Sample records for narrow-based security index

  1. 17 CFR 41.14 - Transition period for indexes that cease being narrow-based security indexes.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... provision. An index that is a narrow-based security index that becomes a broad-based security index for no...-five days. An index that is a narrow-based security index that becomes a broad-based security index for...

  2. 17 CFR 41.14 - Transition period for indexes that cease being narrow-based security indexes.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... provision. An index that is a narrow-based security index that becomes a broad-based security index for no...-five days. An index that is a narrow-based security index that becomes a broad-based security index for...

  3. 17 CFR 41.14 - Transition period for indexes that cease being narrow-based security indexes.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... provision. An index that is a narrow-based security index that becomes a broad-based security index for no...-five days. An index that is a narrow-based security index that becomes a broad-based security index for...

  4. 17 CFR 41.14 - Transition period for indexes that cease being narrow-based security indexes.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... provision. An index that is a narrow-based security index that becomes a broad-based security index for no...-five days. An index that is a narrow-based security index that becomes a broad-based security index for...

  5. 17 CFR 41.14 - Transition period for indexes that cease being narrow-based security indexes.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... day tolerance provision. An index that is a narrow-based security index that becomes a broad-based... than forty-five days. An index that is a narrow-based security index that becomes a broad-based...

  6. 17 CFR 240.3a55-4 - Exclusion from definition of narrow-based security index for indexes composed of debt securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... narrow-based security index for indexes composed of debt securities. 240.3a55-4 Section 240.3a55-4... Miscellaneous Exemptions § 240.3a55-4 Exclusion from definition of narrow-based security index for indexes composed of debt securities. (a) An index is not a narrow-based security index if: (1)(i) Each of the...

  7. 17 CFR 41.13 - Futures contracts on security indexes trading on or subject to the rules of a foreign board of...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Futures contracts on security... Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.13 Futures contracts on security indexes trading on or subject to the rules of a foreign...

  8. 75 FR 77588 - Foreign Futures and Options Contracts on a Non-Narrow-Based Security Index; Commission...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-13

    ...; information and data relating to the index, including the design, computation and maintenance thereof. In... extension is necessary to address complex or novel issues. The information that a foreign board of trade... 45 days if the foreign security index futures contract raises novel or complex issues that require...

  9. 17 CFR 41.13 - Futures contracts on security indexes trading on or subject to the rules of a foreign board of...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Futures contracts on security indexes trading on or subject to the rules of a foreign board of trade. 41.13 Section 41.13 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.13 Futures contracts on...

  10. 17 CFR 41.15 - Exclusion from definition of narrow-based security index for indexes composed of debt securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ..., that is a note, bond, debenture, or evidence of indebtedness; (ii) None of the securities of an issuer... securities that are notes, bonds, debentures, or evidences of indebtedness having a total remaining principal... outstanding securities that are notes, bonds, debentures, or evidences of indebtedness having a total...

  11. 17 CFR 41.15 - Exclusion from definition of narrow-based security index for indexes composed of debt securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... thereunder, that is a note, bond, debenture, or evidence of indebtedness; (ii) None of the securities of an... securities that are notes, bonds, debentures, or evidences of indebtedness having a total remaining principal... outstanding securities that are notes, bonds, debentures, or evidences of indebtedness having a total...

  12. 17 CFR 41.15 - Exclusion from definition of narrow-based security index for indexes composed of debt securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., that is a note, bond, debenture, or evidence of indebtedness; (ii) None of the securities of an issuer... securities that are notes, bonds, debentures, or evidences of indebtedness having a total remaining principal... outstanding securities that are notes, bonds, debentures, or evidences of indebtedness having a total...

  13. 17 CFR 240.3a55-4 - Exclusion from definition of narrow-based security index for indexes composed of debt securities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... respective rules promulgated thereunder, that is a note, bond, debenture, or evidence of indebtedness; (ii... security has outstanding securities that are notes, bonds, debentures, or evidences of indebtedness having... municipal security has outstanding securities that are notes, bonds, debentures, or evidences of...

  14. 17 CFR 240.3a55-4 - Exclusion from definition of narrow-based security index for indexes composed of debt securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... respective rules promulgated thereunder, that is a note, bond, debenture, or evidence of indebtedness; (ii... security has outstanding securities that are notes, bonds, debentures, or evidences of indebtedness having... municipal security has outstanding securities that are notes, bonds, debentures, or evidences of...

  15. 17 CFR 240.3a55-4 - Exclusion from definition of narrow-based security index for indexes composed of debt securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... respective rules promulgated thereunder, that is a note, bond, debenture, or evidence of indebtedness; (ii... security has outstanding securities that are notes, bonds, debentures, or evidences of indebtedness having... municipal security has outstanding securities that are notes, bonds, debentures, or evidences of...

  16. 17 CFR 240.3a55-4 - Exclusion from definition of narrow-based security index for indexes composed of debt securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... respective rules promulgated thereunder, that is a note, bond, debenture, or evidence of indebtedness; (ii... security has outstanding securities that are notes, bonds, debentures, or evidences of indebtedness having... municipal security has outstanding securities that are notes, bonds, debentures, or evidences of...

  17. 17 CFR 41.12 - Indexes underlying futures contracts trading for fewer than 30 days.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... contracts trading for fewer than 30 days. 41.12 Section 41.12 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION (CONTINUED) SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.12 Indexes underlying futures contracts trading for fewer than 30 days. (a) An index on which a contract of...

  18. 17 CFR 41.12 - Indexes underlying futures contracts trading for fewer than 30 days.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... contracts trading for fewer than 30 days. 41.12 Section 41.12 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.12 Indexes underlying futures contracts trading for fewer than 30 days. (a) An index on which a contract of sale for...

  19. 17 CFR 41.12 - Indexes underlying futures contracts trading for fewer than 30 days.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... contracts trading for fewer than 30 days. 41.12 Section 41.12 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.12 Indexes underlying futures contracts trading for fewer than 30 days. (a) An index on which a contract of sale for...

  20. 17 CFR 41.12 - Indexes underlying futures contracts trading for fewer than 30 days.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... contracts trading for fewer than 30 days. 41.12 Section 41.12 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION SECURITY FUTURES PRODUCTS Narrow-Based Security Indexes § 41.12 Indexes underlying futures contracts trading for fewer than 30 days. (a) An index on which a contract of sale for...

  1. Design of the national health security preparedness index.

    PubMed

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  2. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    NASA Astrophysics Data System (ADS)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  3. Resistance and Security Index of Networks: Structural Information Perspective of Network Security.

    PubMed

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-03

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  4. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    PubMed Central

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-01-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks. PMID:27255783

  5. 76 FR 59241 - Foreign Futures and Options Contracts on a Non-Narrow-Based Security Index; Commission...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... controls on trading; information and data relating to the index, including the design, computation and... futures contract raises novel or complex issues that require additional time for review, or if the foreign... composition, computation, or method of selection of component entities of an index referenced and defined in...

  6. An evaluation index system of water security in China based on macroeconomic data from 2000 to 2012

    NASA Astrophysics Data System (ADS)

    Li, X. S.; Peng, Z. Y.; Li, T. T.

    2016-08-01

    This paper establishes an evaluation index system of water security. The index system employs 5 subsystems (water circulation security, water environment security, water ecology security, water society security and water economy security) and has 39 indicators. Using the AHP method, each indicator is given a relative weight to integrate within the whole system. With macroeconomic data from 2000 to 2012, a model of water security evaluation is applied to assess the state of water security in China. The results show an improving trend in the overall state of China's water security. In particular, the cycle of water security is at a high and low fluctuation. Water environment security presents an upward trend on the whole; however, this trend is unsteady and has shown a descending tendency in some years. Yet, water ecology security, water society security, and water economy security are basically on the rise. However, the degree of coordination of China's water security system remains in need of consolidation.

  7. Landscape ecological security assessment based on projection pursuit in Pearl River Delta.

    PubMed

    Gao, Yang; Wu, Zhifeng; Lou, Quansheng; Huang, Huamei; Cheng, Jiong; Chen, Zhangli

    2012-04-01

    Regional landscape ecological security is an important issue for ecological security, and has a great influence on national security and social sustainable development. The Pearl River Delta (PRD) in southern China has experienced rapid economic development and intensive human activities in recent years. This study, based on landscape analysis, provides a method to discover the alteration of character among different landscape types and to understand the landscape ecological security status. Based on remotely sensed products of the Landsat 5 TM images in 1990 and the Landsat 7 ETM+ images in 2005, landscape classification maps of nine cities in the PRD were compiled by implementing Remote Sensing and Geographic Information System technology. Several indices, including aggregation, crush index, landscape shape index, Shannon's diversity index, landscape fragile index, and landscape security adjacent index, were applied to analyze spatial-temporal characteristics of landscape patterns in the PRD. A landscape ecological security index based on these outcomes was calculated by projection pursuit using genetic algorithm. The landscape ecological security of nine cities in the PRD was thus evaluated. The main results of this research are listed as follows: (1) from 1990 to 2005, the aggregation index, crush index, landscape shape index, and Shannon's diversity index of nine cities changed little in the PRD, while the landscape fragile index and landscape security adjacent index changed obviously. The landscape fragile index of nine cities showed a decreasing trend; however, the landscape security adjacent index has been increasing; (2) from 1990 to 2005, landscape ecology of the cities of Zhuhai and Huizhou maintained a good security situation. However, there was a relatively low value of ecological security in the cities of Dongguan and Foshan. Except for Foshan and Guangzhou, whose landscape ecological security situation were slightly improved, the cities had reduced

  8. [Bioequivalence and generics of index drugs with narrow therapeutic margins].

