reducing the in-hospital time delay to thrombolysis in acute stroke patients. We investigated whether implementation of this PI could further reduce the time delays by continuous improvement of the existing process. After determining a key indicator [time interval from emergency department (ED) arrival to intravenous (IV) thrombolysis] and conducting data analysis, the target time from ED arrival to IV thrombolysis in acute stroke patients was set at 40 min. The key indicator was monitored continuously at a weekly stroke conference. The possible reasons for the delay were determined in cases for which IV thrombolysis was not administered within the target time and, where possible, the problems were corrected. The time intervals from ED arrival to the various evaluation steps and treatment before and after implementation of the PI were compared. The median time interval from ED arrival to IV thrombolysis in acute stroke patients was significantly reduced after implementation of the PI (from 63.5 to 45 min, p=0.001). The variation in the time interval was also reduced. A reduction in the evaluation time intervals was achieved after the PI [from 23 to 17 min for computed tomography scanning (p=0.003) and from 35 to 29 min for complete blood counts (p=0.006)]. PI is effective for continuous improvement of the existing process by reducing the time delays between ED arrival and IV thrombolysis in acute stroke patients.

  13. Evaluating filterability of different types of sludge by statistical analysis: The role of key organic compounds in extracellular polymeric substances.

    PubMed

    Xiao, Keke; Chen, Yun; Jiang, Xie; Zhou, Yan

    2017-03-01

    An investigation was conducted for 20 different types of sludge in order to identify the key organic compounds in extracellular polymeric substances (EPS) that are important in assessing variations of sludge filterability. The different types of sludge varied in initial total solids (TS) content, organic composition and pre-treatment methods. For instance, some of the sludges were pre-treated by acid, ultrasonic, thermal, alkaline, or advanced oxidation technique. The Pearson's correlation results showed significant correlations between sludge filterability and zeta potential, pH, dissolved organic carbon, protein and polysaccharide in soluble EPS (SB EPS), loosely bound EPS (LB EPS) and tightly bound EPS (TB EPS). The principal component analysis (PCA) method was used to further explore correlations between variables and similarities among EPS fractions of different types of sludge. Two principal components were extracted: principal component 1 accounted for 59.24% of total EPS variations, while principal component 2 accounted for 25.46% of total EPS variations. Dissolved organic carbon, protein and polysaccharide in LB EPS showed higher eigenvector projection values than the corresponding compounds in SB EPS and TB EPS in principal component 1. Further characterization of fractionized key organic compounds in LB EPS was conducted with size-exclusion chromatography-organic carbon detection-organic nitrogen detection (LC-OCD-OND). A numerical multiple linear regression model was established to describe relationship between organic compounds in LB EPS and sludge filterability. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. The assessment of global thermo-energy performances of existing district heating systems optimized by harnessing renewable energy sources

    NASA Astrophysics Data System (ADS)

    Şoimoşan, Teodora M.; Danku, Gelu; Felseghi, Raluca A.

    2017-12-01

    Within the thermo-energy optimization process of an existing heating system, the increase of the system's energy efficiency and speeding-up the transition to green energy use are pursued. The concept of multi-energy district heating system, with high harnessing levels of the renewable energy sources (RES) in order to produce heat, is expected to be the key-element in the future urban energy infrastructure, due to the important role it can have in the strategies of optimizing and decarbonizing the existing district heating systems. The issues that arise are related to the efficient integration of different technologies of harnessing renewable energy sources in the energy mix and to the increase of the participation levels of RES, respectively. For the holistic modeling of the district heating system, the concept of the energy hub was used, where the synergy of different primary forms of entered energy provides the system a high degree energy security and flexibility in operation. The optimization of energy flows within the energy hub allows the optimization of the thermo-energy district system in order to approach the dual concept of smart city & smart energy.

  15. Generating the Local Oscillator "Locally" in Continuous-Variable Quantum Key Distribution Based on Coherent Detection

    NASA Astrophysics Data System (ADS)

    Qi, Bing; Lougovski, Pavel; Pooser, Raphael; Grice, Warren; Bobrek, Miljko

    2015-10-01

    Continuous-variable quantum key distribution (CV-QKD) protocols based on coherent detection have been studied extensively in both theory and experiment. In all the existing implementations of CV-QKD, both the quantum signal and the local oscillator (LO) are generated from the same laser and propagate through the insecure quantum channel. This arrangement may open security loopholes and limit the potential applications of CV-QKD. In this paper, we propose and demonstrate a pilot-aided feedforward data recovery scheme that enables reliable coherent detection using a "locally" generated LO. Using two independent commercial laser sources and a spool of 25-km optical fiber, we construct a coherent communication system. The variance of the phase noise introduced by the proposed scheme is measured to be 0.04 (rad2 ), which is small enough to enable secure key distribution. This technology also opens the door for other quantum communication protocols, such as the recently proposed measurement-device-independent CV-QKD, where independent light sources are employed by different users.

  16. On the Existence of Positive Solutions of Semilinear Elliptic Equations.

    DTIC Science & Technology

    1981-04-01

    vt I (0 < p < q < r,0< c <’<) I / -30- OIL - 111.2. Bumps and the shape of the nonlinearity: We want, in this section, to show how bumps or some...8l P L LONS DAAG29-80-C-0041 UNCLASSI RC-TSR-2209wL Eh|IEIIEEEEEEE EElhlEEEEEEEEE I IEEEEIIEEEII ARC echncajSummary Repprt # 2209 QON THE EXISTENCE OF...35P30 Key Words: Semilinear equations, positive solutions, topological degree, bifurcation Work Unit Number I - Applied Analysis *Laboratoire

  17. Are the Keys loved to death? A study of diver specialization levels and preferences in the Florida Keys

    Treesearch

    Shona Paterson; David K. Loomis

    2010-01-01

    This paper presents research conducted for the Florida Reef Resilience Program on nonresident recreational SCUBA divers in three zones of the Florida Keys. When divers were segmented into specialization subgroups for analysis, divers in different subgroups tended to use different geographic locations. These results suggest differences in user preferences; yet when...

  18. Quantum key management

    DOEpatents

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  19. The Key Technologies. Some Implications for Education and Training. An Occasional Paper.

    ERIC Educational Resources Information Center

    Mansell, Jack; And Others

    National competitiveness depends in large part on the practical application of technologies. Educational planners must, therefore, identify key (newly emerging) topics in science and engineering that are likely to have a major evolutionary effect on industry and incorporate these areas into existing vocational and technical curricula. Because…

  20. Little genetic variability in resilience among cattle exists for a range of performance traits across herds in Ireland differing in Fasciola hepatica prevalence.

    PubMed

    Twomey, Alan J; Graham, David A; Doherty, Michael L; Blom, Astrid; Berry, Donagh P

    2018-06-04

    It is anticipated that in the future, livestock will be exposed to a greater risk of infection from parasitic diseases. Therefore, future breeding strategies for livestock, which are generally long-term strategies for change, should target animals adaptable to environments with a high parasitic load. Covariance components were estimated in the present study for a selection of dairy and beef performance traits over herd-years differing in Fasciola hepatica load using random regression sire models. Herd-year prevalence of F. hepatica was determined by using F. hepatica-damaged liver phenotypes which were recorded in abattoirs nationally. The data analyzed consisted up to 83,821 lactation records from dairy cows for a range of milk production and fertility traits, as well as 105,054 young animals with carcass-related information obtained at slaughter. Reaction norms for individual sires were derived from the random regression coefficients. The heritability and additive genetic standard deviations for all traits analyzed remained relatively constant as herd-year F. hepatica prevalence gradient increased up to a prevalence level of 0.7; although there was a large increase in heritability and additive genetic standard deviation for milk and fertility traits in the observed F. hepatica prevalence levels >0.7, only 5% of the data existed in herd-year prevalence levels >0.7. Very little rescaling, therefore, exists across differing herd-year F. hepatica prevalence levels. Within-trait genetic correlations among the performance traits across different herd-year F. hepatica prevalence levels were less than unity for all traits. Nevertheless, within-trait genetic correlations for milk production and carcass traits were all >0.8 for F. hepatica prevalence levels between 0.2 and 0.8. The lowest estimate of within-trait genetic correlations for the different fertility traits ranged from -0.03 (SE = 1.09) in age of first calving to 0.54 (SE = 0.22) for calving to first service

  1. An Overview of Key Indicators and Evaluation Tools for Assessing Housing Quality: A Literature Review

    NASA Astrophysics Data System (ADS)

    Sinha, Rajan Chandra; Sarkar, Satyaki; Mandal, Nikhil Ranjan

    2017-09-01

    The issue of the housing quality has been addressed for various stakeholders at different levels. There exist varied opinion about its measurability and possible applications. Thus the study is carried out to have an insight into the concept of housing quality and its relevance in the changing demographics, technological, socio-economic and socio-cultural conditions. This study attempts to summarize the literature that addresses past research concerned with factors related to housing quality, its measurement methodology and critically examines the broad key indicators identified to have impact upon enhancing the housing quality. This work discusses the recent techniques which are extensively used for analysis of housing quality.

  2. Emergency management in health: key issues and challenges in the UK.

    PubMed

    Lee, Andrew C K; Phillips, Wendy; Challen, Kirsty; Goodacre, Steve

    2012-10-19

    Emergency planning in the UK has grown considerably in recent years, galvanised by the threat of terrorism. However, deficiencies in NHS emergency planning were identified and the evidence-base that underpins it is questionable. Inconsistencies in terminologies and concepts also exist. Different models of emergency management exist internationally but the optimal system is unknown. This study examines the evidence-base and evidence requirements for emergency planning in the UK health context. The study involved semi-structured interviews with key stakeholders and opinion leaders. Purposive sampling was used to obtain a breadth of views from various agencies involved in emergency planning and response. Interviews were then analysed using a grounded approach using standard framework analysis techniques. We conducted 17 key informant interviews. Interviewees identified greater gaps in operational than technical aspects of emergency planning. Social and behavioural knowledge gaps were highlighted with regards to how individuals and organisations deal with risk and behave in emergencies. Evidence-based approaches to public engagement and for developing community resilience to disasters are lacking. Other gaps included how knowledge was developed and used. Conflicting views with regards to the optimal configuration and operation of the emergency management system were voiced. Four thematic categories for future research emerged:(i) Knowledge-base for emergency management: Further exploration is needed of how knowledge is acquired, valued, disseminated, adopted and retained.(ii) Social and behavioural issues: Greater understanding of how individuals approach risk and behave in emergencies is required.(iii) Organisational issues in emergencies: Several conflicting organisational issues were identified; value of planning versus plans, flexible versus standardized procedures, top-down versus bottom-up engagement, generic versus specific planning, and reactive versus

  3. Monitoring the HIV continuum of care in key populations across Europe and Central Asia.

    PubMed

    Brown, A E; Attawell, K; Hales, D; Rice, B D; Pharris, A; Supervie, V; Van Beckhoven, D; Delpech, V C; An der Heiden, M; Marcus, U; Maly, M; Noori, T

    2018-05-08

    The aim of the study was to measure and compare national continuum of HIV care estimates in Europe and Central Asia in three key subpopulations: men who have sex with men (MSM), people who inject drugs (PWID) and migrants. Responses to a 2016 European Centre for Disease Prevention and Control (ECDC) survey of 55 European and Central Asian countries were used to describe continuums of HIV care for the subpopulations. Data were analysed using three frameworks: Joint United Nations Programme on HIV/AIDS (UNAIDS) 90-90-90 targets; breakpoint analysis identifying reductions between adjacent continuum stages; quadrant analysis categorizing countries using 90% cut-offs for continuum stages. Overall, 29 of 48 countries reported national data for all HIV continuum stages (numbers living with HIV, diagnosed, receiving treatment and virally suppressed). Six countries reported all stages for MSM, seven for PWID and two for migrants. Thirty-one countries did not report data for MSM (34 for PWID and 41 for migrants). In countries that provided key-population data, overall, 63%, 40% and 41% of MSM, PWID and migrants living with HIV were virally suppressed, respectively (compared with 68%, 65% and 68% nationally, for countries reporting key-population data). Variation was observed between countries, with higher outcomes in subpopulations in Western Europe compared with Eastern Europe and Central Asia. Few reporting countries can produce the continuum of HIV care for the three key populations. Where data are available, differences exist in outcomes between the general and key populations. While MSM broadly mirror national outcomes (in the West), PWID and migrants experience poorer treatment and viral suppression. Countries must develop continuum measures for key populations to identify and address inequalities. © 2018 British HIV Association.

  4. Efficient and universal quantum key distribution based on chaos and middleware

    NASA Astrophysics Data System (ADS)

    Jiang, Dong; Chen, Yuanyuan; Gu, Xuemei; Xie, Ling; Chen, Lijun

    2017-01-01

    Quantum key distribution (QKD) promises unconditionally secure communications, however, the low bit rate of QKD cannot meet the requirements of high-speed applications. Despite the many solutions that have been proposed in recent years, they are neither efficient to generate the secret keys nor compatible with other QKD systems. This paper, based on chaotic cryptography and middleware technology, proposes an efficient and universal QKD protocol that can be directly deployed on top of any existing QKD system without modifying the underlying QKD protocol and optical platform. It initially takes the bit string generated by the QKD system as input, periodically updates the chaotic system, and efficiently outputs the bit sequences. Theoretical analysis and simulation results demonstrate that our protocol can efficiently increase the bit rate of the QKD system as well as securely generate bit sequences with perfect statistical properties. Compared with the existing methods, our protocol is more efficient and universal, it can be rapidly deployed on the QKD system to increase the bit rate when the QKD system becomes the bottleneck of its communication system.

  5. Finding Services for an Open Architecture: A Review of Existing Applications and Programs in PEO C4I

    DTIC Science & Technology

    2011-01-01

    2004) Two key SOA success factors listed were as follows: 1. Shared Services Strategy: Existence of a strategy to identify overlapping business and...model Architectural pattern 22 Finding Services for an Open Architecture or eliminating redundancies and overlaps through use of shared services 2...Funding Model: Existence of an IT funding model aligned with and supportive of a shared services strategy. (Sun Micro- systems, 2004) Become Data

  6. Practical private database queries based on a quantum-key-distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jakobi, Markus; Humboldt-Universitaet zu Berlin, D-10117 Berlin; Simon, Christoph

    2011-02-15

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions inmore » order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.« less

  7. BARI+: a biometric based distributed key management approach for wireless body area networks.

    PubMed

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  8. Quantum key distribution without detector vulnerabilities using optically seeded lasers

    NASA Astrophysics Data System (ADS)

    Comandar, L. C.; Lucamarini, M.; Fröhlich, B.; Dynes, J. F.; Sharpe, A. W.; Tam, S. W.-B.; Yuan, Z. L.; Penty, R. V.; Shields, A. J.

    2016-05-01

    Security in quantum cryptography is continuously challenged by inventive attacks targeting the real components of a cryptographic set-up, and duly restored by new countermeasures to foil them. Owing to their high sensitivity and complex design, detectors are the most frequently attacked components. It was recently shown that two-photon interference from independent light sources can be used to remove any vulnerability from detectors. This new form of detection-safe quantum key distribution (QKD), termed measurement-device-independent (MDI), has been experimentally demonstrated but with modest key rates. Here, we introduce a new pulsed laser seeding technique to obtain high-visibility interference from gain-switched lasers and thereby perform MDI-QKD with unprecedented key rates in excess of 1 megabit per second in the finite-size regime. This represents a two to six orders of magnitude improvement over existing implementations and supports the new scheme as a practical resource for secure quantum communications.

  9. Big data and data repurposing - using existing data to answer new questions in vascular dementia research.

    PubMed

    Doubal, Fergus N; Ali, Myzoon; Batty, G David; Charidimou, Andreas; Eriksdotter, Maria; Hofmann-Apitius, Martin; Kim, Yun-Hee; Levine, Deborah A; Mead, Gillian; Mucke, Hermann A M; Ritchie, Craig W; Roberts, Charlotte J; Russ, Tom C; Stewart, Robert; Whiteley, William; Quinn, Terence J

    2017-04-17

    Traditional approaches to clinical research have, as yet, failed to provide effective treatments for vascular dementia (VaD). Novel approaches to collation and synthesis of data may allow for time and cost efficient hypothesis generating and testing. These approaches may have particular utility in helping us understand and treat a complex condition such as VaD. We present an overview of new uses for existing data to progress VaD research. The overview is the result of consultation with various stakeholders, focused literature review and learning from the group's experience of successful approaches to data repurposing. In particular, we benefitted from the expert discussion and input of delegates at the 9 th International Congress on Vascular Dementia (Ljubljana, 16-18 th October 2015). We agreed on key areas that could be of relevance to VaD research: systematic review of existing studies; individual patient level analyses of existing trials and cohorts and linking electronic health record data to other datasets. We illustrated each theme with a case-study of an existing project that has utilised this approach. There are many opportunities for the VaD research community to make better use of existing data. The volume of potentially available data is increasing and the opportunities for using these resources to progress the VaD research agenda are exciting. Of course, these approaches come with inherent limitations and biases, as bigger datasets are not necessarily better datasets and maintaining rigour and critical analysis will be key to optimising data use.

  10. The Mars Telecommunications Orbiter a key asset in the Mars Network

    NASA Technical Reports Server (NTRS)

    Abilleira, Fernando

    2006-01-01

    The Mars Telecommunications Orbiter (MTO) to be launched in 2009 will play a key role in the Mars Network since it will be the first interplanetary mission whose primary objective is to provide communications to existing and upcoming Mars missions, This paper presents a basic description of the primary mission an provides trajectory information for the Mars Telecommunication Orbiter.

  11. Image encryption based on nonlinear encryption system and public-key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Chi, Yingying

    2015-03-01

    Recently, optical asymmetric cryptosystem (OACS) has became the focus of discussion and concern of researchers. Some researchers pointed out that OACS was not tenable because of misunderstanding the concept of asymmetric cryptosystem (ACS). We propose an improved cryptosystem using RSA public-key algorithm based on existing OACS and the new system conforms to the basic agreement of public key cryptosystem. At the beginning of the encryption process, the system will produce an independent phase matrix and allocate the input image, which also conforms to one-time pad cryptosystem. The simulation results show that the validity of the improved cryptosystem and the high robustness against attack scheme using phase retrieval technique.

  12. Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    PubMed Central

    Chen, Chin-Ling; Lin, I-Hsien

    2010-01-01

    Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths. PMID:22163606

  13. Location-aware dynamic session-key management for grid-based Wireless Sensor Networks.

    PubMed

    Chen, Chin-Ling; Lin, I-Hsien

    2010-01-01

    Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.

  14. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    PubMed

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.

  15. A Multihop Key Agreement Scheme for Wireless Ad Hoc Networks Based on Channel Characteristics

    PubMed Central

    Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks. PMID:23766725

  16. Introduction strategies raise key questions.

    PubMed

    Finger, W R; Keller, S

    1995-09-01

    Key issues that must be considered before a new contraceptive is introduced center on the need for a trained provider to begin or terminate the method, its side effects, duration of use, method's ability to meet users' needs and preferences, and extra training or staff requirements. Logistics and economic issues to consider are identifying a dependable way of effectively supplying commodities, planning extra services needed for the method, and cost of providing the method. Each contraceptive method presents a different side effect pattern and burdens the service delivery setting differently. The strategy developed to introduce or expand the 3-month injectable Depo-Provera (DMPA) can be used for any method. It includes a needs assessment and addresses regulatory issues, service delivery policies and procedures, information and training, evaluation, and other concerns. Viet Nam's needs assessment showed that Norplant should not be introduced until the service delivery system becomes stronger. Any needs assessment for expansion of contraceptive services should cover sexually transmitted disease/HIV issues. A World Health Organization strategy helps officials identify the best method mix for local situations. Introductory strategies must aim to improve the quality of family planning programs and expand choices. Many begin by examining existing data and conducting interviews with policymakers, users, providers, and women's health advocates. Introductory programs for Norplant focus on provider training, adequate counseling and informed consent for users, and ready access to removal. They need a well-prepared service delivery infrastructure. The first phase of the DMPA introductory strategy for the Philippines comprised a social marketing campaign and DMPA introduction at public clinics in 10 pilot areas with strong service delivery. Successful AIDS prevention programs show that people tend to use barrier methods when they are available. USAID is currently studying

  17. An improved scheme on decoy-state method for measurement-device-independent quantum key distribution.

    PubMed

    Wang, Dong; Li, Mo; Guo, Guang-Can; Wang, Qin

    2015-10-14

    Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and two other existing ones, i.e., two-intensity decoy-states with single-photon-added coherent sources, and three-intensity decoy-states with weak coherent sources. Through numerical analysis, we demonstrate the advantages of our scheme in secure transmission distance and the final key generation rate.

  18. An improved scheme on decoy-state method for measurement-device-independent quantum key distribution

    PubMed Central

    Wang, Dong; Li, Mo; Guo, Guang-Can; Wang, Qin

    2015-01-01

    Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and two other existing ones, i.e., two-intensity decoy-states with single-photon-added coherent sources, and three-intensity decoy-states with weak coherent sources. Through numerical analysis, we demonstrate the advantages of our scheme in secure transmission distance and the final key generation rate. PMID:26463580

  19. Sample Language of Modified Contract Elements from Existing CBAs, MOUs, or EWAs to Support Turnaround

    ERIC Educational Resources Information Center

    Mass Insight Education (NJ1), 2011

    2011-01-01

    Organized by the key conditions areas for turnaround, "People, Program, Time and Money," this tool offers sample language for each contract element to serve as a model for modifications from a traditional CBA that may support a district's turnaround efforts. Sample language is offered from existing provisions in district-wide collective bargaining…

  20. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

    PubMed Central

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain. PMID:22319333

  1. Equality and selection for existence.

    PubMed Central

    Persson, I

    1999-01-01

    It is argued that the policy of excluding from further life some human gametes and pre-embryos as "unfit" for existence is not at odds with a defensible idea of human equality. Such an idea must be compatible with the obvious fact that the "functional" value of humans differs, that their "use" to themselves and others differs. A defensible idea of human equality is instead grounded in the fact that as this functional difference is genetically determined, it is nothing which makes humans deserve or be worthy of being better or worse off. Rather, nobody is worth a better life than anyone else. This idea of equality is, however, not applicable to gametes and pre-embryos, since they are not human beings, but something out of which human beings develop. PMID:10226918

  2. A Systematic Review on the Existing Screening Pathways for Lynch Syndrome Identification.

    PubMed

    Tognetto, Alessia; Michelazzo, Maria Benedetta; Calabró, Giovanna Elisa; Unim, Brigid; Di Marco, Marco; Ricciardi, Walter; Pastorino, Roberta; Boccia, Stefania

    2017-01-01

    Lynch syndrome (LS) is the most common hereditary colon cancer syndrome, accounting for 3-5% of colorectal cancer (CRC) cases, and it is associated with the development of other cancers. Early detection of individuals with LS is relevant, since they can take advantage of life-saving intensive care surveillance. The debate regarding the best screening policy, however, is far from being concluded. This prompted us to conduct a systematic review of the existing screening pathways for LS. We performed a systematic search of MEDLINE, ISI Web of Science, and SCOPUS online databases for the existing screening pathways for LS. The eligibility criteria for inclusion in this review required that the studies evaluated a structured and permanent screening pathway for the identification of LS carriers. The effectiveness of the pathways was analyzed in terms of LS detection rate. We identified five eligible studies. All the LS screening pathways started from CRC cases, of which three followed a universal screening approach. Concerning the laboratory procedures, the pathways used immunohistochemistry and/or microsatellite instability testing. If the responses of the tests indicated a risk for LS, the genetic counseling, performed by a geneticist or a genetic counselor, was mandatory to undergo DNA genetic testing. The overall LS detection rate ranged from 0 to 5.2%. This systematic review reported different existing pathways for the identification of LS patients. Although current clinical guidelines suggest to test all the CRC cases to identify LS cases, the actual implementation of pathways for LS identification has not been realized. Large-scale screening programs for LS have the potential to reduce morbidity and mortality for CRC, but coordinated efforts in educating all key stakeholders and addressing public needs are still required.

  3. Delay and cost performance analysis of the diffie-hellman key exchange protocol in opportunistic mobile networks

    NASA Astrophysics Data System (ADS)

    Soelistijanto, B.; Muliadi, V.

    2018-03-01

    Diffie-Hellman (DH) provides an efficient key exchange system by reducing the number of cryptographic keys distributed in the network. In this method, a node broadcasts a single public key to all nodes in the network, and in turn each peer uses this key to establish a shared secret key which then can be utilized to encrypt and decrypt traffic between the peer and the given node. In this paper, we evaluate the key transfer delay and cost performance of DH in opportunistic mobile networks, a specific scenario of MANETs where complete end-to-end paths rarely exist between sources and destinations; consequently, the end-to-end delays in these networks are much greater than typical MANETs. Simulation results, driven by a random node movement model and real human mobility traces, showed that DH outperforms a typical key distribution scheme based on the RSA algorithm in terms of key transfer delay, measured by average key convergence time; however, DH performs as well as the benchmark in terms of key transfer cost, evaluated by total key (copies) forwards.

  4. A fast image matching algorithm based on key points

    NASA Astrophysics Data System (ADS)

    Wang, Huilin; Wang, Ying; An, Ru; Yan, Peng

    2014-05-01

    Image matching is a very important technique in image processing. It has been widely used for object recognition and tracking, image retrieval, three-dimensional vision, change detection, aircraft position estimation, and multi-image registration. Based on the requirements of matching algorithm for craft navigation, such as speed, accuracy and adaptability, a fast key point image matching method is investigated and developed. The main research tasks includes: (1) Developing an improved celerity key point detection approach using self-adapting threshold of Features from Accelerated Segment Test (FAST). A method of calculating self-adapting threshold was introduced for images with different contrast. Hessian matrix was adopted to eliminate insecure edge points in order to obtain key points with higher stability. This approach in detecting key points has characteristics of small amount of computation, high positioning accuracy and strong anti-noise ability; (2) PCA-SIFT is utilized to describe key point. 128 dimensional vector are formed based on the SIFT method for the key points extracted. A low dimensional feature space was established by eigenvectors of all the key points, and each eigenvector was projected onto the feature space to form a low dimensional eigenvector. These key points were re-described by dimension-reduced eigenvectors. After reducing the dimension by the PCA, the descriptor was reduced to 20 dimensions from the original 128. This method can reduce dimensions of searching approximately near neighbors thereby increasing overall speed; (3) Distance ratio between the nearest neighbour and second nearest neighbour searching is regarded as the measurement criterion for initial matching points from which the original point pairs matched are obtained. Based on the analysis of the common methods (e.g. RANSAC (random sample consensus) and Hough transform cluster) used for elimination false matching point pairs, a heuristic local geometric restriction

  5. Approaches to a global quantum key distribution network

    NASA Astrophysics Data System (ADS)

    Islam, Tanvirul; Bedington, Robert; Ling, Alexander

    2017-10-01

    Progress in realising quantum computers threatens to weaken existing public key encryption infrastructure. A global quantum key distribution (QKD) network can play a role in computational attack-resistant encryption. Such a network could use a constellation of high altitude platforms such as airships and satellites as trusted nodes to facilitate QKD between any two points on the globe on demand. This requires both space-to-ground and inter-platform links. However, the prohibitive cost of traditional satellite based development limits the experimental work demonstrating relevant technologies. To accelerate progress towards a global network, we use an emerging class of shoe-box sized spacecraft known as CubeSats. We have designed a polarization entangled photon pair source that can operate on board CubeSats. The robustness and miniature form factor of our entanglement source makes it especially suitable for performing pathfinder missions that studies QKD between two high altitude platforms. The technological outcomes of such mission would be the essential building blocks for a global QKD network.

  6. On the existence of Rydberg nuclear molecules

    NASA Astrophysics Data System (ADS)

    Bertulani, C. A.; Frederico, T.; Hussein, M. S.

    2017-11-01

    Present nuclear detection techniques prevents us from determining if the analogue of a Rydberg molecule exists for the nuclear case. But nothing in nature disallows their existence. As in the atomic case, Rydberg nuclear molecules would be a laboratory for new aspects and applications of nuclear physics. We propose that Rydberg nuclear molecules, which represent the exotic, halo nuclei version, such as 11Be +11Be, of the well known quasimolecules observed in stable nuclei such as 12C +12C, might be common structures that could manifest their existence along the dripline. A study of possible candidates and the expected structure of such exotic clustering of two halo nuclei: the Rydberg nuclear molecules, is made on the basis of three different methods. It is shown that such cluster structures might be stable and unexpectedly common.

  7. Security of a single-state semi-quantum key distribution protocol

    NASA Astrophysics Data System (ADS)

    Zhang, Wei; Qiu, Daowen; Mateus, Paulo

    2018-06-01

    Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.

  8. Different Teams, Same Conclusions? A Systematic Review of Existing Clinical Guidelines for the Assessment and Treatment of Tinnitus in Adults.

    PubMed

    Fuller, Thomas E; Haider, Haula F; Kikidis, Dimitris; Lapira, Alec; Mazurek, Birgit; Norena, Arnaud; Rabau, Sarah; Lardinois, Rachelle; Cederroth, Christopher R; Edvall, Niklas K; Brueggemann, Petra G; Rosing, Susanne N; Kapandais, Anestis; Lungaard, Dorte; Hoare, Derek J; Cima, Rilana F F

    2017-01-01

    Background: Though clinical guidelines for assessment and treatment of chronic subjective tinnitus do exist, a comprehensive review of those guidelines has not been performed. The objective of this review was to identify current clinical guidelines, and compare their recommendations for the assessment and treatment of subjective tinnitus in adults. Method: We systematically searched a range of sources for clinical guidelines (as defined by the Institute of Medicine, United States) for the assessment and/or treatment of subjective tinnitus in adults. No restrictions on language or year of publication were applied to guidelines. Results: Clinical guidelines from Denmark, Germany, Sweden, The Netherlands, and the United States were included in the review. There was a high level of consistency across the guidelines with regard to recommendations for audiometric assessment, physical examination, use of a validated questionnaire(s) to assess tinnitus related distress, and referral to a psychologist when required. Cognitive behavioral treatment for tinnitus related distress, use of hearing aids in instances of hearing loss and recommendations against the use of medicines were consistent across the included guidelines. Differences between the guidelines centered on the use of imaging in assessment procedures and sound therapy as a form of treatment for tinnitus distress respectively. Conclusion: Given the level of commonality across tinnitus guidelines from different countries the development of a European guideline for the assessment and treatment of subjective tinnitus in adults seems feasible. This guideline would have the potential to benefit the large number of clinicians in countries where clinical guidelines do not yet exist, and would support standardization of treatment for patients across Europe.

  9. Key forecasts shaping nursing's perfect storm.

    PubMed

    Yoder-Wise, Patricia S

    2007-01-01

    Perfect storms abound in nursing and healthcare. How we plan for them and how we forecast effectively which ones will have tremendous impact on how we lead the profession is a challenge to anyone who is or will be a leader. This article focuses on key forecasts that contribute to creating perfect storms of the future. The "perfect storm" is a term found in multiple disciplines. The phrase denotes the condition that exists when events occur simultaneously with the result that this confluence has a greater impact than what could have resulted from a chance combination. Although perfect storms are rare, they have enormous impact when they occur, and if an alteration in any of the events occurs, the overall impact is lessened.

  10. Security analysis on some experimental quantum key distribution systems with imperfect optical and electrical devices

    NASA Astrophysics Data System (ADS)

    Liang, Lin-Mei; Sun, Shi-Hai; Jiang, Mu-Sheng; Li, Chun-Yan

    2014-10-01

    In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].

  11. Generating the local oscillator "locally" in continuous-variable quantum key distribution based on coherent detection

    DOE PAGES

    Qi, Bing; Lougovski, Pavel; Pooser, Raphael C.; ...

    2015-10-21

    Continuous-variable quantum key distribution (CV-QKD) protocols based on coherent detection have been studied extensively in both theory and experiment. In all the existing implementations of CV-QKD, both the quantum signal and the local oscillator (LO) are generated from the same laser and propagate through the insecure quantum channel. This arrangement may open security loopholes and limit the potential applications of CV-QKD. In our paper, we propose and demonstrate a pilot-aided feedforward data recovery scheme that enables reliable coherent detection using a “locally” generated LO. Using two independent commercial laser sources and a spool of 25-km optical fiber, we construct amore » coherent communication system. The variance of the phase noise introduced by the proposed scheme is measured to be 0.04 (rad 2), which is small enough to enable secure key distribution. This technology opens the door for other quantum communication protocols, such as the recently proposed measurement-device-independent CV-QKD, where independent light sources are employed by different users.« less

  12. Neuroscience from a mathematical perspective: key concepts, scales and scaling hypothesis, universality.

    PubMed

    van Hemmen, J Leo

    2014-10-01

    This article analyzes the question of whether neuroscience allows for mathematical descriptions and whether an interaction between experimental and theoretical neuroscience can be expected to benefit both of them. It is argued that a mathematization of natural phenomena never happens by itself. First, appropriate key concepts must be found that are intimately connected with the phenomena one wishes to describe and explain mathematically. Second, the scale on, and not beyond, which a specific description can hold must be specified. Different scales allow for different conceptual and mathematical descriptions. This is the scaling hypothesis. Third, can a mathematical description be universally valid and, if so, how? Here we put forth the argument that universals also exist in theoretical neuroscience, that evolution proves the rule, and that theoretical neuroscience is a domain with still lots of space for new developments initiated by an intensive interaction with experiment. Finally, major insight is provided by a careful analysis of the way in which particular brain structures respond to perceptual input and in so doing induce action in an animal's surroundings.

  13. Integrated quantum key distribution sender unit for daily-life implementations

    NASA Astrophysics Data System (ADS)

    Mélen, Gwenaelle; Vogl, Tobias; Rau, Markus; Corrielli, Giacomo; Crespi, Andrea; Osellame, Roberto; Weinfurter, Harald

    2016-03-01

    Unlike currently implemented encryption schemes, Quantum Key Distribution provides a secure way of generating and distributing a key among two parties. Although a multitude of research platforms has been developed, the integration of QKD units within classical communication systems remains a tremendous challenge. The recently achieved maturity of integrated photonic technologies could be exploited to create miniature QKD add-ons that could extend the primary function of various existing systems such as mobile devices or optical stations. In this work we report on an integrated optics module enabling secure short-distance communication for, e.g., quantum access schemes. Using BB84-like protocols, Alice's mobile low-cost device can exchange secure key and information everywhere within a trusted node network. The new optics platform (35×20×8mm) compatible with current smartphone's technology generates NIR faint polarised laser pulses with 100MHz repetition rate. Fully automated beam tracking and live basis-alignment on Bob's side ensure user-friendly operation with a quantum link efficiency as high as 50% stable over a few seconds.

  14. Key management of the double random-phase-encoding method using public-key encryption

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  15. Optical key system

    DOEpatents

    Hagans, Karla G.; Clough, Robert E.

    2000-01-01

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.

  16. Diversity of key players in the microbial ecosystems of the human body

    PubMed Central

    Jordán, Ferenc; Lauria, Mario; Scotti, Marco; Nguyen, Thanh-Phuong; Praveen, Paurush; Morine, Melissa; Priami, Corrado

    2015-01-01

    Coexisting bacteria form various microbial communities in human body parts. In these ecosystems they interact in various ways and the properties of the interaction network can be related to the stability and functional diversity of the local bacterial community. In this study, we analyze the interaction network among bacterial OTUs in 11 locations of the human body. These belong to two major groups. One is the digestive system and the other is the female genital tract. In each local ecosystem we determine the key species, both the ones being in key positions in the interaction network and the ones that dominate by frequency. Beyond identifying the key players and discussing their biological relevance, we also quantify and compare the properties of the 11 networks. The interaction networks of the female genital system and the digestive system show totally different architecture. Both the topological properties and the identity of the key groups differ. Key groups represent four phyla of prokaryotes. Some groups appear in key positions in several locations, while others are assigned only to a single body part. The key groups of the digestive and the genital tracts are totally different. PMID:26514870

  17. Diversity of key players in the microbial ecosystems of the human body.

    PubMed

    Jordán, Ferenc; Lauria, Mario; Scotti, Marco; Nguyen, Thanh-Phuong; Praveen, Paurush; Morine, Melissa; Priami, Corrado

    2015-10-30

    Coexisting bacteria form various microbial communities in human body parts. In these ecosystems they interact in various ways and the properties of the interaction network can be related to the stability and functional diversity of the local bacterial community. In this study, we analyze the interaction network among bacterial OTUs in 11 locations of the human body. These belong to two major groups. One is the digestive system and the other is the female genital tract. In each local ecosystem we determine the key species, both the ones being in key positions in the interaction network and the ones that dominate by frequency. Beyond identifying the key players and discussing their biological relevance, we also quantify and compare the properties of the 11 networks. The interaction networks of the female genital system and the digestive system show totally different architecture. Both the topological properties and the identity of the key groups differ. Key groups represent four phyla of prokaryotes. Some groups appear in key positions in several locations, while others are assigned only to a single body part. The key groups of the digestive and the genital tracts are totally different.