    PubMed

    Le Corre, Pascal

    2010-02-01

    The market share of generic drugs in France is quite low compared to that in other European countries. Because the scientific aspects of bioequivalence that govern the use of generics are sometimes described ambiguously in the literature, they are not always perceived clearly by health professionals. This lack of clarity may be an obstacle to their use. Two drugs are considered bioequivalent if the upper and lower limits of the 90% confidence interval (90% CI) of the generic-to-brand ratio for the area under the curve (AUC) and for the maximum plasma concentration (Cmax) are included in the [-20%, +25%] interval. This interval applies to the 90% CI of the ratios of the AUC (or Cmax) and not directly to the ratio of their values. Hence, it is wrong to consider that there is a -20% to + 25% variation in the AUC (and thus in the bioavailability) between a generic and a brand-name drug. This mistake can sometimes be seen in the medical literature, however, with incorrect extrapolations. The bioequivalence is defined for a generic in relation to a brand-name drug. Consequently, two different generics of the same proprietary drug do not automatically meet the criteria for bioequivalence. Their interchangeability can present problems, especially for drugs with a narrow therapeutic index, that is, those that have a<2-fold difference between the minimum toxic concentration and minimum effective concentration in blood. More restrictive criteria have been proposed for narrow therapeutic index drugs, but there is currently no international consensus on the subject. Determining individual bioequivalence would require modified study protocols to guaranty the interchangeability of the brand-name and generic drugs so that a patient taking one formulation could change to another that would provide the same efficacy and safety. Some antiepileptic drugs have biopharmaceutical and pharmacokinetic properties inducing high levels of intraindividual variability, which can cause problems

  9. Social Security cost-of-living adjustments and the Consumer Price Index.

    PubMed

    Burdick, Clark; Fisher, Lynn

    2007-01-01

    OASDI benefits are indexed for inflation to protect beneficiaries from the loss of purchasing power implied by inflation. In the absence of such indexing, the purchasing power of Social Security benefits would be eroded as rising prices raise the cost of living. By statute, cost-of-living adjustments (COLAs) for Social Security benefits are calculated using the Bureau of Labor Statistics (BLS) Consumer Price Index for Urban Wage Earners and Clerical Workers (CPI-W). Some argue that this index does not accurately reflect the inflation experienced by the elderly population and should be changed to an elderly-specific price index such as the Experimental Consumer Price Index for Americans 62 Years of Age and Older, often referred to as the Consumer Price Index for the Elderly (CPI-E). Others argue that the measure of inflation underlying the COLA is technically biased, causing it to overestimate changes in the cost of living. This argument implies that current COLAs tend to increase, rather than merely maintain, the purchasing power of benefits over time. Potential bias in the CPI as a cost-of-living index arises from a number of sources, including incomplete accounting for the ability of consumers to substitute goods or change purchasing outlets in response to relative price changes. The BLS has constructed a new index called the Chained Consumer Price Index for All Urban Consumers (C-CPI-U) that better accounts for those consumer adjustments. Price indexes are not true cost-of-living indexes, but approximations of cost-of-living indexes (COLI). The Bureau of Labor Statistics (2006a) explains the difference between the two: As it pertains to the CPI, the COLI for the current month is based on the answer to the following question: "What is the cost, at this month ' market prices, of achieving the standard of living actually attained in the base period?" This cost is a hypothetical expenditure-the lowest expenditure level necessary at this month's prices to achieve the

  10. Using the Method of Water Poverty Index (WPI) to Evaluate the Region Water Security

    NASA Astrophysics Data System (ADS)

    Fu, Q.; Kachanoski, G.

    2008-12-01

    Water security is a widely concerned issue in the world nowadays. A new method, water poverty index (WPI), has been used to evaluate the regional water security. Twelve state farms in Heilongjiang Province, Northeastern China were selected to evaluate water security status based on the data of 2006 by using WPI and mean deviation grading method. The method of WPI includes five key indexes, such as resources(R), access (A), capacity(C), utilization (U) and environment (E). Each key index includes several sub-indexes. According to the results of WPI, the grade of each farm has been calculated by using the method of mean deviation grading. Thus, the radar images can be protracted of each farm. From the radar images, the conclusions can be drawn that the WPI values of Farms 853 and Hongqiling were in very safe status, while that of Farm Raohe was in safe status, those of Farms Youyi, 597, 852, 291 and Jiangchuan were in moderate safe status, that of Farm Beixing was in low safe status and those of Farms Shuangyashan, Shuguang and Baoshan were in unsafe status. The results from this study can provide basic information for decision making on rational use of water resources and regulations for regional water safety guarantee system.

  11. The Radio-Loud Narrow-Line Quasar SDSS J172206.03+565451.6

    NASA Astrophysics Data System (ADS)

    Komossa, Stefanie; Voges, Wolfgang; Adorf, Hans-Martin; Xu, Dawei; Mathur, Smita; Anderson, Scott F.

    2006-03-01

    We report identification of the radio-loud narrow-line quasar SDSS J172206.03+565451.6, which we found in the course of a search for radio-loud narrow-line active galactic nuclei (AGNs). SDSS J172206.03+565451.6 is only about the fourth securely identified radio-loud narrow-line quasar and the second-most radio loud, with a radio index R1.4~100-700. Its black hole mass, MBH~=(2-3)×107 Msolar estimated from Hβ line width and 5100 Å luminosity, is unusually small given its radio loudness, and the combination of mass and radio index puts SDSS J172206.03+565451.6 in a scarcely populated region of MBH-R diagrams. SDSS J172206.03+565451.6 is a classical narrow-line Seyfert 1-type object with FWHMHβ~=1490 km s-1, an intensity ratio of [O III]/Hβ~=0.7, and Fe II emission complexes with Fe II λ4570/Hβ~=0.7. The ionization parameter of its narrow-line region, estimated from the line ratio [O II]/[O III], is similar to Seyferts, and its high ratio of [Ne V]/[Ne III] indicates a strong EUV-to-soft X-ray excess. We advertise the combined usage of [O II]/[O III] and [Ne V]/[Ne III] diagrams as a useful diagnostic tool to estimate ionization parameters and to constrain the EUV-soft X-ray continuum shape relatively independently from other parameters.

  12. A novel water poverty index model for evaluation of Chinese regional water security

    NASA Astrophysics Data System (ADS)

    Gong, L.; Jin, C. L.; Li, Y. X.; Zhou, Z. L.

    2017-08-01

    This study proposed an improved Water Poverty Index (WPI) model employed in evaluating Chinese regional water security. Firstly, the Chinese WPI index system was constructed, in which the indicators were obtained according to China River reality. A new mathematical model was then established for WPI values calculation on the basis of Center for Ecology and Hydrology (CEH) model. Furthermore, this new model was applied in Shiyanghe River (located in western China). It turned out that the Chinese index system could clearly reflect the indicators threatening security of river water and the Chinese WPI model is feasible. This work has also developed a Water Security Degree (WSD) standard which is able to be regarded as a scientific basis for further water resources utilization and water security warning mechanism formulation.

  13. Ring resonator based narrow-linewidth semiconductor lasers

    NASA Technical Reports Server (NTRS)

    Ksendzov, Alexander (Inventor)

    2005-01-01

    The present invention is a method and apparatus for using ring resonators to produce narrow linewidth hybrid semiconductor lasers. According to one embodiment of the present invention, the narrow linewidths are produced by combining the semiconductor gain chip with a narrow pass band external feedback element. The semi conductor laser is produced using a ring resonator which, combined with a Bragg grating, acts as the external feedback element. According to another embodiment of the present invention, the proposed integrated optics ring resonator is based on plasma enhanced chemical vapor deposition (PECVD) SiO.sub.2 /SiON/SiO.sub.2 waveguide technology.

  14. Joint space narrowing, body mass index, and knee pain: the ROAD study (OAC1839R1).

    PubMed

    Muraki, S; Akune, T; En-Yo, Y; Yoshida, M; Suzuki, T; Yoshida, H; Ishibashi, H; Tokimura, F; Yamamoto, S; Tanaka, S; Nakamura, K; Kawaguchi, H; Oka, H; Yoshimura, N

    2015-06-01

    The objective of the present study was to clarify the association of joint space narrowing with knee pain in Japanese men and women using a large-scale population-based cohort of the Research on Osteoarthritis/osteoporosis Against Disability (ROAD) study. This study examined the association between minimum joint space width (mJSW) in the medial compartment and pain at the knee. mJSW was measured in the medial and lateral compartments of the knee using a knee osteoarthritis (OA) computer-aided diagnosis system. From the 3040 participants in the ROAD study, the present study analyzed 2733 participants who completed the radiographic examinations and questionnaires regarding knee pain (975 men and 1758 women; mean age, 69.9 ± 11.2 years). Subjects with lateral knee OA were excluded. After adjustment for age and Body mass index (BMI), medial mJSW, as well as medial mJSW/lateral mJSW, was significantly associated with knee pain. Sex and BMI affected the association of medial mJSW with knee pain. The threshold of medial mJSW was approximately 3 mm in men and 2 mm in women, while that of medial mJSW/lateral mJSW was approximately 60% in both men and women. BMI was found to have a distinct effect on the association of mJSW with pain. The present cross-sectional study using a large-scale population from the ROAD study showed that joint space narrowing had a significant association with knee pain. The thresholds of joint space narrowing for knee pain were also established. Copyright © 2015 Osteoarthritis Research Society International. Published by Elsevier Ltd. All rights reserved.

  15. Brief analysis of Jiangsu grid security and stability based on multi-infeed DC index in power system

    NASA Astrophysics Data System (ADS)

    Zhang, Wenjia; Wang, Quanquan; Ge, Yi; Huang, Junhui; Chen, Zhengfang

    2018-02-01

    The impact of Multi-infeed HVDC has gradually increased to security and stability operating in Jiangsu power grid. In this paper, an appraisal method of Multi-infeed HVDC power grid security and stability is raised with Multi-Infeed Effective Short Circuit Ratio, Multi-Infeed Interaction Factor and Commutation Failure Immunity Index. These indices are adopted in security and stability simulating calculation of Jiangsu Multi-infeed HVDC system. The simulation results indicate that Jiangsu power grid is operating with a strong DC system. It has high level of power grid security and stability, and meet the safety running requirements. Jinpin-Suzhou DC system is located in the receiving end with huge capacity, which is easily leading to commutation failure of the transmission line. In order to resolve this problem, dynamic reactive power compensation can be applied in power grid near Jinpin-Suzhou DC system. Simulation result shows this method is feasible to commutation failure.

  16. 75 FR 34429 - Petition of Hard Eight Futures, LLC for Exemptive Relief, Pursuant to Section 4(c) of the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-17

    ... conditions, to trade foreign non- narrow-based security index futures contracts where the foreign exchange... futures on broad-based security indexes; (ii) the securities comprising such an index are principally... the person within ten (10) business days that the claimant does not meet the requirements of the...

  17. How strong is the Social Security safety net? Using the Elder Index to assess gaps in economic security.

    PubMed

    Mutchler, Jan E; Li, Yang; Xu, Ping

    2018-04-16

    Older Americans rely heavily on Social Security benefits (SSBs) to support independent lifestyles, and many have few or no additional sources of income. We establish the extent to which SSBs adequately support economic security, benchmarked by the Elder Economic Security Standard Index. We document variability across U.S. counties in the adequacy levels of SSBs among older adults. We find that the average SSBs fall short of what is required for economic security in every county in the United States, but the level of shortfall varies considerably by location. Policy implications relating to strengthening Social Security and other forms of retirement income are discussed.

  18. An improved bridge safety index for narrow bridges.

    DOT National Transportation Integrated Search

    1983-08-01

    In this report, a new bridge safety index is developed based upon an extensive : statistical study of accident data on 78 bridges. A total of 655 accidents : were recorded at these bridges over the six-year period between 1974 and 1979. : Cluster ana...

  19. [Ecological security early-warning in Zhoushan Islands based on variable weight model].

    PubMed

    Zhou, Bin; Zhong, Lin-sheng; Chen, Tian; Zhou, Rui

    2015-06-01

    Ecological security early warning, as an important content of ecological security research, is of indicating significance in maintaining regional ecological security. Based on driving force, pressure, state, impact and response (D-P-S-I-R) framework model, this paper took Zhoushan Islands in Zhejiang Province as an example to construct the ecological security early warning index system, test degrees of ecological security early warning of Zhoushan Islands from 2000 to 2012 by using the method of variable weight model, and forecast ecological security state of 2013-2018 by Markov prediction method. The results showed that the variable weight model could meet the study needs of ecological security early warning of Zhoushan Islands. There was a fluctuant rising ecological security early warning index from 0.286 to 0.484 in Zhoushan Islands between year 2000 and 2012, in which the security grade turned from "serious alert" into " medium alert" and the indicator light turned from "orange" to "yellow". The degree of ecological security warning was "medium alert" with the light of "yellow" for Zhoushan Islands from 2013 to 2018. These findings could provide a reference for ecological security maintenance of Zhoushan Islands.

  20. Narrow groove plasmonic nano-gratings for surface plasmon resonance sensing

    PubMed Central

    Dhawan, Anuj; Canva, Michael; Vo-Dinh, Tuan

    2011-01-01

    We present a novel surface plasmon resonance (SPR) configuration based on narrow groove (sub-15 nm) plasmonic nano-gratings such that normally incident radiation can be coupled into surface plasmons without the use of prism-coupling based total internal reflection, as in the classical Kretschmann configuration. This eliminates the angular dependence requirements of SPR-based sensing and allows development of robust miniaturized SPR sensors. Simulations based on Rigorous Coupled Wave Analysis (RCWA) were carried out to numerically calculate the reflectance - from different gold and silver nano-grating structures - as a function of the localized refractive index of the media around the SPR nano-gratings as well as the incident radiation wavelength and angle of incidence. Our calculations indicate substantially higher differential reflectance signals, on localized change of refractive index in the narrow groove plasmonic gratings, as compared to those obtained from conventional SPR-based sensing systems. Furthermore, these calculations allow determination of the optimal nano-grating geometric parameters - i. e. nanoline periodicity, spacing between the nanolines, as well as the height of the nanolines in the nano-grating - for highest sensitivity to localized change of refractive index, as would occur due to binding of a biomolecule target to a functionalized nano-grating surface. PMID:21263620

  1. The importance of establishing a national health security preparedness index.

    PubMed

    Lumpkin, John R; Miller, Yoon K; Inglesby, Tom; Links, Jonathan M; Schwartz, Angela T; Slemp, Catherine C; Burhans, Robert L; Blumenstock, James; Khan, Ali S

    2013-03-01

    Natural disasters, infectious disease epidemics, terrorism, and major events like the nuclear incident at Fukushima all pose major potential challenges to public health and security. Events such as the anthrax letters of 2001, Hurricanes Katrina, Irene, and Sandy, severe acute respiratory syndrome (SARS) and West Nile virus outbreaks, and the 2009 H1N1 influenza pandemic have demonstrated that public health, emergency management, and national security efforts are interconnected. These and other events have increased the national resolve and the resources committed to improving the national health security infrastructure. However, as fiscal pressures force federal, state, and local governments to examine spending, there is a growing need to demonstrate both what the investment in public health preparedness has bought and where gaps remain in our nation's health security. To address these needs, the Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (PHPR), is creating an annual measure of health security and preparedness at the national and state levels: the National Health Security Preparedness Index (NHSPI).

  2. Economic Need among Older Latinos: Applying The Elder Economic Security Standard™ Index

    PubMed Central

    Wallace, Steven P.; Padilla-Frausto, D. Imelda; Smith, Susan

    2013-01-01

    The first official U.S. federal poverty line was developed in the 1960s; since the mid-1990s the scientific consensus has been that it has become outdated and inaccurate. This article explains the key elements of the current federal measure that are inaccurate for older adults in general and older Latinos specifically. An alternative is described that addresses the key failings of the current measure. The alternative, the Elder Economic Security Standard™ Index (Elder Index), adapts a national methodology to the basic costs of living in California for 2007 using data from the American Community Survey, and other public data sources. The results show that the amount needed for basic economic security in California is higher than the federal poverty level in all counties, and averages about twice the federal level. Housing costs are the largest component of costs in most counties, although health care is the largest component for couples in lower housing cost counties. Among singles and couples age 65 and over in California, almost 60% of Latinos have incomes below the Elder Index compared to one-quarter of non-Latino whites. The rates are higher among renters, and older Latinos are more likely than non-Latino whites to rent. Applying the Elder Index in California documents the disproportionate rates of economic insecurity among older Latinos. The findings indicate that changes to public programs such as Social Security and Medicare that decrease benefits or increase costs will have disproportionately negative impact on the ability of most older Latinos to pay for basic needs. PMID:23857068

  3. The Narrow-Line Region of Narrow-Line Seyfert 1 Galaxies

    NASA Astrophysics Data System (ADS)

    Rodríguez-Ardila, A.; Binette, Luc; Pastoriza, Miriani G.; Donzelli, Carlos J.

    2000-08-01

    This work studies the optical emission-line properties and physical conditions of the narrow-line region (NLR) of seven narrow-line Seyfert 1 galaxies (NLS1's) for which high signal-to-noise ratio spectroscopic observations were available. The resolution is 340 km s-1 (at Hα) over the wavelength interval 3700-9500 Å, enabling us to separate the broad and narrow components of the permitted emission lines. Our results show that the flux carried out by the narrow component of Hβ is, on average, 50% of the total line flux. As a result, the [O III] λ5007/Hβ ratio emitted in the NLR varies from 1 to 5, instead of the universally adopted value of 10. This has strong implications for the required spectral energy distribution that ionizes the NLR gas. Photoionization models that consider a NLR composed of a combination of matter-bounded and ionization-bounded clouds are successful at explaining the low [O III] λ5007/Hβ ratio and the weakness of low-ionization lines of NLS1's. Variation of the relative proportion of these two type of clouds nicely reproduces the dispersion of narrow-line ratios found among the NLS1 sample. Assuming similar physical model parameters of both NLS1's and the normal Seyfert 1 galaxy NGC 5548, we show that the observed differences of emission-line ratios between these two groups of galaxies can be explained, to a first approximation, in terms of the shape of the input ionizing continuum. Narrow emission-line ratios of NLS1's are better reproduced by a steep power-law continuum in the EUV-soft X-ray region, with spectral index α~-2. Flatter spectral indices (α~-1.5) match the observed line ratios of NGC 5548 but are unable to provide a good match to the NLS1 ratios. This result is consistent with ROSAT observations of NLS1's, which show that these objects are characterized by steeper power-law indices than those of Seyfert 1 galaxies with strong broad optical lines. Based on observations made at CASLEO. Complejo Astronómico El Leoncito

  4. Measuring Poverty for Food Security Analysis: Consumption- Versus Asset-Based Approaches.

    PubMed

    Hjelm, Lisa; Mathiassen, Astrid; Wadhwa, Amit

    2016-06-22

    Poverty and food insecurity are intrinsically linked as poor households often lack the resources required to access sufficient nutritious food to live an active and healthy life. Consumption and expenditure surveys are typically used to identify poor versus nonpoor households but are detailed and costly. Measures of wealth based on asset ownership and housing characteristics can be generated from lighter, less costly surveys. To examine whether indices based on asset ownership and housing characteristics (stock) complement household consumption (flow) when used to analyze inequalities in food security outcomes. Comprehensive data from Nepal, Malawi, Tanzania, Uganda, and Madagascar are used to examine correlations and overlaps in classification between indices of household wealth and consumption per capita. Inequality in food security indicators representing quantity, quality, and vulnerability is examined across wealth and consumption per capita quintiles. Wealth indices are correlated with consumption per capita, with coefficients between 0.5 and 0.6. The prevalence of food insecurity decreases from poorer to wealthier quintiles for all variables and for all food security measures in all countries. Energy deficiency varies much more across consumption quintiles than wealth index quintiles. Interestingly, inequalities in the share of consumption of food are more pronounced across the wealth index quintiles than per capita consumption. Although wealth indices and consumption per capita are related and both are drivers of food security, they cannot be used interchangeably for food security analysis. Each inequality measure is important for describing different aspects of food security. © The Author(s) 2016.

  5. Bandwidth-narrowed Bragg gratings inscribed in double-cladding fiber by femtosecond laser.

    PubMed

    Shi, Jiawei; Li, Yuhua; Liu, Shuhui; Wang, Haiyan; Liu, Ningliang; Lu, Peixiang

    2011-01-31

    Bragg gratings with the bandwidth(FWHM) narrowed up to 79 pm were inscribed in double-cladding fiber with femtosecond radiation and a phase mask followed by an annealing treatment. With the annealing temperature below a critical value, the bandwidth of Bragg gratings induced by Type I-IR and Type II-IR index change was narrowed without the reduction of reflectivity. The bandwidth narrowing is due to the profile transformation of the refractive index modulation caused by the annealing treatment. This mechanism was verified by comparing bandwidth narrowing processes of FBGs written with different power densities.

  6. A secure data outsourcing scheme based on Asmuth-Bloom secret sharing

    NASA Astrophysics Data System (ADS)

    Idris Muhammad, Yusuf; Kaiiali, Mustafa; Habbal, Adib; Wazan, A. S.; Sani Ilyasu, Auwal

    2016-11-01

    Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users' queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients' data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth-Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing.