  18. Medical technology as a key driver of rising health expenditure: disentangling the relationship

    PubMed Central

    Sorenson, Corinna; Drummond, Michael; Bhuiyan Khan, Beena

    2013-01-01

    Health care spending has risen steadily in most countries, becoming a concern for decision-makers worldwide. Commentators often point to new medical technology as the key driver for burgeoning expenditures. This paper critically appraises this conjecture, based on an analysis of the existing literature, with the aim of offering a more detailed and considered analysis of this relationship. Several databases were searched to identify relevant literature. Various categories of studies (eg, multivariate and cost-effectiveness analyses) were included to cover different perspectives, methodological approaches, and issues regarding the link between medical technology and costs. Selected articles were reviewed and relevant information was extracted into a standardized template and analyzed for key cross-cutting themes, ie, impact of technology on costs, factors influencing this relationship, and methodological challenges in measuring such linkages. A total of 86 studies were reviewed. The analysis suggests that the relationship between medical technology and spending is complex and often conflicting. Findings were frequently contingent on varying factors, such as the availability of other interventions, patient population, and the methodological approach employed. Moreover, the impact of technology on costs differed across technologies, in that some (eg, cancer drugs, invasive medical devices) had significant financial implications, while others were cost-neutral or cost-saving. In light of these issues, we argue that decision-makers and other commentators should extend their focus beyond costs solely to include consideration of whether medical technology results in better value in health care and broader socioeconomic benefits. PMID:23807855

  19. Easier detection of invertebrate "identification-key characters" with light of different wavelengths

    PubMed Central

    2011-01-01

    The marine α-taxonomist often encounters two problems. Firstly, the "environmental dirt" that is frequently present on the specimens and secondly the difficulty in distinguishing key-features due to the uniform colours which fixed animals often adopt. Here we show that illuminating animals with deep-blue or ultraviolet light instead of the normal white-light abrogates both difficulties; dirt disappears and important details become clearly visible. This light regime has also two other advantages. It allows easy detection of very small, normally invisible, animals (0.1 μm range). And as these light wavelengths can induce fluorescence, new identification markers may be discovered by this approach. PMID:22040277

  20. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  1. Finite-key analysis for measurement-device-independent quantum key distribution.

    PubMed

    Curty, Marcos; Xu, Feihu; Cui, Wei; Lim, Charles Ci Wen; Tamaki, Kiyoshi; Lo, Hoi-Kwong

    2014-04-29

    Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measurement-device-independent quantum key distribution--has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.

  2. Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations

    NASA Astrophysics Data System (ADS)

    Reid, M. D.

    2000-12-01

    Correlations of the type discussed by EPR in their original 1935 paradox for continuous variables exist for the quadrature phase amplitudes of two spatially separated fields. These correlations were first experimentally reported in 1992. We propose to use such EPR beams in quantum cryptography, to transmit with high efficiency messages in such a way that the receiver and sender may later determine whether eavesdropping has occurred. The merit of the new proposal is in the possibility of transmitting a reasonably secure yet predetermined key. This would allow relay of a cryptographic key over long distances in the presence of lossy channels.

  3. Different Teams, Same Conclusions? A Systematic Review of Existing Clinical Guidelines for the Assessment and Treatment of Tinnitus in Adults

    PubMed Central

    Fuller, Thomas E.; Haider, Haula F.; Kikidis, Dimitris; Lapira, Alec; Mazurek, Birgit; Norena, Arnaud; Rabau, Sarah; Lardinois, Rachelle; Cederroth, Christopher R.; Edvall, Niklas K.; Brueggemann, Petra G.; Rosing, Susanne N.; Kapandais, Anestis; Lungaard, Dorte; Hoare, Derek J.; Cima, Rilana F. F

    2017-01-01

    Background: Though clinical guidelines for assessment and treatment of chronic subjective tinnitus do exist, a comprehensive review of those guidelines has not been performed. The objective of this review was to identify current clinical guidelines, and compare their recommendations for the assessment and treatment of subjective tinnitus in adults. Method: We systematically searched a range of sources for clinical guidelines (as defined by the Institute of Medicine, United States) for the assessment and/or treatment of subjective tinnitus in adults. No restrictions on language or year of publication were applied to guidelines. Results: Clinical guidelines from Denmark, Germany, Sweden, The Netherlands, and the United States were included in the review. There was a high level of consistency across the guidelines with regard to recommendations for audiometric assessment, physical examination, use of a validated questionnaire(s) to assess tinnitus related distress, and referral to a psychologist when required. Cognitive behavioral treatment for tinnitus related distress, use of hearing aids in instances of hearing loss and recommendations against the use of medicines were consistent across the included guidelines. Differences between the guidelines centered on the use of imaging in assessment procedures and sound therapy as a form of treatment for tinnitus distress respectively. Conclusion: Given the level of commonality across tinnitus guidelines from different countries the development of a European guideline for the assessment and treatment of subjective tinnitus in adults seems feasible. This guideline would have the potential to benefit the large number of clinicians in countries where clinical guidelines do not yet exist, and would support standardization of treatment for patients across Europe. PMID:28275357

  4. Do event horizons exist?

    NASA Astrophysics Data System (ADS)

    Baccetti, Valentina; Mann, Robert B.; Terno, Daniel R.

    Event horizons are the defining feature of classical black holes. They are the key ingredient of the information loss paradox which, as paradoxes in quantum foundations, is built on a combination of predictions of quantum theory and counterfactual classical features: neither horizon formation nor its crossing by a test body can be detected by a distant observer. Furthermore, horizons are unnecessary for the production of Hawking-like radiation. We demonstrate that when this radiation is taken into account, it can prevent horizon crossing/formation in a large class of models. We conjecture that horizon avoidance is a general feature of collapse. The nonexistence of event horizons dispels the paradox, but opens up important questions about thermodynamic properties of the resulting objects and correlations between different degrees of freedom.

  5. Optical key system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hagans, K.G.; Clough, R.E.

    2000-04-25

    An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam ofmore » light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.« less

  6. Reserves in load capacity assessment of existing bridges

    NASA Astrophysics Data System (ADS)

    Žitný, Jan; Ryjáček, Pavel

    2017-09-01

    High percentage of all railway bridges in the Czech Republic is made of structural steel. Majority of these bridges is designed according to historical codes and according to the deterioration, they have to be assessed if they satisfy the needs of modern railway traffic. The load capacity assessment of existing bridges according to Eurocodes is however often too conservative and especially, braking and acceleration forces cause huge problems to structural elements of the bridge superstructure. The aim of this paper is to review the different approaches for the determination of braking and acceleration forces. Both, current and historical theoretical models and in-situ measurements are considered. The research of several local European state norms superior to Eurocode for assessment of existing railway bridges shows the big diversity of used local approaches and the conservativeness of Eurocode. This paper should also work as an overview for designers dealing with load capacity assessment, revealing the reserves for existing bridges. Based on these different approaches, theoretical models and data obtained from the measurements, the method for determination of braking and acceleration forces on the basis of real traffic data should be proposed.

  7. Work Keys USA.

    ERIC Educational Resources Information Center

    Work Keys USA, 1998

    1998-01-01

    "Work Keys" is a comprehensive program for assessing and teaching workplace skills. This serial "special issue" features 18 first-hand reports on Work Keys projects in action in states across North America. They show how the Work Keys is helping businesses and educators solve the challenge of building a world-class work force.…

  8. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD aremore » extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.« less

  9. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  10. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2015-01-06

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  11. Modeling the dynamics of piano keys

    NASA Astrophysics Data System (ADS)

    Brenon, Celine; Boutillon, Xavier

    2003-10-01

    The models of piano keys available in the literature are crude: two degrees of freedom and a very few dynamical or geometrical parameters. Experiments on different piano mechanisms (upright, grand, one type of numerical keyboard) exhibit strong differences in the two successive phases of the key motion which are controlled by the finger. Understanding the controllability of the escapement velocity (typically a few percents for professional pianists), the differences between upright and grand pianos, the rationale for the numerous independent adjustments by technicians, and the feel by the pianist require sophisticated modeling. In addition to the inertia of the six independently moving parts of a grand piano mechanism, a careful modeling of friction at pivots and between the jack and the roll, of damping and nonlinearities in felts, and of internal springs will be presented. Simulations will be confronted to the measurements of the motions of the different parts. Currently, the first phase of the motion and the transition to the second phase are well understood while some progress must still be made in order to describe correctly this short but important phase before the escapement of the hammer. [Work done in part at the Laboratory for Musical Acoustics, Paris.

  12. Alternative Placements: Does a Difference Exist in the LD Populations?

    ERIC Educational Resources Information Center

    Olson, Judy; Midgett, Jeanice

    1984-01-01

    The performance of learning disabled male elementary students in self-contained classes (N=35) and resource rooms (N=50) was compared on five diagnostic tests and factors of retention, chronological age, and behavior. Results indicated a difference only in the intelligence factor between the groups. (Authors)

  13. EXIST Perspective for SFXTs

    NASA Astrophysics Data System (ADS)

    Ubertini, Pietro; Sidoli, L.; Sguera, V.; Bazzano, A.

    2009-12-01

    Supergiant Fast X-ray Transients (SFXTs) are one of the most interesting (and unexpected) results of the INTEGRAL mission. They are a new class of HMXBs displaying short hard X-ray outbursts (duration less tha a day) characterized by fast flares (few hours timescale) and large dinamic range (10E3-10E4). The physical mechanism driving their peculiar behaviour is still unclear and highly debated: some models involve the structure of the supergiant companion donor wind (likely clumpy, in a spherical or non spherical geometry) and the orbital properties (wide separation with eccentric or circular orbit), while others involve the properties of the neutron star compact object and invoke very low magnetic field values (B < 1E10 G) or alternatively very high (B>1E14 G, magnetars). The picture is still highly unclear from the observational point of view as well: no cyclotron lines have been detected in the spectra, thus the strength of the neutron star magnetic field is unknown. Orbital periods have been measured in only 4 systems, spanning from 3.3 days to 165 days. Even the duty cycle seems to be quite different from source to source. The Energetic X-ray Imaging Survey Telescope (EXIST), with its hard X-ray all-sky survey and large improved limiting sensitivity, will allow us to get a clearer picture of SFXTs. A complete census of their number is essential to enlarge the sample. A long term and continuous as possible X-ray monitoring is crucial to -(1) obtain the duty cycle, -(2 )investigate their unknown orbital properties (separation, orbital period, eccentricity),- (3) to completely cover the whole outburst activity, (4)-to search for cyclotron lines in the high energy spectra. EXIST observations will provide crucial informations to test the different models and shed light on the peculiar behaviour of SFXTs.

  14. Analysis of key safety metrics of thorium utilization in LWRs

    DOE PAGES

    Ade, Brian J.; Bowman, Stephen M.; Worrall, Andrew; ...

    2016-04-08

    Here, thorium has great potential to stretch nuclear fuel reserves because of its natural abundance and because it is possible to breed the 232Th isotope into a fissile fuel ( 233U). Various scenarios exist for utilization of thorium in the nuclear fuel cycle, including use in different nuclear reactor types (e.g., light water, high-temperature gas-cooled, fast spectrum sodium, and molten salt reactors), along with use in advanced accelerator-driven systems and even in fission-fusion hybrid systems. The most likely near-term application of thorium in the United States is in currently operating light water reactors (LWRs). This use is primarily based onmore » concepts that mix thorium with uranium (UO 2 + ThO 2) or that add fertile thorium (ThO 2) fuel pins to typical LWR fuel assemblies. Utilization of mixed fuel assemblies (PuO 2 + ThO 2) is also possible. The addition of thorium to currently operating LWRs would result in a number of different phenomenological impacts to the nuclear fuel. Thorium and its irradiation products have different nuclear characteristics from those of uranium and its irradiation products. ThO 2, alone or mixed with UO 2 fuel, leads to different chemical and physical properties of the fuel. These key reactor safety–related issues have been studied at Oak Ridge National Laboratory and documented in “Safety and Regulatory Issues of the Thorium Fuel Cycle” (NUREG/CR-7176, U.S. Nuclear Regulatory Commission, 2014). Various reactor analyses were performed using the SCALE code system for comparison of key performance parameters of both ThO 2 + UO 2 and ThO 2 + PuO 2 against those of UO 2 and typical UO 2 + PuO 2 mixed oxide fuels, including reactivity coefficients and power sharing between surrounding UO 2 assemblies and the assembly of interest. The decay heat and radiological source terms for spent fuel after its discharge from the reactor are also presented. Based on this evaluation, potential impacts on safety requirements and

  15. Consensus building for interlaboratory studies, key comparisons, and meta-analysis

    NASA Astrophysics Data System (ADS)

    Koepke, Amanda; Lafarge, Thomas; Possolo, Antonio; Toman, Blaza

    2017-06-01

    Interlaboratory studies in measurement science, including key comparisons, and meta-analyses in several fields, including medicine, serve to intercompare measurement results obtained independently, and typically produce a consensus value for the common measurand that blends the values measured by the participants. Since interlaboratory studies and meta-analyses reveal and quantify differences between measured values, regardless of the underlying causes for such differences, they also provide so-called ‘top-down’ evaluations of measurement uncertainty. Measured values are often substantially over-dispersed by comparison with their individual, stated uncertainties, thus suggesting the existence of yet unrecognized sources of uncertainty (dark uncertainty). We contrast two different approaches to take dark uncertainty into account both in the computation of consensus values and in the evaluation of the associated uncertainty, which have traditionally been preferred by different scientific communities. One inflates the stated uncertainties by a multiplicative factor. The other adds laboratory-specific ‘effects’ to the value of the measurand. After distinguishing what we call recipe-based and model-based approaches to data reductions in interlaboratory studies, we state six guiding principles that should inform such reductions. These principles favor model-based approaches that expose and facilitate the critical assessment of validating assumptions, and give preeminence to substantive criteria to determine which measurement results to include, and which to exclude, as opposed to purely statistical considerations, and also how to weigh them. Following an overview of maximum likelihood methods, three general purpose procedures for data reduction are described in detail, including explanations of how the consensus value and degrees of equivalence are computed, and the associated uncertainty evaluated: the DerSimonian-Laird procedure; a hierarchical Bayesian

  16. Keys to Scholarship

    ERIC Educational Resources Information Center

    Hebert, Terri

    2011-01-01

    Up ahead, a foreboding wooden door showing wear from passage of earlier travelers is spotted. As the old porch light emits a pale yellow glow, a key ring emerges from deep inside the coat pocket. Searching for just the right key, the voyager settles on one that also shows age. As the key enters its receptacle and begins to turn, a clicking noise…

  17. Distinct Circular Single-Stranded DNA Viruses Exist in Different Soil Types

    PubMed Central

    Swanson, Maud M.; Dawson, Lorna; Freitag, Thomas E.; Singh, Brajesh K.; Torrance, Lesley; Mushegian, Arcady R.

    2015-01-01

    The potential dependence of virus populations on soil types was examined by electron microscopy, and the total abundance of virus particles in four soil types was similar to that previously observed in soil samples. The four soil types examined differed in the relative abundances of four morphological groups of viruses. Machair, a unique type of coastal soil in western Scotland and Ireland, differed from the others tested in having a higher proportion of tailed bacteriophages. The other soils examined contained predominantly spherical and thin filamentous virus particles, but the Machair soil had a more even distribution of the virus types. As the first step in looking at differences in populations in detail, virus sequences from Machair and brown earth (agricultural pasture) soils were examined by metagenomic sequencing after enriching for circular Rep-encoding single-stranded DNA (ssDNA) (CRESS-DNA) virus genomes. Sequences from the family Microviridae (icosahedral viruses mainly infecting bacteria) of CRESS-DNA viruses were predominant in both soils. Phylogenetic analysis of Microviridae major coat protein sequences from the Machair viruses showed that they spanned most of the diversity of the subfamily Gokushovirinae, whose members mainly infect obligate intracellular parasites. The brown earth soil had a higher proportion of sequences that matched the morphologically similar family Circoviridae in BLAST searches. However, analysis of putative replicase proteins that were similar to those of viruses in the Circoviridae showed that they are a novel clade of Circoviridae-related CRESS-DNA viruses distinct from known Circoviridae genera. Different soils have substantially different taxonomic biodiversities even within ssDNA viruses, which may be driven by physicochemical factors. PMID:25841004

  18. Determining if Instructional Delivery Model Differences Exist in Remedial English

    ERIC Educational Resources Information Center

    Carter, LaTanya Woods

    2012-01-01

    The purpose of this causal comparative study is to test the theory of no significant difference that compares pre- and post-test assessment scores, controlling for the instructional delivery model of online and face-to-face students at a Mid-Atlantic university. Online education and virtual distance learning programs have increased in popularity…

  19. Key management and encryption under the bounded storage model.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Draelos, Timothy John; Neumann, William Douglas; Lanzone, Andrew J.

    2005-11-01

    There are several engineering obstacles that need to be solved before key management and encryption under the bounded storage model can be realized. One of the critical obstacles hindering its adoption is the construction of a scheme that achieves reliable communication in the event that timing synchronization errors occur. One of the main accomplishments of this project was the development of a new scheme that solves this problem. We show in general that there exist message encoding techniques under the bounded storage model that provide an arbitrarily small probability of transmission error. We compute the maximum capacity of this channelmore » using the unsynchronized key-expansion as side-channel information at the decoder and provide tight lower bounds for a particular class of key-expansion functions that are pseudo-invariant to timing errors. Using our results in combination with Dziembowski et al. [11] encryption scheme we can construct a scheme that solves the timing synchronization error problem. In addition to this work we conducted a detailed case study of current and future storage technologies. We analyzed the cost, capacity, and storage data rate of various technologies, so that precise security parameters can be developed for bounded storage encryption schemes. This will provide an invaluable tool for developing these schemes in practice.« less

  20. Analytical template protection performance and maximum key size given a Gaussian-modeled biometric source

    NASA Astrophysics Data System (ADS)

    Kelkboom, Emile J. C.; Breebaart, Jeroen; Buhan, Ileana; Veldhuis, Raymond N. J.

    2010-04-01

    Template protection techniques are used within biometric systems in order to protect the stored biometric template against privacy and security threats. A great portion of template protection techniques are based on extracting a key from or binding a key to a biometric sample. The achieved protection depends on the size of the key and its closeness to being random. In the literature it can be observed that there is a large variation on the reported key lengths at similar classification performance of the same template protection system, even when based on the same biometric modality and database. In this work we determine the analytical relationship between the system performance and the theoretical maximum key size given a biometric source modeled by parallel Gaussian channels. We consider the case where the source capacity is evenly distributed across all channels and the channels are independent. We also determine the effect of the parameters such as the source capacity, the number of enrolment and verification samples, and the operating point selection on the maximum key size. We show that a trade-off exists between the privacy protection of the biometric system and its convenience for its users.

  1. Effective user management with high strength crypto -key in dynamic group environment in cloud

    NASA Astrophysics Data System (ADS)

    Kumar, P. J.; Suganya, P.; Karthik, G.

    2017-11-01

    Cloud Clusters consists of various collections of files which are being accessed by multiple users of Cloud. The users are managed as a group and the association of the user to a particular group is dynamic in nature. Every group has a manager who handles the membership of a user to a particular group by issuing keys for encryption and decryption. Due to the dynamic nature of a user he/she may leave the group very frequently. But an attempt can be made by the user who has recently left the group to access a file maintained by that group. Key distribution becomes a critical issue while the behavior of the user is dynamic. Existing techniques to manage the users of group in terms of security and key distribution has been investigated so that to arrive at an objective to identify the scopes to increase security and key management scheme in cloud. The usage of various key combinations to measure the strength of security and efficiency of user management in dynamic cloud environment has been investigated.

  2. Advanced emphysema in African-American and white patients: do differences exist?

    PubMed

    Chatila, Wissam M; Hoffman, Eric A; Gaughan, John; Robinswood, G Blake; Criner, Gerard J

    2006-07-01

    Emphysema is the only smoking-related disease in which white patients have higher prevalence and higher attributable mortality rates than African-American patients. Epidemiologic studies have not addressed, nor explained, the observed racial differences in emphysema. To determine whether white and African-American patients differ with respect to the magnitude, anatomic distribution, and physiologic impairments of emphysema. Characteristics of patients with severe and very severe emphysema enrolled in the National Emphysema Treatment Trial were examined and compared. Patient demographics, cardiopulmonary function, quality of life, and severity/distribution of the emphysema by quantitative CT were analyzed. Of the 1,218 patients enrolled in the trial, 42 were African American (3.4%) and 1,156 were white (95%). African Americans were younger (mean age +/- SD, 63 +/- 7 years vs 67 +/- 6 years) and smoked less (26 +/- 14 cigarettes per day vs 32 +/- 14 cigarettes per day) than white patients (p = 0.01). There was no difference between the two racial groups in pulmonary function (FEV1, 27 +/- 6% predicted vs 27 +/- 7% predicted), gas exchange (Pa(O2), 66 +/- 11 mm Hg vs 65 +/- 10 mm Hg), and exercise (33 +/- 14 W vs 36 +/- 21 W), respectively. Quality of life measures were similar between the groups, but African Americans had a lower socioeconomic status, lower education level, and fewer were married. Radiographic analysis of the extent of emphysema in African Americans, who were matched with selected white patients, revealed significantly less emphysema in the former group and different distribution of severe emphysema. African Americans with emphysema were younger and had a similar degree of lung impairment as the white study population despite smoking less. In a subgroup of matched patients, the severity and distribution of emphysema by quantitative radiographic analysis were different.

  3. Europa Explorer - An Exceptional Mission Using Existing Technology

    NASA Technical Reports Server (NTRS)

    Clark, Karla B.

    2007-01-01

    A mission to Europa has been identified as a high priority by the science community for several years. The difficulty of an orbital mission, primarily due to the propulsive requirements and Jupiter's trapped radiation, led to many studies which investigated various approaches to meeting the science goals. The Europa Orbiter Mission studied in the late 1990's only met the most fundamental science objectives. The science objectives have evolved with the discoveries from the Galileo mission. JPL studied one concept, Europa Explorer, for a Europa orbiting mission which could meet a much expanded set of science objectives. A study science group was formed to verify that the science objectives and goals were being adequately met by the resulting mission design concept. The Europa Explorer design emerged primarily from two key self-imposed constraints: 1) meet the full set of identified nonlander science objectives and 2) use only existing technology.

  4. Key challenges for nanotechnology: Standardization of ecotoxicity testing.

    PubMed

    Cerrillo, Cristina; Barandika, Gotzone; Igartua, Amaya; Areitioaurtena, Olatz; Mendoza, Gemma

    2017-04-03

    Nanotechnology is expected to contribute to the protection of the environment, but many uncertainties exist regarding the environmental and human implications of manufactured nanomaterials (MNMs). Contradictory results have been reported for their ecotoxicity to aquatic organisms, which constitute one of the most important pathways for their entrance and transfer throughout the food web. The present review is focused on the international strategies that are laying the foundations of the ecotoxicological assessment of MNMs. Specific advice is provided on the preparation of MNM dispersions in the culture media of the organisms, which is considered a key factor to overcome the limitations in the standardization of the test methodologies.

  5. Addressing criticisms of existing predictive bias research: cognitive ability test scores still overpredict African Americans' job performance.

    PubMed

    Berry, Christopher M; Zhao, Peng

    2015-01-01

    Predictive bias studies have generally suggested that cognitive ability test scores overpredict job performance of African Americans, meaning these tests are not predictively biased against African Americans. However, at least 2 issues call into question existing over-/underprediction evidence: (a) a bias identified by Aguinis, Culpepper, and Pierce (2010) in the intercept test typically used to assess over-/underprediction and (b) a focus on the level of observed validity instead of operational validity. The present study developed and utilized a method of assessing over-/underprediction that draws on the math of subgroup regression intercept differences, does not rely on the biased intercept test, allows for analysis at the level of operational validity, and can use meta-analytic estimates as input values. Therefore, existing meta-analytic estimates of key parameters, corrected for relevant statistical artifacts, were used to determine whether African American job performance remains overpredicted at the level of operational validity. African American job performance was typically overpredicted by cognitive ability tests across levels of job complexity and across conditions wherein African American and White regression slopes did and did not differ. Because the present study does not rely on the biased intercept test and because appropriate statistical artifact corrections were carried out, the present study's results are not affected by the 2 issues mentioned above. The present study represents strong evidence that cognitive ability tests generally overpredict job performance of African Americans. (c) 2015 APA, all rights reserved.

  6. Key Odorants Regulate Food Attraction in Drosophila melanogaster

    PubMed Central

    Giang, Thomas; He, Jianzheng; Belaidi, Safaa; Scholz, Henrike

    2017-01-01

    In insects, the search for food is highly dependent on olfactory sensory input. Here, we investigated whether a single key odorant within an odor blend or the complexity of the odor blend influences the attraction of Drosophila melanogaster to a food source. A key odorant is defined as an odorant that elicits a difference in the behavioral response when two similar complex odor blends are offered. To validate that the observed behavioral responses were elicited by olfactory stimuli, we used olfactory co-receptor Orco mutants. We show that within a food odor blend, ethanol functions as a key odorant. In addition to ethanol other odorants might serve as key odorants at specific concentrations. However, not all odorants are key odorants. The intensity of the odor background influences the attractiveness of the key odorants. Increased complexity is only more attractive in a concentration-dependent range for single compounds in a blend. Orco is necessary to discriminate between two similarly attractive odorants when offered as single odorants and in food odor blends, supporting the importance of single odorant recognition in odor blends. These data strongly indicate that flies use more than one strategy to navigate to a food odor source, depending on the availability of key odorants in the odor blend and the alternative odor offered. PMID:28928642

  7. Key-lock colloids in a nematic liquid crystal.

    PubMed

    Silvestre, Nuno M; Tasinkevych, M

    2017-01-01

    The Landau-de Gennes free energy is used to study theoretically the effective interaction of spherical "key" and anisotropic "lock" colloidal particles. We assume identical anchoring properties of the surfaces of the key and of the lock particles, and we consider planar degenerate and perpendicular anchoring conditions separately. The lock particle is modeled as a spherical particle with a spherical dimple. When such a particle is introduced into a nematic liquid crystal, it orients its dimple at an oblique angle θ_{eq} with respect to the far field director n_{∞}. This angle depends on the depth of the dimple. Minimization results show that the free energy of a pair of key and lock particles exhibits a global minimum for the configuration when the key particle is facing the dimple of the lock colloidal particle. The preferred orientation ϕ_{eq} of the key-lock composite doublet relative to n_{∞} is robust against thermal fluctuations. The preferred orientation θ_{eq}^{(2)} of the dimple particle in the doublet is different from the isolated situation. This is related to the "direct" interaction of defects accompanying the key particle with the edge of the dimple. We propose that this nematic-amplified key-lock interaction can play an important role in self-organization and clustering of mixtures of colloidal particles with dimple colloids present.

  8. [Do regional and generational differences in attitudes toward "Luck Resource Belief" exist?].

    PubMed

    Murakami, Koshi

    2016-04-01

    This article examines whether belief in superstitions and folklore differs by age and degree of modernization specifically. This study investigated regional and generational differences in attitudes toward "Luck Resource Belief," a notion regarding luck. The 500 Japanese participants in our sample were stratified by place of residence, age, and income. The results reflected gender differences, but not regional or generational differences with regard to the "Luck Resource Belief" scale scores. Based on these results, the hypothesis that the mass media plays a major role in the dissemination of information about superstitions and folklore is discussed in this context.

  9. Greening Existing Tribal Buildings

    EPA Pesticide Factsheets

    Guidance about improving sustainability in existing tribal casinos and manufactured homes. Many steps can be taken to make existing buildings greener and healthier. They may also reduce utility and medical costs.

  10. Materializing Heart Regeneration: Biomimicry of Key Observations in Cell Transplantation Therapies and Natural Cardiac Regeneration

    NASA Astrophysics Data System (ADS)

    Kong, Yen P.; Jongpaiboonkit, Leena

    2016-07-01

    New regenerative paradigms are needed to address the growing global problem of heart failure as existing interventions are unsatisfactory. Outcomes from the current paradigm of cell transplantation have not been stellar but the mechanistic knowledge learned from them is instructive in the development of future paradigms. An emerging biomaterial-based approach incorporating key mechanisms and additional ones scrutinized from the process of natural heart regeneration in zebrafish may become the next evolution in cardiac repair. We highlight, with examples, tested key concepts and pivotal ones that may be integrated into a successful therapy.

  11. Improved key-rate bounds for practical decoy-state quantum-key-distribution systems

    NASA Astrophysics Data System (ADS)

    Zhang, Zhen; Zhao, Qi; Razavi, Mohsen; Ma, Xiongfeng

    2017-01-01

    The decoy-state scheme is the most widely implemented quantum-key-distribution protocol in practice. In order to account for the finite-size key effects on the achievable secret key generation rate, a rigorous statistical fluctuation analysis is required. Originally, a heuristic Gaussian-approximation technique was used for this purpose, which, despite its analytical convenience, was not sufficiently rigorous. The fluctuation analysis has recently been made rigorous by using the Chernoff bound. There is a considerable gap, however, between the key-rate bounds obtained from these techniques and that obtained from the Gaussian assumption. Here we develop a tighter bound for the decoy-state method, which yields a smaller failure probability. This improvement results in a higher key rate and increases the maximum distance over which secure key exchange is possible. By optimizing the system parameters, our simulation results show that our method almost closes the gap between the two previously proposed techniques and achieves a performance similar to that of conventional Gaussian approximations.

  12. Key Working for Families with Young Disabled Children

    PubMed Central

    Carter, Bernie; Thomas, Megan

    2011-01-01

    For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop). Data were collected from 43 participants (parents, key workers, and other stakeholders). All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals, and other

  13. It is AN Illusion to Think that 'things' Exist

    NASA Astrophysics Data System (ADS)

    Jensen, Henrik Jeldtoft

    The world consists of inter-connected processes. It is an illusion to think that things exist. As argued by Alfred North Whitehead processes are ontologically fundamental. Since the building blocks do not consist of things with specific intrinsic properties, we can hope that a general science of the processes underlying and controlling the behavior of apparently very different situations, such as the evolution of an ecosystem or the performance of a piece of music by a band, may very well exist...

  14. Quantum key distribution with 1.25 Gbps clock synchronization.

    PubMed

    Bienfang, J; Gross, A; Mink, A; Hershman, B; Nakassis, A; Tang, X; Lu, R; Su, D; Clark, Charles; Williams, Carl; Hagley, E; Wen, Jesse

    2004-05-03

    We have demonstrated the exchange of sifted quantum cryptographic key over a 730 meter free-space link at rates of up to 1.0 Mbps, two orders of magnitude faster than previously reported results. A classical channel at 1550 nm operates in parallel with a quantum channel at 845 nm. Clock recovery techniques on the classical channel at 1.25 Gbps enable quantum transmission at up to the clock rate. System performance is currently limited by the timing resolution of our silicon avalanche photodiode detectors. With improved detector resolution, our technique will yield another order of magnitude increase in performance, with existing technology.

  15. The use of mode of action information in risk assessment: quantitative key events/dose-response framework for modeling the dose-response for key events.

    PubMed

    Simon, Ted W; Simons, S Stoney; Preston, R Julian; Boobis, Alan R; Cohen, Samuel M; Doerrer, Nancy G; Fenner-Crisp, Penelope A; McMullin, Tami S; McQueen, Charlene A; Rowlands, J Craig

    2014-08-01

    The HESI RISK21 project formed the Dose-Response/Mode-of-Action Subteam to develop strategies for using all available data (in vitro, in vivo, and in silico) to advance the next-generation of chemical risk assessments. A goal of the Subteam is to enhance the existing Mode of Action/Human Relevance Framework and Key Events/Dose Response Framework (KEDRF) to make the best use of quantitative dose-response and timing information for Key Events (KEs). The resulting Quantitative Key Events/Dose-Response Framework (Q-KEDRF) provides a structured quantitative approach for systematic examination of the dose-response and timing of KEs resulting from a dose of a bioactive agent that causes a potential adverse outcome. Two concepts are described as aids to increasing the understanding of mode of action-Associative Events and Modulating Factors. These concepts are illustrated in two case studies; 1) cholinesterase inhibition by the pesticide chlorpyrifos, which illustrates the necessity of considering quantitative dose-response information when assessing the effect of a Modulating Factor, that is, enzyme polymorphisms in humans, and 2) estrogen-induced uterotrophic responses in rodents, which demonstrate how quantitative dose-response modeling for KE, the understanding of temporal relationships between KEs and a counterfactual examination of hypothesized KEs can determine whether they are Associative Events or true KEs.

  16. Growth and abundance of Pacific Sand Lance, Ammodytes hexapterus, under differing oceanographic regimes

    USGS Publications Warehouse

    Robards, Martin D.; Gray, Floyd; Piatt, John F.

    2002-01-01

    Dramatic changes in seabird and marine mammal stocks in the Gulf of Alaska have been linked to shifts in abundance and composition of forage fish stocks over the past 20 years. The relative value (e.g., size and condition of individual fish, abundance) of specific forage fish stocks to predators under temporally changing oceanographic regimes is also expected to vary. We inferred potential temporal responses in abundance, growth, and age structure of a key forage fish, sand lance, by studying across spatially different oceanographic regimes. Marked meso-scale differences in abundance, growth, and mortality existed in conjunction with these differing regimes. Growth rate within stocks (between years) was positively correlated with temperature. However, this relationship did not exist among stocks (locations) and differing growth rates were better correlated to marine productivity. Sand lance were least abundant and grew slowest at the warmest site (Chisik Island), an area of limited habitat and low food abundance. Abundance and growth of juvenile sand lance was highest at the coolest site (Barren Islands), an area of highly productive upwelled waters. Sand lance at two sites located oceanographically between the Barren Islands and Chisik Island (inner- and outer-Kachemak Bay) displayed correspondingly intermediate abundance and growth. Resident predators at these sites are presented with markedly different numbers and quality of this key prey species. Our results suggest that at the decadal scale, Gulf of Alaska forage fish such as sand lance are probably more profoundly affected by changes in abundance and quality of their planktonic food, than by temperature alone.

  17. Entropy Driven Self-Assembly in Charged Lock-Key Particles.

    PubMed

    Odriozola, Gerardo; Lozada-Cassou, Marcelo

    2016-07-07

    In this work we study the lock-key model successfully used in supramolecular chemistry and particles self-assembly and gain further insight into the infinite diluted limit of the lock and key, depletant mediated, effective attraction. We discuss the depletant forces and entropy approaches to self-assembly and give details on the different contributions to the net force for a charged lock and key pair immersed in a solvent plus a primitive model electrolyte. We show a strong correlation of the force components behavior and the underlying processes of co-ion and solvent release from the cavity. In addition, we put into context the universal behavior observed for the energy-distance curves when changing the lock and key to solvent size ratio. Basically, we now show that this behavior is not always achieved and depends on the particular system geometry. Finally, we present a qualitative good agreement with experiments when changing the electrolyte concentration, valence, and cavity-key size ratio.