  7. Assessment of ecological security based on soil and water conservation: a case study from Gansu Province, China

    NASA Astrophysics Data System (ADS)

    Li, Z. J.; Tian, Q.; Song, L. L.

    2016-08-01

    In this study, the analytic hierarchy process (ahp), ecological security index(S) and PSR model were used to evaluate Gansu's ecological security based on the large number of survey data. The results indicated that Gansu's ecological security index increased from 0.31 in 1986 to 0.66 in 2013, which reflected ecological security was in sensitive state (0.7༞S≥⃒0.5). The main reason was that national policy on protecting the ecological environment has played a crucial role, especially the national project of returning farmland to forest and grass carried out in recent years. Moreover, the environmental issues such as the higher PM2.5, sand storms and climate extremes, had significantly improved people's environmental awareness in the study area. The regional difference of ecological security index was significant in Gansu Provinces, and the part of Yangtze river basin was higher than the part of Yellow River basin, whiles the in-land river basin was the lowest value. In a world, Gansu's ecological security had improved in recent years, but there was strong need for paying more attention to policy for ecological environment protection and increasing the propaganda to ensure the Gansu's ecological security in the future. This study will provide a scientific basis for the sustainable development of regional social economy and ecological environment.

  8. Water security evaluation in Yellow River basin

    NASA Astrophysics Data System (ADS)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  9. Associations between narrow angle and adult anthropometry: the Liwan Eye Study.

    PubMed

    Jiang, Yuzhen; He, Mingguang; Friedman, David S; Khawaja, Anthony P; Lee, Pak Sang; Nolan, Winifred P; Yin, Qiuxia; Foster, Paul J

    2014-06-01

    To assess the associations between narrow angle and adult anthropometry. Chinese adults aged 50 years and older were recruited from a population-based survey in the Liwan District of Guangzhou, China. Narrow angle was defined as the posterior trabecular meshwork not visible under static gonioscopy in at least three quadrants (i.e. a circumference of at least 270°). Logistic regression models were used to examine the associations between narrow angle and anthropomorphic measures (height, weight and body mass index, BMI). Among the 912 participants, lower weight, shorter height, and lower BMI were significantly associated with narrower angle width (tests for trend: mean angle width in degrees vs weight p < 0.001; vs height p < 0.001; vs BMI p = 0.012). In univariate analyses, shorter height, lower weight and lower BMI were all significantly associated with greater odds of narrow angle. The crude association between height and narrow angle was largely attributable to a stronger association with age and sex. Lower BMI and weight remained significantly associated with narrow angle after adjustment for height, age, sex, axial ocular biometric measures and education. In analyses stratified by sex, the association between BMI and narrow angle was only observed in women. Lower BMI and weight were associated with significantly greater odds of narrow angle after adjusting for age, education, axial ocular biometric measures and height. The odds of narrow angle increased 7% per 1 unit decrease in BMI. This association was most evident in women.

  10. [Delineation of ecological security pattern based on ecological network].

    PubMed

    Fu, Qiang; Gu, Chao Lin

    2017-03-18

    Ecological network can be used to describe and assess the relationship between spatial organization of landscapes and species survival under the condition of the habitat fragmentation. Taking Qingdao City as the research area, woodland and wetland ecological networks in 2005 were simulated based on least cost path method, and the ecological networks were classified by their corridors' cumulative cost value. We made importance distinction of ecological network structure elements such as patches and corridors using betweenness centrality index and correlation length-percentage of importance of omitted patches index, and then created the structure system of ecological network. Considering the effects brought by the newly-added construction land from 2005 to 2013, we proposed the ecological security pattern for construction land change of Qingdao City. The results showed that based on ecological network framework, graph theory based methods could be used to quantify both attributes of specific ecological land (e.g., the area of an ecological network patch) and functional connection between ecological lands. Between 2005 and 2013, large area of wetlands had been destroyed by newly-added construction land, while the role of specific woodland and wetland played in the connection of the whole network had not been considered. The delineation of ecological security pattern based on ecological network could optimize regional ecological basis, provide accurate spatial explicit decision for ecological conservation and restoration, and meanwhile provide scientific and reasonable space guidance for urban spatial expansion.

  11. Illegal "no prescription" internet access to narrow therapeutic index drugs.

    PubMed

    Liang, Bryan A; Mackey, Tim K; Lovett, Kimberly M

    2013-05-01

    Narrow therapeutic index (NTI) drugs, because of proximity of therapeutic amounts to toxic amounts, require close professional oversight, particularly when switching formulations. However, safe use may be compromised by unsupervised switching through access to online "no prescription" Web sites. We assessed no prescription online availability of NTI drugs, using an academically published list (core NTI drugs). Using the Google search term "buy DRUG no prescription," we reviewed the first 5 search result pages for marketing of no prescription NTI drugs. We further assessed if National Association of Boards of Pharmacy (NABP) Not Recommended vendors were marketing NTI drugs. Searches were conducted from November 3, 2012 to January 3, 2013. For core NTI drugs, we found 13 of 14 NTI drugs (92%) marketed as available without prescription, all from NABP Not Recommended vendors. On the basis of these initial findings, we expanded our core list to 12 additional NTI drugs; 11 of 12 of these drugs (92%) were available from no prescription Web sites. Overall, 24 of 26 NTI drugs (92%) were illegally marketed as available online without the need for a prescription. Suspect online NTI drug access from no prescription vendors represents a significant patient safety risk because of potential patient drug switching and risk of counterfeit versions. Further, state health care exchanges with coverage limitations may drive patients to seek formulations online. Food and Drug Administration harmonization with tighter international NTI drug standards should be considered, and aggressive action against suspect online marketers should be a regulatory and public health priority. Copyright © 2013 Elsevier HS Journals, Inc. All rights reserved.

  12. The Co-Influence of the Natural, Built, and Linguistic Landscape: Indexing Security

    ERIC Educational Resources Information Center

    Vickers, Caroline H.; Lindfelt, Christopher; Greer, Marsha

    2015-01-01

    This study examines physical aspects of place and how such visible aspects work to index a discourse of insecurity, including an insider-outsider binary, particularly through security signs in the linguistic landscape (LL). Our main focus is the relationship between policy and the uses of written language that appear in the LL in different census…

  13. Tablet splitting of narrow therapeutic index drugs: a nationwide survey in Taiwan.

    PubMed

    Chou, Chia-Lin; Hsu, Chia-Chen; Chou, Chia-Yu; Chen, Tzeng-Ji; Chou, Li-Fang; Chou, Yueh-Ching

    2015-12-01

    Tablet splitting or pill splitting frequently occurs in daily medical practice. For drugs with special pharmacokinetic characters, such as drugs with narrow therapeutic index (NTI), unequal split tablets might lead to erroneous dose titration and it even cause toxicity. The aim of this study was to investigate the frequency of prescribing split NTI drugs at ambulatory setting in Taiwan. A population-based retrospective study was conducted using the National Health Insurance Research Database in Taiwan. All ambulatory visits were analyzed from the longitudinal cohort datasets of the National Health Insurance Research Database. The details of ambulatory prescriptions containing NTI drugs were extracted by using the claims datasets of one million beneficiaries from National Healthcare Insurance Research Database in 2010 in Taiwan. The analyses were stratified by dosage form, patient age and the number of prescribed tablets in a single dose for each NTI drugs. Main outcome measures Number and distinct dosage forms of available NTI drug items in Taiwan, number of prescriptions involved split NTI drugs, and number of patients received split NTI drugs. A total of 148,548 patients had received 512,398 prescriptions of NTI drugs and 41.8 % (n = 62,121) of patients had received 36.3 % (n = 185,936) of NTI drug prescriptions in form of split tablets. The percentage of splitting was highest in digoxin prescriptions (81.0 %), followed by warfarin (72.0 %). In the elderly patients, split tablets were very prevalent with digoxin (82.4 %) and warfarin (84.5 %). NTI drugs were frequently prescribed to be taken in split forms in Taiwan. Interventions may be needed to provide effective and convenient NTI drug use. Further studies are needed to evaluate the clinical outcome of inappropriate split NTI drugs.

  14. Facile Atmospheric Pressure Synthesis of High Thermal Stability and Narrow-Band Red-Emitting SrLiAl3N4:Eu(2+) Phosphor for High Color Rendering Index White Light-Emitting Diodes.

    PubMed

    Zhang, Xuejie; Tsai, Yi-Ting; Wu, Shin-Mou; Lin, Yin-Chih; Lee, Jyh-Fu; Sheu, Hwo-Shuenn; Cheng, Bing-Ming; Liu, Ru-Shi

    2016-08-03

    Red phosphors (e.g., SrLiAl3N4:Eu(2+)) with high thermal stability and narrow-band properties are urgently explored to meet the next-generation high-power white light-emitting diodes (LEDs). However, to date, synthesis of such phosphors remains an arduous task. Herein, we report, for the first time, a facile method to synthesize SrLiAl3N4:Eu(2+) through Sr3N2, Li3N, Al, and EuN under atmospheric pressure. The as-synthesized narrow-band red-emitting phosphor exhibits excellent thermal stability, including small chromaticity shift and low thermal quenching. Intriguingly, the title phosphor shows an anomalous increase in theoretical lumen equivalent with the increase of temperature as a result of blue shift and band broadening of the emission band, which is crucial for high-power white LEDs. Utilizing the title phosphor, commercial YAG:Ce(3+), and InGaN-based blue LED chip, a proof-of-concept warm white LEDs with a color rendering index (CRI) of 91.1 and R9 = 68 is achieved. Therefore, our results highlight that this method, which is based on atmospheric pressure synthesis, may open a new means to explore narrow-band-emitting nitride phosphor. In addition, the underlying requirements to design Eu(2+)-doped narrow-band-emitting phosphors were also summarized.

  15. Trunk, head, and step characteristics during normal and narrow-based walking under deteriorated sensory conditions.

    PubMed

    Deshpande, Nandini; Zhang, Fang

    2014-01-01

    The ability to maintain stability in the frontal plane (medialateral direction) while walking is commonly included as a component of motor performance assessment. Postural control in the frontal plane may deteriorate faster and earlier with increasing age, compared to that in the sagittal plane (anteroposterior direction). Fifteen young (20-30 years old) and 15 older (>65 years old) healthy participants were recruited to investigate age-related differences in postural control during the normal and narrow-based walking when performed under suboptimal vestibular and lower limb somatosensory conditions achieved by galvanic stimulation and compliant surfaces, respectively. Gait speed decreased in the narrow-based walking condition, with larger decrease in the elderly (by 6%). In the elderly head roll increased with perturbed vestibular information in impaired somatosensory condition (by 40.70%). In both age groups trunk roll increased under impaired somatosensation in the narrow-based walking condition (by 43.62%) but not in normal walking condition. Older participants adopted a more cautious strategy characterized by lower walking speed when walking on a narrow base and exhibited deteriorated integrative ability of the CNS for head control. Accurate lower limb somatosensation may play a critical role in narrow-based walking.

  16. Associations between Narrow Angle and Adult Anthropometry: The Liwan Eye Study

    PubMed Central

    Jiang, Yuzhen; He, Mingguang; Friedman, David S.; Khawaja, Anthony P.; Lee, Pak Sang; Nolan, Winifred P.; Yin, Qiuxia; Foster, Paul J.

    2015-01-01

    Purpose To assess the associations between narrow angle and adult anthropometry. Methods Chinese adults aged 50 years and older were recruited from a population-based survey in the Liwan District of Guangzhou, China. Narrow angle was defined as the posterior trabecular meshwork not visible under static gonioscopy in at least three quadrants (i.e. a circumference of at least 270°). Logistic regression models were used to examine the associations between narrow angle and anthropomorphic measures (height, weight and body mass index, BMI). Results Among the 912 participants, lower weight, shorter height, and lower BMI were significantly associated with narrower angle width (tests for trend: mean angle width in degrees vs weight p<0.001; vs height p<0.001; vs BMI p = 0.012). In univariate analyses, shorter height, lower weight and lower BMI were all significantly associated with greater odds of narrow angle. The crude association between height and narrow angle was largely attributable to a stronger association with age and sex. Lower BMI and weight remained significantly associated with narrow angle after adjustment for height, age, sex, axial ocular biometric measures and education. In analyses stratified by sex, the association between BMI and narrow angle was only observed in women. Conclusion Lower BMI and weight were associated with significantly greater odds of narrow angle after adjusting for age, education, axial ocular biometric measures and height. The odds of narrow angle increased 7% per 1 unit decrease in BMI. This association was most evident in women. PMID:24707840

  17. Optofluidic refractive-index sensor in step-index fiber with parallel hollow micro-channel.

    PubMed

    Lee, H W; Schmidt, M A; Uebel, P; Tyagi, H; Joly, N Y; Scharrer, M; Russell, P St J

    2011-04-25

    We present a simple refractive index sensor based on a step-index fiber with a hollow micro-channel running parallel to its core. This channel becomes waveguiding when filled with a liquid of index greater than silica, causing sharp dips to appear in the transmission spectrum at wavelengths where the glass-core mode phase-matches to a mode of the liquid-core. The sensitivity of the dip-wavelengths to changes in liquid refractive index is quantified and the results used to study the dynamic flow characteristics of fluids in narrow channels. Potential applications of this fiber microstructure include measuring the optical properties of liquids, refractive index sensing, biophotonics and studies of fluid dynamics on the nanoscale.

  18. 17 CFR Appendix D to Part 30 - Information That a Foreign Board of Trade Should Submit When Seeking No-Action Relief To Offer...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... COMMISSION FOREIGN FUTURES AND FOREIGN OPTIONS TRANSACTIONS Pt. 30, App. D Appendix D to Part 30—Information... trading of futures contracts on a group or index of securities on contract markets and derivatives... United States, a Futures Contract on a Foreign Non-Narrow-Based Security Index Traded on That Foreign...

  19. SME Worker Affective (SWA) index based on environmental ergonomics

    NASA Astrophysics Data System (ADS)

    Ushada, M.; Kusuma Aji, G.; Okayama, T.; Khidir, M.

    2018-04-01

    Small-Medium sized (SME) is a focal type of Indonesian industry which contributes to national emerging economies. Indonesian goverment has developed employee social security system (BPJS Ketenagakerjaan) to support worker quality of life. However, there were limited research which could assist BPJS Ketenagakerjaan in evaluating worker quality of life. Worker quality of life could be categorized as the highest worker needs or affective states. SME Worker Affective (SWA) index is being concerned as a basic tool to make balance between worker performance and quality of life in workstation of SMEs. The research objectives are: 1) To optimize the environmental ergonomics in SMEs; 2) To quantify SME Worker Affective (SWA) index based on optimized environmental ergonomics. The research advantage is to support Indonesian goverment in monitoring SMEs good practices to its worker quality of life. Simulated annealing optimized the heart rate and environmental ergonomics parameters. SWA index was determined based on comparison between optimized heart rate and environmental ergonomics parameters. SWA index were quantified for 380 data of worker. The evaluation indicated 51.3% worker in affective and 48.7% in non-affective condition. Research results indicated that stakeholders of SMEs should put more attention on environmental ergonomics and worker affective.

  20. Parental attachment style: examination of links with parent secure base provision and adolescent secure base use.

    PubMed

    Jones, Jason D; Cassidy, Jude

    2014-01-01

    The secure base construct represents one of attachment theory's most important contributions to our understanding of parent-child relationships and child development. The present study represents the first examination of how parents' self-reported attachment styles relate to parental secure base provision and adolescent (mean age = 16.6 years, SE = .59) secure base use during an observed parent-adolescent interaction. Further, the present study is the first to examine how fathers', as well as mothers', attachment styles relate to observed behavior in a parent-child interaction. At the bivariate level, maternal avoidance, but not anxiety, was negatively associated with observed adolescent secure base use. In addition, path analysis revealed that maternal avoidance was indirectly related to less adolescent secure base use through mothers' self-reported hostile behavior toward their adolescents and through adolescents' less positive perceptions of their mothers. Further, paternal anxiety, but not avoidance, was indirectly related to less adolescent secure base use through fathers' self-reported hostile behavior toward their adolescents. No significant findings emerged in relation to parental secure base provision. We discuss these results in the context of attachment theory and suggest directions for future research.

  1. High power narrow-band fiber-based ASE source.

    PubMed

    Schmidt, O; Rekas, M; Wirth, C; Rothhardt, J; Rhein, S; Kliner, A; Strecker, M; Schreiber, T; Limpert, J; Eberhardt, R; Tünnermann, A

    2011-02-28

    In this paper we describe a high power narrow-band amplified spontaneous emission (ASE) light source at 1030 nm center wavelength generated in an Yb-doped fiber-based experimental setup. By cutting a small region out of a broadband ASE spectrum using two fiber Bragg gratings a strongly constrained bandwidth of 12±2 pm (3.5±0.6 GHz) is formed. A two-stage high power fiber amplifier system is used to boost the output power up to 697 W with a measured beam quality of M2≤1.34. In an additional experiment we demonstrate a stimulated Brillouin scattering (SBS) suppression of at least 17 dB (theoretically predicted ~20 dB), which is only limited by the dynamic range of the measurement and not by the onset of SBS when using the described light source. The presented narrow-band ASE source could be of great interest for brightness scaling applications by beam combination, where SBS is known as a limiting factor.

  2. Global Food Security Index Studies and Satellite Information

    NASA Astrophysics Data System (ADS)

    Medina, T. A.; Ganti-Agrawal, S.; Joshi, D.; Lakhankar, T.

    2017-12-01

    Food yield is equal to the total crop harvest per unit cultivated area. During the elapsed time of germination and frequent harvesting, both human and climate related effects determine a country's' contribution towards global food security. Each country across the globe's annual income per capita was collected to then determine nine countries for further studies. For a location to be chosen, its income per capita needed to be considered poor, uprising or wealthy. Both physical land cover and regional climate helped categorize potential parameters thought to be studied. Once selected, Normalized Difference Vegetation Index (NDVI) data was collected for Ethiopia, Liberia, Indonesia, United States, Norway, Russia, Kuwait and Saudi Arabia over the recent 16 years for approximately every 16 days starting from early in the year 2000. Software languages such as Geographic Information System (GIS), MatLab and Excel were used to determine how population size, income and deforestation directly determines agricultural yields. Because of high maintenance requirements for large harvests when forest areas are cleared, they often have a reduction in soil quality, requiring fertilizer use to produce sufficient crop yields. Total area and vegetation index of each country is to be studied, to determine crop and deforestation percentages. To determine how deforestation impacts future income and crop yield predictions of each country studied. By using NDVI results a parameter is to be potentially found that will help define an index, to create an equation that will determine a country's annual income and ability to provide for their families and themselves.

  3. Parental Attachment Style: Examination of Links with Parent Secure Base Provision and Adolescent Secure Base Use

    PubMed Central

    Jones, Jason D.; Cassidy, Jude

    2014-01-01

    The secure base construct is a core aspect of attachment theory and, according to Bowlby (1988), represents one of attachment theory’s most important contributions to our understanding of parent-child relationships and child development. The present study represents the first examination of how parents’ self-reported attachment styles relate to parental secure base provision and adolescent (Mage = 16.6 years, SE = .59) secure base use during an observed parent-adolescent interaction. Further, the present study is the first to examine how fathers’, as well as mothers’, attachment styles relate to observed behavior in a parent-child interaction. At the bivariate level, maternal avoidance, but not anxiety, was negatively associated with observed adolescent secure base use. In addition, path analysis revealed that maternal avoidance was indirectly related to less adolescent secure base use through mothers’ self-reported hostile behavior toward their adolescents and through adolescents’ less positive perceptions of their mothers. Further, paternal anxiety, but not avoidance, was indirectly related to less adolescent secure base use through fathers’ self-reported hostile behavior toward their adolescents. No significant findings emerged in relation to parental secure base provision. We discuss these results in the context of attachment theory and suggest directions for future research. PMID:24897927

  4. Motivations for Providing a Secure Base: Links with Attachment Orientation and Secure Base Support Behavior

    PubMed Central

    Feeney, Brooke C.; Collins, Nancy L.; Van Vleet, Meredith; Tomlinson, Jennifer

    2015-01-01

    This investigation examined the importance of underlying motivations in predicting secure base support behavior, as well as the extent to which support motivations are predicted by individual differences in attachment orientation. Participants were 189 married couples who participated in two laboratory sessions: During a questionnaire session, couples completed assessments of their underlying motivations for providing, and for not providing, support for their partner's exploration (i.e., goal-strivings), as well as assessments of their typical secure base support behavior. In an observational session, couples engaged in a discussion of one member's personal goals, during which the partner's secure base support was assessed. Results revealed a variety of distinct motivations for providing, and for not providing, secure base support to one's partner, as well as theoretically expected links between these motivations and both secure base behavior and attachment orientation. This work establishes motivations as important mechanisms that underlie the effective or ineffective provision of relational support. PMID:23581972

  5. Temporal and Spatial Distribution of Ecological Security in Arid Region Based on GIS: A Case Study in Xinjiang

    NASA Astrophysics Data System (ADS)

    Zhang, Q.; Song, W.; Yang, J.