  18. Public Key Cryptography.

    ERIC Educational Resources Information Center

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  19. A semi-automatic 2D-to-3D video conversion with adaptive key-frame selection

    NASA Astrophysics Data System (ADS)

    Ju, Kuanyu; Xiong, Hongkai

    2014-11-01

    To compensate the deficit of 3D content, 2D to 3D video conversion (2D-to-3D) has recently attracted more attention from both industrial and academic communities. The semi-automatic 2D-to-3D conversion which estimates corresponding depth of non-key-frames through key-frames is more desirable owing to its advantage of balancing labor cost and 3D effects. The location of key-frames plays a role on quality of depth propagation. This paper proposes a semi-automatic 2D-to-3D scheme with adaptive key-frame selection to keep temporal continuity more reliable and reduce the depth propagation errors caused by occlusion. The potential key-frames would be localized in terms of clustered color variation and motion intensity. The distance of key-frame interval is also taken into account to keep the accumulated propagation errors under control and guarantee minimal user interaction. Once their depth maps are aligned with user interaction, the non-key-frames depth maps would be automatically propagated by shifted bilateral filtering. Considering that depth of objects may change due to the objects motion or camera zoom in/out effect, a bi-directional depth propagation scheme is adopted where a non-key frame is interpolated from two adjacent key frames. The experimental results show that the proposed scheme has better performance than existing 2D-to-3D scheme with fixed key-frame interval.

  20. FTTH: the overview of existing technologies

    NASA Astrophysics Data System (ADS)

    Nowak, Dawid; Murphy, John

    2005-06-01

    The growing popularity of the Internet is the key driver behind the development of new access methods which would enable a customer to experience a true broadband. Amongst various technologies, the access methods based on the optical fiber are getting more and more attention as they offer the ultimate solution in delivering different services to the customers' premises. Three different architectures have been proposed that facilitate the roll out of Fiber-to-the-Home (FTTH) infrastructure. Point-to-point Ethernet networks are the most straightforward and already matured solution. Different flavors of Passive Optical Networks (PONs) with Time Division Multiplexing Access (TDMA) are getting more widespread as necessary equipment is becoming available on the market. The third main contender are PONs withWavelength DivisionMultiplexing Access (WDMA). Although still in their infancy, the laboratory tests show that they have many advantages over present solutions. In this paper we show a brief comparison of these three access methods. In our analysis the architecture of each solution is presented. The applicability of each system is looked at from different viewpoint and their advantages and disadvantages are highlighted.

  1. Data requirements for valuing externalities: The role of existing permitting processes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lee, A.D.; Baechler, M.C.; Callaway, J.M.

    1990-08-01

    While the assessment of externalities, or residual impacts, will place new demands on regulators, utilities, and developers, existing processes already require certain data and information that may fulfill some of the data needs for externality valuation. This paper examines existing siting, permitting, and other processes and highlights similarities and differences between their data requirements and the data required to value environmental externalities. It specifically considers existing requirements for siting new electricity resources in Oregon and compares them with the information and data needed to value externalities for such resources. This paper also presents several observations about how states can takemore » advantage of data acquired through processes already in place as they move into an era when externalities are considered in utility decision-making. It presents other observations on the similarities and differences between the data requirements under existing processes and those for valuing externalities. This paper also briefly discusses the special case of cumulative impacts. And it presents recommendations on what steps to take in future efforts to value externalities. 35 refs., 2 tabs.« less

  2. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice of Appointment of Receiver Notice is hereby given that, pursuant to the authority contained in... Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  3. Predicting Key Events in the Popularity Evolution of Online Information.

    PubMed

    Hu, Ying; Hu, Changjun; Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  4. Key Objectives Bank: Year 9. Key Stage 3: National Strategy.

    ERIC Educational Resources Information Center

    Department for Education and Skills, London (England).

    In each sub-section of the "Framework for Teaching English: Years 7, 8 and 9," certain key objectives are identified in boldface print. These objectives are key because they signify skills or understanding which are crucial to pupils' language development. They are challenging for the age group and are important markers of progress. This…

  5. Decoy-state quantum key distribution with a leaky source

    NASA Astrophysics Data System (ADS)

    Tamaki, Kiyoshi; Curty, Marcos; Lucamarini, Marco

    2016-06-01

    In recent years, there has been a great effort to prove the security of quantum key distribution (QKD) with a minimum number of assumptions. Besides its intrinsic theoretical interest, this would allow for larger tolerance against device imperfections in the actual implementations. However, even in this device-independent scenario, one assumption seems unavoidable, that is, the presence of a protected space devoid of any unwanted information leakage in which the legitimate parties can privately generate, process and store their classical data. In this paper we relax this unrealistic and hardly feasible assumption and introduce a general formalism to tackle the information leakage problem in most of existing QKD systems. More specifically, we prove the security of optical QKD systems using phase and intensity modulators in their transmitters, which leak the setting information in an arbitrary manner. We apply our security proof to cases of practical interest and show key rates similar to those obtained in a perfectly shielded environment. Our work constitutes a fundamental step forward in guaranteeing implementation security of quantum communication systems.

  6. The surgical personality: does it exist?

    PubMed

    Whitaker, Matthew

    2018-01-01

    Introduction This study aims to answer the question of whether surgeons have different personalities to non-surgeons. Methods Members of the Royal College of Surgeons of England were sent an email survey containing 50 standard questions from the Five Factor personality assessment, which scores each respondent in five key personality traits (conscientiousness, agreeableness, neuroticism, openness, extroversion). Results were analysed and compared with a population-level data set from a survey conducted by the BBC. Results Five hundred and ninety-nine surgeons completed the survey. Analysis showed that surgeons scored significantly higher for conscientiousness, agreeableness, openness and neuroticism than non-surgeons (P < 0.05). Further analysis showed that female surgeons scored higher in openness and extroversion relative to the population average and that surgeons become more prone to neuroticism than non-surgeons as they age. Conclusions The results support the notion of a surgical personality, as well as indicating that female surgeons have significantly different personality profiles from male surgeons, and that age affects surgeons' personalities in different ways to non-surgeons.

  7. Variable ligand- and receptor-binding hot spots in key strains of influenza neuraminidase

    PubMed Central

    Votapka, Lane; Demir, Özlem; Swift, Robert V; Walker, Ross C; Amaro, Rommie E

    2012-01-01

    Influenza A continues to be a major public health concern due to its ability to cause epidemic and pandemic disease outbreaks in humans. Computational investigations of structural dynamics of the major influenza glycoproteins, especially the neuraminidase (NA) enzyme, are able to provide key insights beyond what is currently accessible with standard experimental techniques. In particular, all-atom molecular dynamics simulations reveal the varying degrees of flexibility for such enzymes. Here we present an analysis of the relative flexibility of the ligand- and receptor-binding area of three key strains of influenza A: highly pathogenic H5N1, the 2009 pandemic H1N1, and a human N2 strain. Through computational solvent mapping, we investigate the various ligand- and receptor-binding “hot spots” that exist on the surface of NA which interacts with both sialic acid receptors on the host cells and antiviral drugs. This analysis suggests that the variable cavities found in the different strains and their corresponding capacities to bind ligand functional groups may play an important role in the ability of NA to form competent reaction encounter complexes with other species of interest, including antiviral drugs, sialic acid receptors on the host cell surface, and the hemagglutinin protein. Such considerations may be especially useful for the prediction of how such complexes form and with what binding capacity. PMID:22872804

  8. Boundary of Phase Co-existence in Docosahexaenoic Acid System

    NASA Astrophysics Data System (ADS)

    Lor, Chai; Hirst, Linda S.

    2011-11-01

    Docosahexaenoic acid (DHA) is a highly polyunsaturated fatty acid (PUFA) that exhibits six double bonds in the hydrocarbon tail. It induces phase separation of the membrane into liquid order and liquid disorder in mixtures containing other lipids with more saturation and cholesterol. With the utilization of atomic force microscopy, phase co-existence is observed in lipid mixtures containing DHA on a single supported lipid bilayer. The boundary of phase co-existence with decreasing DHA concentration is explored. The elastic force, thickness, and roughness of the different phases are investigated.

  9. Nonmarket economic user values of the Florida Keys/Key West

    Treesearch

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  10. Key drivers of airline loyalty.

    PubMed

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  11. Key drivers of airline loyalty

    PubMed Central

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-01-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty. PMID:27064618

  12. Facilities Management of Existing School Buildings: Two Models.

    ERIC Educational Resources Information Center

    Building Technology, Inc., Silver Spring, MD.

    While all school districts are responsible for the management of their existing buildings, they often approach the task in different ways. This document presents two models that offer ways a school district administration, regardless of size, may introduce activities into its ongoing management process that will lead to improvements in earthquake…

  13. The SEDIBUD (Sediment Budgets in Cold Environments) Programme: Current activities and future key tasks

    NASA Astrophysics Data System (ADS)

    Beylich, A. A.; Lamoureux, S. F.; Decaulne, A.

    2012-04-01

    Projected climate change in cold regions is expected to alter melt season duration and intensity, along with the number of extreme rainfall events, total annual precipitation and the balance between snowfall and rainfall. Similarly, changes to the thermal balance are expected to reduce the extent of permafrost and seasonal ground frost and increase active layer depths. These effects will undoubtedly change surface environments in cold regions and alter the fluxes of sediments, nutrients and solutes, but the absence of quantitative data and coordinated process monitoring and analysis to understand the sensitivity of the Earth surface environment is acute in cold climate environments. The International Association of Geomorphologists (I.A.G./A.I.G.)SEDIBUD (Sediment Budgets in Cold Environments) Programme was formed in 2005 to address this existing key knowledge gap. SEDIBUD currently has about 400 members worldwide and the Steering Committee of this international programme is composed of ten scientists from eight different countries: Achim A. Beylich (Chair) (Norway), Armelle Decaulne (Secretary) (France), John C. Dixon (USA), Scott F. Lamoureux (Vice-Chair) (Canada), John F. Orwin (Canada), Jan-Christoph Otto (Austria), Irina Overeem (USA), Thorsteinn Saemundsson (Iceland), Jeff Warburton (UK), Zbigniew Zwolinski (Poland). The central research question of this global group of scientists is to: Assess and model the contemporary sedimentary fluxes in cold climates, with emphasis on both particulate and dissolved components. Initially formed as European Science Foundation (ESF) Network SEDIFLUX (2004-2006), SEDIBUD has further expanded to a global group of researchers with field research sites located in polar and alpine regions in the northern and southern hemisphere. Research carried out at each of the close to 50 defined SEDIBUD key test sites varies by programme, logistics and available resources, but typically represent interdisciplinary collaborations of

  14. Security of six-state quantum key distribution protocol with threshold detectors

    PubMed Central

    Kato, Go; Tamaki, Kiyoshi

    2016-01-01

    The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and as a result the bit error rate threshold for secure key generation for the six-state protocol is higher than that for the BB84 protocol. Unfortunately, however, this type of detector is demanding in terms of technological level compared to the standard threshold detector, and removing the necessity of such a detector enhances the feasibility of the implementation of the six-state protocol. Here, we develop the security proof for the six-state protocol and show that we can use the threshold detector for the six-state protocol. Importantly, the bit error rate threshold for the key generation for the six-state protocol (12.611%) remains almost the same as the one (12.619%) that is derived from the existing security proofs assuming the use of PNR detectors. This clearly demonstrates feasibility of the six-state protocol with practical devices. PMID:27443610

  15. Managing an academic career in science: What gender differences exist and why?

    NASA Astrophysics Data System (ADS)

    Richards, Gayle Patrice

    The present study examines the career trajectories of academic scientists during the period from 1993 to 2001 to explore gender differences in mobility. Data from the National Science Foundation's Survey of Doctorate Recipients are used to examine and compare gender differences in the odds of promotion. The effects of age, marital and family status, duration of time to complete doctorate, academic discipline, cumulative number of publications and time in the survey are considered as explanatory variables. Event history analyses are conducted for all scientists, for scientists in four major academic disciplines and for scientists in various academic ranks. While no overall gender differences were observed in the odds of promotion, several important similarities and differences were evident. Expectedly, publications had a significant and positive relationship with advancement for both women and men. The role of parent influenced promotions quite differently for women and men. Contrary to expectations based on prior research, academic women scientists who were mothers advanced at similar rates as women without children. Consistent with expectations based on traditional roles, married men and men with children generally advanced more quickly than single or childless men, respectively. Two surprising patterns emerged among subgroups of women. Marriage was associated with greater odds of advancement for women engineers and motherhood was associated with greater odds of advancement for among assistant professors. Possible explanations for these findings are presented.

  16. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  17. Use of existing patient-reported outcome (PRO) instruments and their modification: the ISPOR Good Research Practices for Evaluating and Documenting Content Validity for the Use of Existing Instruments and Their Modification PRO Task Force Report.

    PubMed

    Rothman, Margaret; Burke, Laurie; Erickson, Pennifer; Leidy, Nancy Kline; Patrick, Donald L; Petrie, Charles D

    2009-01-01

    Patient-reported outcome (PRO) instruments are used to evaluate the effect of medical products on how patients feel or function. This article presents the results of an ISPOR task force convened to address good clinical research practices for the use of existing or modified PRO instruments to support medical product labeling claims. The focus of the article is on content validity, with specific reference to existing or modified PRO instruments, because of the importance of content validity in selecting or modifying an existing PRO instrument and the lack of consensus in the research community regarding best practices for establishing and documenting this measurement property. Topics addressed in the article include: definition and general description of content validity; PRO concept identification as the important first step in establishing content validity; instrument identification and the initial review process; key issues in qualitative methodology; and potential threats to content validity, with three case examples used to illustrate types of threats and how they might be resolved. A table of steps used to identify and evaluate an existing PRO instrument is provided, and figures are used to illustrate the meaning of content validity in relationship to instrument development and evaluation. RESULTS & RECOMMENDATIONS: Four important threats to content validity are identified: unclear conceptual match between the PRO instrument and the intended claim, lack of direct patient input into PRO item content from the target population in which the claim is desired, no evidence that the most relevant and important item content is contained in the instrument, and lack of documentation to support modifications to the PRO instrument. In some cases, careful review of the threats to content validity in a specific application may be reduced through additional well documented qualitative studies that specifically address the issue of concern. Published evidence of the content

  18. Fundamental finite key limits for one-way information reconciliation in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Tomamichel, Marco; Martinez-Mateo, Jesus; Pacher, Christoph; Elkouss, David

    2017-11-01

    The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that one-way information reconciliation imposes fundamental limitations on the amount of secret key that can be extracted in the finite key regime. In particular, we find that an often used approximation for the information leakage during information reconciliation is not generally valid. We propose an improved approximation that takes into account finite key effects and numerically test it against codes for two probability distributions, that we call binary-binary and binary-Gaussian, that typically appear in quantum key distribution protocols.

  19. Estimation of marginal costs at existing waste treatment facilities.

    PubMed

    Martinez-Sanchez, Veronica; Hulgaard, Tore; Hindsgaul, Claus; Riber, Christian; Kamuk, Bettina; Astrup, Thomas F

    2016-04-01

    This investigation aims at providing an improved basis for assessing economic consequences of alternative Solid Waste Management (SWM) strategies for existing waste facilities. A bottom-up methodology was developed to determine marginal costs in existing facilities due to changes in the SWM system, based on the determination of average costs in such waste facilities as function of key facility and waste compositional parameters. The applicability of the method was demonstrated through a case study including two existing Waste-to-Energy (WtE) facilities, one with co-generation of heat and power (CHP) and another with only power generation (Power), affected by diversion strategies of five waste fractions (fibres, plastic, metals, organics and glass), named "target fractions". The study assumed three possible responses to waste diversion in the WtE facilities: (i) biomass was added to maintain a constant thermal load, (ii) Refused-Derived-Fuel (RDF) was included to maintain a constant thermal load, or (iii) no reaction occurred resulting in a reduced waste throughput without full utilization of the facility capacity. Results demonstrated that marginal costs of diversion from WtE were up to eleven times larger than average costs and dependent on the response in the WtE plant. Marginal cost of diversion were between 39 and 287 € Mg(-1) target fraction when biomass was added in a CHP (from 34 to 303 € Mg(-1) target fraction in the only Power case), between -2 and 300 € Mg(-1) target fraction when RDF was added in a CHP (from -2 to 294 € Mg(-1) target fraction in the only Power case) and between 40 and 303 € Mg(-1) target fraction when no reaction happened in a CHP (from 35 to 296 € Mg(-1) target fraction in the only Power case). Although average costs at WtE facilities were highly influenced by energy selling prices, marginal costs were not (provided a response was initiated at the WtE to keep constant the utilized thermal capacity). Failing to systematically

  20. Device-independent secret-key-rate analysis for quantum repeaters

    NASA Astrophysics Data System (ADS)

    Holz, Timo; Kampermann, Hermann; Bruß, Dagmar

    2018-01-01

    The device-independent approach to quantum key distribution (QKD) aims to establish a secret key between two or more parties with untrusted devices, potentially under full control of a quantum adversary. The performance of a QKD protocol can be quantified by the secret key rate, which can be lower bounded via the violation of an appropriate Bell inequality in a setup with untrusted devices. We study secret key rates in the device-independent scenario for different quantum repeater setups and compare them to their device-dependent analogon. The quantum repeater setups under consideration are the original protocol by Briegel et al. [Phys. Rev. Lett. 81, 5932 (1998), 10.1103/PhysRevLett.81.5932] and the hybrid quantum repeater protocol by van Loock et al. [Phys. Rev. Lett. 96, 240501 (2006), 10.1103/PhysRevLett.96.240501]. For a given repeater scheme and a given QKD protocol, the secret key rate depends on a variety of parameters, such as the gate quality or the detector efficiency. We systematically analyze the impact of these parameters and suggest optimized strategies.

  1. Predicting Key Events in the Popularity Evolution of Online Information

    PubMed Central

    Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the “burst”, “peak”, and “fade” key events together as a representative summary of popularity evolution. We propose a novel prediction task—predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify “burst”, “peak”, and “fade” in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution. PMID:28046121

  2. 18. Interior view, 'Inside Key Route Inspection Bldg.', view to ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    18. Interior view, 'Inside Key Route Inspection Bldg.', view to east, August 16, 1939. Note inspection pits and work areas beneath tracks. The Key Route and Interurban Electric Railway Bridge Yard Shop buildings were identical, and this view provides an in-service look at the well-lit interior. While Key Route articulated cars were quite different in design from the Interurban Electric Railway cars, the maintenance requirements were quite similar. The Key Route Bridge Yard Shop building was demolished in the 1970s. Its last use was storage of much of the historic railway equipment now on display at the California State Railroad Museum in Sacramento. - Interurban Electric Railway Bridge Yard Shop, Interstate 80 at Alameda County Postmile 2.0, Oakland, Alameda County, CA

  3. Physical Unclonable Function Hardware Keys Utilizing Kirchhoff-Law Secure Key Exchange and Noise-Based Logic

    NASA Astrophysics Data System (ADS)

    Kish, Laszlo B.; Kwan, Chiman

    Weak unclonable function (PUF) encryption key means that the manufacturer of the hardware can clone the key but not anybody else. Strong unclonable function (PUF) encryption key means that even the manufacturer of the hardware is unable to clone the key. In this paper, first we introduce an "ultra" strong PUF with intrinsic dynamical randomness, which is not only unclonable but also gets renewed to an independent key (with fresh randomness) during each use via the unconditionally secure key exchange. The solution utilizes the Kirchhoff-law-Johnson-noise (KLJN) method for dynamical key renewal and a one-time-pad secure key for the challenge/response process. The secure key is stored in a flash memory on the chip to provide tamper-resistance and nonvolatile storage with zero power requirements in standby mode. Simplified PUF keys are shown: a strong PUF utilizing KLJN protocol during the first run and noise-based logic (NBL) hyperspace vector string verification method for the challenge/response during the rest of its life or until it is re-initialized. Finally, the simplest PUF utilizes NBL without KLJN thus it can be cloned by the manufacturer but not by anybody else.

  4. Sarcopenia and sarcopenic obesity in comparison: prevalence, metabolic profile, and key differences. A cross-sectional study in Italian hospitalized elderly.

    PubMed

    Perna, Simone; Peroni, Gabriella; Faliva, Milena Anna; Bartolo, Arianna; Naso, Maurizio; Miccono, Alessandra; Rondanelli, Mariangela

    2017-12-01

    The aim of this study is to identify the prevalence, assess the metabolic profile, and key differences (versus healthy) in a cohort of subjects with sarcopenia (S) and in sarcopenic obesity (SO) hospitalized elderly. A standardized comprehensive geriatric assessment was performed. We enrolled 639 elderly subjects (196 men, 443 women) with a mean age of 80.90 ± 7.77 years. Analysis of variance and a multinomial logistic regression analysis adjusting for covariates were used to assess the differences between groups. The prevalence of (S) was 12.42% in women and 23.47% in men. (SO) was 8.13% in women and 22.45% in men. Data showed that either groups had a functional impairment (Barthel index < 50 points). (S) had the mean value of erythrocyte sedimentation rate (ESR) (>15 mm/h), CPR (>0.50 mg/dl) homocysteine (>12 micromol/l), and hemoglobin (<12 g/dl). Ferritin level over the range (>145 mcg/dl) was detected in either cohort (due to inflammation). (SO) had glycemia (>110 mg/dl). Key differences in (S) cohort (versus healthy) were a reduction in functional impairment (p < 0.001), an increase in white blood cell (p < 0.01), a decrease in iron level (p < 0.05), in electrolytes balance (Na: p < 0.01 and Cl: p < 0.01), and tyroid function (TSH: p < 0.001). In addition, (S) had higher state of inflammation (erythrocyte sedimentation rate: p < 0.05 and C-reactive protein: p < 0.01), and an increase of risk of fractures (FRAX: OR 1.07; p < 0.001), risk of malnutrition (mini nutritional assessment: p < 0.001), and risk of edema (extra cellular water: p < 0.001). In (SO) cohort, an increase in white blood cell (p < 0.001) and erythrocyte sedimentation rate (p < 0.05) was observed. (S) subjects appears more vulnerable than (SO). Sarcopenia is closely linked to an increase in the risk of hip-femur fractures, inflammation, edema, and malnutrition. The (SO) subjects seem to benefit from the "obesity paradox."

  5. Key Parameters for Operator Diagnosis of BWR Plant Condition during a Severe Accident

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Clayton, Dwight A.; Poore, III, Willis P.

    2015-01-01

    The objective of this research is to examine the key information needed from nuclear power plant instrumentation to guide severe accident management and mitigation for boiling water reactor (BWR) designs (specifically, a BWR/4-Mark I), estimate environmental conditions that the instrumentation will experience during a severe accident, and identify potential gaps in existing instrumentation that may require further research and development. This report notes the key parameters that instrumentation needs to measure to help operators respond to severe accidents. A follow-up report will assess severe accident environmental conditions as estimated by severe accident simulation model analysis for a specific US BWR/4-Markmore » I plant for those instrumentation systems considered most important for accident management purposes.« less

  6. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  7. Maintenance of pre-existing DNA methylation states through recurring excess-light stress.

    PubMed

    Ganguly, Diep R; Crisp, Peter A; Eichten, Steven R; Pogson, Barry J

    2018-04-29

    The capacity for plant stress priming and memory and the notion of this being underpinned by DNA methylation-mediated memory is an appealing hypothesis for which there is mixed evidence. We previously established a lack of drought-induced methylome variation in Arabidopsis thaliana (Arabidopsis); however, this was tied to only minor observations of physiological memory. There are numerous independent observations demonstrating that photoprotective mechanisms, induced by excess-light stress, can lead to robust programmable changes in newly developing leaf tissues. Although key signalling molecules and transcription factors are known to promote this priming signal, an untested question is the potential involvement of chromatin marks towards the maintenance of light stress acclimation, or memory. Thus, we systematically tested our previous hypothesis of a stress-resistant methylome using a recurring excess-light stress, then analysing new, emerging, and existing tissues. The DNA methylome showed negligible stress-associated variation, with the vast majority attributable to stochastic differences. Yet, photoacclimation was evident through enhanced photosystem II performance in exposed tissues, and nonphotochemical quenching and fluorescence decline ratio showed evidence of mitotic transmission. Thus, we have observed physiological acclimation in new and emerging tissues in the absence of substantive DNA methylome changes. © 2018 John Wiley & Sons Ltd.

  8. The Prediction of Key Cytoskeleton Components Involved in Glomerular Diseases Based on a Protein-Protein Interaction Network.

    PubMed

    Ding, Fangrui; Tan, Aidi; Ju, Wenjun; Li, Xuejuan; Li, Shao; Ding, Jie

    2016-01-01

    Maintenance of the physiological morphologies of different types of cells and tissues is essential for the normal functioning of each system in the human body. Dynamic variations in cell and tissue morphologies depend on accurate adjustments of the cytoskeletal system. The cytoskeletal system in the glomerulus plays a key role in the normal process of kidney filtration. To enhance the understanding of the possible roles of the cytoskeleton in glomerular diseases, we constructed the Glomerular Cytoskeleton Network (GCNet), which shows the protein-protein interaction network in the glomerulus, and identified several possible key cytoskeletal components involved in glomerular diseases. In this study, genes/proteins annotated to the cytoskeleton were detected by Gene Ontology analysis, and glomerulus-enriched genes were selected from nine available glomerular expression datasets. Then, the GCNet was generated by combining these two sets of information. To predict the possible key cytoskeleton components in glomerular diseases, we then examined the common regulation of the genes in GCNet in the context of five glomerular diseases based on their transcriptomic data. As a result, twenty-one cytoskeleton components as potential candidate were highlighted for consistently down- or up-regulating in all five glomerular diseases. And then, these candidates were examined in relation to existing known glomerular diseases and genes to determine their possible functions and interactions. In addition, the mRNA levels of these candidates were also validated in a puromycin aminonucleoside(PAN) induced rat nephropathy model and were also matched with existing Diabetic Nephropathy (DN) transcriptomic data. As a result, there are 15 of 21 candidates in PAN induced nephropathy model were consistent with our predication and also 12 of 21 candidates were matched with differentially expressed genes in the DN transcriptomic data. By providing a novel interaction network and prediction, GCNet

  9. The Prediction of Key Cytoskeleton Components Involved in Glomerular Diseases Based on a Protein-Protein Interaction Network

    PubMed Central

    Ju, Wenjun; Li, Xuejuan; Li, Shao; Ding, Jie

    2016-01-01

    Maintenance of the physiological morphologies of different types of cells and tissues is essential for the normal functioning of each system in the human body. Dynamic variations in cell and tissue morphologies depend on accurate adjustments of the cytoskeletal system. The cytoskeletal system in the glomerulus plays a key role in the normal process of kidney filtration. To enhance the understanding of the possible roles of the cytoskeleton in glomerular diseases, we constructed the Glomerular Cytoskeleton Network (GCNet), which shows the protein-protein interaction network in the glomerulus, and identified several possible key cytoskeletal components involved in glomerular diseases. In this study, genes/proteins annotated to the cytoskeleton were detected by Gene Ontology analysis, and glomerulus-enriched genes were selected from nine available glomerular expression datasets. Then, the GCNet was generated by combining these two sets of information. To predict the possible key cytoskeleton components in glomerular diseases, we then examined the common regulation of the genes in GCNet in the context of five glomerular diseases based on their transcriptomic data. As a result, twenty-one cytoskeleton components as potential candidate were highlighted for consistently down- or up-regulating in all five glomerular diseases. And then, these candidates were examined in relation to existing known glomerular diseases and genes to determine their possible functions and interactions. In addition, the mRNA levels of these candidates were also validated in a puromycin aminonucleoside(PAN) induced rat nephropathy model and were also matched with existing Diabetic Nephropathy (DN) transcriptomic data. As a result, there are 15 of 21 candidates in PAN induced nephropathy model were consistent with our predication and also 12 of 21 candidates were matched with differentially expressed genes in the DN transcriptomic data. By providing a novel interaction network and prediction, GCNet

  10. Backup key generation model for one-time password security protocol

    NASA Astrophysics Data System (ADS)

    Jeyanthi, N.; Kundu, Sourav

    2017-11-01

    The use of one-time password (OTP) has ushered new life into the existing authentication protocols used by the software industry. It introduced a second layer of security to the traditional username-password authentication, thus coining the term, two-factor authentication. One of the drawbacks of this protocol is the unreliability of the hardware token at the time of authentication. This paper proposes a simple backup key model that can be associated with the real world applications’user database, which would allow a user to circumvent the second authentication stage, in the event of unavailability of the hardware token.

  11. Multicriteria decision model for retrofitting existing buildings

    NASA Astrophysics Data System (ADS)

    Bostenaru Dan, B.

    2003-04-01

    In this paper a model to decide which buildings from an urban area should be retrofitted is presented. The model has been cast into existing ones by choosing the decision rule, criterion weighting and decision support system types most suitable for the spatial problem of reducing earthquake risk in urban areas, considering existing spatial multiatributive and multiobjective decision methods and especially collaborative issues. Due to the participative character of the group decision problem "retrofitting existing buildings" the decision making model is based on interactivity. Buildings have been modeled following the criteria of spatial decision support systems. This includes identifying the corresponding spatial elements of buildings according to the information needs of actors from different sphaeres like architects, construction engineers and economists. The decision model aims to facilitate collaboration between this actors. The way of setting priorities interactivelly will be shown, by detailing the two phases: judgemental and computational, in this case site analysis, collection and evaluation of the unmodified data and converting survey data to information with computational methods using additional expert support. Buildings have been divided into spatial elements which are characteristic for the survey, present typical damages in case of an earthquake and are decisive for a better seismic behaviour in case of retrofitting. The paper describes the architectural and engineering characteristics as well as the structural damage for constuctions of different building ages on the example of building types in Bucharest, Romania in compressible and interdependent charts, based on field observation, reports from the 1977 earthquake and detailed studies made by the author together with a local engineer for the EERI Web Housing Encyclopedia. On this base criteria for setting priorities flow into the expert information contained in the system.

  12. Quantum dense key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.

    2004-03-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  13. Novel image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing

    NASA Astrophysics Data System (ADS)

    Zhou, Nanrun; Zhang, Aidi; Zheng, Fen; Gong, Lihua

    2014-10-01

    The existing ways to encrypt images based on compressive sensing usually treat the whole measurement matrix as the key, which renders the key too large to distribute and memorize or store. To solve this problem, a new image compression-encryption hybrid algorithm is proposed to realize compression and encryption simultaneously, where the key is easily distributed, stored or memorized. The input image is divided into 4 blocks to compress and encrypt, then the pixels of the two adjacent blocks are exchanged randomly by random matrices. The measurement matrices in compressive sensing are constructed by utilizing the circulant matrices and controlling the original row vectors of the circulant matrices with logistic map. And the random matrices used in random pixel exchanging are bound with the measurement matrices. Simulation results verify the effectiveness, security of the proposed algorithm and the acceptable compression performance.

  14. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network

    PubMed Central

    Yang, Bin; Zhang, Jianfeng

    2017-01-01

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme. PMID:28657588

  15. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    PubMed

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  16. Challenges in adapting existing clinical natural language processing systems to multiple, diverse health care settings.

    PubMed

    Carrell, David S; Schoen, Robert E; Leffler, Daniel A; Morris, Michele; Rose, Sherri; Baer, Andrew; Crockett, Seth D; Gourevitch, Rebecca A; Dean, Katie M; Mehrotra, Ateev

    2017-09-01

    Widespread application of clinical natural language processing (NLP) systems requires taking existing NLP systems and adapting them to diverse and heterogeneous settings. We describe the challenges faced and lessons learned in adapting an existing NLP system for measuring colonoscopy quality. Colonoscopy and pathology reports from 4 settings during 2013-2015, varying by geographic location, practice type, compensation structure, and electronic health record. Though successful, adaptation required considerably more time and effort than anticipated. Typical NLP challenges in assembling corpora, diverse report structures, and idiosyncratic linguistic content were greatly magnified. Strategies for addressing adaptation challenges include assessing site-specific diversity, setting realistic timelines, leveraging local electronic health record expertise, and undertaking extensive iterative development. More research is needed on how to make it easier to adapt NLP systems to new clinical settings. A key challenge in widespread application of NLP is adapting existing systems to new clinical settings. © The Author 2017. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  17. 10 CFR 4.127 - Existing facilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Existing facilities. 4.127 Section 4.127 Energy NUCLEAR... 1973, as Amended Discriminatory Practices § 4.127 Existing facilities. (a) Accessibility. A recipient... make each of its existing facilities or every part of an existing facility accessible to and usable by...

  18. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  19. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  20. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  1. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  2. 33 CFR 110.189a - Key West Harbor, Key West, Fla., naval explosives anchorage area.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Key West Harbor, Key West, Fla..., DEPARTMENT OF HOMELAND SECURITY ANCHORAGES ANCHORAGE REGULATIONS Anchorage Grounds § 110.189a Key West Harbor, Key West, Fla., naval explosives anchorage area. (a) The anchorage ground. A circular area with its...

  3. A Dichotomous Key to Tree Cones and Fruits of the Eastern United States.

    ERIC Educational Resources Information Center

    Collins, Linda T.

    1991-01-01

    The author presents a dichotomous key to 29 tree cones, fruits, and nuts of eastern United States. Students can use the key to identify at least 10 species in a 1-hour laboratory assignment. This key uses reproductive structures that are significantly different from others. These structures are durable enough to be used in the laboratory for many…

  4. The structure and composition of Holocene coral reefs in the Middle Florida Keys

    USGS Publications Warehouse

    Toth, Lauren T.; Stathakopoulos, Anastasios; Kuffner, Ilsa B.

    2016-07-21

    The Florida Keys reef tract (FKRT) is the largest coral-reef ecosystem in the continental United States. The modern FKRT extends for 362 kilometers along the coast of South Florida from Dry Tortugas National Park in the southwest, through the Florida Keys National Marine Sanctuary (FKNMS), to Fowey Rocks reef in Biscayne National Park in the northeast. Most reefs along the FKRT are sheltered by the exposed islands of the Florida Keys; however, large channels are located between the islands of the Middle Keys. These openings allow for tidal transport of water from Florida Bay onto reefs in the area. The characteristics of the water masses coming from Florida Bay, which can experience broad swings in temperature, salinity, nutrients, and turbidity over short periods of time, are generally unfavorable or “inimical” to coral growth and reef development.Although reef habitats are ubiquitous throughout most of the Upper and Lower Keys, relatively few modern reefs exist in the Middle Keys most likely because of the impacts of inimical waters from Florida Bay. The reefs that are present in the Middle Keys generally are poorly developed compared with reefs elsewhere in the region. For example, Acropora palmata has been the dominant coral on shallow-water reefs in the Caribbean over the last 1.5 million years until populations of the coral declined throughout the region in recent decades. Although A. palmata was historically abundant in the Florida Keys, it was conspicuously absent from reefs in the Middle Keys. Instead, contemporary reefs in the Middle Keys have been dominated by occasional massive (that is, boulder or head) corals and, more often, small, non-reef-building corals.Holocene reef cores have been collected from many locations along the FKRT; however, despite the potential importance of the history of reefs in the Middle Florida Keys to our understanding of the environmental controls on reef development throughout the FKRT, there are currently no published

  5. Key Stage 3 Pupils' Views about Reading

    ERIC Educational Resources Information Center

    Atkinson, Cathy

    2006-01-01

    Recent developments in literacy teaching have tended to target the needs of primary, rather than high school pupils and focus on technical, rather than affective aspects of reading. This paper describes a questionnaire-based study undertaken to identify perceptions and views held by Key Stage 3 readers of different ages, genders and abilities.…

  6. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  7. Transcriptome analysis of pecan seeds at different developing stages and identification of key genes involved in lipid metabolism.

    PubMed

    Xu, Zheng; Ni, Jun; Shah, Faheem Afzal; Wang, Qiaojian; Wang, Zhaocheng; Wu, Lifang; Fu, Songling

    2018-01-01

    Pecan is an economically important nut crop tree due to its unique texture and flavor properties. The pecan seed is rich of unsaturated fatty acid and protein. However, little is known about the molecular mechanisms of the biosynthesis of fatty acids in the developing seeds. In this study, transcriptome sequencing of the developing seeds was performed using Illumina sequencing technology. Pecan seed embryos at different developmental stages were collected and sequenced. The transcriptomes of pecan seeds at two key developing stages (PA, the initial stage and PS, the fast oil accumulation stage) were also compared. A total of 82,155 unigenes, with an average length of 1,198 bp from seven independent libraries were generated. After functional annotations, we detected approximately 55,854 CDS, among which, 2,807 were Transcription Factor (TF) coding unigenes. Further, there were 13,325 unigenes that showed a 2-fold or greater expression difference between the two groups of libraries (two developmental stages). After transcriptome analysis, we identified abundant unigenes that could be involved in fatty acid biosynthesis, degradation and some other aspects of seed development in pecan. This study presents a comprehensive dataset of transcriptomic changes during the seed development of pecan. It provides insights in understanding the molecular mechanisms responsible for fatty acid biosynthesis in the seed development. The identification of functional genes will also be useful for the molecular breeding work of pecan.

  8. Key influences in the design and implementation of mental health information systems in Ghana and South Africa.

    PubMed

    Ahuja, S; Mirzoev, T; Lund, C; Ofori-Atta, A; Skeen, S; Kufuor, A

    2016-01-01

    Strengthening of mental health information systems (MHIS) is essential to monitor and evaluate mental health services in low and middle-income countries. While research exists assessing wider health management information systems, there is limited published evidence exploring the design and implementation of MHIS in these settings. This paper aims to identify and assess the key factors affecting the design and implementation of MHIS, as perceived by the key stakeholders in Ghana and South Africa. We report findings from the Mental Health and Poverty Project, a 5-year research programme implemented within four African countries. The MHIS strengthening in South Africa and Ghana included two related components: intervention and research. The intervention component aimed to strengthen MHIS in the two countries, and the research component aimed to document interventions in each country, including the key influences. Data were collected using semi structured interviews with key stakeholders and reviews of key documents and secondary data from the improved MHIS. We analyzed the qualitative data using a framework approach. Key components of the MHIS intervention involved the introduction of a redesigned patient registration form, entry into computers for analysis every 2 months by clinical managerial staff, and utilization of data in hospital management meetings in three psychiatric hospitals in Ghana; and the introduction of a new set of mental health indicators and related forms and tally sheets at primary care clinics and district hospitals in five districts in the KwaZulu-Natal and Northern Cape provinces in South Africa. Overall, the key stakeholders perceived the MHIS strengthening as an effective intervention in both countries with an enhanced set of indicators in South Africa and introduction of a computerized system in Ghana. Influences on the design and implementation of MHIS interventions in Ghana and South Africa relate to resources, working approaches

  9. Long-distance quantum key distribution with imperfect devices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lo Piparo, Nicoló; Razavi, Mohsen

    2014-12-04

    Quantum key distribution over probabilistic quantum repeaters is addressed. We compare, under practical assumptions, two such schemes in terms of their secure key generation rate per memory, R{sub QKD}. The two schemes under investigation are the one proposed by Duan et al. in [Nat. 414, 413 (2001)] and that of Sangouard et al. proposed in [Phys. Rev. A 76, 050301 (2007)]. We consider various sources of imperfections in the latter protocol, such as a nonzero double-photon probability for the source, dark count per pulse, channel loss and inefficiencies in photodetectors and memories, to find the rate for different nesting levels.more » We determine the maximum value of the double-photon probability beyond which it is not possible to share a secret key anymore. We find the crossover distance for up to three nesting levels. We finally compare the two protocols.« less

  10. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    NASA Astrophysics Data System (ADS)

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  11. Comparative evaluation of existing expendable upper stages for space shuttle

    NASA Technical Reports Server (NTRS)

    Weyers, V. J.; Sagerman, G. D.; Borsody, J.; Lubick, R. J.

    1974-01-01

    The use of existing expendable upper stages in the space shuttle during its early years of operation is evaluated. The Burner 2, Scout, Delta, Agena, Transtage, and Centaur were each studied under contract by their respective manufacturers to determine the extent and cost of the minimum modifications necessary to integrate the stage with the shuttle orbiter. A comparative economic analysis of thirty-five different families of these stages is discussed. Results show that the overall transportation system cost differences between many of the families are quite small. However, by considering several factors in addition to cost, it is possible to select one family as being representative of the capability of the minimum modification existing stage approach. The selected family meets all of the specified mission requirements during the early years of shuttle operation.

  12. Using existing case-mix methods to fund trauma cases.

    PubMed

    Monakova, Julia; Blais, Irene; Botz, Charles; Chechulin, Yuriy; Picciano, Gino; Basinski, Antoni

    2010-01-01

    Policymakers frequently face the need to increase funding in isolated and frequently heterogeneous (clinically and in terms of resource consumption) patient subpopulations. This article presents a methodologic solution for testing the appropriateness of using existing grouping and weighting methodologies for funding subsets of patients in the scenario where a case-mix approach is preferable to a flat-rate based payment system. Using as an example the subpopulation of trauma cases of Ontario lead trauma hospitals, the statistical techniques of linear and nonlinear regression models, regression trees, and spline models were applied to examine the fit of the existing case-mix groups and reference weights for the trauma cases. The analyses demonstrated that for funding Ontario trauma cases, the existing case-mix systems can form the basis for rational and equitable hospital funding, decreasing the need to develop a different grouper for this subset of patients. This study confirmed that Injury Severity Score is a poor predictor of costs for trauma patients. Although our analysis used the Canadian case-mix classification system and cost weights, the demonstrated concept of using existing case-mix systems to develop funding rates for specific subsets of patient populations may be applicable internationally.

  13. Necessary detection efficiencies for secure quantum key distribution and bound randomness

    NASA Astrophysics Data System (ADS)

    Acín, Antonio; Cavalcanti, Daniel; Passaro, Elsa; Pironio, Stefano; Skrzypczyk, Paul

    2016-01-01

    In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies. We present a simple attack of this form that applies to any protocol in which the key is constructed from the results of untrusted measurements performed on particles coming from an insecure source or channel. Because of its generality, the attack applies to a large class of protocols, from standard prepare-and-measure to device-independent schemes. Our attack gives bounds on the critical detection efficiencies necessary for secure quantum key distribution, which show that the implementation of most partly device-independent solutions is, from the point of view of detection efficiency, almost as demanding as fully device-independent ones. We also show how our attack implies the existence of a form of bound randomness, namely nonlocal correlations in which a nonsignalling eavesdropper can find out a posteriori the result of any implemented measurement.

  14. Establishment of Aedes albopictus (Diptera: Culicidae) in the Florida Keys, 2001-2017.

    PubMed

    Murray, Heidi L; Pruszynski, Catherine A; Leal, Andrea L; Hribar, Lawrence J

    2018-06-23

    The presence of Aedes albopictus (Skuse) was first reported in the Florida Keys in 1993. Despite extensive surveillance, the Florida Keys Mosquito Control District (FKMCD) only collected specimens occasionally on a few islands, some years finding no evidence of the invasive species. In 2013-2017, FKMCD witnessed a sudden increase in population size and geographic extent of Ae. albopictus. Samples of Ae. albopictus have now been identified on 30 different islands in the Florida Keys. Three islands in particular (Key Largo, Big Pine Key, and Stock Island) have produced multiple positive samples during at least 4 of the last 5 yr, suggesting establishment of the invasive species. FKMCD continues to monitor Ae. albopictus throughout the Keys and make extensive efforts to reduce population abundance and geographic extent of this disease vector.

  15. The engineering of a scalable multi-site communications system utilizing quantum key distribution (QKD)

    NASA Astrophysics Data System (ADS)

    Tysowski, Piotr K.; Ling, Xinhua; Lütkenhaus, Norbert; Mosca, Michele

    2018-04-01

    Quantum key distribution (QKD) is a means of generating keys between a pair of computing hosts that is theoretically secure against cryptanalysis, even by a quantum computer. Although there is much active research into improving the QKD technology itself, there is still significant work to be done to apply engineering methodology and determine how it can be practically built to scale within an enterprise IT environment. Significant challenges exist in building a practical key management service (KMS) for use in a metropolitan network. QKD is generally a point-to-point technique only and is subject to steep performance constraints. The integration of QKD into enterprise-level computing has been researched, to enable quantum-safe communication. A novel method for constructing a KMS is presented that allows arbitrary computing hosts on one site to establish multiple secure communication sessions with the hosts of another site. A key exchange protocol is proposed where symmetric private keys are granted to hosts while satisfying the scalability needs of an enterprise population of users. The KMS operates within a layered architectural style that is able to interoperate with various underlying QKD implementations. Variable levels of security for the host population are enforced through a policy engine. A network layer provides key generation across a network of nodes connected by quantum links. Scheduling and routing functionality allows quantum key material to be relayed across trusted nodes. Optimizations are performed to match the real-time host demand for key material with the capacity afforded by the infrastructure. The result is a flexible and scalable architecture that is suitable for enterprise use and independent of any specific QKD technology.

  16. Existence and significance of communities in the World Trade Web

    NASA Astrophysics Data System (ADS)

    Piccardi, Carlo; Tajoli, Lucia

    2012-06-01

    The World Trade Web (WTW), which models the international transactions among countries, is a fundamental tool for studying the economics of trade flows, their evolution over time, and their implications for a number of phenomena, including the propagation of economic shocks among countries. In this respect, the possible existence of communities is a key point, because it would imply that countries are organized in groups of preferential partners. In this paper, we use four approaches to analyze communities in the WTW between 1962 and 2008, based, respectively, on modularity optimization, cluster analysis, stability functions, and persistence probabilities. Overall, the four methods agree in finding no evidence of significant partitions. A few weak communities emerge from the analysis, but they do not represent secluded groups of countries, as intercommunity linkages are also strong, supporting the view of a truly globalized trading system.

  17. Existence and significance of communities in the World Trade Web.

    PubMed

    Piccardi, Carlo; Tajoli, Lucia

    2012-06-01

    The World Trade Web (WTW), which models the international transactions among countries, is a fundamental tool for studying the economics of trade flows, their evolution over time, and their implications for a number of phenomena, including the propagation of economic shocks among countries. In this respect, the possible existence of communities is a key point, because it would imply that countries are organized in groups of preferential partners. In this paper, we use four approaches to analyze communities in the WTW between 1962 and 2008, based, respectively, on modularity optimization, cluster analysis, stability functions, and persistence probabilities. Overall, the four methods agree in finding no evidence of significant partitions. A few weak communities emerge from the analysis, but they do not represent secluded groups of countries, as intercommunity linkages are also strong, supporting the view of a truly globalized trading system.

  18. Extending key sharing: how to generate a key tightly coupled to a network security policy

    NASA Astrophysics Data System (ADS)

    Kazantzidis, Matheos

    2006-04-01

    Current state of the art security policy technologies, besides the small scale limitation and largely manual nature of accompanied management methods, are lacking a) in real-timeliness of policy implementation and b) vulnerabilities and inflexibility stemming from the centralized policy decision making; even if, for example, a policy description or access control database is distributed, the actual decision is often a centralized action and forms a system single point of failure. In this paper we are presenting a new fundamental concept that allows implement a security policy by a systematic and efficient key distribution procedure. Specifically, we extend the polynomial Shamir key splitting. According to this, a global key is split into n parts, any k of which can re-construct the original key. In this paper we present a method that instead of having "any k parts" be able to re-construct the original key, the latter can only be reconstructed if keys are combined as any access control policy describes. This leads into an easily deployable key generation procedure that results a single key per entity that "knows" its role in the specific access control policy from which it was derived. The system is considered efficient as it may be used to avoid expensive PKI operations or pairwise key distributions as well as provides superior security due to its distributed nature, the fact that the key is tightly coupled to the policy, and that policy change may be implemented easier and faster.

  19. Existence and non-existence of transition fronts in mixed ignition-monostable media

    NASA Astrophysics Data System (ADS)

    Graham, Cole; Shean Lim, Tau; Ma, Andrew; Weber, David

    2018-02-01

    We study transition fronts for one-dimensional reaction-diffusion equations with compactly-perturbed ignition-monostable reactions. We establish an almost sharp condition on reactions which characterizes the existence and non-existence of fronts. In particular, we prove that a strong inhomogeneity in the reaction prevents formation of transition fronts, while a weak inhomogeneity gives rise to a front. Our work extends the results and methods introduced in Nolen et al 2012 (Arch. Ration. Mech. Anal. 203 217-46), which studied the same question in inhomogeneous KPP media.

  20. Straightening: existence, uniqueness and stability

    PubMed Central

    Destrade, M.; Ogden, R. W.; Sgura, I.; Vergori, L.

    2014-01-01

    One of the least studied universal deformations of incompressible nonlinear elasticity, namely the straightening of a sector of a circular cylinder into a rectangular block, is revisited here and, in particular, issues of existence and stability are addressed. Particular attention is paid to the system of forces required to sustain the large static deformation, including by the application of end couples. The influence of geometric parameters and constitutive models on the appearance of wrinkles on the compressed face of the block is also studied. Different numerical methods for solving the incremental stability problem are compared and it is found that the impedance matrix method, based on the resolution of a matrix Riccati differential equation, is the more precise. PMID:24711723

  1. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2014-10-01 2014-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  2. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2012-10-01 2012-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  3. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2010-10-01 2010-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  4. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2011-10-01 2011-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  5. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2013-10-01 2013-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  6. A harmonized segmentation protocol for hippocampal and parahippocampal subregions: why do we need one and what are the key goals?

    PubMed Central

    Olsen, Rosanna K.; Berron, David; Carr, Valerie A.; Stark, Craig E.L.; Amaral, Robert S.C.; Amunts, Katrin; Augustinack, Jean C.; Bender, Andrew R.; Bernstein, Jeffrey D.; Boccardi, Marina; Bocchetta, Martina; Burggren, Alison; Chakravarty, M. Mallar; Chupin, Marie; Ekstrom, Arne; de Flores, Robin; Insausti, Ricardo; Kanel, Prabesh; Kedo, Olga; Kennedy, Kristen M.; Kerchner, Geoffrey A.; LaRocque, Karen F.; Liu, Xiuwen; Maass, Anne; Malykhin, Nicolai; Mueller, Susanne G.; Ofen, Noa; Palombo, Daniela J.; Parekh, Mansi B.; Pluta, John B.; Pruessner, Jens C.; Raz, Naftali; Rodrigue, Karen M.; Schoemaker, Dorothee; Shafer, Andrea T.; Steve, Trevor A.; Suthana, Nanthia; Wang, Lei; Winterburn, Julie L.; Yassa, Michael A.; Yushkevich, Paul A.; la Joie, Renaud

    2016-01-01

    The advent of high-resolution magnetic resonance imaging (MRI) has enabled in vivo research in a variety of populations and diseases on the structure and function of hippocampal subfields and subdivisions of the parahippocampal gyrus. Due to the many extant and highly discrepant segmentation protocols, comparing results across studies is difficult. To overcome this barrier, the Hippocampal Subfields Group was formed as an international collaboration with the aim of developing a harmonized protocol for manual segmentation of hippocampal and parahippocampal subregions on high-resolution MRI. In this commentary we discuss the goals for this protocol and the associated key challenges involved in its development. These include differences among existing anatomical reference materials, striking the right balance between reliability of measurements and anatomical validity, and the development of a versatile protocol that can be adopted for the study of populations varying in age and health. The commentary outlines these key challenges, as well as the proposed solution of each, with concrete examples from our working plan. Finally, with two examples, we illustrate how the harmonized protocol, once completed, is expected to impact the field by producing measurements that are quantitatively comparable across labs and by facilitating the synthesis of findings across different studies. PMID:27862600

  7. A harmonized segmentation protocol for hippocampal and parahippocampal subregions: Why do we need one and what are the key goals?

    PubMed

    Wisse, Laura E M; Daugherty, Ana M; Olsen, Rosanna K; Berron, David; Carr, Valerie A; Stark, Craig E L; Amaral, Robert S C; Amunts, Katrin; Augustinack, Jean C; Bender, Andrew R; Bernstein, Jeffrey D; Boccardi, Marina; Bocchetta, Martina; Burggren, Alison; Chakravarty, M Mallar; Chupin, Marie; Ekstrom, Arne; de Flores, Robin; Insausti, Ricardo; Kanel, Prabesh; Kedo, Olga; Kennedy, Kristen M; Kerchner, Geoffrey A; LaRocque, Karen F; Liu, Xiuwen; Maass, Anne; Malykhin, Nicolai; Mueller, Susanne G; Ofen, Noa; Palombo, Daniela J; Parekh, Mansi B; Pluta, John B; Pruessner, Jens C; Raz, Naftali; Rodrigue, Karen M; Schoemaker, Dorothee; Shafer, Andrea T; Steve, Trevor A; Suthana, Nanthia; Wang, Lei; Winterburn, Julie L; Yassa, Michael A; Yushkevich, Paul A; la Joie, Renaud

    2017-01-01

    The advent of high-resolution magnetic resonance imaging (MRI) has enabled in vivo research in a variety of populations and diseases on the structure and function of hippocampal subfields and subdivisions of the parahippocampal gyrus. Because of the many extant and highly discrepant segmentation protocols, comparing results across studies is difficult. To overcome this barrier, the Hippocampal Subfields Group was formed as an international collaboration with the aim of developing a harmonized protocol for manual segmentation of hippocampal and parahippocampal subregions on high-resolution MRI. In this commentary we discuss the goals for this protocol and the associated key challenges involved in its development. These include differences among existing anatomical reference materials, striking the right balance between reliability of measurements and anatomical validity, and the development of a versatile protocol that can be adopted for the study of populations varying in age and health. The commentary outlines these key challenges, as well as the proposed solution of each, with concrete examples from our working plan. Finally, with two examples, we illustrate how the harmonized protocol, once completed, is expected to impact the field by producing measurements that are quantitatively comparable across labs and by facilitating the synthesis of findings across different studies. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  8. Autoshaping and automaintenance of a key-press response in squirrel monkeys.

    PubMed

    Gamzu, E; Schwam, E

    1974-03-01

    Following exposure for a minimum of 500 to 600 trials, three of four naive squirrel monkeys eventually pressed a response key, illumination of which always preceded delivery of a food pellet. Three other naive monkeys did not press the key when the pellets were delivered randomly with respect to key illumination. Despite some similarities to autoshaping using pigeons, the data indicate many points of difference when squirrel monkeys are used as subjects. Although key-food pairings were shown to be important in the acquisition of the key-press response, they were ineffective in maintaining the response when either a negative response-reinforcer dependency was introduced, or when there was no scheduled response-reinforcer dependency (fixed trial). Not all demonstrations of autoshaping can be considered to be under the control of those processes that are primarily responsible for the phenomena obtained in pigeons.

  9. Kullback-Leibler information in resolving natural resource conflicts when definitive data exist

    USGS Publications Warehouse

    Anderson, D.R.; Burnham, K.P.; White, Gary C.

    2001-01-01

    Conflicts often arise in the management of natural resources. Often they result from differing perceptions, varying interpretations of the law, and self-interests among stakeholder groups (for example, the values and perceptions about spotted owls and forest management differ markedly among environmental groups, government regulatory agencies, and timber industries). We extend the conceptual approach to conflict resolution of Anderson et al. (1999) by using information-theoretic methods to provide quantitative evidence for differing stakeholder positions. Importantly, we assume that relevant empirical data exist that are central to the potential resolution of the conflict. We present a hypothetical example involving an experiment to assess potential effects of a chemical on monthly survival probabilities of the hen clam (Spisula solidissima). The conflict centers on 3 stakeholder positions: 1) no effect, 2) an acute effect, and 3) an acute and chronic effect of the chemical treatment. Such data were given to 18 analytical teams to make independent analyses and provide the relative evidence for each of 3 stakeholder positions in the conflict. The empirical evidence strongly supports only one of the 3 positions in the conflict: the application of the chemical causes acute and chronic effects on monthly survival, following treatment. Formal inference from all the stakeholder positions is provided for the 2 key parameters underlying the hen clam controversy. The estimates of these parameters were essentially unbiased (the relative bias for the control and treatment group's survival probability was -0.857% and 1.400%, respectively) and precise (coefficients of variation were 0.576% and 2.761%, respectively). The advantages of making formal inference from all the models, rather than drawing conclusions from only the estimated best model, is illustrated. Finally, we contrast information-theoretic and Bayesian approaches in terms of how positions in the controversy enter

  10. Quantum hacking on quantum key distribution using homodyne detection

    NASA Astrophysics Data System (ADS)

    Huang, Jing-Zheng; Kunz-Jacques, Sébastien; Jouguet, Paul; Weedbrook, Christian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2014-03-01

    Imperfect devices in commercial quantum key distribution systems open security loopholes that an eavesdropper may exploit. An example of one such imperfection is the wavelength-dependent coupling ratio of the fiber beam splitter. Utilizing this loophole, the eavesdropper can vary the transmittances of the fiber beam splitter at the receiver's side by inserting lights with wavelengths different from what is normally used. Here, we propose a wavelength attack on a practical continuous-variable quantum key distribution system using homodyne detection. By inserting light pulses at different wavelengths, this attack allows the eavesdropper to bias the shot-noise estimation even if it is done in real time. Based on experimental data, we discuss the feasibility of this attack and suggest a prevention scheme by improving the previously proposed countermeasures.

  11. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    PubMed

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  12. A Recommended Set of Key Arctic Indicators

    NASA Astrophysics Data System (ADS)

    Stanitski, D.; Druckenmiller, M.; Fetterer, F. M.; Gerst, M.; Intrieri, J. M.; Kenney, M. A.; Meier, W.; Overland, J. E.; Stroeve, J.; Trainor, S.

    2017-12-01

    The Arctic is an interconnected and environmentally sensitive system of ice, ocean, land, atmosphere, ecosystems, and people. From local to pan-Arctic scales, the area has already undergone major changes in physical and societal systems and will continue at a pace that is greater than twice the global average. Key Arctic indicators can quantify these changes. Indicators serve as the bridge between complex information and policy makers, stakeholders, and the general public, revealing trends and information people need to make important socioeconomic decisions. This presentation evaluates and compiles more than 70 physical, biological, societal and economic indicators into an approachable summary that defines the changing Arctic. We divided indicators into "existing," "in development," "possible," and "aspirational". In preparing a paper on Arctic Indicators for a special issue of the journal Climatic Change, our group established a set of selection criteria to identify indicators to specifically guide decision-makers in their responses to climate change. A goal of the analysis is to select a manageable composite list of recommended indicators based on sustained, reliable data sources with known user communities. The selected list is also based on the development of a conceptual model that identifies components and processes critical to our understanding of the Arctic region. This list of key indicators is designed to inform the plans and priorities of multiple groups such as the U.S. Global Change Research Program (USGCRP), Interagency Arctic Research Policy Committee (IARPC), and the Arctic Council.

  13. On the vulnerability of basic quantum key distribution protocols and three protocols stable to attack with 'blinding' of avalanche photodetectors

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com

    2012-05-15

    The fundamental quantum mechanics prohibitions on the measurability of quantum states allow secure key distribution between spatially remote users to be performed. Experimental and commercial implementations of quantum cryptography systems, however, use components that exist at the current technology level, in particular, one-photon avalanche photodetectors. These detectors are subject to the blinding effect. It was shown that all the known basic quantum key distribution protocols and systems based on them are vulnerable to attacks with blinding of photodetectors. In such attacks, an eavesdropper knows all the key transferred, does not produce errors at the reception side, and remains undetected. Threemore » protocols of quantum key distribution stable toward such attacks are suggested. The security of keys and detection of eavesdropping attempts are guaranteed by the internal structure of protocols themselves rather than additional technical improvements.« less

  14. Measurement-device-independent quantum key distribution with correlated source-light-intensity errors

    NASA Astrophysics Data System (ADS)

    Jiang, Cong; Yu, Zong-Wen; Wang, Xiang-Bin

    2018-04-01

    We present an analysis for measurement-device-independent quantum key distribution with correlated source-light-intensity errors. Numerical results show that the results here can greatly improve the key rate especially with large intensity fluctuations and channel attenuation compared with prior results if the intensity fluctuations of different sources are correlated.

  15. CAREGIVERS’ DIFFERING NEEDS ACROSS KEY EXPERIENCES OF THE ADVANCED CANCER DISEASE TRAJECTORY

    PubMed Central

    Bernard-DuBenske, Lori L.; Wen, Kuang-Yi; Gustafson, David H.; Guarnaccia, Charles A.; Cleary, James F.; Dinauer, Susan K.; McTavish, Fiona M.

    2013-01-01

    Familial caregivers are providing increasing amounts of care to advanced cancer patients. Increased understanding of caregivers’ needs is vital in providing necessary support to lessen caregiver burden and morbidity. Current literature has identified caregiver and patient needs at broad stages of the cancer trajectory; however, such broad stages may be too general to inform a practice of targeting specific interventions when they have the greatest utility. This study examines a variety of particular needs across a number of more discrete illness-related transition experiences specifically in the advanced cancer disease trajectory. One hundred fifty-nine female informal caregivers of people with advanced cancer completed a needs assessment survey. Analyses of these cross-sectional retrospective-report data reveal that cancer caregiver needs vary across specific key experiences occurring within the broader stages of illness identified by current literature. Furthermore, caregivers have unique needs during bereavement. While the sample characteristics are demographically limited, this study provides preliminary evidence that the broad stages are not specific enough increments for effectively examining caregiver needs, and supports the need for more precise distribution of cancer-related information at more discrete times in the illness course. PMID:18662420

  16. Quantum cryptography using coherent states: Randomized encryption and key generation

    NASA Astrophysics Data System (ADS)

    Corndorf, Eric

    With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic

  17. Planar air-bearing microgravity simulators: Review of applications, existing solutions and design parameters

    NASA Astrophysics Data System (ADS)

    Rybus, Tomasz; Seweryn, Karol

    2016-03-01

    All devices designed to be used in space must be thoroughly tested in relevant conditions. For several classes of devices the reduced gravity conditions are the key factor. In early stages of development and later due to financial reasons, the tests need to be done on Earth. However, in Earth conditions it is impossible to obtain a different gravity field independent on all linear and rotational spatial coordinates. Therefore, various test-bed systems are used, with their design driven by the device's specific needs. One of such test-beds are planar air-bearing microgravity simulators. In such an approach, the tested objects (e.g., manipulators intended for on-orbit operations or vehicles simulating satellites in a close formation flight) are mounted on planar air-bearings that allow almost frictionless motion on a flat surface, thus simulating microgravity conditions in two dimensions. In this paper we present a comprehensive review of research activities related to planar air-bearing microgravity simulators, demonstrating achievements of the most active research groups and describing newest trends and ideas, such as tests of landing gears for low-g bodies. Major design parameters of air-bearing test-beds are also reviewed and a list of notable existing test-beds is presented.

  18. Decision Trajectories in Dementia Care Networks: Decisions and Related Key Events.

    PubMed

    Groen-van de Ven, Leontine; Smits, Carolien; Oldewarris, Karen; Span, Marijke; Jukema, Jan; Eefsting, Jan; Vernooij-Dassen, Myrra

    2017-10-01

    This prospective multiperspective study provides insight into the decision trajectories of people with dementia by studying the decisions made and related key events. This study includes three waves of interviews, conducted between July 2010 and July 2012, with 113 purposefully selected respondents (people with beginning to advanced stages of dementia and their informal and professional caregivers) completed in 12 months (285 interviews). Our multilayered qualitative analysis consists of content analysis, timeline methods, and constant comparison. Four decision themes emerged-managing daily life, arranging support, community living, and preparing for the future. Eight key events delineate the decision trajectories of people with dementia. Decisions and key events differ between people with dementia living alone and living with a caregiver. Our study clarifies that decisions relate not only to the disease but to living with the dementia. Individual differences in decision content and sequence may effect shared decision-making and advance care planning.

  19. Fast implementation of length-adaptive privacy amplification in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Chun-Mei; Li, Mo; Huang, Jing-Zheng; Patcharapong, Treeviriyanupab; Li, Hong-Wei; Li, Fang-Yi; Wang, Chuan; Yin, Zhen-Qiang; Chen, Wei; Keattisak, Sripimanwat; Han, Zhen-Fu

    2014-09-01

    Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is used for sharing the same keys and for distilling unconditional secret keys. In this paper, we focus on speeding up the privacy amplification process by choosing a simple multiplicative universal class of hash functions. By constructing an optimal multiplication algorithm based on four basic multiplication algorithms, we give a fast software implementation of length-adaptive privacy amplification. “Length-adaptive” indicates that the implementation of privacy amplification automatically adapts to different lengths of input blocks. When the lengths of the input blocks are 1 Mbit and 10 Mbit, the speed of privacy amplification can be as fast as 14.86 Mbps and 10.88 Mbps, respectively. Thus, it is practical for GHz or even higher repetition frequency QKD systems.

  20. Autoshaping and automaintenance of a key-press response in squirrel monkeys

    PubMed Central

    Gamzu, Elkan; Schwam, Elias

    1974-01-01

    Following exposure for a minimum of 500 to 600 trials, three of four naive squirrel monkeys eventually pressed a response key, illumination of which always preceded delivery of a food pellet. Three other naive monkeys did not press the key when the pellets were delivered randomly with respect to key illumination. Despite some similarities to autoshaping using pigeons, the data indicate many points of difference when squirrel monkeys are used as subjects. Although key-food pairings were shown to be important in the acquisition of the key-press response, they were ineffective in maintaining the response when either a negative response-reinforcer dependency was introduced, or when there was no scheduled response-reinforcer dependency (fixed trial). Not all demonstrations of autoshaping can be considered to be under the control of those processes that are primarily responsible for the phenomena obtained in pigeons. PMID:16811749

  1. An Efficient Authenticated Key Transfer Scheme in Client-Server Networks

    NASA Astrophysics Data System (ADS)

    Shi, Runhua; Zhang, Shun

    2017-10-01

    In this paper, we presented a novel authenticated key transfer scheme in client-server networks, which can achieve two secure goals of remote user authentication and the session key establishment between the remote user and the server. Especially, the proposed scheme can subtly provide two fully different authentications: identity-base authentication and anonymous authentication, while the remote user only holds a private key. Furthermore, our scheme only needs to transmit 1-round messages from the remote user to the server, thus it is very efficient in communication complexity. In addition, the most time-consuming computation in our scheme is elliptic curve scalar point multiplication, so it is also feasible even for mobile devices.

  2. Alternative transitions between existing representations in multi-scale maps

    NASA Astrophysics Data System (ADS)

    Dumont, Marion; Touya, Guillaume; Duchêne, Cécile

    2018-05-01

    Map users may have issues to achieve multi-scale navigation tasks, as cartographic objects may have various representations across scales. We assume that adding intermediate representations could be one way to reduce the differences between existing representations, and to ease the transitions across scales. We consider an existing multiscale map on the scale range from 1 : 25k to 1 : 100k scales. Based on hypotheses about intermediate representations design, we build custom multi-scale maps with alternative transitions. We will conduct in a next future a user evaluation to compare the efficiency of these alternative maps for multi-scale navigation. This paper discusses the hypotheses and production process of these alternative maps.

  3. Transcriptome analysis of pecan seeds at different developing stages and identification of key genes involved in lipid metabolism

    PubMed Central

    Shah, Faheem Afzal; Wang, Qiaojian; Wang, Zhaocheng; Wu, Lifang

    2018-01-01

    Pecan is an economically important nut crop tree due to its unique texture and flavor properties. The pecan seed is rich of unsaturated fatty acid and protein. However, little is known about the molecular mechanisms of the biosynthesis of fatty acids in the developing seeds. In this study, transcriptome sequencing of the developing seeds was performed using Illumina sequencing technology. Pecan seed embryos at different developmental stages were collected and sequenced. The transcriptomes of pecan seeds at two key developing stages (PA, the initial stage and PS, the fast oil accumulation stage) were also compared. A total of 82,155 unigenes, with an average length of 1,198 bp from seven independent libraries were generated. After functional annotations, we detected approximately 55,854 CDS, among which, 2,807 were Transcription Factor (TF) coding unigenes. Further, there were 13,325 unigenes that showed a 2-fold or greater expression difference between the two groups of libraries (two developmental stages). After transcriptome analysis, we identified abundant unigenes that could be involved in fatty acid biosynthesis, degradation and some other aspects of seed development in pecan. This study presents a comprehensive dataset of transcriptomic changes during the seed development of pecan. It provides insights in understanding the molecular mechanisms responsible for fatty acid biosynthesis in the seed development. The identification of functional genes will also be useful for the molecular breeding work of pecan. PMID:29694395

  4. Interactive simulations for quantum key distribution

    NASA Astrophysics Data System (ADS)

    Kohnle, Antje; Rizzoli, Aluna

    2017-05-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels.

  5. Biocatalytic conversion of methane to methanol as a key step for development of methane-based biorefineries.

    PubMed

    Hwang, In Yeub; Lee, Seung Hwan; Choi, Yoo Seong; Park, Si Jae; Na, Jeong Geol; Chang, In Seop; Kim, Choongik; Kim, Hyun Cheol; Kim, Yong Hwan; Lee, Jin Won; Lee, Eun Yeol

    2014-12-28

    Methane is considered as a next-generation carbon feedstock owing to the vast reserves of natural and shale gas. Methane can be converted to methanol by various methods, which in turn can be used as a starting chemical for the production of value-added chemicals using existing chemical conversion processes. Methane monooxygenase is the key enzyme that catalyzes the addition of oxygen to methane. Methanotrophic bacteria can transform methane to methanol by inhibiting methanol dehydrogenase. In this paper, we review the recent progress made on the biocatalytic conversion of methane to methanol as a key step for methane-based refinery systems and discuss future prospects for this technology.

  6. Principles of visual key construction-with a visual identification key to the Fagaceae of the southeastern United States.

    PubMed

    Kirchoff, Bruce K; Leggett, Roxanne; Her, Va; Moua, Chue; Morrison, Jessica; Poole, Chamika

    2011-01-01

    Advances in digital imaging have made possible the creation of completely visual keys. By a visual key we mean a key based primarily on images, and that contains a minimal amount of text. Characters in visual keys are visually, not verbally defined. In this paper we create the first primarily visual key to a group of taxa, in this case the Fagaceae of the southeastern USA. We also modify our recently published set of best practices for image use in illustrated keys to make them applicable to visual keys. Photographs of the Fagaceae were obtained from internet and herbarium databases or were taken specifically for this project. The images were printed and then sorted into hierarchical groups. These hierarchical groups of images were used to create the 'couplets' in the key. A reciprocal process of key creation and testing was used to produce the final keys. Four keys were created, one for each of the parts-leaves, buds, fruits and bark. Species description pages consisting of multiple images were also created for each of the species in the key. Creation and testing of the key resulted in a modified list of best practices for image use visual keys. The inclusion of images into paper and electronic keys has greatly increased their ease of use. However, virtually all of these keys are still based upon verbally defined, atomistic characters. The creation of primarily visual keys allows us to overcome the well-known limitations of linguistic-based characters and create keys that are much easier to use, especially for botanical novices.

  7. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis

    PubMed Central

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    Background This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Methodology/Principal Findings Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006–2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006–2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including “natural products and polymers” with nine key technical points, “fermentation industry” with twelve ones, “electrical medical equipment” with four ones, and “diagnosis, surgery” with four ones. Conclusions/Significance The results of this study could provide guidance on the development

  8. Conditions for the existence of Kelvin-Helmholtz instability in a CME

    NASA Astrophysics Data System (ADS)

    Jatenco-Pereira, Vera; Páez, Andrés; Falceta-Gonçalves, Diego; Opher, Merav

    2015-08-01

    The presence of Kelvin-Helmholtz instability (KHI) in the sheaths of the Coronal Mass Ejection (CME) has motivated several analysis and simulations to test their existence. In the present work we assume the existence of the KHI and propose a method to identify the regions where it is possible the development of KHI for a CME propagating in a fast and slow solar wind. We build functions for the velocities, densities and magnetic fields for two different zones of interaction between the solar wind and a CME. Based on the theory of magnetic KHI proposed by Chandrasekhar (1961) and we found conditions for the existence of KHI in the CME sheaths. Using this method it is possible to determine the range of parameters, in particular CME magnetic fields in which the KHI could exist. We conclude that KHI may exist in the two CME flanks and it is perceived that the zone with boundaries with the slow solar wind is more appropriated for the formation of the KHI.

  9. Identification of key residues for protein conformational transition using elastic network model.

    PubMed

    Su, Ji Guo; Xu, Xian Jin; Li, Chun Hua; Chen, Wei Zu; Wang, Cun Xin

    2011-11-07

    Proteins usually undergo conformational transitions between structurally disparate states to fulfill their functions. The large-scale allosteric conformational transitions are believed to involve some key residues that mediate the conformational movements between different regions of the protein. In the present work, a thermodynamic method based on the elastic network model is proposed to predict the key residues involved in protein conformational transitions. In our method, the key functional sites are identified as the residues whose perturbations largely influence the free energy difference between the protein states before and after transition. Two proteins, nucleotide binding domain of the heat shock protein 70 and human/rat DNA polymerase β, are used as case studies to identify the critical residues responsible for their open-closed conformational transitions. The results show that the functionally important residues mainly locate at the following regions for these two proteins: (1) the bridging point at the interface between the subdomains that control the opening and closure of the binding cleft; (2) the hinge region between different subdomains, which mediates the cooperative motions between the corresponding subdomains; and (3) the substrate binding sites. The similarity in the positions of the key residues for these two proteins may indicate a common mechanism in their conformational transitions.