    2017-12-01

    Ecological security is close related to the people's survival and development. In the context of the global warming, with the increasingly frequent human activities, ecological and environmental problems have become increasingly prominent. Ecological security has aroused widespread concern, especially in the arid region. It has an important role in national security as well as political security, military security, economic security, social security. Taken Xinjiang as the research area, which is a typical arid region in China, this study establishes an ecological safety assessment indicator system from perspective of the generic process and the formation mechanism of the ecosystem. The framework is based on natural resources dimensions, natural environment dimensions and human disturbance dimensions. Water is the restrictive factor for the development of arid region, so the water resources carrying capacity is the main natural resource of the study area. The natural environment includes SPI(standardized precipitation index), dryness index, landscape vulnerability, NDVI. Human disturbance includes urbanization rate, population density, afforestation area, per capita GDP, water-saving irrigation area, fertilizer and pesticide application, agriculture Mechanical power, energy consumption. The expert scoring method and the coefficient of variation method are used to determine the weight of each indicator, and finally a comprehensive index is constructed to evaluate the ecological security of Xinjiang, that is, the ecological security index. The results indicate that the ecological security of Xinjiang is 0.43, which is in the critical area. The ecological security of Hami, Turpan and Karamay is the lowest, and the ecological security of the Arabian and Yili is the highest. The ecological security of the south in the Xinjiang is higher than that in the north. In short, ecological environment of Xinjiang is in a sensitive period. Effective ecological protection policy

  6. Equivalence and interchangeability of narrow therapeutic index drugs in organ transplantation

    PubMed Central

    Johnston, Atholl

    2013-01-01

    The calcineurin inhibitors (CNIs), ciclosporin and tacrolimus, are the mainstay of immunosuppression in solid organ transplantation. Generic formulations of these drugs are now available. With increasing pressure on healthcare budgets and the consequent need to match health expectations to available resources, substitution with a generic product appears an attractive option to reduce costs. Approval of generic products differs from innovator drugs, and narrow therapeutic index drugs (NTIs; including CNIs) bring their own particular considerations. With NTIs, small variations in drug exposure could result in reduced immunosuppression or drug toxicity with potentially adverse effects on patient outcomes. NTIs are subject to stricter regulatory approval versus many other generic drugs. However, different generic formulations may still not necessarily be therapeutically equivalent in individuals, raising the possibility of significant differences in exposure between products. Although regional recommendations vary, many guidelines emphasise the need for NTI drug substitution to be initiated by the transplant physician, thus ensuring careful therapeutic monitoring and reduced negative patient impact. The need for therapeutic monitoring during generic substitution has important implications for the overall costs of generic treatment as these costs have to be factored in to the potential savings made from using generic formulations. The reduced acquisition costs of generic products may not necessarily translate into lower overall healthcare costs. This article examines the issue of equivalence and interchangeability of NTI drugs used in organ transplantation, the implications of the approval process for generic drugs on treatment efficacy and safety, and the effective management of substitutions between products. PMID:24089632

  7. 76 FR 46668 - Business Conduct Standards for Security-Based Swap Dealers and Major Security-Based Swap...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-03

    ... SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 [Release No. 34-64766; File No. S7-25-11] RIN 3235-AL10 Business Conduct Standards for Security-Based Swap Dealers and Major Security-Based Swap Participants Correction In proposed rule document number 2011-16758, appearing on pages 42396-42455 in the...

  8. An analysis of Indonesia’s information security index: a case study in a public university

    NASA Astrophysics Data System (ADS)

    Yustanti, W.; Qoiriah, A.; Bisma, R.; Prihanto, A.

    2018-01-01

    Ministry of Communication and Informatics of the Republic of Indonesia has issued the regulation number 4-2016 about Information Security Management System (ISMS) for all kind organizations. Public university as a government institution must apply this standard to assure its level of information security has complied ISO 27001:2013. This research is a preliminary study to evaluate the readiness of university IT services (case study in a public university) meets the requirement of ISO 27001:2013 using the Indonesia’s Information Security Index (IISI). There are six parameters used to measure the level of information security, these are the ICT role, governance, risk management, framework, asset management and technology. Each parameter consists of serial questions which must be answered and convert to a numeric value. The result shows the level of readiness and maturity to apply ISO 27001 standard.

  9. Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

    PubMed Central

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C.-W.

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions. PMID:25207333

  10. Efficient and provable secure pairing-free security-mediated identity-based identification schemes.

    PubMed

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  11. New methods for indexing multi-lattice diffraction data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gildea, Richard J.; Waterman, David G.; CCP4, Research Complex at Harwell, Rutherford Appleton Laboratory, Didcot OX11 0FA

    2014-10-01

    A new indexing method is presented which is capable of indexing multiple crystal lattices from narrow wedges of data. The efficacy of this method is demonstrated with both semi-synthetic multi-lattice data and real multi-lattice data recorded from microcrystals of ∼1 µm in size. A new indexing method is presented which is capable of indexing multiple crystal lattices from narrow wedges of diffraction data. The method takes advantage of a simplification of Fourier transform-based methods that is applicable when the unit-cell dimensions are known a priori. The efficacy of this method is demonstrated with both semi-synthetic multi-lattice data and real multi-latticemore » data recorded from crystals of ∼1 µm in size, where it is shown that up to six lattices can be successfully indexed and subsequently integrated from a 1° wedge of data. Analysis is presented which shows that improvements in data-quality indicators can be obtained through accurate identification and rejection of overlapping reflections prior to scaling.« less

  12. Privacy preserving index for encrypted electronic medical records.

    PubMed

    Chen, Yu-Chi; Horng, Gwoboa; Lin, Yi-Jheng; Chen, Kuo-Chang

    2013-12-01

    With the development of electronic systems, privacy has become an important security issue in real-life. In medical systems, privacy of patients' electronic medical records (EMRs) must be fully protected. However, to combine the efficiency and privacy, privacy preserving index is introduced to preserve the privacy, where the EMR can be efficiently accessed by this patient or specific doctor. In the literature, Goh first proposed a secure index scheme with keyword search over encrypted data based on a well-known primitive, Bloom filter. In this paper, we propose a new privacy preserving index scheme, called position index (P-index), with keyword search over the encrypted data. The proposed index scheme is semantically secure against the adaptive chosen keyword attack, and it also provides flexible space, lower false positive rate, and search privacy. Moreover, it does not rely on pairing, a complicate computation, and thus can search over encrypted electronic medical records from the cloud server efficiently.

  13. Rationale and Development of a Security Assurance Index with Application toward the Development of a World Risk Index

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    M. M. Plum; G. A. Beitel, PhD

    Assurance categories were previously developed to support the Department of Homeland Security’s efforts in the mitigation of Cyber Control System events. Defined according to the risk of life and economic loss, the minimum range is designated by policy, whereas the maximum limit seems to be constrained only by limits and interdependencies of the event. Use of this life / assets scale has proven to be helpful in managing risk due to the scale's ease of use, communication, and understanding. Suggestions have been made that this scale could be applied to all events of terror, disaster, and calamity of an internationalmore » scale, with equally good results. This paper presents the history of some existing scales of disaster and assurance, the rationale behind the development of the original Security Assurance Index, and our proposed scale of disaster and calamity as a World Risk Index.« less

  14. Refractive Index Sensor Based on Fano Resonances in Metal-Insulator-Metal Waveguides Coupled with Resonators.

    PubMed

    Tang, Yue; Zhang, Zhidong; Wang, Ruibing; Hai, Zhenyin; Xue, Chenyang; Zhang, Wendong; Yan, Shubin

    2017-04-06

    A surface plasmon polariton refractive index sensor based on Fano resonances in metal-insulator-metal (MIM) waveguides coupled with rectangular and ring resonators is proposed and numerically investigated using a finite element method. Fano resonances are observed in the transmission spectra, which result from the coupling between the narrow-band spectral response in the ring resonator and the broadband spectral response in the rectangular resonator. Results are analyzed using coupled-mode theory based on transmission line theory. The coupled mode theory is employed to explain the Fano resonance effect, and the analytical result is in good agreement with the simulation result. The results show that with an increase in the refractive index of the fill dielectric material in the slot of the system, the Fano resonance peak exhibits a remarkable red shift, and the highest value of sensitivity (S) is 1125 nm/RIU, RIU means refractive index unit. Furthermore, the coupled MIM waveguide structure can be integrated with other photonic devices at the chip scale. The results can provide a guide for future applications of this structure.

  15. Security for Web-Based Tests.

    ERIC Educational Resources Information Center

    Shermis, Mark D.; Averitt, Jason

    The purpose of this paper is to enumerate a series of security steps that might be taken by those researchers or organizations that are contemplating Web-based tests and performance assessments. From a security viewpoint, much of what goes on with Web-based transactions is similar to other general computer activity, but the recommendations here…

  16. 76 FR 27673 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-12

    ... futures on individual stocks or on narrow-based stock indexes (collectively, ``security futures products....\\2\\ \\1\\ These matters are higher margin levels, fraud or manipulation, recordkeeping, reporting...