  10. What is big data? A consensual definition and a review of key research topics

    NASA Astrophysics Data System (ADS)

    De Mauro, Andrea; Greco, Marco; Grimaldi, Michele

    2015-02-01

    Although Big Data is a trending buzzword in both academia and the industry, its meaning is still shrouded by much conceptual vagueness. The term is used to describe a wide range of concepts: from the technological ability to store, aggregate, and process data, to the cultural shift that is pervasively invading business and society, both drowning in information overload. The lack of a formal definition has led research to evolve into multiple and inconsistent paths. Furthermore, the existing ambiguity among researchers and practitioners undermines an efficient development of the subject. In this paper we have reviewed the existing literature on Big Data and analyzed its previous definitions in order to pursue two results: first, to provide a summary of the key research areas related to the phenomenon, identifying emerging trends and suggesting opportunities for future development; second, to provide a consensual definition for Big Data, by synthesizing common themes of existing works and patterns in previous definitions.

  11. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange

    NASA Astrophysics Data System (ADS)

    Gonzalez, Elias; Kish, Laszlo B.

    2016-03-01

    As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.

  12. Soil fauna: key to new carbon models

    NASA Astrophysics Data System (ADS)

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; De Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; José Jiménez, Juan

    2016-11-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined mostly in terms of plant residue quality and input and microbial decomposition, overlooking the significant regulation provided by soil fauna. The fauna controls almost any aspect of organic matter turnover, foremost by regulating the activity and functional composition of soil microorganisms and their physical-chemical connectivity with soil organic matter. We demonstrate a very strong impact of soil animals on carbon turnover, increasing or decreasing it by several dozen percent, sometimes even turning C sinks into C sources or vice versa. This is demonstrated not only for earthworms and other larger invertebrates but also for smaller fauna such as Collembola. We suggest that inclusion of soil animal activities (plant residue consumption and bioturbation altering the formation, depth, hydraulic properties and physical heterogeneity of soils) can fundamentally affect the predictive outcome of SOM models. Understanding direct and indirect impacts of soil fauna on nutrient availability, carbon sequestration, greenhouse gas emissions and plant growth is key to the understanding of SOM dynamics in the context of global carbon cycling models. We argue that explicit consideration of soil fauna is essential to make realistic modelling predictions on SOM dynamics and to detect expected non-linear responses of SOM dynamics to global change. We present a decision framework, to be further developed through the activities of KEYSOM, a European COST Action, for when mechanistic SOM models

  13. 10 CFR 611.206 - Existing facilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Existing facilities. 611.206 Section 611.206 Energy... PROGRAM Facility/Funding Awards § 611.206 Existing facilities. The Secretary shall, in making awards to those manufacturers that have existing facilities, give priority to those facilities that are oldest or...

  14. Security Analysis of Measurement-Device-Independent Quantum Key Distribution in Collective-Rotation Noisy Environment

    NASA Astrophysics Data System (ADS)

    Li, Na; Zhang, Yu; Wen, Shuang; Li, Lei-lei; Li, Jian

    2018-01-01

    Noise is a problem that communication channels cannot avoid. It is, thus, beneficial to analyze the security of MDI-QKD in noisy environment. An analysis model for collective-rotation noise is introduced, and the information theory methods are used to analyze the security of the protocol. The maximum amount of information that Eve can eavesdrop is 50%, and the eavesdropping can always be detected if the noise level ɛ ≤ 0.68. Therefore, MDI-QKD protocol is secure as quantum key distribution protocol. The maximum probability that the relay outputs successful results is 16% when existing eavesdropping. Moreover, the probability that the relay outputs successful results when existing eavesdropping is higher than the situation without eavesdropping. The paper validates that MDI-QKD protocol has better robustness.

  15. Establishing security of quantum key distribution without monitoring disturbance

    NASA Astrophysics Data System (ADS)

    Koashi, Masato

    2015-10-01

    In conventional quantum key distribution (QKD) protocols, the information leak to an eavesdropper is estimated through the basic principle of quantum mechanics dictated in the original version of Heisenberg's uncertainty principle. The amount of leaked information on a shared sifted key is bounded from above essentially by using information-disturbance trade-off relations, based on the amount of signal disturbance measured via randomly sampled or inserted probe signals. Here we discuss an entirely different avenue toward the private communication, which does not rely on the information disturbance trade-off relations and hence does not require a monitoring of signal disturbance. The independence of the amount of privacy amplification from that of disturbance tends to give it a high tolerance on the channel noises. The lifting of the burden of precise statistical estimation of disturbance leads to a favorable finite-key-size effect. A protocol based on the novel principle can be implemented by only using photon detectors and classical optics tools: a laser, a phase modulator, and an interferometer. The protocol resembles the differential-phase-shift QKD protocol in that both share a simple binary phase shift keying on a coherent train of weak pulses from a laser. The difference lies in the use of a variable-delay interferometer in the new protocol, which randomly changes the combination of pulse pairs to be superposed. This extra randomness has turned out to be enough to upper-bound the information extracted by the eavesdropper, regardless of how they have disturbed the quantum signal.

  16. Malate as a key carbon source of leaf dark-respired CO2 across different environmental conditions in potato plants.

    PubMed

    Lehmann, Marco M; Rinne, Katja T; Blessing, Carola; Siegwolf, Rolf T W; Buchmann, Nina; Werner, Roland A

    2015-09-01

    Dissimilation of carbon sources during plant respiration in support of metabolic processes results in the continuous release of CO2. The carbon isotopic composition of leaf dark-respired CO2 (i.e. δ (13) C R ) shows daily enrichments up to 14.8‰ under different environmental conditions. However, the reasons for this (13)C enrichment in leaf dark-respired CO2 are not fully understood, since daily changes in δ(13)C of putative leaf respiratory carbon sources (δ (13) C RS ) are not yet clear. Thus, we exposed potato plants (Solanum tuberosum) to different temperature and soil moisture treatments. We determined δ (13) C R with an in-tube incubation technique and δ (13) C RS with compound-specific isotope analysis during a daily cycle. The highest δ (13) C RS values were found in the organic acid malate under different environmental conditions, showing less negative values compared to δ (13) C R (up to 5.2‰) and compared to δ (13) C RS of soluble carbohydrates, citrate and starch (up to 8.8‰). Moreover, linear relationships between δ (13) C R and δ (13) C RS among different putative carbon sources were strongest for malate during daytime (r(2)=0.69, P≤0.001) and nighttime (r(2)=0.36, P≤0.001) under all environmental conditions. A multiple linear regression analysis revealed δ (13) C RS of malate as the most important carbon source influencing δ (13) C R . Thus, our results strongly indicate malate as a key carbon source of (13)C enriched dark-respired CO2 in potato plants, probably driven by an anapleurotic flux replenishing intermediates of the Krebs cycle. © The Author 2015. Published by Oxford University Press on behalf of the Society for Experimental Biology.

  17. Malate as a key carbon source of leaf dark-respired CO2 across different environmental conditions in potato plants

    PubMed Central

    Lehmann, Marco M.; Rinne, Katja T.; Blessing, Carola; Siegwolf, Rolf T. W.; Buchmann, Nina; Werner, Roland A.

    2015-01-01

    Dissimilation of carbon sources during plant respiration in support of metabolic processes results in the continuous release of CO2. The carbon isotopic composition of leaf dark-respired CO2 (i.e. δ 13 C R) shows daily enrichments up to 14.8‰ under different environmental conditions. However, the reasons for this 13C enrichment in leaf dark-respired CO2 are not fully understood, since daily changes in δ13C of putative leaf respiratory carbon sources (δ 13 C RS) are not yet clear. Thus, we exposed potato plants (Solanum tuberosum) to different temperature and soil moisture treatments. We determined δ 13 C R with an in-tube incubation technique and δ 13 C RS with compound-specific isotope analysis during a daily cycle. The highest δ 13 C RS values were found in the organic acid malate under different environmental conditions, showing less negative values compared to δ 13 C R (up to 5.2‰) and compared to δ 13 C RS of soluble carbohydrates, citrate and starch (up to 8.8‰). Moreover, linear relationships between δ 13 C R and δ 13 C RS among different putative carbon sources were strongest for malate during daytime (r2=0.69, P≤0.001) and nighttime (r2=0.36, P≤0.001) under all environmental conditions. A multiple linear regression analysis revealed δ 13 C RS of malate as the most important carbon source influencing δ 13 C R. Thus, our results strongly indicate malate as a key carbon source of 13C enriched dark-respired CO2 in potato plants, probably driven by an anapleurotic flux replenishing intermediates of the Krebs cycle. PMID:26139821

  18. 10 CFR 611.206 - Existing facilities.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Existing facilities. 611.206 Section 611.206 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS ADVANCED TECHNOLOGY VEHICLES MANUFACTURER ASSISTANCE PROGRAM Facility/Funding Awards § 611.206 Existing facilities. The Secretary shall, in making awards to those manufacturers that have existing...

  19. 10 CFR 611.206 - Existing facilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Existing facilities. 611.206 Section 611.206 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS ADVANCED TECHNOLOGY VEHICLES MANUFACTURER ASSISTANCE PROGRAM Facility/Funding Awards § 611.206 Existing facilities. The Secretary shall, in making awards to those manufacturers that have existing...

  20. 10 CFR 611.206 - Existing facilities.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Existing facilities. 611.206 Section 611.206 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS ADVANCED TECHNOLOGY VEHICLES MANUFACTURER ASSISTANCE PROGRAM Facility/Funding Awards § 611.206 Existing facilities. The Secretary shall, in making awards to those manufacturers that have existing...

  1. 10 CFR 611.206 - Existing facilities.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Existing facilities. 611.206 Section 611.206 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS ADVANCED TECHNOLOGY VEHICLES MANUFACTURER ASSISTANCE PROGRAM Facility/Funding Awards § 611.206 Existing facilities. The Secretary shall, in making awards to those manufacturers that have existing...

  2. Fast optical source for quantum key distribution based on semiconductor optical amplifiers.

    PubMed

    Jofre, M; Gardelein, A; Anzolin, G; Amaya, W; Capmany, J; Ursin, R; Peñate, L; Lopez, D; San Juan, J L; Carrasco, J A; Garcia, F; Torcal-Milla, F J; Sanchez-Brea, L M; Bernabeu, E; Perdigues, J M; Jennewein, T; Torres, J P; Mitchell, M W; Pruneri, V

    2011-02-28

    A novel integrated optical source capable of emitting faint pulses with different polarization states and with different intensity levels at 100 MHz has been developed. The source relies on a single laser diode followed by four semiconductor optical amplifiers and thin film polarizers, connected through a fiber network. The use of a single laser ensures high level of indistinguishability in time and spectrum of the pulses for the four different polarizations and three different levels of intensity. The applicability of the source is demonstrated in the lab through a free space quantum key distribution experiment which makes use of the decoy state BB84 protocol. We achieved a lower bound secure key rate of the order of 3.64 Mbps and a quantum bit error ratio as low as 1.14×10⁻² while the lower bound secure key rate became 187 bps for an equivalent attenuation of 35 dB. To our knowledge, this is the fastest polarization encoded QKD system which has been reported so far. The performance, reduced size, low power consumption and the fact that the components used can be space qualified make the source particularly suitable for secure satellite communication.

  3. Randomness determines practical security of BB84 quantum key distribution.

    PubMed

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-10

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  4. Randomness determines practical security of BB84 quantum key distribution

    NASA Astrophysics Data System (ADS)

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  5. Randomness determines practical security of BB84 quantum key distribution

    PubMed Central

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-01-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system. PMID:26552359

  6. Inhibition of existing denitrification enzyme activity by chloramphenicol

    USGS Publications Warehouse

    Brooks, M.H.; Smith, R.L.; Macalady, D.L.

    1992-01-01

    Chloramphenicol completely inhibited the activity of existing denitrification enzymes in acetylene-block incubations with (i) sediments from a nitrate-contaminated aquifer and (ii) a continuous culture of denitrifying groundwater bacteria. Control flasks with no antibiotic produced significant amounts of nitrous oxide in the same time period. Amendment with chloramphenicol after nitrous oxide production had begun resulted in a significant decrease in the rate of nitrous oxide production. Chloramphenicol also decreased (>50%) the activity of existing denitrification enzymes in pure cultures of Pseudomonas denitrificans that were harvested during log- phase growth and maintained for 2 weeks in a starvation medium lacking electron donor. Short-term time courses of nitrate consumption and nitrous oxide production in the presence of acetylene with P. denitrificans undergoing carbon starvation were performed under optimal conditions designed to mimic denitrification enzyme activity assays used with soils. Time courses were linear for both chloramphenicol and control flasks, and rate estimates for the two treatments were significantly different at the 95% confidence level. Complete or partial inhibition of existing enzyme activity is not consistent with the current understanding of the mode of action of chloramphenicol or current practice, in which the compound is frequently employed to inhibit de novo protein synthesis during the course of microbial activity assays. The results of this study demonstrate that chloramphenicol amendment can inhibit the activity of existing denitrification enzymes and suggest that caution is needed in the design and interpretation of denitrification activity assays in which chloramphenicol is used to prevent new protein synthesis.

  7. 76 FR 68314 - Special Local Regulations; Key West World Championship, Atlantic Ocean; Key West, FL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-04

    ...-AA08 Special Local Regulations; Key West World Championship, Atlantic Ocean; Key West, FL AGENCY: Coast... World Championship, a series of high-speed boat races. The event is scheduled to take place on Wednesday... Key West World Championship, a series of high-speed boat races. The event will be held on the waters...

  8. Symmetric Key Services Markup Language (SKSML)

    NASA Astrophysics Data System (ADS)

    Noor, Arshad

    Symmetric Key Services Markup Language (SKSML) is the eXtensible Markup Language (XML) being standardized by the OASIS Enterprise Key Management Infrastructure Technical Committee for requesting and receiving symmetric encryption cryptographic keys within a Symmetric Key Management System (SKMS). This protocol is designed to be used between clients and servers within an Enterprise Key Management Infrastructure (EKMI) to secure data, independent of the application and platform. Building on many security standards such as XML Signature, XML Encryption, Web Services Security and PKI, SKSML provides standards-based capability to allow any application to use symmetric encryption keys, while maintaining centralized control. This article describes the SKSML protocol and its capabilities.

  9. Detection of Different β-Lactamases and their Co-existence by Using Various Discs Combination Methods in Clinical Isolates of Enterobacteriaceae and Pseudomonas spp.

    PubMed Central

    Rawat, Vinita; Singhai, Monil; Verma, Pankaj Kumar

    2013-01-01

    Background: Resistance to broad spectrum beta-lactams mediated by extended spectrum β-lactamase (ESBL), AmpC, and metallobetalactamase (MBLs) enzymes are an increasing problem worldwide. The study was aimed to detect occurrence rate and to evaluate different substrates and inhibitors by disc combination method for detecting varying degree of β-lactamase enzymes and their co-production. Materials and Methods: A disc panel containing imipenem (IMP), IMP/EDTA, ceftazidime (CA), ceftazidime-tazobactum (CAT), CAT/cloxacillin (CLOX), ceftazidime-clavulanic acid (CAC), CAC/CLOX, cefoxitin (CN), and CN/CLOX in a single plate was used to detect presence of ESBLs, AmpC, and MBLs and/or their co-existence in 184 consecutive, nonrepetitive, clinical isolates of Enterobacteriace (n = 96) and Pseudomonas spp. (n = 88) from pus samples of hospitalized patients, resistant to 3rd generation cephalosporins. Results: Out of a total of 96 clinical isolates of Enterobacteriaceae, 18.7, 20.8, and 27% were pure ESBL, AmpC, and MBL producers, respectively. ESBL and AmpC were co-produced by 25% isolates. Among 88 Pseudomonas spp. 38.6, 13, and 6% were pure MBL, ESBL, and AmpC producers, respectively. ESBL/AmpC and MBL/AmpC co-production was seen in 20% and 18% isolates, respectively. Among ESBL and AmpC co-producers, CA/CAC/CLOX disc combination (DC) missed 7 of the 24 ESBL producers in Enterobacteriace and 4 of the 18 ESBL in Pseudomonas spp., which were detected by CA/CAT/CLOX DC. No mechanism was detected among 8.3% Enterobacteriaceae and 2.3% Pseudomonas isolates. Conclusion: Diagnostic problems posed by co-existence of different classes of β-lactamases in a single isolate could be solved by disc combination method by using simple panel of discs containing CA, CAT, CAT/CLOX, IMP, and IMP/EDTA. PMID:24014963

  10. The I.A.G./A.I.G. SEDIBUD (Sediment Budgets in Cold Environments) Program (2005 - 2017): Key activities and outcomes

    NASA Astrophysics Data System (ADS)

    Beylich, Achim A.

    2017-04-01

    Amplified climate change and ecological sensitivity of high-latitude and high-altitude cold climate environments has been highlighted as a key global environmental issue. Projected climate change in largely undisturbed cold regions is expected to alter melt-season duration and intensity, along with the number of extreme rainfall events, total annual precipitation and the balance between snowfall and rainfall. Similarly, changes to the thermal balance are expected to reduce the extent of permafrost and seasonal ground frost and increase active-layer depths. These combined effects will undoubtedly change Earth surface environments in cold regions and will alter the fluxes of sediments, solutes and nutrients. However, the absence of quantitative data and coordinated analysis to understand the sensitivity of the Earth surface environment are acute in cold regions. Contemporary cold climate environments generally provide the opportunity to identify solute and sedimentary systems where anthropogenic impacts are still less important than the effects of climate change. Accordingly, it is still possible to develop a library of baseline fluvial yields and sedimentary budgets before the natural environment is completely transformed. The SEDIBUD (Sediment Budgets in Cold Environments) Program, building on the European Science Foundation (ESF) Network SEDIFLUX (Sedimentary Source-to-Sink Fluxes in Cold Environments, since 2004) was formed in 2005 as a new Program (Working Group) of the International Association of Geomorphologists (I.A.G./A.I.G.) to address this still existing key knowledge gap. SEDIBUD (2005-2017) has currently about 400 members worldwide and the Steering Committee of this international program is composed of eleven scientists from ten different countries. The central research question of this global program is to: Assess and model the contemporary sedimentary fluxes in cold climates, with emphasis on both particulate and dissolved components. Research carried

  11. Key metrics for HFIR HEU and LEU models

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ilas, Germina; Betzler, Benjamin R.; Chandler, David

    This report compares key metrics for two fuel design models of the High Flux Isotope Reactor (HFIR). The first model represents the highly enriched uranium (HEU) fuel currently in use at HFIR, and the second model considers a low-enriched uranium (LEU) interim design fuel. Except for the fuel region, the two models are consistent, and both include an experiment loading that is representative of HFIR's current operation. The considered key metrics are the neutron flux at the cold source moderator vessel, the mass of 252Cf produced in the flux trap target region as function of cycle time, the fast neutronmore » flux at locations of interest for material irradiation experiments, and the reactor cycle length. These key metrics are a small subset of the overall HFIR performance and safety metrics. They were defined as a means of capturing data essential for HFIR's primary missions, for use in optimization studies assessing the impact of HFIR's conversion from HEU fuel to different types of LEU fuel designs.« less

  12. Quantum key distribution using continuous-variable non-Gaussian states

    NASA Astrophysics Data System (ADS)

    Borelli, L. F. M.; Aguiar, L. S.; Roversi, J. A.; Vidiella-Barranco, A.

    2016-02-01

    In this work, we present a quantum key distribution protocol using continuous-variable non-Gaussian states, homodyne detection and post-selection. The employed signal states are the photon added then subtracted coherent states (PASCS) in which one photon is added and subsequently one photon is subtracted from the field. We analyze the performance of our protocol, compared with a coherent state-based protocol, for two different attacks that could be carried out by the eavesdropper (Eve). We calculate the secret key rate transmission in a lossy line for a superior channel (beam-splitter) attack, and we show that we may increase the secret key generation rate by using the non-Gaussian PASCS rather than coherent states. We also consider the simultaneous quadrature measurement (intercept-resend) attack, and we show that the efficiency of Eve's attack is substantially reduced if PASCS are used as signal states.

  13. Chapter 2. Selecting Key Habitat Attributes for Monitoring

    Treesearch

    Gregory D. Hayward; Lowell H. Suring

    2013-01-01

    The success of habitat monitoring programs depends, to a large extent, on carefully selecting key habitat attributes to monitor. The challenge of choosing a limited but sufficient set of attributes will differ depending on the objectives of the monitoring program. In some circumstances, such as managing National Forest System lands for threatened and endangered species...

  14. Different perspectives on the key challenges facing rural health: The challenges of power and knowledge.

    PubMed

    Malatzky, Christina; Bourke, Lisa

    2018-05-25

    To examine the effects of dominant knowledge in rural health, including how they shape issues central to rural health. In particular, this article examines the roles of: (i) deficit knowledge of rural health workforce; (ii) dominant portrayals of generalism; and (iii) perceptions of inferiority about rural communities in maintaining health disparities between rural- and metropolitan-based Australians. A Foucauldian framework is applied to literature, evidence, case studies and key messages in rural health. Three scenarios are used to provide practical examples of specific knowledge that is prioritised or marginalised. The analysis of three areas in rural health identifies how deficit knowledge is privileged despite it undermining the purpose of rural health. First, deficit knowledge highlights the workforce shortage rather than the type of work in rural practice or the oversupply of workforce in metropolitan areas. Second, the construction of generalist practice as less skilled and more monotonous undermines other knowledge that it is diverse and challenging. Third, dominant negative stereotypes of rural communities discourage rural careers and highlight undesirable aspects of rural practice. The privileging of deficit knowledge pertaining to rural health workforce, broader dominant discourses of generalism and the nature of rural Australian communities reproduces many of the key challenges in rural health today, including persisting health disparities between rural- and metropolitan-based Australians. To disrupt the operations of power that highlight deficit knowledge and undermine other knowledge, we need to change the way in which rural health is currently constructed and understood. © 2018 National Rural Health Alliance Ltd.

  15. Simulating of the measurement-device independent quantum key distribution with phase randomized general sources

    PubMed Central

    Wang, Qin; Wang, Xiang-Bin

    2014-01-01

    We present a model on the simulation of the measurement-device independent quantum key distribution (MDI-QKD) with phase randomized general sources. It can be used to predict experimental observations of a MDI-QKD with linear channel loss, simulating corresponding values for the gains, the error rates in different basis, and also the final key rates. Our model can be applicable to the MDI-QKDs with arbitrary probabilistic mixture of different photon states or using any coding schemes. Therefore, it is useful in characterizing and evaluating the performance of the MDI-QKD protocol, making it a valuable tool in studying the quantum key distributions. PMID:24728000

  16. Existence conditions for unknown input functional observers

    NASA Astrophysics Data System (ADS)

    Fernando, T.; MacDougall, S.; Sreeram, V.; Trinh, H.

    2013-01-01

    This article presents necessary and sufficient conditions for the existence and design of an unknown input Functional observer. The existence of the observer can be verified by computing a nullspace of a known matrix and testing some matrix rank conditions. The existence of the observer does not require the satisfaction of the observer matching condition (i.e. Equation (16) in Hou and Muller 1992, 'Design of Observers for Linear Systems with Unknown Inputs', IEEE Transactions on Automatic Control, 37, 871-875), is not limited to estimating scalar functionals and allows for arbitrary pole placement. The proposed observer always exists when a state observer exists for the unknown input system, and furthermore, the proposed observer can exist even in some instances when an unknown input state observer does not exist.

  17. Strategy Guideline: Quality Management in Existing Homes; Cantilever Floor Example

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Taggart, J.; Sikora, J.; Wiehagen, J.

    2011-12-01

    This guideline is designed to highlight the QA process that can be applied to any residential building retrofit activity. The cantilevered floor retrofit detailed in this guideline is included only to provide an actual retrofit example to better illustrate the QA activities being presented. The goal of existing home high performing remodeling quality management systems (HPR-QMS) is to establish practices and processes that can be used throughout any remodeling project. The research presented in this document provides a comparison of a selected retrofit activity as typically done versus that same retrofit activity approached from an integrated high performance remodeling andmore » quality management perspective. It highlights some key quality management tools and approaches that can be adopted incrementally by a high performance remodeler for this or any high performance retrofit. This example is intended as a template and establishes a methodology that can be used to develop a portfolio of high performance remodeling strategies.« less

  18. 25 CFR 502.14 - Key employee.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee. [57 FR 12392, Apr. 9...

  19. Methods and apparatuses for self-generating fault-tolerant keys in spread-spectrum systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moradi, Hussein; Farhang, Behrouz; Subramanian, Vijayarangam

    Self-generating fault-tolerant keys for use in spread-spectrum systems are disclosed. At a communication device, beacon signals are received from another communication device and impulse responses are determined from the beacon signals. The impulse responses are circularly shifted to place a largest sample at a predefined position. The impulse responses are converted to a set of frequency responses in a frequency domain. The frequency responses are shuffled with a predetermined shuffle scheme to develop a set of shuffled frequency responses. A set of phase differences is determined as a difference between an angle of the frequency response and an angle ofmore » the shuffled frequency response at each element of the corresponding sets. Each phase difference is quantized to develop a set of secret-key quantized phases and a set of spreading codes is developed wherein each spreading code includes a corresponding phase of the set of secret-key quantized phases.« less

  20. Opportunities for Decarbonizing Existing U.S. Coal-Fired Power Plants via CO2 Capture, Utilization and Storage.

    PubMed

    Zhai, Haibo; Ou, Yang; Rubin, Edward S

    2015-07-07

    This study employs a power plant modeling tool to explore the feasibility of reducing unit-level emission rates of CO2 by 30% by retrofitting carbon capture, utilization, and storage (CCUS) to existing U.S. coal-fired electric generating units (EGUs). Our goal is to identify feasible EGUs and their key attributes. The results indicate that for about 60 gigawatts of the existing coal-fired capacity, the implementation of partial CO2 capture appears feasible, though its cost is highly dependent on the unit characteristics and fuel prices. Auxiliary gas-fired boilers can be employed to power a carbon capture process without significant increases in the cost of electricity generation. A complementary CO2 emission trading program can provide additional economic incentives for the deployment of CCS with 90% CO2 capture. Selling and utilizing the captured CO2 product for enhanced oil recovery can further accelerate CCUS deployment and also help reinforce a CO2 emission trading market. These efforts would allow existing coal-fired EGUs to continue to provide a significant share of the U.S. electricity demand.

  1. Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Hughes, Richard

    2004-05-01

    Quantum key distribution (QKD) uses single-photon communications to generate the shared, secret random number sequences that are used to encrypt and decrypt secret communications. The unconditional security of QKD is based on the interplay between fundamental principles of quantum physics and information theory. An adversary can neither successfully tap the transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). QKD could be particularly attractive for free-space optical communications, both ground-based and for satellites. I will describe a QKD experiment performed over multi-kilometer line-of-sight paths, which serves as a model for a satellite-to-ground key distribution system. The system uses single-photon polarization states, without active polarization switching, and for the first time implements the complete BB84 QKD protocol including, reconciliation, privacy amplification and the all-important authentication stage. It is capable of continuous operation throughout the day and night, achieving the self-sustaining production of error-free, shared, secret bits. I will also report on the results of satellite-to-ground QKD modeling.

  2. Bacillus cereus Biofilms—Same, Only Different

    PubMed Central

    Majed, Racha; Faille, Christine; Kallassy, Mireille; Gohar, Michel

    2016-01-01

    Bacillus cereus displays a high diversity of lifestyles and ecological niches and include beneficial as well as pathogenic strains. These strains are widespread in the environment, are found on inert as well as on living surfaces and contaminate persistently the production lines of the food industry. Biofilms are suspected to play a key role in this ubiquitous distribution and in this persistency. Indeed, B. cereus produces a variety of biofilms which differ in their architecture and mechanism of formation, possibly reflecting an adaptation to various environments. Depending on the strain, B. cereus has the ability to grow as immersed or floating biofilms, and to secrete within the biofilm a vast array of metabolites, surfactants, bacteriocins, enzymes, and toxins, all compounds susceptible to act on the biofilm itself and/or on its environment. Within the biofilm, B. cereus exists in different physiological states and is able to generate highly resistant and adhesive spores, which themselves will increase the resistance of the bacterium to antimicrobials or to cleaning procedures. Current researches show that, despite similarities with the regulation processes and effector molecules involved in the initiation and maturation of the extensively studied Bacillus subtilis biofilm, important differences exists between the two species. The present review summarizes the up to date knowledge on biofilms produced by B. cereus and by two closely related pathogens, Bacillus thuringiensis and Bacillus anthracis. Economic issues caused by B. cereus biofilms and management strategies implemented to control these biofilms are included in this review, which also discuss the ecological and functional roles of biofilms in the lifecycle of these bacterial species and explore future developments in this important research area. PMID:27458448

  3. Smooth Upgrade of Existing Passive Optical Networks With Spectral-Shaping Line-Coding Service Overlay

    NASA Astrophysics Data System (ADS)

    Hsueh, Yu-Li; Rogge, Matthew S.; Shaw, Wei-Tao; Kim, Jaedon; Yamamoto, Shu; Kazovsky, Leonid G.

    2005-09-01

    A simple and cost-effective upgrade of existing passive optical networks (PONs) is proposed, which realizes service overlay by novel spectral-shaping line codes. A hierarchical coding procedure allows processing simplicity and achieves desired long-term spectral properties. Different code rates are supported, and the spectral shape can be properly tailored to adapt to different systems. The computation can be simplified by quantization of trigonometric functions. DC balance is achieved by passing the dc residual between processing windows. The proposed line codes tend to introduce bit transitions to avoid long consecutive identical bits and facilitate receiver clock recovery. Experiments demonstrate and compare several different optimized line codes. For a specific tolerable interference level, the optimal line code can easily be determined, which maximizes the data throughput. The service overlay using the line-coding technique leaves existing services and field-deployed fibers untouched but fully functional, providing a very flexible and economic way to upgrade existing PONs.

  4. Secure key from bound entanglement.

    PubMed

    Horodecki, Karol; Horodecki, Michał; Horodecki, Paweł; Oppenheim, Jonathan

    2005-04-29

    We characterize the set of shared quantum states which contain a cryptographically private key. This allows us to recast the theory of privacy as a paradigm closely related to that used in entanglement manipulation. It is shown that one can distill an arbitrarily secure key from bound entangled states. There are also states that have less distillable private keys than the entanglement cost of the state. In general, the amount of distillable key is bounded from above by the relative entropy of entanglement. Relationships between distillability and distinguishability are found for a class of states which have Bell states correlated to separable hiding states. We also describe a technique for finding states exhibiting irreversibility in entanglement distillation.

  5. 78 FR 33221 - Special Local Regulation; Annual Swim Around Key West, Atlantic Ocean and Gulf of Mexico; Key...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-04

    ... Fort Zach State Park, North through Key West Harbor, East through Flemming Cut, South on Cow Key... State Park, North through Key West Harbor, East through Flemming Cut, South on Cow Key Channel and West...

  6. Key Gaps for Enabling Plant Growth in Future Missions

    NASA Technical Reports Server (NTRS)

    Anderson, Molly S.; Barta, Daniel; Douglas, Grace; Fritsche, Ralph; Massa, Gioia; Wheeler, Ray; Quincy, Charles; Romeyn, Matthew; Motil, Brian; Hanford, Anthony

    2017-01-01

    Growing plants to provide food or psychological benefits to crewmembers is a common vision for the future of human spaceflight, often represented both in media and in serious concept studies. The complexity of controlled environment agriculture and of plant growth in microgravity have and continue to be the subject of dedicated scientific research. However, actually implementing these systems in a way that will be cost effective, efficient, and sustainable for future space missions is a complex, multi-disciplinary problem. Key questions exist in many areas: human research in nutrition and psychology, horticulture, plant physiology and microbiology, multi-phase microgravity fluid physics, hardware design and technology development, and system design, operations and mission planning. The criticality of the research, and the ideal solution, will vary depending on the mission and type of system implementation being considered.

  7. Key Articles Related to Complementary and Alternative Medicine in Cardiovascular Disease

    PubMed Central

    Chow, Sheryl L.; Dorsch, Michael; Dunn, Steven; Jackevicius, Cynthia; Page, Robert Lee; Trujillo, Toby C.; Vardeny, Orly; Wiggins, Barbara S.; Bleske, Barry E.

    2014-01-01

    Complementary and alternative medicine (CAM) therapy has gained popularity in America over the past several years, reflected in the increased utilization of these agents. Given the abundance of nontraditional products available to the public, clinicians should be made aware of the existing evidence relating to CAM therapy to better provide patient care in a meaningful manner. This bibliography paper compiled key articles specific to CAM therapy and cardiovascular disease, which include primary literature, review articles, consensus statements, and abstracts of landmark studies. Based on the numerous published reports available on this topic, this bibliography, as part I of II, focuses on the efficacy of CAM therapy in cardiovascular disease. PMID:20030478

  8. Mining key elements for severe convection prediction based on CNN

    NASA Astrophysics Data System (ADS)

    Liu, Ming; Pan, Ning; Zhang, Changan; Sha, Hongzhou; Zhang, Bolei; Liu, Liang; Zhang, Meng

    2017-04-01

    Severe convective weather is a kind of weather disasters accompanied by heavy rainfall, gust wind, hail, etc. Along with recent developments on remote sensing and numerical modeling, there are high-volume and long-term observational and modeling data accumulated to capture massive severe convective events over particular areas and time periods. With those high-volume and high-variety weather data, most of the existing studies and methods carry out the dynamical laws, cause analysis, potential rule study, and prediction enhancement by utilizing the governing equations from fluid dynamics and thermodynamics. In this study, a key-element mining method is proposed for severe convection prediction based on convolution neural network (CNN). It aims to identify the key areas and key elements from huge amounts of historical weather data including conventional measurements, weather radar, satellite, so as numerical modeling and/or reanalysis data. Under this manner, the machine-learning based method could help the human forecasters on their decision-making on operational weather forecasts on severe convective weathers by extracting key information from the real-time and historical weather big data. In this paper, it first utilizes computer vision technology to complete the data preprocessing work of the meteorological variables. Then, it utilizes the information such as radar map and expert knowledge to annotate all images automatically. And finally, by using CNN model, it cloud analyze and evaluate each weather elements (e.g., particular variables, patterns, features, etc.), and identify key areas of those critical weather elements, then help forecasters quickly screen out the key elements from huge amounts of observation data by current weather conditions. Based on the rich weather measurement and model data (up to 10 years) over Fujian province in China, where the severe convective weathers are very active during the summer months, experimental tests are conducted with

  9. GPU: the biggest key processor for AI and parallel processing

    NASA Astrophysics Data System (ADS)

    Baji, Toru

    2017-07-01

    Two types of processors exist in the market. One is the conventional CPU and the other is Graphic Processor Unit (GPU). Typical CPU is composed of 1 to 8 cores while GPU has thousands of cores. CPU is good for sequential processing, while GPU is good to accelerate software with heavy parallel executions. GPU was initially dedicated for 3D graphics. However from 2006, when GPU started to apply general-purpose cores, it was noticed that this architecture can be used as a general purpose massive-parallel processor. NVIDIA developed a software framework Compute Unified Device Architecture (CUDA) that make it possible to easily program the GPU for these application. With CUDA, GPU started to be used in workstations and supercomputers widely. Recently two key technologies are highlighted in the industry. The Artificial Intelligence (AI) and Autonomous Driving Cars. AI requires a massive parallel operation to train many-layers of neural networks. With CPU alone, it was impossible to finish the training in a practical time. The latest multi-GPU system with P100 makes it possible to finish the training in a few hours. For the autonomous driving cars, TOPS class of performance is required to implement perception, localization, path planning processing and again SoC with integrated GPU will play a key role there. In this paper, the evolution of the GPU which is one of the biggest commercial devices requiring state-of-the-art fabrication technology will be introduced. Also overview of the GPU demanding key application like the ones described above will be introduced.

  10. Finite-key security analysis of quantum key distribution with imperfect light sources

    DOE PAGES

    Mizutani, Akihiro; Curty, Marcos; Lim, Charles Ci Wen; ...

    2015-09-09

    In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily flawed optical receivers. The status for QKD systems with imperfect light sources is however less satisfactory, in the sense that the resulting secure key rates are often overly dependent on the quality of state preparation. This is especially the case when the channel loss is high. Very recently, to overcome this limitation, Tamaki et al proposed a QKD protocol based on the so-called 'rejected data analysis', and showed that its security in the limit of infinitelymore » long keys is almost independent of any encoding flaw in the qubit space, being this protocol compatible with the decoy state method. Here, as a step towards practical QKD, we show that a similar conclusion is reached in the finite-key regime, even when the intensity of the light source is unstable. More concretely, we derive security bounds for a wide class of realistic light sources and show that the bounds are also efficient in the presence of high channel loss. Our results strongly suggest the feasibility of long distance provably secure communication with imperfect light sources.« less

  11. Comparison is key.

    PubMed

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  12. Comorbid forms of psychopathology: key patterns and future research directions.

    PubMed

    Cerdá, Magdalena; Sagdeo, Aditi; Galea, Sandro

    2008-01-01

    The purpose of this review is to systematically appraise the peer-reviewed literature about clustered forms of psychopathology and to present a framework that can be useful for studying comorbid psychiatric disorders. The review focuses on four of the most prevalent types of mental health problems: anxiety, depression, conduct disorder, and substance abuse. The authors summarize existing empirical research on the distribution of concurrent and sequential comorbidity in children and adolescents and in adults, and they review existing knowledge about exogenous risk factors that influence comorbidity. The authors include articles that used a longitudinal study design and used psychiatric definitions of the disorders. A total of 58 articles met the inclusion criteria and were assessed. Current evidence demonstrates a reciprocal, sequential relation between most comorbid pairs, although the mechanisms that mediate such links remain to be explained. Methodological concerns include the inconsistency of measurement of the disorders across studies, small sample sizes, and restricted follow-up times. Given the significant mental health burden placed by comorbid disorders, and their high prevalence across populations, research on the key risk factors for clustering of psychopathology is needed.

  13. Grade 1 to 6 Thai students' existing ideas about light: Across-age study

    NASA Astrophysics Data System (ADS)

    Horasirt, Yupaporn; Yuenyong, Chokchai

    2018-01-01

    This paper aimed to investigate Grade 1 to 6 Thai (6 - 12 years old) students' existing ideas about light, sight, vision, source of light. The participants included 36 Grade 1 to 6 students (6 students in each Grade) who studying at a primary school in Khon Kaen. The method of this study is a descriptive qualitative research design. The tools included the two-tiered test about light and open-ended question. Students' responses were categorized the students' existing ideas about light. Findings indicated that young students held various existing ideas about light that could be categorized into 6 different groups relating to sight, vision, and source of light. The paper discussed these students' existing ideas for developing constructivist learning about light in Thailand context.

  14. Quantum key distribution network for multiple applications

    NASA Astrophysics Data System (ADS)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  15. Algorithms for Lightweight Key Exchange.

    PubMed

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  16. The preferable keypad layout for ease of pressing small cell phone keys with the thumb.

    PubMed

    Muraki, Satoshi; Okabe, Keiichi; Abe, Tetsuji; Sai, Akishige

    2010-12-01

    The present study investigated the effect of keypad layout on the ease of operating small cell phones with the thumb in one-handed operations by young and elderly male and female participants. Eighteen young participants (9 males and 9 females) and 12 elderly participants (6 males and 6 females) operated 9 different keypads modeled after commercially available cordless handsets. Keypads designed by using the L9 orthogonal array differed in vertical pitch (V-Pitch: 7, 8, 9 mm) between keys, horizontal pitch (H-Pitch: 10, 11, 12 mm) between keys, the margin below the bottom row of keys (B-Margin: 5, 13, 21 mm), and phone body width (P-Width: 38, 41, 44 mm). Results concerning subjective overall usability showed the lowest scores for a V-Pitch of 7 mm and a B-Margin of 5 mm in most groups. However, for the female participants, with shorter thumbs, the increase in V-pitch did not improve operability. In the elderly participants, miskeying frequently occurred at dial keys of specific numbers. These findings suggest that the preferable keypad layout differs between different age groups and between male and female participants.

  17. Key Largo Limestone revisited: Pleistocene shelf-edge facies, Florida Keys, USA

    USGS Publications Warehouse

    Gray, Multer H.; Gischler, E.; Lundberg, J.; Simmons, K.R.; Shinn, E.A.

    2002-01-01

    New dates and analysis of 12 deep and 57 shallow cores allow a more detailed interpretation of the Pleistocene shelf edge of the Florida Platform as found in various facies of the Key Largo Limestone beneath the Florida Keys. In this study a three-phase evolution of the Quaternary units (Q1-Q5) of the Key Largo is presented with new subdivision of the Q5. (1) In the first phase, the Q1 and Q2 (perhaps deposited during oxygen-isotope stage 11) deep-water quartz-rich environment evolved into a shallow carbonate phase. (2) Subsequently, a Q3 (presumably corresponding to oxygen-isotope stage 9) flourishing reef and productive high-platform sediment phase developed. (3) Finally, a Q4 and Q5 (corresponding to oxygen-isotope stages 7 and 5) stabilization phase occured with reefs and leeward productive lagoons, followed by lower sea levels presenting a sequence of younger (isotope substages 5c, 5a) shelf-margin wedges, sediment veneers and outlier reefs. The Key Largo Limestone provides an accessible model of a carbonate shelf edge with fluctuating water depth, bordering a deep seaward basin for a period of at least 300 ka. During this time, at least four onlaps/offlaps, often separated by periods of karst development with associated diagenetic alterations, took place. The story presented by this limestone not only allows a better understanding of the history of south Florida but also aids in the interpretation of similar persistent shelf-edge sites bordering deep basins in other areas.

  18. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    NASA Astrophysics Data System (ADS)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  19. Fuels planning: science synthesis and integration; environmental consequences fact sheet 04: wildlife responses to fuels treatments: key considerations

    Treesearch

    David Pilliod

    2004-01-01

    Managers face a difficult task in predicting the effects of fuels treatments on wildlife populations, mostly because information on how animals respond to fuels treatments is scarce or does not exist. This paper discusses key considerations-aspects of an animal's ecology and available information-that, despite the scarcity of information, may make predictions of...

  20. Ecological Understanding 2: Transformation--A Key to Ecological Understanding.

    ERIC Educational Resources Information Center

    Carlsson, Britta

    2002-01-01

    Describes the structure and general features of the phenomenon of ecological understanding. Presents qualitatively different ways of experiencing cycling of matter and the flow of energy in the context of ecosystems. The idea of transformation is key to the development of ecological understanding. (Contains 17 references.) (Author/YDS)

  1. Secondary Analysis and Integration of Existing Data to Elucidate the Genetic Architecture of Cancer Risk and Related Outcomes, R21 | Informatics Technology for Cancer Research (ITCR)

    Cancer.gov

    This funding opportunity announcement (FOA) encourages applications that propose to conduct secondary data analysis and integration of existing datasets and database resources, with the ultimate aim to elucidate the genetic architecture of cancer risk and related outcomes. The goal of this initiative is to address key scientific questions relevant to cancer epidemiology by supporting the analysis of existing genetic or genomic datasets, possibly in combination with environmental, outcomes, behavioral, lifestyle, and molecular profiles data.

  2. Secondary Analysis and Integration of Existing Data to Elucidate the Genetic Architecture of Cancer Risk and Related Outcomes, R01 | Informatics Technology for Cancer Research (ITCR)

    Cancer.gov

    This funding opportunity announcement (FOA) encourages applications that propose to conduct secondary data analysis and integration of existing datasets and database resources, with the ultimate aim to elucidate the genetic architecture of cancer risk and related outcomes. The goal of this initiative is to address key scientific questions relevant to cancer epidemiology by supporting the analysis of existing genetic or genomic datasets, possibly in combination with environmental, outcomes, behavioral, lifestyle, and molecular profiles data.

  3. Key concepts in consumer and community engagement: a scoping meta-review.

    PubMed

    Sarrami-Foroushani, Pooria; Travaglia, Joanne; Debono, Deborah; Braithwaite, Jeffrey

    2014-06-13

    Although consumer and community engagement (CCE) in health care is receiving increasing attention, research and practice in this area are hampered by the variability of concepts and terminology commonly employed. This scoping meta-review aims to identify key CCE concepts and examine terminology used to describe them. In a scoping meta-review, an extensive list of 47 phrases and 11 Medical Subject Headings (MeSH) was used to undertake a comprehensive and systematic search in PubMed Central, Embase, EBM reviews, CINAHL, APAPsycNET, and Scopus. 59 systematic reviews met the selection criteria and were included in the final analysis. The analysis identified nine different concepts related to CCE: shared decision making, self-management, CCE in health care systems, community-based health promotion, providing access to health care, rehabilitation, participation in research, collaboration in research design and conduct, and peer support. The identified concepts differ from each other in many aspects including the aim of the activity, the role of consumers and the type of professionals' involvement. Each concept was described by a range of terms, with some terms shared by different concepts. In addition, two overlapping concepts of patient-centeredness and patient empowerment were recognised. This study describes CCE-related key concepts and provides new insight into their relationship with different CCE-related terms. Identification of key CCE-related concepts and terms will be useful to focus future studies and initiatives and enhance production of CCE-related evidence.

  4. Key concepts in consumer and community engagement: a scoping meta-review

    PubMed Central

    2014-01-01

    Background Although consumer and community engagement (CCE) in health care is receiving increasing attention, research and practice in this area are hampered by the variability of concepts and terminology commonly employed. This scoping meta-review aims to identify key CCE concepts and examine terminology used to describe them. Methods In a scoping meta-review, an extensive list of 47 phrases and 11 Medical Subject Headings (MeSH) was used to undertake a comprehensive and systematic search in PubMed Central, Embase, EBM reviews, CINAHL, APAPsycNET, and Scopus. Results 59 systematic reviews met the selection criteria and were included in the final analysis. The analysis identified nine different concepts related to CCE: shared decision making, self-management, CCE in health care systems, community-based health promotion, providing access to health care, rehabilitation, participation in research, collaboration in research design and conduct, and peer support. The identified concepts differ from each other in many aspects including the aim of the activity, the role of consumers and the type of professionals’ involvement. Each concept was described by a range of terms, with some terms shared by different concepts. In addition, two overlapping concepts of patient-centeredness and patient empowerment were recognised. Conclusions This study describes CCE-related key concepts and provides new insight into their relationship with different CCE-related terms. Identification of key CCE-related concepts and terms will be useful to focus future studies and initiatives and enhance production of CCE-related evidence. PMID:24923771

  5. 24 CFR 200.24 - Existing projects.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... section 207 of the Act, or for refinancing the existing debt of an existing nursing home, intermediate care facility, assisted living facility, or board and care home, or any combination thereof, under...

  6. ChoiceKey: a real-time speech recognition program for psychology experiments with a small response set.

    PubMed

    Donkin, Christopher; Brown, Scott D; Heathcote, Andrew

    2009-02-01

    Psychological experiments often collect choice responses using buttonpresses. However, spoken responses are useful in many cases-for example, when working with special clinical populations, or when a paradigm demands vocalization, or when accurate response time measurements are desired. In these cases, spoken responses are typically collected using a voice key, which usually involves manual coding by experimenters in a tedious and error-prone manner. We describe ChoiceKey, an open-source speech recognition package for MATLAB. It can be optimized by training for small response sets and different speakers. We show ChoiceKey to be reliable with minimal training for most participants in experiments with two different responses. Problems presented by individual differences, and occasional atypical responses, are examined, and extensions to larger response sets are explored. The ChoiceKey source files and instructions may be downloaded as supplemental materials for this article from brm.psychonomic-journals.org/content/supplemental.

  7. Optimizing Requirements Decisions with KEYS

    NASA Technical Reports Server (NTRS)

    Jalali, Omid; Menzies, Tim; Feather, Martin

    2008-01-01

    Recent work with NASA's Jet Propulsion Laboratory has allowed for external access to five of JPL's real-world requirements models, anonymized to conceal proprietary information, but retaining their computational nature. Experimentation with these models, reported herein, demonstrates a dramatic speedup in the computations performed on them. These models have a well defined goal: select mitigations that retire risks which, in turn, increases the number of attainable requirements. Such a non-linear optimization is a well-studied problem. However identification of not only (a) the optimal solution(s) but also (b) the key factors leading to them is less well studied. Our technique, called KEYS, shows a rapid way of simultaneously identifying the solutions and their key factors. KEYS improves on prior work by several orders of magnitude. Prior experiments with simulated annealing or treatment learning took tens of minutes to hours to terminate. KEYS runs much faster than that; e.g for one model, KEYS ran 13,000 times faster than treatment learning (40 minutes versus 0.18 seconds). Processing these JPL models is a non-linear optimization problem: the fewest mitigations must be selected while achieving the most requirements. Non-linear optimization is a well studied problem. With this paper, we challenge other members of the PROMISE community to improve on our results with other techniques.

  8. Multi-party Measurement-Device-Independent Quantum Key Distribution Based on Cluster States

    NASA Astrophysics Data System (ADS)

    Liu, Chuanqi; Zhu, Changhua; Ma, Shuquan; Pei, Changxing

    2018-03-01

    We propose a novel multi-party measurement-device-independent quantum key distribution (MDI-QKD) protocol based on cluster states. A four-photon analyzer which can distinguish all the 16 cluster states serves as the measurement device for four-party MDI-QKD. Any two out of four participants can build secure keys after the analyzers obtains successful outputs and the two participants perform post-processing. We derive a security analysis for the protocol, and analyze the key rates under different values of polarization misalignment. The results show that four-party MDI-QKD is feasible over 280 km in the optical fiber channel when the key rate is about 10- 6 with the polarization misalignment parameter 0.015. Moreover, our work takes an important step toward a quantum communication network.

  9. Existence of equilibria in articulated bearings

    NASA Astrophysics Data System (ADS)

    Buscaglia, G.; Ciuperca, I.; Hafidi, I.; Jai, M.

    2007-04-01

    The existence of equilibrium solutions for a lubricated system consisting of an articulated body sliding over a flat plate is considered. Though this configuration is very common (it corresponds to the popular tilting-pad thrust bearings), the existence problem has only been addressed in extremely simplified cases, such as planar sliders of infinite width. Our results show the existence of at least one equilibrium for a quite general class of (nonplanar) slider shapes. We also extend previous results concerning planar sliders.

  10. Cost of enlarged operating zone for an existing Francis runner

    NASA Astrophysics Data System (ADS)

    Monette, Christine; Marmont, Hugues; Chamberland-Lauzon, Joël; Skagerstrand, Anders; Coutu, André; Carlevi, Jens

    2016-11-01

    Traditionally, hydro power plants have been operated close to best efficiency point, the more stable operating condition for which they have been designed. However, because of changes in the electricity market, many hydro power plants operators wish to operate their machines differently to fulfil those new market needs. New operating conditions can include whole range operation, many start/stops, extensive low load operation, synchronous condenser mode and power/frequency regulation. Many of these new operating conditions may impose more severe fatigue damage than the traditional base load operation close to best efficiency point. Under these conditions, the fatigue life of the runner may be significantly reduced and reparation or replacement cost might occur sooner than expected. In order to design reliable Francis runners for those new challenging operating scenarios, Andritz Hydro has developed various proprietary tools and design rules. These are used within Andritz Hydro to design mechanically robust Francis runners for the operating scenarios fulfilling customer's specifications. To estimate residual life under different operating scenarios of an existing runner designed years ago for best efficiency base load operation, Andritz Hydro's design rules and tools would necessarily lead to conservative results. While the geometry of a new runner can be modified to fulfil all conservative mechanical design rules, the predicted fatigue life of an existing runner under off-design operating conditions may appear rather short because of the conservative safety factor included in the calculations. The most precise and reliable way to calculate residual life of an existing runner under different operating scenarios is to perform a strain gauge measurement campaign on the runner. This paper presents the runner strain gage measurement campaign of a mid-head Francis turbine over all the operating conditions available during the test, the analysis of the measurement signals

  11. Paediatric International Nursing Study: using person-centred key performance indicators to benchmark children's services.

    PubMed

    McCance, Tanya; Wilson, Val; Kornman, Kelly

    2016-07-01

    The aim of the Paediatric International Nursing Study was to explore the utility of key performance indicators in developing person-centred practice across a range of services provided to sick children. The objective addressed in this paper was evaluating the use of these indicators to benchmark services internationally. This study builds on primary research, which produced indicators that were considered novel both in terms of their positive orientation and use in generating data that privileges the patient voice. This study extends this research through wider testing on an international platform within paediatrics. The overall methodological approach was a realistic evaluation used to evaluate the implementation of the key performance indicators, which combined an integrated development and evaluation methodology. The study involved children's wards/hospitals in Australia (six sites across three states) and Europe (seven sites across four countries). Qualitative and quantitative methods were used during the implementation process, however, this paper reports the quantitative data only, which used survey, observations and documentary review. The findings demonstrate the quality of care being delivered to children and their families across different international sites. The benchmarking does, however, highlight some differences between paediatric and general hospitals, and between the different key performance indicators across all the sites. The findings support the use of the key performance indicators as a novel method to benchmark services internationally. Whilst the data collected across 20 paediatric sites suggest services are more similar than different, benchmarking illuminates variations that encourage a critical dialogue about what works and why. The transferability of the key performance indicators and measurement framework across different settings has significant implications for practice. The findings offer an approach to benchmarking and celebrating

  12. An investigation into the effects of different existing states of aluminum isopropoxide on copper-based catalysts for direct synthesis of dimethyl ether from syngas

    NASA Astrophysics Data System (ADS)

    Sun, Kai; Wang, Peng; Bian, Zhongkai; Huang, Wei

    2018-01-01

    Aluminum isopropoxide (AIP) is a vital raw material to produce high surface area alumina catalyst, which is used for catalytic applications, such as hydrocracking, Fischer-Tropsch and STD (syngas to dimethyl ether) reactions. However, the different existing states have an effect on hydrolysis and condensation in the process of precursor preparation. The Cu/Zn/Al slurry catalysts were prepared by aluminum isopropoxide, which were liquid state, crystalline state and solid state, utilizing a complete liquid phase preparation technology. In the dimethyl ether (DME) synthesis reaction, the aluminum resource of crystalline state was prepared for slurry catalyst, which presented high CO conversion and DME selectivity of 54.32% and 69.74%, respectively. Characterization results indicated that different forms of AIP have the variant coordination numbers of Al-O and polymerization degrees, and the catalyst prepared by crystalline state consists amount of tetra-coordinated Al and few hexa-coordinated Al, which can exert different hydrolysis and condensation process compared with other aluminum sources, and finally it contributes to the strong interaction between active site copper species and Zn/Al species, confirming more Cu+ is responsible for the synthesis of DME in the slurry reactor.

  13. Comparative study of key exchange and authentication methods in application, transport and network level security mechanisms

    NASA Astrophysics Data System (ADS)

    Fathirad, Iraj; Devlin, John; Jiang, Frank

    2012-09-01

    The key-exchange and authentication are two crucial elements of any network security mechanism. IPsec, SSL/TLS, PGP and S/MIME are well-known security approaches in providing security service to network, transport and application layers; these protocols use different methods (based on their requirements) to establish keying materials and authenticates key-negotiation and participated parties. This paper studies and compares the authenticated key negotiation methods in mentioned protocols.

  14. Application of the criteria for classification of existing chemicals as dangerous for the environment.

    PubMed

    Knacker, T; Schallnaß, H J; Klaschka, U; Ahlers, J

    1995-11-01

    The criteria for classification and labelling of substances as "dangerous for the environment" agreed upon within the European Union (EU) were applied to two sets of existing chemicals. One set (sample A) consisted of 41 randomly selected compounds listed in the European Inventory of Existing Chemical Substances (EINECS). The other set (sample B) comprised 115 substances listed in Annex I of Directive 67/548/EEC which were classified by the EU Working Group on Classification and Labelling of Existing Chemicals. The aquatic toxicity (fish mortality,Daphnia immobilisation, algal growth inhibition), ready biodegradability and n-octanol/water partition coefficient were measured for sample A by one and the same laboratory. For sample B, the available ecotoxicological data originated from many different sources and therefore was rather heterogeneous. In both samples, algal toxicity was the most sensitive effect parameter for most substances. Furthermore, it was found that, classification based on a single aquatic test result differs in many cases from classification based on a complete data set, although a correlation exists between the biological end-points of the aquatic toxicity test systems.

  15. SLAR image interpretation keys for geographic analysis

    NASA Technical Reports Server (NTRS)

    Coiner, J. C.

    1972-01-01

    A means for side-looking airborne radar (SLAR) imagery to become a more widely used data source in geoscience and agriculture is suggested by providing interpretation keys as an easily implemented interpretation model. Interpretation problems faced by the researcher wishing to employ SLAR are specifically described, and the use of various types of image interpretation keys to overcome these problems is suggested. With examples drawn from agriculture and vegetation mapping, direct and associate dichotomous image interpretation keys are discussed and methods of constructing keys are outlined. Initial testing of the keys, key-based automated decision rules, and the role of the keys in an information system for agriculture are developed.

  16. Triple symmetric key cryptosystem for data security

    NASA Astrophysics Data System (ADS)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  17. The Geology of the Florida Keys.

    ERIC Educational Resources Information Center

    Shinn, Eugene A.

    1988-01-01

    Describes some of the ancient geologic history of the Florida Keys from Key Largo to Key West including the effects of glaciers, sea level rise, reef distribution, spurs and grooves, backstepping and ecological zonation, growth rates and erosion. Predicts future changes in this area. (CW)

  18. Honeybees Learn Odour Mixtures via a Selection of Key Odorants

    PubMed Central

    Reinhard, Judith; Sinclair, Michael; Srinivasan, Mandyam V.; Claudianos, Charles

    2010-01-01

    Background The honeybee has to detect, process and learn numerous complex odours from her natural environment on a daily basis. Most of these odours are floral scents, which are mixtures of dozens of different odorants. To date, it is still unclear how the bee brain unravels the complex information contained in scent mixtures. Methodology/Principal Findings This study investigates learning of complex odour mixtures in honeybees using a simple olfactory conditioning procedure, the Proboscis-Extension-Reflex (PER) paradigm. Restrained honeybees were trained to three scent mixtures composed of 14 floral odorants each, and then tested with the individual odorants of each mixture. Bees did not respond to all odorants of a mixture equally: They responded well to a selection of key odorants, which were unique for each of the three scent mixtures. Bees showed less or very little response to the other odorants of the mixtures. The bees' response to mixtures composed of only the key odorants was as good as to the original mixtures of 14 odorants. A mixture composed of the other, non-key-odorants elicited a significantly lower response. Neither an odorant's volatility or molecular structure, nor learning efficiencies for individual odorants affected whether an odorant became a key odorant for a particular mixture. Odorant concentration had a positive effect, with odorants at high concentration likely to become key odorants. Conclusions/Significance Our study suggests that the brain processes complex scent mixtures by predominantly learning information from selected key odorants. Our observations on key odorant learning lend significant support to previous work on olfactory learning and mixture processing in honeybees. PMID:20161714

  19. Why and how might genetic and phylogenetic diversity be reflected in the identification of key biodiversity areas?

    PubMed

    Brooks, T M; Cuttelod, A; Faith, D P; Garcia-Moreno, J; Langhammer, P; Pérez-Espona, S

    2015-02-19

    'Key biodiversity areas' are defined as sites contributing significantly to the global persistence of biodiversity. The identification of these sites builds from existing approaches based on measures of species and ecosystem diversity and process. Here, we therefore build from the work of Sgró et al. (2011 Evol. Appl. 4, 326-337. (doi:10.1111/j.1752-4571.2010.00157.x)) to extend a framework for how components of genetic diversity might be considered in the identification of key biodiversity areas. We make three recommendations to inform the ongoing process of consolidating a key biodiversity areas standard: (i) thresholds for the threatened species criterion currently consider a site's share of a threatened species' population; expand these to include the proportion of the species' genetic diversity unique to a site; (ii) expand criterion for 'threatened species' to consider 'threatened taxa' and (iii) expand the centre of endemism criterion to identify as key biodiversity areas those sites holding a threshold proportion of the compositional or phylogenetic diversity of species (within a taxonomic group) whose restricted ranges collectively define a centre of endemism. We also recommend consideration of occurrence of EDGE species (i.e. threatened phylogenetic diversity) in key biodiversity areas to prioritize species-specific conservation actions among sites.

  20. Why and how might genetic and phylogenetic diversity be reflected in the identification of key biodiversity areas?

    PubMed Central

    Brooks, T. M.; Cuttelod, A.; Faith, D. P.; Garcia-Moreno, J.; Langhammer, P.; Pérez-Espona, S.

    2015-01-01

    Key biodiversity areas' are defined as sites contributing significantly to the global persistence of biodiversity. The identification of these sites builds from existing approaches based on measures of species and ecosystem diversity and process. Here, we therefore build from the work of Sgró et al. (2011 Evol. Appl. 4, 326–337. (doi:10.1111/j.1752-4571.2010.00157.x)) to extend a framework for how components of genetic diversity might be considered in the identification of key biodiversity areas. We make three recommendations to inform the ongoing process of consolidating a key biodiversity areas standard: (i) thresholds for the threatened species criterion currently consider a site's share of a threatened species' population; expand these to include the proportion of the species' genetic diversity unique to a site; (ii) expand criterion for ‘threatened species' to consider ‘threatened taxa’ and (iii) expand the centre of endemism criterion to identify as key biodiversity areas those sites holding a threshold proportion of the compositional or phylogenetic diversity of species (within a taxonomic group) whose restricted ranges collectively define a centre of endemism. We also recommend consideration of occurrence of EDGE species (i.e. threatened phylogenetic diversity) in key biodiversity areas to prioritize species-specific conservation actions among sites. PMID:25561678

  1. Captured key electrical safety lockout system

    DOEpatents

    Darimont, Daniel E.

    1995-01-01

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member's second position corresponds to the preselected position at which the key can be removed from and inserted into the lock.

  2. Captured key electrical safety lockout system

    DOEpatents

    Darimont, D.E.

    1995-10-31

    A safety lockout apparatus for an electrical circuit includes an electrical switch, a key, a lock and a blocking mechanism. The electrical switch is movable between an ON position at which the electrical circuit is energized and an OFF position at which the electrical circuit is deactivated. The lock is adapted to receive the key and is rotatable among a plurality of positions by the key. The key is only insertable and removable when the lock is at a preselected position. The lock is maintained in the preselected position when the key is removed from the lock. The blocking mechanism physically maintains the switch in its OFF position when the key is removed from the lock. The blocking mechanism preferably includes a member driven by the lock between a first position at which the electrical switch is movable between its ON and OFF positions and a second position at which the member physically maintains the electrical switch in its OFF position. Advantageously, the driven member`s second position corresponds to the preselected position at which the key can be removed from and inserted into the lock. 7 figs.

  3. Key handling in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Li, Y.; Newe, T.

    2007-07-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  4. Review of 11 national policies for rare diseases in the context of key patient needs.

    PubMed

    Dharssi, Safiyya; Wong-Rieger, Durhane; Harold, Matthew; Terry, Sharon

    2017-03-31

    Rare diseases collectively exert a global public health burden in the severity of their manifestations and the total number of people they afflict. For many patients, considerable barriers exist in terms of access to appropriate care, delayed diagnosis and limited or non-existing treatment options. Motivated by these challenges, the rare disease patient community has played a critical role, elevating the patient voice and mobilizing legislation to support the development of programs that address the needs of patients with rare diseases.The US Orphan Drug Act of 1983 served as a key milestone in this journey, providing a roadmap for other countries to introduce and implement similar orphan drug legislation; more recently, the European Union (EU) has gone further to encourage the widespread adoption and implementation of rare disease plans or strategies designed to more adequately address the comprehensive needs of patients with rare diseases. Despite these legislative efforts and the growing contributions of patient advocacy groups in moving forward implementation and adoption of rare disease programs, gaps still exist across the policy landscape for several countries. To gain deeper insights into the challenges and opportunities to address key needs of rare disease patients, it is critical to define the current status of rare disease legislation and policy across a geographically and economically diverse selection of countries. We analyzed the rare disease policy landscape across 11 countries: Germany, France, the United Kingdom, Canada, Bulgaria, Turkey, Argentina, Mexico, Brazil, China, and Taiwan. The status and implementation of policy was evaluated for each country in the context of key patient needs across 5 dimensions: improving coordination of care, diagnostic resources, access to treatments, patient awareness and support, and promoting innovative research. Our findings highlight the continuing role of the patient community in driving the establishment and

  5. On the security of a simple three-party key exchange protocol without server's public keys.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  6. On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723

  7. High-efficiency Gaussian key reconciliation in continuous variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bai, ZengLiang; Wang, XuYang; Yang, ShenShen; Li, YongMin

    2016-01-01

    Efficient reconciliation is a crucial step in continuous variable quantum key distribution. The progressive-edge-growth (PEG) algorithm is an efficient method to construct relatively short block length low-density parity-check (LDPC) codes. The qua-sicyclic construction method can extend short block length codes and further eliminate the shortest cycle. In this paper, by combining the PEG algorithm and qua-si-cyclic construction method, we design long block length irregular LDPC codes with high error-correcting capacity. Based on these LDPC codes, we achieve high-efficiency Gaussian key reconciliation with slice recon-ciliation based on multilevel coding/multistage decoding with an efficiency of 93.7%.

  8. Continuous-variable quantum key distribution with 1 Mbps secure key rate.

    PubMed

    Huang, Duan; Lin, Dakai; Wang, Chao; Liu, Weiqi; Fang, Shuanghong; Peng, Jinye; Huang, Peng; Zeng, Guihua

    2015-06-29

    We report the first continuous-variable quantum key distribution (CVQKD) experiment to enable the creation of 1 Mbps secure key rate over 25 km standard telecom fiber in a coarse wavelength division multiplexers (CWDM) environment. The result is achieved with two major technological advances: the use of a 1 GHz shot-noise-limited homodyne detector and the implementation of a 50 MHz clock system. The excess noise due to noise photons from local oscillator and classical data channels in CWDM is controlled effectively. We note that the experimental verification of high-bit-rate CVQKD in the multiplexing environment is a significant step closer toward large-scale deployment in fiber networks.

  9. Dementia ascertainment using existing data in UK longitudinal and cohort studies: a systematic review of methodology.

    PubMed

    Sibbett, Ruth A; Russ, Tom C; Deary, Ian J; Starr, John M

    2017-07-03

    Studies investigating the risk factors for or causation of dementia must consider subjects prior to disease onset. To overcome the limitations of prospective studies and self-reported recall of information, the use of existing data is key. This review provides a narrative account of dementia ascertainment methods using sources of existing data. The literature search was performed using: MEDLINE, EMBASE, PsychInfo and Web of Science. Included articles reported a UK-based study of dementia in which cases were ascertained using existing data. Existing data included that which was routinely collected and that which was collected for previous research. After removing duplicates, abstracts were screened and the remaining articles were included for full-text review. A quality tool was used to evaluate the description of the ascertainment methodology. Of the 3545 abstracts screened, 360 articles were selected for full-text review. 47 articles were included for final consideration. Data sources for ascertainment included: death records, national datasets, research databases and hospital records among others. 36 articles used existing data alone for ascertainment, of which 27 used only a single data source. The most frequently used source was a research database. Quality scores ranged from 7/16 to 16/16. Quality scores were better for articles with dementia ascertainment as an outcome. Some papers performed validation studies of dementia ascertainment and most indicated that observed rates of dementia were lower than expected. We identified a lack of consistency in dementia ascertainment methodology using existing data. With no data source identified as a "gold-standard", we suggest the use of multiple sources. Where possible, studies should access records with evidence to confirm the diagnosis. Studies should also calculate the dementia ascertainment rate for the population being studied to enable a comparison with an expected rate.

  10. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks.

    PubMed

    Furrer, F; Franz, T; Berta, M; Leverrier, A; Scholz, V B; Tomamichel, M; Werner, R F

    2012-09-07

    We provide a security analysis for continuous variable quantum key distribution protocols based on the transmission of two-mode squeezed vacuum states measured via homodyne detection. We employ a version of the entropic uncertainty relation for smooth entropies to give a lower bound on the number of secret bits which can be extracted from a finite number of runs of the protocol. This bound is valid under general coherent attacks, and gives rise to keys which are composably secure. For comparison, we also give a lower bound valid under the assumption of collective attacks. For both scenarios, we find positive key rates using experimental parameters reachable today.

  11. Context or Key? Language in Four Adult Learning Programmes

    ERIC Educational Resources Information Center

    Robinson, Clinton

    2007-01-01

    Context is a key factor in designing and delivering adult learning programmes, and in multilingual environments the choice of language plays a decisive role. Four programmes, two in Asia (Bhutan Myanmar) and two in Africa (Ghana and Uganda), which focus on learning for development, integrate language considerations in different ways, related both…

  12. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  13. Effect of the Key Mixture Parameters on Shrinkage of Reactive Powder Concrete

    PubMed Central

    Zubair, Ahmed

    2014-01-01

    Reactive powder concrete (RPC) mixtures are reported to have excellent mechanical and durability characteristics. However, such concrete mixtures having high amount of cementitious materials may have high early shrinkage causing cracking of concrete. In the present work, an attempt has been made to study the simultaneous effects of three key mixture parameters on shrinkage of the RPC mixtures. Considering three different levels of the three key mixture factors, a total of 27 mixtures of RPC were prepared according to 33 factorial experiment design. The specimens belonging to all 27 mixtures were monitored for shrinkage at different ages over a total period of 90 days. The test results were plotted to observe the variation of shrinkage with time and to see the effects of the key mixture factors. The experimental data pertaining to 90-day shrinkage were used to conduct analysis of variance to identify significance of each factor and to obtain an empirical equation correlating the shrinkage of RPC with the three key mixture factors. The rate of development of shrinkage at early ages was higher. The water to binder ratio was found to be the most prominent factor followed by cement content with the least effect of silica fume content. PMID:25050395

  14. Effect of the key mixture parameters on shrinkage of reactive powder concrete.

    PubMed

    Ahmad, Shamsad; Zubair, Ahmed; Maslehuddin, Mohammed

    2014-01-01

    Reactive powder concrete (RPC) mixtures are reported to have excellent mechanical and durability characteristics. However, such concrete mixtures having high amount of cementitious materials may have high early shrinkage causing cracking of concrete. In the present work, an attempt has been made to study the simultaneous effects of three key mixture parameters on shrinkage of the RPC mixtures. Considering three different levels of the three key mixture factors, a total of 27 mixtures of RPC were prepared according to 3(3) factorial experiment design. The specimens belonging to all 27 mixtures were monitored for shrinkage at different ages over a total period of 90 days. The test results were plotted to observe the variation of shrinkage with time and to see the effects of the key mixture factors. The experimental data pertaining to 90-day shrinkage were used to conduct analysis of variance to identify significance of each factor and to obtain an empirical equation correlating the shrinkage of RPC with the three key mixture factors. The rate of development of shrinkage at early ages was higher. The water to binder ratio was found to be the most prominent factor followed by cement content with the least effect of silica fume content.

  15. From big data to rich data: The key features of athlete wheelchair mobility performance.

    PubMed

    van der Slikke, R M A; Berger, M A M; Bregman, D J J; Veeger, H E J

    2016-10-03

    Quantitative assessment of an athlete׳s individual wheelchair mobility performance is one prerequisite needed to evaluate game performance, improve wheelchair settings and optimize training routines. Inertial Measurement Unit (IMU) based methods can be used to perform such quantitative assessment, providing a large number of kinematic data. The goal of this research was to reduce that large amount of data to a set of key features best describing wheelchair mobility performance in match play and present them in meaningful way for both scientists and athletes. To test the discriminative power, wheelchair mobility characteristics of athletes with different performance levels were compared. The wheelchair kinematics of 29 (inter-)national level athletes were measured during a match using three inertial sensors mounted on the wheelchair. Principal component analysis was used to reduce 22 kinematic outcomes to a set of six outcomes regarding linear and rotational movement; speed and acceleration; average and best performance. In addition, it was explored whether groups of athletes with known performance differences based on their impairment classification also differed with respect to these key outcomes using univariate general linear models. For all six key outcomes classification showed to be a significant factor (p<0.05). We composed a set of six key kinematic outcomes that accurately describe wheelchair mobility performance in match play. The key kinematic outcomes were displayed in an easy to interpret way, usable for athletes, coaches and scientists. This standardized representation enables comparison of different wheelchair sports regarding wheelchair mobility, but also evaluation at the level of an individual athlete. By this means, the tool could enhance further development of wheelchair sports in general. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. Field test of quantum key distribution in the Tokyo QKD Network.