  17. A Secure Base in Adolescence: Markers of Attachment Security in the Mother–Adolescent Relationship

    PubMed Central

    Allen, Joseph P.; McElhaney, Kathleen Boykin; Land, Deborah J.; Kuperminc, Gabriel P.; Moore, Cynthia W.; O’Beirne-Kelly, Heather; Kilmer, Sarah Liebman

    2017-01-01

    This study sought to identify ways in which adolescent attachment security, as assessed via the Adult Attachment Interview, is manifest in qualities of the secure base provided by the mother–adolescent relationship. Assessments included data coded from mother–adolescent interactions, test-based data, and adolescent self-reports obtained from an ethnically and socioeconomically diverse sample of moderately at-risk 9th and 10th graders. This study found several robust markers of adolescent attachment security in the mother–adolescent relationship. Each of these markers was found to contribute unique variance to explaining adolescent security, and in combination, they accounted for as much as 40% of the raw variance in adolescent security. These findings suggest that security is closely connected to the workings of the mother–adolescent relationship via a secure-base phenomenon, in which the teen can explore independence in thought and speech from the secure base of a maternal relationship characterized by maternal attunement to the adolescent and maternal supportiveness. PMID:12625451

  18. Thermal refraction focusing in planar index-antiguided lasers.

    PubMed

    Casperson, Lee W; Dittli, Adam; Her, Tsing-Hua

    2013-03-15

    Thermal refraction focusing in planar index-antiguided lasers is investigated both theoretically and experimentally. An analytical model based on zero-field approximation is presented for treating the combined effects of index antiguiding and thermal focusing. At very low pumping power, the mode is antiguided by the amplifier boundary, whereas at high pumping power it narrows due to thermal focusing. Theoretical results are in reasonable agreement with experimental data.

  19. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.

    PubMed

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-09-25

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  20. 17 CFR 240.3a55-3 - Futures contracts on security indexes trading on or subject to the rules of a foreign board of...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Futures contracts on security indexes trading on or subject to the rules of a foreign board of trade. 240.3a55-3 Section 240.3a55-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...

  1. 17 CFR 240.3a55-3 - Futures contracts on security indexes trading on or subject to the rules of a foreign board of...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Futures contracts on security indexes trading on or subject to the rules of a foreign board of trade. 240.3a55-3 Section 240.3a55-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...

  2. Computer-Based Radiographic Quantification of Joint Space Narrowing Progression Using Sequential Hand Radiographs: Validation Study in Rheumatoid Arthritis Patients from Multiple Institutions.

    PubMed

    Ichikawa, Shota; Kamishima, Tamotsu; Sutherland, Kenneth; Fukae, Jun; Katayama, Kou; Aoki, Yuko; Okubo, Takanobu; Okino, Taichi; Kaneda, Takahiko; Takagi, Satoshi; Tanimura, Kazuhide

    2017-10-01

    We have developed a refined computer-based method to detect joint space narrowing (JSN) progression with the joint space narrowing progression index (JSNPI) by superimposing sequential hand radiographs. The purpose of this study is to assess the validity of a computer-based method using images obtained from multiple institutions in rheumatoid arthritis (RA) patients. Sequential hand radiographs of 42 patients (37 females and 5 males) with RA from two institutions were analyzed by a computer-based method and visual scoring systems as a standard of reference. The JSNPI above the smallest detectable difference (SDD) defined JSN progression on the joint level. The sensitivity and specificity of the computer-based method for JSN progression was calculated using the SDD and a receiver operating characteristic (ROC) curve. Out of 314 metacarpophalangeal joints, 34 joints progressed based on the SDD, while 11 joints widened. Twenty-one joints progressed in the computer-based method, 11 joints in the scoring systems, and 13 joints in both methods. Based on the SDD, we found lower sensitivity and higher specificity with 54.2 and 92.8%, respectively. At the most discriminant cutoff point according to the ROC curve, the sensitivity and specificity was 70.8 and 81.7%, respectively. The proposed computer-based method provides quantitative measurement of JSN progression using sequential hand radiographs and may be a useful tool in follow-up assessment of joint damage in RA patients.

  3. Comprehensive evaluation of ecological security in mining area based on PSR-ANP-GRAY.

    PubMed

    He, Gang; Yu, Baohua; Li, Shuzhou; Zhu, Yanna

    2017-09-06

    With the large exploitation of mineral resources, a series of problems have appeared in the ecological environment of the mining area. Therefore, evaluating the ecological security of mining area is of great significance to promote its healthy development. In this paper, the evaluation index system of ecological security in mining area was constructed from three dimensions of nature, society and economy, combined with Pressure-State-Response framework model. Then network analytic hierarchy process and GRAY relational analysis method were used to evaluate the ecological security of the region, and the weighted correlation degree of ecological security was calculated through the index data of a coal mine from 2012 to 2016 in China. The results show that the ecological security in the coal mine area is on the rise as a whole, though it alternatively rose and dropped from 2012 to 2016. Among them, the ecological security of the study mining area is at the general security level from 2012 to 2015, and at a relatively safe level in 2016. It shows that the ecological environment of the study mining area can basically meet the requirement of the survival and development of the enterprises.

  4. Index of cyber integrity

    NASA Astrophysics Data System (ADS)

    Anderson, Gustave

    2014-05-01

    Unfortunately, there is no metric, nor set of metrics, that are both general enough to encompass all possible types of applications yet specific enough to capture the application and attack specific details. As a result we are left with ad-hoc methods for generating evaluations of the security of our systems. Current state of the art methods for evaluating the security of systems include penetration testing and cyber evaluation tests. For these evaluations, security professionals simulate an attack from malicious outsiders and malicious insiders. These evaluations are very productive and are able to discover potential vulnerabilities resulting from improper system configuration, hardware and software flaws, or operational weaknesses. We therefore propose the index of cyber integrity (ICI), which is modeled after the index of biological integrity (IBI) to provide a holistic measure of the health of a system under test in a cyber-environment. The ICI provides a broad base measure through a collection of application and system specific metrics. In this paper, following the example of the IBI, we demonstrate how a multi-metric index may be used as a holistic measure of the health of a system under test in a cyber-environment.

  5. Assessment of atherosclerotic luminal narrowing of coronary arteries based on morphometrically generated visual guides.

    PubMed

    Barth, Rolf F; Kellough, David A; Allenby, Patricia; Blower, Luke E; Hammond, Scott H; Allenby, Greg M; Buja, L Maximilian

    Determination of the degree of stenosis of atherosclerotic coronary arteries is an important part of postmortem examination of the heart, but, unfortunately, estimation of the degree of luminal narrowing can be imprecise and tends to be approximations. Visual guides can be useful to assess this, but earlier attempts to develop such guides did not employ digital technology. Using this approach, we have developed two computer-generated morphometric guides to estimate the degree of luminal narrowing of atherosclerotic coronary arteries. The first is based on symmetric or eccentric circular or crescentic narrowing of the vessel lumen and the second on either slit-like or irregularly shaped narrowing of the vessel lumens. Using the Aperio ScanScope XT at a magnification of 20× we created digital whole-slide images of 20 representative microscopic cross sections of the left anterior descending (LAD) coronary artery, stained with either hematoxylin and eosin (H&E) or Movat's pentachrome stain. These cross sections illustrated a variety of luminal profiles and degrees of stenosis. Three representative types of images were selected and a visual guide was constructed with Adobe Photoshop CS5. Using the "Scale" and "Measurement" tools, we created a series of representations of stenosis with luminal cross sections depicting 20%, 40%, 60%, 70%, 80%, and 90% occlusion of the LAD branch. Four pathologists independently reviewed and scored the degree of atherosclerotic luminal narrowing based on our visual guides. In addition, digital technology was employed to determine the degree of narrowing by measuring the cross-sectional area of the 20 microscopic sections of the vessels, first assuming no narrowing and then comparing this to the percent of narrowing determined by precise measurement. Two of the observers were very experienced general autopsy pathologists, one was a first-year pathology resident on his first rotation on the autopsy service, and the fourth observer was a

  6. Defining Information Security.

    PubMed

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  7. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium

    PubMed Central

    Somasundaram, M.; Sivakumar, R.

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security. PMID:26759829

  8. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium.

    PubMed

    Somasundaram, M; Sivakumar, R

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security.

  9. Computer-Based Testing: Test Site Security.

    ERIC Educational Resources Information Center

    Rosen, Gerald A.

    Computer-based testing places great burdens on all involved parties to ensure test security. A task analysis of test site security might identify the areas of protecting the test, protecting the data, and protecting the environment as essential issues in test security. Protecting the test involves transmission of the examinations, identifying the…

  10. The Latent Structure of Secure Base Script Knowledge

    ERIC Educational Resources Information Center

    Waters, Theodore E. A.; Fraley, R. Chris; Groh, Ashley M.; Steele, Ryan D.; Vaughn, Brian E.; Bost, Kelly K.; Veríssimo, Manuela; Coppola, Gabrielle; Roisman, Glenn I.

    2015-01-01

    There is increasing evidence that attachment representations abstracted from childhood experiences with primary caregivers are organized as a cognitive script describing secure base use and support (i.e., the "secure base script"). To date, however, the latent structure of secure base script knowledge has gone unexamined--this despite…

  11. Aviation Security: Biometric Technology and Risk Based Security Aviation Passenger Screening Program

    DTIC Science & Technology

    2012-12-01

    distribution is unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT (maximum 200 words ) Since 9/11, the Transportation Security Administration (TSA...Council POE Point Of Entry RBS Risk-Based Security SENTRI Secure Electronic Network for Travelers Rapid Inspection SFPD Secure Flight Passenger...Committee on Biometrics provides the origins of biometrics; the term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to measure

  12. Securing the Global Airspace System Via Identity-Based Security

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2015-01-01

    Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.

  13. Tablet splitting of a narrow therapeutic index drug: a case with levothyroxine sodium.

    PubMed

    Shah, Rakhi B; Collier, Jarrod S; Sayeed, Vilayat A; Bryant, Arthur; Habib, Muhammad J; Khan, Mansoor A

    2010-09-01

    Levothyroxine is a narrow therapeutic index, and to avoid adverse effect associated with under or excessive dosage, the dose response is carefully titrated. The tablets are marketed with a score providing an option to split. However, there are no systematic studies evaluating the effect of splitting on dose accuracy, and current study was undertaken to evaluate effects of splitting and potential causes for uniformity failures by measuring assay and content uniformity in whole and split tablets. Stability was evaluated by assaying drug for a period of 8 weeks. Effect of formulation factors on splittability was evaluated by a systematic investigation of formulation factors by preparing levothyroxine tablets in house by varying the type of excipients (binder, diluent, disintegrant, glidant) or by varying the processing factors (granulating liquid, mixing type, compression pressure). The tablets were analyzed using novel analytical tool such as near infrared chemical imaging to visualize the distribution of levothyroxine. Assay was not significantly different for whole versus split tablets irrespective of method of splitting (hand or splitter), and splitting also had no measurable impact on the stability. Split tablets either by hand or splitter showed higher rate of content uniformity failures as compared to whole tablets. Tablet splitter produced more fragmentation and, hence, more content uniformity and friability failures. Chemical imaging data revealed that the distribution of levothyroxine was heterogeneous and was dependent on type of binder and the process used in the manufacture of tablets. Splitting such tablets could prove detrimental if sub- or super-potency becomes an issue.