    PubMed

    Sasaki, M; Fujiwara, M; Ishizuka, H; Klaus, W; Wakui, K; Takeoka, M; Miki, S; Yamashita, T; Wang, Z; Tanaka, A; Yoshino, K; Nambu, Y; Takahashi, S; Tajima, A; Tomita, A; Domeki, T; Hasegawa, T; Sakai, Y; Kobayashi, H; Asai, T; Shimizu, K; Tokura, T; Tsurumaru, T; Matsui, M; Honjo, T; Tamaki, K; Takesue, H; Tokura, Y; Dynes, J F; Dixon, A R; Sharpe, A W; Yuan, Z L; Shields, A J; Uchikoga, S; Legré, M; Robyr, S; Trinkler, P; Monat, L; Page, J-B; Ribordy, G; Poppe, A; Allacher, A; Maurhart, O; Länger, T; Peev, M; Zeilinger, A

    2011-05-23

    A secure communication network with quantum key distribution in a metropolitan area is reported. Six different QKD systems are integrated into a mesh-type network. GHz-clocked QKD links enable us to demonstrate the world-first secure TV conferencing over a distance of 45km. The network includes a commercial QKD product for long-term stable operation, and application interface to secure mobile phones. Detection of an eavesdropper, rerouting into a secure path, and key relay via trusted nodes are demonstrated in this network.

  17. Key rate for calibration robust entanglement based BB84 quantum key distribution protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gittsovich, O.; Moroder, T.

    2014-12-04

    We apply the approach of verifying entanglement, which is based on the sole knowledge of the dimension of the underlying physical system to the entanglement based version of the BB84 quantum key distribution protocol. We show that the familiar one-way key rate formula holds already if one assumes the assumption that one of the parties is measuring a qubit and no further assumptions about the measurement are needed.

  18. Revocable identity-based proxy re-signature against signing key exposure.

    PubMed

    Yang, Xiaodong; Chen, Chunlin; Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification.

  19. The Power of Key: Celebrating 20 Years of Innovation at the Key Learning Community

    ERIC Educational Resources Information Center

    Kunkel, Christine

    2007-01-01

    The Key Learning Community in Indianapolis was the first school in the world to base its approach on the theory of multiple intelligences. Ms. Kunkel, Key's principal, reflects on the school's continuing growth and success--even in the face of pressures to standardize--and shares the history of its founding. (Contains 5 endnotes.)

  20. Key node selection in minimum-cost control of complex networks

    NASA Astrophysics Data System (ADS)

    Ding, Jie; Wen, Changyun; Li, Guoqi

    2017-11-01

    Finding the key node set that is connected with a given number of external control sources for driving complex networks from initial state to any predefined state with minimum cost, known as minimum-cost control problem, is critically important but remains largely open. By defining an importance index for each node, we propose revisited projected gradient method extension (R-PGME) in Monte-Carlo scenario to determine key node set. It is found that the importance index of a node is strongly correlated to occurrence rate of that node to be selected as a key node in Monte-Carlo realizations for three elementary topologies, Erdős-Rényi and scale-free networks. We also discover the distribution patterns of key nodes when the control cost reaches its minimum. Specifically, the importance indices of all nodes in an elementary stem show a quasi-periodic distribution with high peak values in the beginning and end of a quasi-period while they approach to a uniform distribution in an elementary cycle. We further point out that an elementary dilation can be regarded as two elementary stems whose lengths are the closest, and the importance indices in each stem present similar distribution as in an elementary stem. Our results provide a better understanding and deep insight of locating the key nodes in different topologies with minimum control cost.

  1. 47 CFR 54.604 - Existing contracts.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES (CONTINUED) UNIVERSAL SERVICE Universal Service Support for Health Care Providers § 54.604 Existing contracts. (a) Existing... health care provider as defined under § 54.601 and a telecommunications carrier shall be exempt from the...

  2. 45 CFR 84.22 - Existing facilities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., welfare, or other social services at alternate accessible sites, alteration of existing facilities and... to make structural changes in existing facilities where other methods are effective in achieving... handicapped persons in the most integrated setting appropriate. (c) Small health, welfare, or other social...

  3. 45 CFR 84.22 - Existing facilities.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., welfare, or other social services at alternate accessible sites, alteration of existing facilities and... to make structural changes in existing facilities where other methods are effective in achieving... handicapped persons in the most integrated setting appropriate. (c) Small health, welfare, or other social...

  4. Effect of the existing form of Cu element on the mechanical properties, bio-corrosion and antibacterial properties of Ti-Cu alloys for biomedical application.

    PubMed

    Zhang, Erlin; Wang, Xiaoyan; Chen, Mian; Hou, Bing

    2016-12-01

    Ti-Cu alloys have exhibited strong antibacterial ability, but Ti-Cu alloys prepared by different processes showed different antibacterial ability. In order to reveal the controlling mechanism, Ti-Cu alloys with different existing forms of Cu element were prepared in this paper. The effects of the Cu existing form on the microstructure, mechanical, corrosion and antibacterial properties of Ti-Cu alloys have been systematically investigated. Results have shown that the as-cast Ti-Cu alloys showed a higher hardness and mechanical strength as well as a higher antibacterial rate (51-64%) but a relatively lower corrosion resistance than pure titanium. Treatment at 900°C/2h (T4) significantly increased the hardness and the strength, improved the corrosion resistance but had little effect on the antibacterial property. Treatment at 900°C/2h+400°C/12h (T6) increased further the hardness and the mechanical strength, improved the corrosion resistance and but also enhanced the antibacterial rate (>90%) significantly. It was demonstrated that the Cu element in solid solution state showed high strengthening ability but low antibacterial property while Cu element in Ti2Cu phase exhibited strong strengthening ability and strong antibacterial property. Ti2Cu phase played a key role in the antibacterial mechanism. The antibacterial ability of Ti-Cu alloy was strongly proportional to the Cu content and the surface area of Ti2Cu phase. High Cu content and fine Ti2Cu phase would contribute to a high strength and a strong antibacterial ability. Copyright © 2016 Elsevier B.V. All rights reserved.

  5. Seismic imaging using finite-differences and parallel computers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ober, C.C.

    1997-12-31

    A key to reducing the risks and costs of associated with oil and gas exploration is the fast, accurate imaging of complex geologies, such as salt domes in the Gulf of Mexico and overthrust regions in US onshore regions. Prestack depth migration generally yields the most accurate images, and one approach to this is to solve the scalar wave equation using finite differences. As part of an ongoing ACTI project funded by the US Department of Energy, a finite difference, 3-D prestack, depth migration code has been developed. The goal of this work is to demonstrate that massively parallel computersmore » can be used efficiently for seismic imaging, and that sufficient computing power exists (or soon will exist) to make finite difference, prestack, depth migration practical for oil and gas exploration. Several problems had to be addressed to get an efficient code for the Intel Paragon. These include efficient I/O, efficient parallel tridiagonal solves, and high single-node performance. Furthermore, to provide portable code the author has been restricted to the use of high-level programming languages (C and Fortran) and interprocessor communications using MPI. He has been using the SUNMOS operating system, which has affected many of his programming decisions. He will present images created from two verification datasets (the Marmousi Model and the SEG/EAEG 3D Salt Model). Also, he will show recent images from real datasets, and point out locations of improved imaging. Finally, he will discuss areas of current research which will hopefully improve the image quality and reduce computational costs.« less

  6. Dendritic cells: key to fetal tolerance?

    PubMed

    Blois, Sandra M; Kammerer, Ulrike; Alba Soto, Catalina; Tometten, Mareike C; Shaikly, Valerie; Barrientos, Gabriela; Jurd, Richard; Rukavina, Daniel; Thomson, Angus W; Klapp, Burghard F; Fernández, Nelson; Arck, Petra C

    2007-10-01

    Pregnancy is a unique event in which a fetus, despite being genetically and immunologically different from the mother (a hemi-allograft), develops in the uterus. Successful pregnancy implies avoidance of rejection by the maternal immune system. Fetal and maternal immune cells come into direct contact at the decidua, which is a highly specialized mucous membrane that plays a key role in fetal tolerance. Uterine dendritic cells (DC) within the decidua have been implicated in pregnancy maintenance. DC serve as antigen-presenting cells with the unique ability to induce primary immune responses. Just as lymphocytes comprise different subsets, DC subsets have been identified that differentially control lymphocyte function. DC may also act to induce immunologic tolerance and regulation of T cell-mediated immunity. Current understanding of DC immunobiology within the context of mammalian fetal-maternal tolerance is reviewed and discussed herein.

  7. Key Concepts in Geomorphology - NSF supports community-based creation of a new style of textbook

    NASA Astrophysics Data System (ADS)

    Bierman, P. R.; Montgomery, D. R.; Massey, C. A.

    2013-12-01

    Using support from the National Science Foundation, we have created an all new textbook that differs from existing books and serves as a model for extensive community involvement and vetting at all stages from initial outlining through chapter development and revision to final review. The new textbook is designed to serve undergraduate students in first year courses about Earth Surface Processes, Physical Geography, and Quaternary Geology. The approach we employed to create this book could easily be adapted to creating books in other disciplines. The new textbook differs from existing books because it is shorter and focuses on the key concepts of the discipline rather than on specific derivations or place-based examples. A series of >200 electronic resources developed by community members as part of this project (http://serc.carleton.edu/vignettes) provide more detail and geographically specific case-studies that faculty and students need for place-or content-based teaching and learning. NSF support provided for extensive review to ensure accuracy and completeness. Each chapter was reviewed at least twice by two experts in the chapter's content area. Every chapter was also vetted by 8 to 10 generalist reviewers before extensive copyediting. The entire textbook was edited by two senior geomorphologists and a technical editor with expertise in geomorphology. The textbook has 14 chapters organized into four sections. Each chapter includes between 10 and 14 newly drafted, full-color figures designed specifically for novice learners. Between 20 and 30 annotated color photographs illustrate each of the chapters. At the end of each chapter, the Digging Deeper section presents an in depth look at the development of scientific thought on a problem relevant to the chapter along with a worked problem and a series of questions that allow students to test their mastery of the material.

  8. Sex Bias Exists in Human Surgical Clinical Research

    PubMed Central

    Mansukhani, Neel A.; Yoon, Dustin Y.; Teter, Katherine A.; Stubbs, Vanessa C.; Helenowski, Irene B.; Woodruff, Teresa K.; Kibbe, Melina R.

    2016-01-01

    Importance Sex is a variable that is poorly controlled for in clinical research. Objective Determine if sex bias exists in human surgical clinical research, determine if data are reported and analyzed using sex as an independent variable, and identify specialties where the greatest and least sex biases exist. Design Review and data abstraction from published peer-reviewed manuscripts. Setting All original peer-reviewed manuscripts published in 2011 and 2012 in Annals of Surgery, American Journal of Surgery, JAMA Surgery, Journal of Surgical Research, and Surgery. Main Outcome Measures Study type, location, number and sex of subjects, sex matching, and inclusion of sex-based reporting, statistical analysis, and discussion of data. Results Of 2,347 articles reviewed, 1,668 included human subjects. After excluding 365 articles, 1,303 manuscripts remained: 17 (1%) included only males, 41 (3%) included only females, 1,020 (78%) included males and females, and 225 (17%) did not document the sex of the subjects. While females represent over 50% of the total number of subjects included, considerable variability existed with the number of male, female, and unspecified subjects included among the journals, between US domestic and international studies, and between single versus multi-center studies. For manuscripts included in the study, only 38% reported these data by sex, 33% analyzed these data by sex, and 23% included a discussion of sex-based results. Sex matching of the subjects included in the research was poor, with only 18% of the studies matching the inclusion of both sexes by 80%. Upon analysis of the different surgical specialties, a wide variation in sex-based inclusion, matching, and data reporting existed, with colorectal surgery having the best matching of males and females and cardiac surgery having the worst. Conclusion Our data show that sex bias exists in human surgical clinical research. Few studies included men and women equally, less than one

  9. Free-ranging domestic cats (Felis catus) on public lands: estimating density, activity, and diet in the Florida Keys

    USGS Publications Warehouse

    Cove, Michael V.; Gardner, Beth; Simons, Theodore R.; Kays, Roland; O'Connell, Allan F.

    2017-01-01

    Feral and free-ranging domestic cats (Felis catus) can have strong negative effects on small mammals and birds, particularly in island ecosystems. We deployed camera traps to study free-ranging cats in national wildlife refuges and state parks on Big Pine Key and Key Largo in the Florida Keys, USA, and used spatial capture–recapture models to estimate cat abundance, movement, and activities. We also used stable isotope analyses to examine the diet of cats captured on public lands. Top population models separated cats based on differences in movement and detection with three and two latent groups on Big Pine Key and Key Largo, respectively. We hypothesize that these latent groups represent feral, semi-feral, and indoor/outdoor house cats based on the estimated movement parameters of each group. Estimated cat densities and activity varied between the two islands, with relatively high densities (~4 cats/km2) exhibiting crepuscular diel patterns on Big Pine Key and lower densities (~1 cat/km2) exhibiting nocturnal diel patterns on Key Largo. These differences are most likely related to the higher proportion of house cats on Big Pine relative to Key Largo. Carbon and nitrogen isotope ratios from hair samples of free-ranging cats (n = 43) provided estimates of the proportion of wild and anthropogenic foods in cat diets. At the population level, cats on both islands consumed mostly anthropogenic foods (>80% of the diet), but eight individuals were effective predators of wildlife (>50% of the diet). We provide evidence that cat groups within a population move different distances, exhibit different activity patterns, and that individuals consume wildlife at different rates, which all have implications for managing this invasive predator.

  10. The Existence of Steady Compressible Subsonic Impinging Jet Flows

    NASA Astrophysics Data System (ADS)

    Cheng, Jianfeng; Du, Lili; Wang, Yongfu

    2018-03-01

    In this paper, we investigate the compressible subsonic impinging jet flows through a semi-infinitely long nozzle and impacting on a solid wall. Firstly, it is shown that given a two-dimensional semi-infinitely long nozzle and a wall behind the nozzle, and an appropriate atmospheric pressure, then there exists a smooth global subsonic compressible impinging jet flow with two asymptotic directions. The subsonic impinging jet develops two free streamlines, which initiate smoothly at the end points of the semi-infinitely long nozzles. In particular, there exists a smooth curve which separates the fluids which go to different places downstream. Moreover, under some suitable asymptotic assumptions of the nozzle, the asymptotic behaviors of the compressible subsonic impinging jet flows in the inlet and the downstream are obtained by means of a blow-up argument. On the other hand, the non-existence of compressible subsonic impinging jet flows with only one asymptotic direction is also established. This main result in this paper solves the open problem (4) in Chapter 16.3 proposed by uc(Friedman) in his famous survey (uc(Friedman) in Mathematics in industrial problems, II, I.M.A. volumes in mathematics and its applications, vol 24, Springer, New York, 1989).

  11. Environmental Influences on Physical Activity among Rural Adults in Montana, United States: Views from Built Environment Audits, Resident Focus Groups, and Key Informant Interviews.

    PubMed

    Lo, Brian K; Morgan, Emily H; Folta, Sara C; Graham, Meredith L; Paul, Lynn C; Nelson, Miriam E; Jew, Nicolette V; Moffat, Laurel F; Seguin, Rebecca A

    2017-10-04

    Rural populations in the United States have lower physical activity levels and are at a higher risk of being overweight and suffering from obesity than their urban counterparts. This paper aimed to understand the environmental factors that influence physical activity among rural adults in Montana. Eight built environment audits, 15 resident focus groups, and 24 key informant interviews were conducted between August and December 2014. Themes were triangulated and summarized into five categories of environmental factors: built, social, organizational, policy, and natural environments. Although the existence of active living features was documented by environmental audits, residents and key informants agreed that additional indoor recreation facilities and more well-maintained and conveniently located options were needed. Residents and key informants also agreed on the importance of age-specific, well-promoted, and structured physical activity programs, offered in socially supportive environments, as facilitators to physical activity. Key informants, however, noted that funding constraints and limited political will were barriers to developing these opportunities. Since building new recreational facilities and structures to support active transportation pose resource challenges, especially for rural communities, our results suggest that enhancing existing features, making small improvements, and involving stakeholders in the city planning process would be more fruitful to build momentum towards larger changes.

  12. KEY COMPARISON: CCQM-K21 Key Comparison Determination of pp’-DDT in fish oil

    NASA Astrophysics Data System (ADS)

    Webb, K. S.; Carter, D.; Wolff Briche, C. S. J.

    2003-01-01

    A key comparison on the determination of (pp'-dichlorodiphenyl) trichloroethane (pp'-DDT) in a fish oil matrix has been successfully completed. Nine NMIs participated in this key comparison and used the technique of isotope dilution gas-chromatography mass spectrometry (ID/GC/MS) for the determinations. Two samples (A and B) of fish oil were distributed to participants, each gravimetrically spiked with pp'-DDT. The KCRV for Sample A is 0.0743 +/- 0.0020 µg g-1 and that of Sample B is 0.1655 +/- 0.0014 µg g-1 of pp'-DDT in fish oil. The results for Sample A showed a RSD of 3.5%, the RSD for Sample B was within 1%. These results were an improvement over those of the corresponding pilot study (CCQM-P21), where at a mass fraction of pp'-DDT in fish oil of 0.311 µg g-1 the RSD was 2.6%. The compound pp'-DDT is a typical organochlorine pesticide and this key comparison has shown that NMIs have the ability to measure such compounds at levels typically found in the environment. The compound (pp'-dichlorodiphenyl) dichloroethylene (pp'-DDE), a metabolite of pp'-DDT, was the subject of a previous key comparison (CCQM-K5). The compound pp'-DDT is technically more challenging than that of pp'-DDE since it can decompose during the measurement procedure. Consequently the success of this key comparison, combined with that of CCQM-K5 demonstrates a broad measurement capability by NMIs for organochlorine compounds in the environment. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the Mutual Recognition Arrangement (MRA).

  13. Identification of the key ecological factors influencing vegetation degradation in semi-arid agro-pastoral ecotone considering spatial scales

    NASA Astrophysics Data System (ADS)

    Peng, Yu; Wang, Qinghui; Fan, Min

    2017-11-01

    When assessing re-vegetation project performance and optimizing land management, identification of the key ecological factors inducing vegetation degradation has crucial implications. Rainfall, temperature, elevation, slope, aspect, land use type, and human disturbance are ecological factors affecting the status of vegetation index. However, at different spatial scales, the key factors may vary. Using Helin County, Inner-Mongolia, China as the study site and combining remote sensing image interpretation, field surveying, and mathematical methods, this study assesses key ecological factors affecting vegetation degradation under different spatial scales in a semi-arid agro-pastoral ecotone. It indicates that the key factors are different at various spatial scales. Elevation, rainfall, and temperature are identified as crucial for all spatial extents. Elevation, rainfall and human disturbance are key factors for small-scale quadrats of 300 m × 300 m and 600 m × 600 m, temperature and land use type are key factors for a medium-scale quadrat of 1 km × 1 km, and rainfall, temperature, and land use are key factors for large-scale quadrats of 2 km × 2 km and 5 km × 5 km. For this region, human disturbance is not the key factor for vegetation degradation across spatial scales. It is necessary to consider spatial scale for the identification of key factors determining vegetation characteristics. The eco-restoration programs at various spatial scales should identify key influencing factors according their scales so as to take effective measurements. The new understanding obtained in this study may help to explore the forces which driving vegetation degradation in the degraded regions in the world.

  14. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    PubMed

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  15. 33 CFR 175.135 - Existing equipment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Existing equipment. 175.135 Section 175.135 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) BOATING SAFETY EQUIPMENT REQUIREMENTS Visual Distress Signals § 175.135 Existing equipment. Launchers...

  16. 33 CFR 175.135 - Existing equipment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Existing equipment. 175.135 Section 175.135 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) BOATING SAFETY EQUIPMENT REQUIREMENTS Visual Distress Signals § 175.135 Existing equipment. Launchers...

  17. 33 CFR 175.135 - Existing equipment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Existing equipment. 175.135 Section 175.135 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) BOATING SAFETY EQUIPMENT REQUIREMENTS Visual Distress Signals § 175.135 Existing equipment. Launchers...

  18. 33 CFR 175.135 - Existing equipment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Existing equipment. 175.135 Section 175.135 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) BOATING SAFETY EQUIPMENT REQUIREMENTS Visual Distress Signals § 175.135 Existing equipment. Launchers...

  19. 33 CFR 175.135 - Existing equipment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Existing equipment. 175.135 Section 175.135 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) BOATING SAFETY EQUIPMENT REQUIREMENTS Visual Distress Signals § 175.135 Existing equipment. Launchers...

  20. 34 CFR 104.22 - Existing facilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., delivery of health, welfare, or other social services at alternate accessible sites, alteration of existing... not required to make structural changes in existing facilities where other methods are effective in... handicapped persons in the most integrated setting appropriate. (c) Small health, welfare, or other social...

  1. Obstructions to Existence in Fast-Diffusion Equations

    NASA Astrophysics Data System (ADS)

    Rodriguez, Ana; Vazquez, Juan L.

    The study of nonlinear diffusion equations produces a number of peculiar phenomena not present in the standard linear theory. Thus, in the sub-field of very fast diffusion it is known that the Cauchy problem can be ill-posed, either because of non-uniqueness, or because of non-existence of solutions with small data. The equations we consider take the general form ut=( D( u, ux) ux) x or its several-dimension analogue. Fast diffusion means that D→∞ at some values of the arguments, typically as u→0 or ux→0. Here, we describe two different types of non-existence phenomena. Some fast-diffusion equations with very singular D do not allow for solutions with sign changes, while other equations admit only monotone solutions, no oscillations being allowed. The examples we give for both types of anomaly are closely related. The most typical examples are vt=( vx/∣ v∣) x and ut= uxx/∣ ux∣. For these equations, we investigate what happens to the Cauchy problem when we take incompatible initial data and perform a standard regularization. It is shown that the limit gives rise to an initial layer where the data become admissible (positive or monotone, respectively), followed by a standard evolution for all t>0, once the obstruction has been removed.

  2. Different dynamin blockers interfere with distinct phases of synaptic endocytosis during stimulation in motoneurones

    PubMed Central

    Linares-Clemente, Pedro; Rozas, José L; Mircheski, Josif; García-Junco-Clemente, Pablo; Martínez-López, José A; Nieto-González, José L; Vázquez, M Eugenio; Pintado, C Oscar; Fernández-Chacón, Rafael

    2015-01-01

    Key points Neurotransmitter release requires a tight coupling between synaptic vesicle exocytosis and endocytosis with dynamin being a key protein in that process. We used imaging techniques to examine the time course of endocytosis at mouse motor nerve terminals expressing synaptopHluorin, a genetically encoded reporter of the synaptic vesicle cycle. We separated two sequential phases of endocytosis taking place during the stimulation train: early and late endocytosis. Freshly released synaptic vesicle proteins are preferentially retrieved during the early phase, which is very sensitive to dynasore, an inhibitor of dynamin GTPase activity. Synaptic vesicle proteins pre-existing at the plasma membrane before the stimulation are preferentially retrieved during the late phase, which is very sensitive to myristyl trimethyl ammonium bromide (MitMAB), an inhibitor of the dynamin–phospholipid interaction. Abstract Synaptic endocytosis is essential at nerve terminals to maintain neurotransmitter release by exocytosis. Here, at the neuromuscular junction of synaptopHluorin (spH) transgenic mice, we have used imaging to study exo- and endocytosis occurring simultaneously during nerve stimulation. We observed two endocytosis components, which occur sequentially during stimulation. The early component of endocytosis apparently internalizes spH molecules freshly exocytosed. This component was sensitive to dynasore, a blocker of dynamin 1 GTPase activity. In contrast, this early component was resistant to myristyl trimethyl ammonium bromide (MiTMAB), a competitive agent that blocks dynamin binding to phospholipid membranes. The late component of endocytosis is likely to internalize spH molecules that pre-exist at the plasma membrane before stimulation starts. This component was blocked by MiTMAB, perhaps by impairing the binding of dynamin or other key endocytic proteins to phospholipid membranes. Our study suggests the co-existence of two sequential synaptic endocytosis

  3. 48 CFR 27.405-2 - Existing works.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Existing works. 27.405-2... REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Data and Copyrights 27.405-2 Existing works. The clause at 52.227-18, Rights in Data—Existing Works, is for use in contracts exclusively for the acquisition...

  4. 48 CFR 27.405-2 - Existing works.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Existing works. 27.405-2... REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Data and Copyrights 27.405-2 Existing works. The clause at 52.227-18, Rights in Data—Existing Works, is for use in contracts exclusively for the acquisition...

  5. High speed and adaptable error correction for megabit/s rate quantum key distribution.

    PubMed

    Dixon, A R; Sato, H

    2014-12-02

    Quantum Key Distribution is moving from its theoretical foundation of unconditional security to rapidly approaching real world installations. A significant part of this move is the orders of magnitude increases in the rate at which secure key bits are distributed. However, these advances have mostly been confined to the physical hardware stage of QKD, with software post-processing often being unable to support the high raw bit rates. In a complete implementation this leads to a bottleneck limiting the final secure key rate of the system unnecessarily. Here we report details of equally high rate error correction which is further adaptable to maximise the secure key rate under a range of different operating conditions. The error correction is implemented both in CPU and GPU using a bi-directional LDPC approach and can provide 90-94% of the ideal secure key rate over all fibre distances from 0-80 km.

  6. Resilience of Florida Keys coral communities following large scale disturbances

    EPA Science Inventory

    The decline of coral reefs in the Caribbean over the last 40 years has been attributed to multiple chronic stressors and episodic large-scale disturbances. This study assessed the resilience of coral communities in two different regions of the Florida Keys reef system between 199...

  7. Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheldon, Frederick T; Abercrombie, Robert K; Mili, Ali

    2008-01-01

    Good security metrics are required to make good decisions about how to design security countermeasures, to choose between alternative security architectures, and to improve security during operations. Therefore, in essence, measurement can be viewed as a decision aid. The lack of sound practical security metrics is severely hampering progress in the development of secure systems. The Cyberspace Security Econometrics System (CSES) offers the following advantages over traditional measurement systems: (1) CSES reflects the variances that exist amongst different stakeholders of the same system. Different stakeholders will typically attach different stakes to the same requirement or service (e.g., a service maymore » be provided by an information technology system or process control system, etc.). (2) For a given stakeholder, CSES reflects the variance that may exist among the stakes she/he attaches to meeting each requirement. The same stakeholder may attach different stakes to satisfying different requirements within the overall system specification. (3) For a given compound specification (e.g., combination(s) of commercial off the shelf software and/or hardware), CSES reflects the variance that may exist amongst the levels of verification and validation (i.e., certification) performed on components of the specification. The certification activity may produce higher levels of assurance across different components of the specification than others. Consequently, this paper introduces the basis, objectives and capabilities for the CSES including inputs/outputs and the basic structural and mathematical underpinnings.« less

  8. The EXIST Mission Concept Study

    NASA Technical Reports Server (NTRS)

    Fishman, Gerald J.; Grindlay, J.; Hong, J.

    2008-01-01

    EXIST is a mission designed to find and study black holes (BHs) over a wide range of environments and masses, including: 1) BHs accreting from binary companions or dense molecular clouds throughout our Galaxy and the Local Group, 2) supermassive black holes (SMBHs) lying dormant in galaxies that reveal their existence by disrupting passing stars, and 3) SMBHs that are hidden from our view at lower energies due to obscuration by the gas that they accrete. 4) the birth of stellar mass BHs which is accompanied by long cosmic gamma-ray bursts (GRBs) which are seen several times a day and may be associated with the earliest stars to form in the Universe. EXIST will provide an order of magnitude increase in sensitivity and angular resolution as well as greater spectral resolution and bandwidth compared with earlier hard X-ray survey telescopes. With an onboard optical-infra red (IR) telescope, EXIST will measure the spectra and redshifts of GRBs and their utility as cosmological probes of the highest z universe and epoch of reionization. The mission would retain its primary goal of being the Black Hole Finder Probe in the Beyond Einstein Program. However, the new design for EXIST proposed to be studied here represents a significant advance from its previous incarnation as presented to BEPAC. The mission is now less than half the total mass, would be launched on the smallest EELV available (Atlas V-401) for a Medium Class mission, and most importantly includes a two-telescope complement that is ideally suited for the study of both obscured and very distant BHs. EXIST retains its very wide field hard X-ray imaging High Energy Telescope (HET) as the primary instrument, now with improved angular and spectral resolution, and in a more compact payload that allows occasional rapid slews for immediate optical/IR imaging and spectra of GRBs and AGN as well as enhanced hard X-ray spectra and timing with pointed observations. The mission would conduct a 2 year full sky survey in

  9. Three-party authenticated key agreements for optimal communication

    PubMed Central

    Lee, Tian-Fu; Hwang, Tzonelih

    2017-01-01

    Authenticated key agreements enable users to determine session keys, and to securely communicate with others over an insecure channel via the session keys. This study investigates the lower bounds on communications for three-party authenticated key agreements and considers whether or not the sub-keys for generating a session key can be revealed in the channel. Since two clients do not share any common secret key, they require the help of the server to authenticate their identities and exchange confidential and authenticated information over insecure networks. However, if the session key security is based on asymmetric cryptosystems, then revealing the sub-keys cannot compromise the session key. The clients can directly exchange the sub-keys and reduce the transmissions. In addition, authenticated key agreements were developed by using the derived results of the lower bounds on communications. Compared with related approaches, the proposed protocols had fewer transmissions and realized the lower bounds on communications. PMID:28355253

  10. Harry Potter and the Dichotomous Key

    ERIC Educational Resources Information Center

    Crowther, David T.

    2003-01-01

    In this lesson, students use Bertie Bott's Every Flavor Beans--a "wild" candy written about in the Harry Potter books and now available in stores--to learn about classification and dichotomous keys. In these activities, students sort jelly beans according to a key and then construct a key for a "new" flavor of beans. Students then build on their…

  11. "Key Concepts in ELT": Taking Stock

    ERIC Educational Resources Information Center

    Hall, Graham

    2012-01-01

    This article identifies patterns and trends within "Key Concepts in ELT", both since the inception of the feature in ELT Journal in 1993 and during the 17 years of the current editorship. After outlining the aims of the series, the article identifies key themes that have emerged over time, exploring the links between "Key Concepts" pieces and the…

  12. 14 CFR 1251.301 - Existing facilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... HANDICAP Accessibility § 1251.301 Existing facilities. (a) Accessibility. A recipient shall operate each... readily accessible to handicapped persons. This paragraph does not require a recipient to make each of its existing facilities or every part of a facility accessible to and usable by handicapped persons. (b...

  13. 14 CFR 1251.301 - Existing facilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... HANDICAP Accessibility § 1251.301 Existing facilities. (a) Accessibility. A recipient shall operate each... readily accessible to handicapped persons. This paragraph does not require a recipient to make each of its existing facilities or every part of a facility accessible to and usable by handicapped persons. (b...

  14. 14 CFR 1251.301 - Existing facilities.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... HANDICAP Accessibility § 1251.301 Existing facilities. (a) Accessibility. A recipient shall operate each... readily accessible to handicapped persons. This paragraph does not require a recipient to make each of its existing facilities or every part of a facility accessible to and usable by handicapped persons. (b...

  15. 14 CFR 1251.301 - Existing facilities.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... HANDICAP Accessibility § 1251.301 Existing facilities. (a) Accessibility. A recipient shall operate each... readily accessible to handicapped persons. This paragraph does not require a recipient to make each of its existing facilities or every part of a facility accessible to and usable by handicapped persons. (b...

  16. Polarization variations in installed fibers and their influence on quantum key distribution systems.

    PubMed

    Ding, Yu-Yang; Chen, Hua; Wang, Shuang; He, De-Yong; Yin, Zhen-Qiang; Chen, Wei; Zhou, Zheng; Guo, Guang-Can; Han, Zheng-Fu

    2017-10-30

    Polarization variations in the installed fibers are complex and volatile, and would severely affect the performances of polarization-sensitive quantum key distribution (QKD) systems. Based on the recorded data about polarization variations of different installed fibers, we establish an analytical methodology to quantitatively evaluate the influence of polarization variations on polarization-sensitive QKD systems. Using the increased quantum bit error rate induced by polarization variations as a key criteria, we propose two parameters - polarization drift time and required tracking speed - to characterize polarization variations. For field buried and aerial fibers with different length, we quantitatively evaluate the influence of polarization variations, and also provide requirements and suggestions for polarization basis alignment modules of QKD systems deployed in different kind of fibers.

  17. Efficient key pathway mining: combining networks and OMICS data.

    PubMed

    Alcaraz, Nicolas; Friedrich, Tobias; Kötzing, Timo; Krohmer, Anton; Müller, Joachim; Pauling, Josch; Baumbach, Jan

    2012-07-01

    Systems biology has emerged over the last decade. Driven by the advances in sophisticated measurement technology the research community generated huge molecular biology data sets. These comprise rather static data on the interplay of biological entities, for instance protein-protein interaction network data, as well as quite dynamic data collected for studying the behavior of individual cells or tissues in accordance with changing environmental conditions, such as DNA microarrays or RNA sequencing. Here we bring the two different data types together in order to gain higher level knowledge. We introduce a significantly improved version of the KeyPathwayMiner software framework. Given a biological network modelled as a graph and a set of expression studies, KeyPathwayMiner efficiently finds and visualizes connected sub-networks where most components are expressed in most cases. It finds all maximal connected sub-networks where all nodes but k exceptions are expressed in all experimental studies but at most l exceptions. We demonstrate the power of the new approach by comparing it to similar approaches with gene expression data previously used to study Huntington's disease. In addition, we demonstrate KeyPathwayMiner's flexibility and applicability to non-array data by analyzing genome-scale DNA methylation profiles from colorectal tumor cancer patients. KeyPathwayMiner release 2 is available as a Cytoscape plugin and online at http://keypathwayminer.mpi-inf.mpg.de.

  18. Key Nutrients.

    ERIC Educational Resources Information Center

    Federal Extension Service (USDA), Washington, DC.

    Lessons written to help trainer agents prepare aides for work with families in the Food and Nutrition Program are presented in this booklet. The key nutrients discussed in the 10 lessons are protein, carbohydrates, fat, calcium, iron, iodine, and Vitamins A, B, C, and D. the format of each lesson is as follows: Purpose, Presentation, Application…

  19. 32 CFR 651.46 - Existing EISs.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Existing EISs. 651.46 Section 651.46 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) ENVIRONMENTAL QUALITY ENVIRONMENTAL ANALYSIS OF ARMY ACTIONS (AR 200-2) Environmental Impact Statement § 651.46 Existing EISs. A newly...

  20. 47 CFR 17.17 - Existing structures.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Existing structures. 17.17 Section 17.17... STRUCTURES Federal Aviation Administration Notification Criteria § 17.17 Existing structures. (a) The requirements found in § 17.23 relating to painting and lighting of antenna structures shall not apply to those...

  1. Key Technologies of Phone Storage Forensics Based on ARM Architecture

    NASA Astrophysics Data System (ADS)

    Zhang, Jianghan; Che, Shengbing

    2018-03-01

    Smart phones are mainly running Android, IOS and Windows Phone three mobile platform operating systems. The android smart phone has the best market shares and its processor chips are almost ARM software architecture. The chips memory address mapping mechanism of ARM software architecture is different with x86 software architecture. To forensics to android mart phone, we need to understand three key technologies: memory data acquisition, the conversion mechanism from virtual address to the physical address, and find the system’s key data. This article presents a viable solution which does not rely on the operating system API for a complete solution to these three issues.

  2. KEY COMPARISON: Final report on CCQM-K69 key comparison: Testosterone glucuronide in human urine

    NASA Astrophysics Data System (ADS)

    Liu, Fong-Ha; Mackay, Lindsey; Murby, John

    2010-01-01

    The CCQM-K69 key comparison of testosterone glucuronide in human urine was organized under the auspices of the CCQM Organic Analysis Working Group (OAWG). The National Measurement Institute Australia (NMIA) acted as the coordinating laboratory for the comparison. The samples distributed for the key comparison were prepared at NMIA with funding from the World Anti-Doping Agency (WADA). WADA granted the approval for this material to be used for the intercomparison provided the distribution and handling of the material were strictly controlled. Three national metrology institutes (NMIs)/designated institutes (DIs) developed reference methods and submitted data for the key comparison along with two other laboratories who participated in the parallel pilot study. A good selection of analytical methods and sample workup procedures was displayed in the results submitted considering the complexities of the matrix involved. The comparability of measurement results was successfully demonstrated by the participating NMIs. Only the key comparison data were used to estimate the key comparison reference value (KCRV), using the arithmetic mean approach. The reported expanded uncertainties for results ranged from 3.7% to 6.7% at the 95% level of confidence and all results agreed within the expanded uncertainty of the KCRV. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  3. Do the kinematics of a baulked take-off in springboard diving differ from those of a completed dive.

    PubMed

    Barris, Sian; Farrow, Damian; Davids, Keith

    2013-01-01

    Consistency and invariance in movements are traditionally viewed as essential features of skill acquisition and elite sports performance. This emphasis on the stabilization of action has resulted in important processes of adaptation in movement coordination during performance being overlooked in investigations of elite sport performance. Here we investigate whether differences exist between the movement kinematics displayed by five, elite springboard divers (age 17 ± 2.4 years) in the preparation phases of baulked and completed take-offs. The two-dimensional kinematic characteristics of the reverse somersault take-off phases (approach and hurdle) were recorded during normal training sessions and used for intra-individual analysis. All participants displayed observable differences in movement patterns at key events during the approach phase; however, the presence of similar global topological characteristics suggested that, overall, participants did not perform distinctly different movement patterns during completed and baulked dives. These findings provide a powerful rationale for coaches to consider assessing functional variability or adaptability of motor behaviour as a key criterion of successful performance in sports such as diving.

  4. Practical challenges in quantum key distribution

    DOE PAGES

    Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing; ...

    2016-11-08

    Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.

  5. Practical challenges in quantum key distribution

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing

    Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.

  6. 22 CFR 217.22 - Existing facilities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Existing facilities. 217.22 Section 217.22... PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Accessibility § 217.22 Existing facilities... necessary to achieve full accessibility under § 217.22(a) and, if the time period of the transition plan is...

  7. 22 CFR 217.22 - Existing facilities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Existing facilities. 217.22 Section 217.22... PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Accessibility § 217.22 Existing facilities... necessary to achieve full accessibility under § 217.22(a) and, if the time period of the transition plan is...

  8. 22 CFR 217.22 - Existing facilities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Existing facilities. 217.22 Section 217.22... PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Accessibility § 217.22 Existing facilities... necessary to achieve full accessibility under § 217.22(a) and, if the time period of the transition plan is...

  9. 22 CFR 217.22 - Existing facilities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Existing facilities. 217.22 Section 217.22... PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Accessibility § 217.22 Existing facilities... necessary to achieve full accessibility under § 217.22(a) and, if the time period of the transition plan is...

  10. 22 CFR 217.22 - Existing facilities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Existing facilities. 217.22 Section 217.22... PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Accessibility § 217.22 Existing facilities... necessary to achieve full accessibility under § 217.22(a) and, if the time period of the transition plan is...

  11. 10 CFR 1040.72 - Existing facilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Existing facilities. 1040.72 Section 1040.72 Energy... § 1040.72 Existing facilities. (a) Accessibility. A recipient shall operate any program or activity to... facilities or every part of a facility accessible to and useable by handicapped persons. (b) Methods. A...

  12. High key rate continuous-variable quantum key distribution with a real local oscillator.

    PubMed

    Wang, Tao; Huang, Peng; Zhou, Yingming; Liu, Weiqi; Ma, Hongxin; Wang, Shiyu; Zeng, Guihua

    2018-02-05

    Continuous-variable quantum key distribution (CVQKD) with a real local oscillator (LO) has been extensively studied recently due to its security and simplicity. In this paper, we propose a novel implementation of a high-key-rate CVQKD with a real LO. Particularly, with the help of the simultaneously generated reference pulse, the phase drift of the signal is tracked in real time and then compensated. By utilizing the time and polarization multiplexing techniques to isolate the reference pulse and controlling the intensity of it, not only the contamination from it is suppressed, but also a high accuracy of the phase compensation can be guaranteed. Besides, we employ homodyne detection on the signal to ensure the high quantum efficiency and heterodyne detection on the reference pulse to acquire the complete phase information of it. In order to suppress the excess noise, a theoretical noise model for our scheme is established. According to this model, the impact of the modulation variance and the intensity of the reference pulse are both analysed theoretically and then optimized according to the experimental data. By measuring the excess noise in the 25km optical fiber transmission system, a 3.14Mbps key rate in the asymptotic regime proves to be achievable. This work verifies the feasibility of the high-key-rate CVQKD with a real LO within the metropolitan area.

  13. Practical quantum key distribution protocol without monitoring signal disturbance.

    PubMed

    Sasaki, Toshihiko; Yamamoto, Yoshihisa; Koashi, Masato

    2014-05-22

    Quantum cryptography exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation of the experimental parameters influenced by the eavesdropper's intervention, which is achieved by randomly sampling the signal. If the estimation of many parameters with high precision is required, the portion of the signal that is sacrificed increases, thus decreasing the efficiency of the protocol. Here we propose a QKD protocol based on an entirely different principle. The sender encodes a bit sequence onto non-orthogonal quantum states and the receiver randomly dictates how a single bit should be calculated from the sequence. The eavesdropper, who is unable to learn the whole of the sequence, cannot guess the bit value correctly. An achievable rate of secure key distribution is calculated by considering complementary choices between quantum measurements of two conjugate observables. We found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers. It also has a better tolerance of bit errors and of finite-sized-key effects. We anticipate that this finding will give new insight into how the probabilistic nature of quantum mechanics can be related to secure communication, and will facilitate the simple and efficient use of conventional lasers for QKD.

  14. Translation and Its Discontents: Key Concepts in English and German History Education

    ERIC Educational Resources Information Center

    Seixas, Peter

    2016-01-01

    Key terms and concepts are crucial tools in teaching and learning in the disciplines. Different linguistic traditions approach such tools in diverse ways. This paper offers an initial contribution by a monolingual Anglophone history educator in dialogue with German history educators. It presents three different scenarios for the potential of…

  15. High speed and adaptable error correction for megabit/s rate quantum key distribution

    PubMed Central

    Dixon, A. R.; Sato, H.

    2014-01-01

    Quantum Key Distribution is moving from its theoretical foundation of unconditional security to rapidly approaching real world installations. A significant part of this move is the orders of magnitude increases in the rate at which secure key bits are distributed. However, these advances have mostly been confined to the physical hardware stage of QKD, with software post-processing often being unable to support the high raw bit rates. In a complete implementation this leads to a bottleneck limiting the final secure key rate of the system unnecessarily. Here we report details of equally high rate error correction which is further adaptable to maximise the secure key rate under a range of different operating conditions. The error correction is implemented both in CPU and GPU using a bi-directional LDPC approach and can provide 90–94% of the ideal secure key rate over all fibre distances from 0–80 km. PMID:25450416

  16. Building capacity in Australian interprofessional health education: perspectives from key health and higher education stakeholders.

    PubMed

    Matthews, Lynda R; Pockett, Rosalie B; Nisbet, Gillian; Thistlethwaite, Jill E; Dunston, Roger; Lee, Alison; White, Jill F

    2011-05-01

    A substantial literature engaging with the directions and experiences of stakeholders involved in interprofessional health education exists at the international level, yet almost nothing has been published that documents and analyses the Australian experience. Accordingly, this study aimed to scope the experiences of key stakeholders in health and higher education in relation to the development of interprofessional practice capabilities in health graduates in Australia. Twenty-seven semi-structured interviews and two focus groups of key stakeholders involved in the development and delivery of interprofessional health education in Australian higher education were undertaken. Interview data were coded to identify categories that were organised into key themes, according to principles of thematic analysis. Three themes were identified: the need for common ground between health and higher education, constraints and enablers in current practice, and the need for research to establish an evidence base. Five directions for national development were also identified. The study identified a range of interconnected changes that will be required to successfully mainstream interprofessional education within Australia, in particular, the importance of addressing issues of culture change and the need for a nationally coordinated and research informed approach. These findings reiterate those found in the international literature.

  17. 15 CFR 922.47 - Pre-existing authorizations or rights and certifications of pre-existing authorizations or rights.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... rights of subsistence use or access in existence on the date of designation of any National Marine... leases, permits, licenses, or rights consistent with the purposes for which the Sanctuary was designated... authorized by a valid lease, permit, license, approval or other authorization in existence on the effective...

  18. 15 CFR 922.47 - Pre-existing authorizations or rights and certifications of pre-existing authorizations or rights.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... rights of subsistence use or access in existence on the date of designation of any National Marine... leases, permits, licenses, or rights consistent with the purposes for which the Sanctuary was designated... authorized by a valid lease, permit, license, approval or other authorization in existence on the effective...

  19. Engagement in the HIV Care Continuum among Key Populations in Tijuana, Mexico.

    PubMed

    Smith, Laramie R; Patterson, Thomas L; Magis-Rodriguez, Carlos; Ojeda, Victoria D; Burgos, Jose Luis; Rojas, Sarah A; Zúñiga, María Luisa; Strathdee, Steffanie A

    2016-05-01

    In Tijuana, Mexico, HIV is concentrated in sub-epidemics of key populations: persons who inject drugs (PWID), sex workers (SW), and men who have sex with men (MSM). To date, data on engagement in the HIV care continuum among these key populations, particularly in resource-constrained settings, are sparse. We pooled available epidemiological data from six studies (N = 3368) to examine HIV testing and treatment uptake in these key populations; finding an overall HIV prevalence of 5.7 %. Of the 191 identified HIV-positive persons, only 11.5 % knew their HIV-positive status and 3.7 % were on ART. Observed differences between these HIV-positive key populations suggest PWID (vs. non-PWID) were least likely to have previously tested or initiate HIV care. MSM (vs. non-MSM) were more likely to have previously tested but not more likely to know their HIV-positive status. Of persons aware of their HIV-positive status, SW (vs. non-SW) were more likely to initiate HIV care. Findings suggest engagement of key populations in HIV treatment is far below estimates observed for similarly resource-constrained generalized epidemics in sub-Saharan Africa. These data provide one of the first empirical-snapshots highlighting the extent of HIV treatment disparities in key populations.

  20. 43 CFR 17.217 - Existing facilities.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 43 Public Lands: Interior 1 2011-10-01 2011-10-01 false Existing facilities. 17.217 Section 17.217... facilities. (a) Accessibility. A recipient shall operate each program or activity so that when each part is... not require a recipient to make each of its existing facilities or every part of a facility accessible...

  1. A Key Evolutionary Mutation Enhances DNA Binding of the FOXP2 Forkhead Domain.

    PubMed

    Morris, Gavin; Fanucchi, Sylvia

    2016-04-05

    Forkhead box (FOX) transcription factors share a conserved forkhead DNA binding domain (FHD) and are key role players in the development of many eukaryotic species. Their involvement in various congenital disorders and cancers makes them clinically relevant targets for novel therapeutic strategies. Among them, the FOXP subfamily of multidomain transcriptional repressors is unique in its ability to form DNA binding homo and heterodimers. The truncated FOXP2 FHD, in the absence of the leucine zipper, exists in equilibrium between monomeric and domain-swapped dimeric states in vitro. As a consequence, determining the DNA binding properties of the FOXP2 FHD becomes inherently difficult. In this work, two FOXP2 FHD hinge loop mutants have been generated to successfully prevent both the formation (A539P) and the dissociation (F541C) of the homodimers. This allows for the separation of the two species for downstream DNA binding studies. Comparison of DNA binding of the different species using electrophoretic mobility shift assay, fluorescence anisotropy and isothermal titration calorimetry indicates that the wild-type FOXP2 FHD binds DNA as a monomer. However, comparison of the DNA-binding energetics of the monomer and wild-type FHD, reveals that there is a difference in the mechanism of binding between the two species. We conclude that the naturally occurring reverse mutation (P539A) seen in the FOXP subfamily increases DNA binding affinity and may increase the potential for nonspecific binding compared to other FOX family members.

  2. 48 CFR 2452.237-70 - Key personnel.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... contracts when it is necessary for contract performance to identify the contractor's key personnel: Key... perform as follows: [List Key Personnel and/or positions, and tasks, percentage of effort, number of hours...

  3. Revocable identity-based proxy re-signature against signing key exposure

    PubMed Central

    Ma, Tingchun; Wang, Jinli; Wang, Caifen

    2018-01-01

    Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into another signature under another identity on the same message by using a re-signature key. Due to this transformation function, IDPRS is very useful in constructing privacy-preserving schemes for various information systems. Key revocation functionality is important in practical IDPRS for managing users dynamically; however, the existing IDPRS schemes do not provide revocation mechanisms that allow the removal of misbehaving or compromised users from the system. In this paper, we first introduce a notion called revocable identity-based proxy re-signature (RIDPRS) to achieve the revocation functionality. We provide a formal definition of RIDPRS as well as its security model. Then, we present a concrete RIDPRS scheme that can resist signing key exposure and prove that the proposed scheme is existentially unforgeable against adaptive chosen identity and message attacks in the standard model. To further improve the performance of signature verification in RIDPRS, we introduce a notion called server-aided revocable identity-based proxy re-signature (SA-RIDPRS). Moreover, we extend the proposed RIDPRS scheme to the SA-RIDPRS scheme and prove that this extended scheme is secure against adaptive chosen message and collusion attacks. The analysis results show that our two schemes remain efficient in terms of computational complexity when implementing user revocation procedures. In particular, in the SA-RIDPRS scheme, the verifier needs to perform only a bilinear pairing and four exponentiation operations to verify the validity of the signature. Compared with other IDPRS schemes in the standard model, our SA-RIDPRS scheme greatly reduces the computation overhead of verification. PMID:29579125

  4. A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method

    PubMed Central

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Chen, Wei

    2016-01-01

    With the development of wireless sensor networks (WSNs), in most application scenarios traditional WSNs with static sink nodes will be gradually replaced by Mobile Sinks (MSs), and the corresponding application requires a secure communication environment. Current key management researches pay less attention to the security of sensor networks with MS. This paper proposes a hybrid key management schemes based on a Polynomial Pool-based key pre-distribution and Basic Random key pre-distribution (PPBR) to be used in WSNs with MS. The scheme takes full advantages of these two kinds of methods to improve the cracking difficulty of the key system. The storage effectiveness and the network resilience can be significantly enhanced as well. The tree-based path key establishment method is introduced to effectively solve the problem of communication link connectivity. Simulation clearly shows that the proposed scheme performs better in terms of network resilience, connectivity and storage effectiveness compared to other widely used schemes. PMID:27070624

  5. Continuous-variable measurement-device-independent quantum key distribution with photon subtraction

    NASA Astrophysics Data System (ADS)

    Ma, Hong-Xin; Huang, Peng; Bai, Dong-Yun; Wang, Shi-Yu; Bao, Wan-Su; Zeng, Gui-Hua

    2018-04-01

    It has been found that non-Gaussian operations can be applied to increase and distill entanglement between Gaussian entangled states. We show the successful use of the non-Gaussian operation, in particular, photon subtraction operation, on the continuous-variable measurement-device-independent quantum key distribution (CV-MDI-QKD) protocol. The proposed method can be implemented based on existing technologies. Security analysis shows that the photon subtraction operation can remarkably increase the maximal transmission distance of the CV-MDI-QKD protocol, which precisely make up for the shortcoming of the original CV-MDI-QKD protocol, and one-photon subtraction operation has the best performance. Moreover, the proposed protocol provides a feasible method for the experimental implementation of the CV-MDI-QKD protocol.

  6. The genomes of two key bumblebee species with primitive eusocial organization.

    PubMed

    Sadd, Ben M; Barribeau, Seth M; Bloch, Guy; de Graaf, Dirk C; Dearden, Peter; Elsik, Christine G; Gadau, Jürgen; Grimmelikhuijzen, Cornelis J P; Hasselmann, Martin; Lozier, Jeffrey D; Robertson, Hugh M; Smagghe, Guy; Stolle, Eckart; Van Vaerenbergh, Matthias; Waterhouse, Robert M; Bornberg-Bauer, Erich; Klasberg, Steffen; Bennett, Anna K; Câmara, Francisco; Guigó, Roderic; Hoff, Katharina; Mariotti, Marco; Munoz-Torres, Monica; Murphy, Terence; Santesmasses, Didac; Amdam, Gro V; Beckers, Matthew; Beye, Martin; Biewer, Matthias; Bitondi, Márcia M G; Blaxter, Mark L; Bourke, Andrew F G; Brown, Mark J F; Buechel, Severine D; Cameron, Rossanah; Cappelle, Kaat; Carolan, James C; Christiaens, Olivier; Ciborowski, Kate L; Clarke, David F; Colgan, Thomas J; Collins, David H; Cridge, Andrew G; Dalmay, Tamas; Dreier, Stephanie; du Plessis, Louis; Duncan, Elizabeth; Erler, Silvio; Evans, Jay; Falcon, Tiago; Flores, Kevin; Freitas, Flávia C P; Fuchikawa, Taro; Gempe, Tanja; Hartfelder, Klaus; Hauser, Frank; Helbing, Sophie; Humann, Fernanda C; Irvine, Frano; Jermiin, Lars S; Johnson, Claire E; Johnson, Reed M; Jones, Andrew K; Kadowaki, Tatsuhiko; Kidner, Jonathan H; Koch, Vasco; Köhler, Arian; Kraus, F Bernhard; Lattorff, H Michael G; Leask, Megan; Lockett, Gabrielle A; Mallon, Eamonn B; Antonio, David S Marco; Marxer, Monika; Meeus, Ivan; Moritz, Robin F A; Nair, Ajay; Näpflin, Kathrin; Nissen, Inga; Niu, Jinzhi; Nunes, Francis M F; Oakeshott, John G; Osborne, Amy; Otte, Marianne; Pinheiro, Daniel G; Rossié, Nina; Rueppell, Olav; Santos, Carolina G; Schmid-Hempel, Regula; Schmitt, Björn D; Schulte, Christina; Simões, Zilá L P; Soares, Michelle P M; Swevers, Luc; Winnebeck, Eva C; Wolschin, Florian; Yu, Na; Zdobnov, Evgeny M; Aqrawi, Peshtewani K; Blankenburg, Kerstin P; Coyle, Marcus; Francisco, Liezl; Hernandez, Alvaro G; Holder, Michael; Hudson, Matthew E; Jackson, LaRonda; Jayaseelan, Joy; Joshi, Vandita; Kovar, Christie; Lee, Sandra L; Mata, Robert; Mathew, Tittu; Newsham, Irene F; Ngo, Robin; Okwuonu, Geoffrey; Pham, Christopher; Pu, Ling-Ling; Saada, Nehad; Santibanez, Jireh; Simmons, DeNard; Thornton, Rebecca; Venkat, Aarti; Walden, Kimberly K O; Wu, Yuan-Qing; Debyser, Griet; Devreese, Bart; Asher, Claire; Blommaert, Julie; Chipman, Ariel D; Chittka, Lars; Fouks, Bertrand; Liu, Jisheng; O'Neill, Meaghan P; Sumner, Seirian; Puiu, Daniela; Qu, Jiaxin; Salzberg, Steven L; Scherer, Steven E; Muzny, Donna M; Richards, Stephen; Robinson, Gene E; Gibbs, Richard A; Schmid-Hempel, Paul; Worley, Kim C

    2015-04-24

    The shift from solitary to social behavior is one of the major evolutionary transitions. Primitively eusocial bumblebees are uniquely placed to illuminate the evolution of highly eusocial insect societies. Bumblebees are also invaluable natural and agricultural pollinators, and there is widespread concern over recent population declines in some species. High-quality genomic data will inform key aspects of bumblebee biology, including susceptibility to implicated population viability threats. We report the high quality draft genome sequences of Bombus terrestris and Bombus impatiens, two ecologically dominant bumblebees and widely utilized study species. Comparing these new genomes to those of the highly eusocial honeybee Apis mellifera and other Hymenoptera, we identify deeply conserved similarities, as well as novelties key to the biology of these organisms. Some honeybee genome features thought to underpin advanced eusociality are also present in bumblebees, indicating an earlier evolution in the bee lineage. Xenobiotic detoxification and immune genes are similarly depauperate in bumblebees and honeybees, and multiple categories of genes linked to social organization, including development and behavior, show high conservation. Key differences identified include a bias in bumblebee chemoreception towards gustation from olfaction, and striking differences in microRNAs, potentially responsible for gene regulation underlying social and other traits. These two bumblebee genomes provide a foundation for post-genomic research on these key pollinators and insect societies. Overall, gene repertoires suggest that the route to advanced eusociality in bees was mediated by many small changes in many genes and processes, and not by notable expansion or depauperation.

  7. Quantum key distribution without the wavefunction

    NASA Astrophysics Data System (ADS)

    Niestegge, Gerd

    A well-known feature of quantum mechanics is the secure exchange of secret bit strings which can then be used as keys to encrypt messages transmitted over any classical communication channel. It is demonstrated that this quantum key distribution allows a much more general and abstract access than commonly thought. The results include some generalizations of the Hilbert space version of quantum key distribution, but are based upon a general nonclassical extension of conditional probability. A special state-independent conditional probability is identified as origin of the superior security of quantum key distribution; this is a purely algebraic property of the quantum logic and represents the transition probability between the outcomes of two consecutive quantum measurements.

  8. Tight control of mild-moderate pre-existing or non-proteinuric gestational hypertension.

    PubMed

    Nabhan, Ashraf F; Elsedawy, Maged M

    2011-07-06

    The question of the target blood pressure in pregnant women with mild-moderate hypertension continues to be an area of debate. To compare tight versus very tight control of mild-moderate pre-existing or non-proteinuric gestational hypertension for improving outcomes We searched the Cochrane Pregnancy and Childbirth Group's Trials Register (31 March 2011), CENTRAL (The Cochrane Library 2011, Issue 3), MEDLINE (January 1966 to March 2011), and the metaRegister of Controlled Trials (31 March 2011). We handsearched citation lists of relevant publications, review articles, and included studies. Randomized controlled trials of tight versus very tight control in pregnant women with mild or moderate pre-existing or non-proteinuric gestational hypertension. Two authors independently assessed trial quality and extracted data. We expressed results as risk ratio (RR) or mean differences, together with their 95% confidence intervals (CI). We included two studies (256 participants) with mild-moderate pre-existing or non-proteinuric gestational hypertension. There was no evidence of a difference between tight and very tight control groups regarding severe pre-eclampsia (risk ratio (RR) 1.28, 95% CI 0.97 to 1.70; two trials, 256 participants). More women in the tight group were hospitalized during their pregnancy (RR 2.53, 95% CI 1.14 to 5.63; one trial, 125 participants). There was no evidence of a difference in other outcome measures including fetal distress, IUGR, neonatal admission to a NICU, perinatal deaths, induction of labor and cesarean delivery between the tight and the very tight control groups. Gestational age at delivery had a non-significant mean difference (MD) of -0.15 weeks between the tight and very tight control groups (MD -0.15, 95% CI -1.52 to 1.21, random-effects, T² = 0.75, I² = 77%; two trials, 256 participants). The MD in birthweight between the tight and the very tight control group was not significant (MD -100.00 grams, 95% CI -363.69 to 163.69; one

  9. Composition of key offensive odorants released from fresh food materials

    NASA Astrophysics Data System (ADS)

    Kim, Ki-Hyun; Kim, Yong-Hyun

    2014-06-01

    A refrigerator loaded with a variety of foods without sealed packaging can create quite an olfactory nuisance, and it may come as a surprise that fresh foods emit unpleasant odorants just as those that are decaying. To learn more about nuisance sources in our daily lives, we measured a list of 22 compounds designated as the key offensive odorants (e.g., reduced sulfur, nitrogenous, volatile fatty acid (VFA), and carbonyls) from nine types of common food items consumed in S. Korea: raw beef, raw fish, spam, yolks and albumin of boiled eggs (analyzed separately), milk, cheese, onions, and strawberries. The odor intensity (OI) of each food item was computed initially with the aid of previously used empirical equations. This indicates that the malodor properties of target foods tend to be governed by a few key odorants such as VFA, S, and N compounds. The extent of odorant mixing of a given food was then evaluated by exploring the correlation between the human olfaction (e.g., dilution-to-threshold (D/T) ratio) and the odor potential determined indirectly (instrumentally) such as odor activity value (OAV) or sum of odor intensity (SOI). The overall results of our study confirm the existence of malodorant compounds released from common food items and their contribution to their odor characteristics to a certain degree.

  10. Existence and exponential stability of traveling waves for delayed reaction-diffusion systems

    NASA Astrophysics Data System (ADS)

    Hsu, Cheng-Hsiung; Yang, Tzi-Sheng; Yu, Zhixian

    2018-03-01

    The purpose of this work is to investigate the existence and exponential stability of traveling wave solutions for general delayed multi-component reaction-diffusion systems. Following the monotone iteration scheme via an explicit construction of a pair of upper and lower solutions, we first obtain the existence of monostable traveling wave solutions connecting two different equilibria. Then, applying the techniques of weighted energy method and comparison principle, we show that all solutions of the Cauchy problem for the considered systems converge exponentially to traveling wave solutions provided that the initial perturbations around the traveling wave fronts belong to a suitable weighted Sobolev space.

  11. High-capacity quantum key distribution via hyperentangled degrees of freedom

    NASA Astrophysics Data System (ADS)

    Simon, David S.; Sergienko, Alexander V.

    2014-06-01

    Quantum key distribution (QKD) has long been a promising area for the application of quantum effects in solving real-world problems. However, two major obstacles have stood in the way of its widespread application: low secure key generation rates and short achievable operating distances. In this paper, a new physical mechanism for dealing with the first of these problems is proposed: the interplay between different degrees of freedom in a hyperentangled system (parametric down-conversion) is used to increase the Hilbert space dimension available for key generation while maintaining security. Polarization-based Bell tests provide security checking, while orbital angular momentum (OAM) and total angular momentum (TAM) provide a higher key generation rate. Whether to measure TAM or OAM is decided randomly in each trial. The concurrent noncommutativity of TAM with OAM and polarization provides the physical basis for quantum security. TAM measurements link polarization to OAM, so that if the legitimate participants measure OAM while the eavesdropper measures TAM (or vice-versa), then polarization entanglement is lost, revealing the eavesdropper. In contrast to other OAM-based QKD methods, complex active switching between OAM bases is not required; instead, passive switching by beam splitters combined with much simpler active switching between polarization bases makes implementation at high OAM more practical.

  12. Consideration of techniques to mitigate the unauthorized 3D printing production of keys

    NASA Astrophysics Data System (ADS)

    Straub, Jeremy; Kerlin, Scott

    2016-05-01

    The illicit production of 3D printed keys based on remote-sensed imagery is problematic as it allows a would-be intruder to access a secured facility without the attack attempt being as obviously detectable as conventional techniques. This paper considers the problem from multiple perspectives. First, it looks at different attack types and considers the prospective attack from a digital information perspective. Second, based on this, techniques for securing keys are considered. Third, the design of keys is considered from the perspective of making them more difficult to duplicate using visible light sensing and 3D printing. Policy and legal considerations are discussed.

  13. Short-term effect of Keyes' approach to periodontal therapy compared with modified Widman flap surgery.

    PubMed

    Whitehead, S P; Watts, T L

    1987-11-01

    Keyes' method of non-surgical therapy was compared with modified Widman flap surgery in 9 patients with symmetrical periodontal disease. Following an initial oral hygiene programme, baseline measurements were recorded and paired contralateral areas were subjected randomly to the 2 techniques. 42 teeth receiving surgery were compared with 40 treated by Keyes' method. 6 sites per tooth were scored immediately prior to therapy and 3 months later, using a constant force probe with onlays. Consistent data were recorded for the 6 separate sites, which showed no baseline difference between treatments, slightly greater recession with surgery at 3 months, but no difference between treatments in probing depth and attachment levels. Mean data for individual patients showed similar consistency. Probing depth in deep sites was reduced slightly more with surgery, and there were no differences in bleeding on probing at 3 months. Both techniques gave marked improvements in health. Surprisingly, only 2 subjects preferred Keyes' technique of mechanical therapy, 6 preferred surgery, and 1 had no preference.

  14. Investigation of the key determinants of Asian nurses' quality of life.

    PubMed

    Makabe, Sachiko; Kowitlawakul, Yanika; Nurumal, Mohd Said; Takagai, Junko; Wichaikhum, Orn-Anong; Wangmo, Neyzang; Yap, Suk Foon; Kunaviktikul, Wipada; Komatsu, Junko; Shirakawa, Hideko; Kimura, Yutaka; Asanuma, Yoshihiro

    2018-06-01

    The study aimed to compare nurses' quality of life and investigate key determinants among Asian countries with different economic status. A cross-sectional survey was conducted across five Asian countries (Japan, Singapore, Malaysia, Thailand, and Bhutan). Quality of life (WHOQOL-BREF), job stress (National Institute of Occupational Safety and Health questionnaire), and demographic data were assessed. Stepwise multivariate linear regression analysis was performed to identify the key determinants of quality of life. Participants were 3,829 nurses (response rate: 82%) with a mean age of 33 ± 10 yr and majority were women (92%). Regarding quality of life, Bhutan yielded the highest scores, followed by Malaysia, Thailand, Singapore, and Japan, and these results were statistically significant. The key determinants that were significantly related to quality of life were "stress coping ability," "life satisfaction," "Japan," "social support," "job stress," and "Singapore" (adjusted R 2 =0.46). In conclusion, nurses' quality of life differs across Asian countries and is not linked to the country's economic development. To maintain a good quality of life for nurses, an international exchange program like international nursing conferences for work environment and staff coping strategies is recommended to broaden institution' minds and share experiences and exchange views to be able to realize their own problems and discover global solutions to them.

  15. Key differences between apoC-III regulation and expression in intestine and liver.

    PubMed

    West, Gabrielle; Rodia, Cayla; Li, Diana; Johnson, Zania; Dong, Hongli; Kohan, Alison B

    2017-09-23

    ApoC-III is a critical cardiovascular risk factor, and humans expressing null mutations in apoC-III are robustly protected from cardiovascular disease. Because of its critical role in elevating plasma lipids and CVD risk, hepatic apoC-III regulation has been studied at length. Considerably less is known about the factors that regulate intestinal apoC-III. In this work, we use primary murine enteroids, Caco-2 cells, and dietary studies in wild-type mice to show that intestinal apoC-III expression does not change in response to fatty acids, glucose, or insulin administration, in contrast to hepatic apoC-III. Intestinal apoC-III is not sensitive to changes in FoxO1 expression (which is itself very low in the intestine, as is FoxO1 target IGFBP-1), nor is intestinal apoC-III responsive to western diet, a significant contrast to hepatic apoC-III stimulation during western diet. These data strongly suggest that intestinal apoC-III is not a FoxO1 target and support the idea that apoC-III is not regulated coordinately with hepatic apoC-III, and establishes another key aspect of apoC-III that is unique in the intestine from the liver. Copyright © 2017 Elsevier Inc. All rights reserved.

  16. Pre-Existing Background Knowledge Influences Socioeconomic Differences in Preschoolers' Word Learning and Comprehension

    ERIC Educational Resources Information Center

    Kaefer, Tanya; Neuman, Susan B.; Pinkham, Ashley M.

    2015-01-01

    The goal of the current study is to explore the influence of knowledge on socioeconomic discrepancies in word learning and comprehension. After establishing socioeconomic differences in background knowledge (Study 1), the authors presented children with a storybook that incorporates this knowledge (Study 2). Results indicated that middle-income…

  17. POP emission inventories on different scales and their future trends

    NASA Astrophysics Data System (ADS)

    Theloke, Jochen; Breivik, Knut; Denier van der Gon, Hugo; Kugler, Ulrike; Li, Yi-Fan; Pacyna, Jozef; Panasiuk, Damian; Sundseth, Kyrre; Sweetman, Andy; Tao, Shu

    2010-05-01

    Persistent organic pollutants (POPs) are defined as organic substances that possess toxic characteristics; are persistent; bioaccumulate; are prone to long-range transboundary atmospheric transport and deposition; and are likely to cause significant adverse human health or environmental effects near to and distant from their sources. To reduce these adverse effects and for monitoring the effectiveness of existing international agreements, esp. UNECE-POP and UNEP protocols, concerning POPs the compilation of emission inventories is required. This presentation addresses emission inventories for POPs which are covered by existing protocols as well as candidate substances which are in focus for the revision of the international protocols. The following substances will be taken into account in this presentation: Dioxins and Furans (PCDD/F), PAHs, PCBs, Hexachlorbenzene (HCB), Pesticides (e.g. HCH, Dicofol and Endosulfan), Perfluoroctansulfonate (PFOS) and Polybrominated Diphenylethers (PBDEs), Hexachlorobutadiene (HCBD), Pentachlorobenzene (PeCB), Polychlorinated Naphthalenes (PCN), and Pentachlorophenols (PCPs). For all considered substances emission inventories exist with different qualities, from preliminary estimates to more complete inventories. These inventories are based on different methodologies (measurements, modelling, mass balance approaches, etc.), cover different regions (Europe, North America, Asia, China) and different spatial scales (regional, global) with different spatial resolutions. An overview will be given of the current state of the knowledge through a description of the main sources for the specific pollutants, the recent emission levels, a description of historical emission (incl. time series) and gridded data bases, if available. Furthermore, recommendations to improve POP emission inventories as well as major obstacles to achieve these improvements will be given. A further focus of this presentation will be an overview of future trends of

  18. Usability testing of existing type 2 diabetes mellitus websites.

    PubMed

    Davis, Dorian; Jiang, Steven

    2016-08-01

    Given the significant increase in the use of the internet as an educational tool for diabetes, very little research has been published on the usability of healthcare websites, even though it is a determining factor for user satisfaction. The aim of this study is to evaluate and critique the interfaces of existing diabetes websites for usability concerns and provide design solutions for improvement. Emphasis is placed on Type 2 Diabetes Mellitus since it is the most common and life threatening form of diabetes. A usability test was performed on the interfaces of three existing diabetes websites, American Diabetes Association (www.diabetes.org), WebMD (www.webmd.com) and the National Diabetes Education Program (ndep.nih.gov). The goal was to collect qualitative and quantitative data to determine: (1) if participants are able to complete specified tasks successfully; (2) the length of time it takes participants to complete the specified tasks and; (3) participants' satisfaction with the three websites. Twenty adults, 18 years of age and older participated in the study. The results from the MANOVA test revealed a significant difference between the three websites for number of clicks, number of errors and completion time when analyzed simultaneously. The ANOVA tests revealed a significant difference for all three variables. The Student-Newman-Keuls (SNK) test shows a significant difference for completion time between American Diabetes Association and WebMD. A significant difference was found for the number of clicks for the National Diabetes Education Program compared to the American Diabetes Association and WebMD. However, no significant difference was found for the number of clicks between American Diabetes Association and WebMD. Lastly, a significant difference was found between each interface for number of errors. Although, the American Diabetes Association web-interface was most favorable, there were many positive design elements for each interface. On the other

  19. Algorithms for Lightweight Key Exchange †

    PubMed Central

    Santonja, Juan; Zamora, Antonio

    2017-01-01

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks. PMID:28654006

  20. The Aesthetic Dilemma: Wallace Stevens'"The Idea of Order at Key West"

    ERIC Educational Resources Information Center

    Graham, John

    1974-01-01

    Analyzes the growth, development, and change that occurred in Wallace Stevens' poetry, basing the argument on poems selected from different periods with special emphasis on "The Idea of Order at Key West." (RB)