  14. Narrow Networks on the Individual Marketplace in 2017.

    PubMed

    Polski, Daniel; Weiner, Janet; Zhang, Yuehan

    2017-09-01

    This Issue Brief describes the breadth of physician networks on the ACA marketplaces in 2017. We find that the overall rate of narrow networks is 21%, which is a decline since 2014 (31%) and 2016 (25%). Narrow networks are concentrated in plans sold on state-based marketplaces, at 42%, compared to 10% of plans on federally-facilitated marketplaces. Issuers that have traditionally offered Medicaid coverage have the highest prevalence of narrow network plans at 36%, with regional/local plans and provider-based plans close behind at 27% and 30%. We also find large differences in narrow networks by state and by plan type.

  15. Maternal secure-base scripts and children's attachment security in an adopted sample.

    PubMed

    Veríssimo, Manuela; Salvaterra, Fernanda

    2006-09-01

    Studies of families with adopted children are of special interest to attachment theorists because they afford opportunities to probe assumptions of attachment theory with regard to the developmental timing of interactions necessary to form primary attachments and also with regard to effects of shared genes on child attachment quality. In Bowlby's model, attachment-relevant behaviors and interactions are observable from the moment of birth, but for adoptive families, these interactions cannot begin until the child enters the family, sometimes several months or even years post-partum. Furthermore, because adoptive parents and adopted children do not usually share genes by common descent, any correspondence between attachment representations of the parent and secure base behavior of the child must arise as a consequence of dyadic interaction histories. The objectives of this study were to evaluate whether the child's age at the time of adoption or at the time of attachment assessment predicted child attachment security in adoptive families and also whether the adoptive mother's internal attachment representation predicted the child's attachment security. The participants were 106 mother - child dyads selected from the 406 adoptions carried out through the Lisbon Department of Adoption Services over a period of 3 years. The Attachment Behavior Q-Set (AQS; Waters, 1995) was used to assess secure base behavior and an attachment script representation task was used to assess the maternal attachment representations. Neither child's age at the time of adoption, nor age of the child at assessment significantly predicted the AQS security score; however, scores reflecting the presence and quality of maternal secure base scripts did predict AQS security. These findings support the notion that the transmission of attachment security across generations involves mutual exchanges and learning by the child and that the exchanges leading to secure attachment need not begin at birth

  16. Development of narrow-band fluorescence index for the detection of aflatoxin contaminated corn

    NASA Astrophysics Data System (ADS)

    Yao, Haibo; Hruska, Zuzana; Kincaid, Russell; Ononye, Ambrose; Brown, Robert L.; Bhatnagar, Deepak; Cleveland, Thomas E.

    2011-06-01

    Aflatoxin is produced by the fungus Aspergillus flavus when the fungus invades developing corn kernels. Because of its potent toxicity, the levels of aflatoxin are regulated by the Food and Drug Administration (FDA) in the US, allowing 20 ppb (parts per billion) limits in food, and feed intended for interstate commerce. Currently, aflatoxin detection and quantification methods are based on analytical tests. These tests require the destruction of samples, can be costly and time consuming, and often rely on less than desirable sampling techniques. Thus, the ability to detect aflatoxin in a rapid, non-invasive way is crucial to the corn industry in particular. This paper described how narrow-band fluorescence indices were developed for aflatoxin contamination detection based on single corn kernel samples. The indices were based on two bands extracted from full wavelength fluorescence hyperspectral imagery. The two band results were later applied to two large sample experiments with 25 g and 1 kg of corn per sample. The detection accuracies were 85% and 95% when 100 ppb threshold was used. Since the data acquisition period is significantly lower for several image bands than for full wavelength hyperspectral data, this study would be helpful in the development of real-time detection instrumentation for the corn industry.

  17. [Food security in Mexico].

    PubMed

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance.

  18. The Security Email Based on Smart Card

    NASA Astrophysics Data System (ADS)

    Lina, Zhang; Jiang, Meng Hai.

    Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can't be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.

  19. Ankle-Brachial Index

    MedlinePlus

    ... in which the arteries in your legs or arms are narrowed or blocked. People with peripheral artery ... ankle with your blood pressure measured at your arm. A low ankle-brachial index number can indicate ...

  20. The prevalence of cervical myelopathy among subjects with narrow cervical spinal canal in a population-based magnetic resonance imaging study: the Wakayama Spine Study.

    PubMed

    Nagata, Keiji; Yoshimura, Noriko; Hashizume, Hiroshi; Muraki, Shigeyuki; Ishimoto, Yuyu; Yamada, Hiroshi; Takiguchi, Noboru; Nakagawa, Yukihiro; Minamide, Akihito; Oka, Hiroyuki; Kawaguchi, Hiroshi; Nakamura, Kozo; Akune, Toru; Yoshida, Munehito

    2014-12-01

    A narrow cervical spinal canal (CSC) is a well-known risk factor for cervical myelopathy (CM). However, no epidemiologic data of the CSC based on a population-based cohort are available. The purpose of the study was to investigate the age-related differences in CSC diameters on plain radiographs and to examine the associated magnetic resonance imaging (MRI) abnormalities including cervical cord compression and increased signal intensity (ISI) as well as the clinical CM with the narrow CSC. This was a cross-sectional study. Data were obtained from the baseline survey of the Wakayama Spine Study that was performed from 2008 to 2010 in a western part of Japan. Finally, a total of 959 subjects (319 men and 640 women; mean age, 66.4 years) were included. The outcome measures included in the study were the CSC diameter at C5 level on plain radiographs, cervical cord compression and ISI on sagittal T2-weighted MRI, and physical signs related to CM (eg, the Hoffmann reflex, hyperreflexia of the patellar tendon, the Babinski reflex, sensory and motor function, and bowel/bladder symptoms). The age-related differences of CSC diameters in men and women were investigated by descriptive statistics. The prevalence of MRI abnormalities and clinical CM was compared among the groups divided by the CSC diameter (less than 13, 13-15, and 15 mm or more). In addition, a logistic regression analysis was performed to determine the association of the CSC diameter with cervical cord compression/clinical CM after overall adjustment for age, sex, and body mass index. The CSC diameter was narrower with increasing age in both men and women. The prevalence of cervical cord compression, ISI, and the clinical CM was significantly higher in the narrower CSC group. The prevalence of cervical cord compression, ISI, and CM among subjects with CSC diameter less than 13 mm was 38.0%, 5.4%, and 10.1%, respectively. In the logistic model, the CSC diameter was a significant predictive factor for the

  1. 75 FR 64643 - Reporting of Security-Based Swap Transaction Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-20

    ... information relating to pre-enactment security-based swaps to a registered security-based swap data repository... within 60 days after a registered security- based swap data repository commences operations to receive... repository,\\8\\ and security- based swap execution facility.\\9\\ The Commission has issued an advance notice of...

  2. Remote monitoring and security alert based on motion detection using mobile

    NASA Astrophysics Data System (ADS)

    Suganya Devi, K.; Srinivasan, P.

    2016-03-01

    Background model does not have any robust solution and constitutes one of the main problems in surveillance systems. The aim of the paper is to provide a mobile based security to a remote monitoring system through a WAP using GSM modem. It is most designed to provide durability and versatility for a wide variety of indoor and outdoor applications. It is compatible with both narrow and band networks and provides simultaneous image detection. The communicator provides remote control, event driven recording, including pre-alarm and post-alarm and image motion detection. The web cam allowing them to be mounted either to a ceiling or wall without requiring bracket, with the use of web cam. We could continuously monitoring status in the client system through the web. If any intruder arrives in the client system, server will provide an alert to the mobile (what we are set in the message that message send to the authorized person) and the client can view the image using WAP.

  3. The Quality of Maternal Secure-Base Scripts Predicts Children's Secure-Base Behavior at Home in Three Sociocultural Groups

    ERIC Educational Resources Information Center

    Vaughn, Brian E.; Coppola, Gabrielle; Verissimo, Manuela; Monteiro, Ligia; Santos, Antonio Jose; Posada, German; Carbonell, Olga A.; Plata, Sandra J.; Waters, Harriet S.; Bost, Kelly K.; McBride, Brent; Shin, Nana; Korth, Bryan

    2007-01-01

    The secure-base phenomenon is central to the Bowlby/Ainsworth theory of attachment and is also central to the assessment of attachment across the lifespan. The present study tested whether mothers' knowledge about the secure-base phenomenon, as assessed using a recently designed wordlist prompt measure for eliciting attachment-relevant stories,…

  4. FlySec: a risk-based airport security management system based on security as a service concept

    NASA Astrophysics Data System (ADS)

    Kyriazanos, Dimitris M.; Segou, Olga E.; Zalonis, Andreas; Thomopoulos, Stelios C. A.

    2016-05-01

    Complementing the ACI/IATA efforts, the FLYSEC European H2020 Research and Innovation project (http://www.fly-sec.eu/) aims to develop and demonstrate an innovative, integrated and end-to-end airport security process for passengers, enabling a guided and streamlined procedure from the landside to airside and into the boarding gates, and offering for an operationally validated innovative concept for end-to-end aviation security. FLYSEC ambition turns through a well-structured work plan into: (i) innovative processes facilitating risk-based screening; (ii) deployment and integration of new technologies and repurposing existing solutions towards a risk-based Security paradigm shift; (iii) improvement of passenger facilitation and customer service, bringing security as a real service in the airport of tomorrow;(iv) achievement of measurable throughput improvement and a whole new level of Quality of Service; and (v) validation of the results through advanced "in-vitro" simulation and "in-vivo" pilots. On the technical side, FLYSEC achieves its ambitious goals by integrating new technologies on video surveillance, intelligent remote image processing and biometrics combined with big data analysis, open-source intelligence and crowdsourcing. Repurposing existing technologies is also in the FLYSEC objectives, such as mobile application technologies for improved passenger experience and positive boarding applications (i.e. services to facilitate boarding and landside/airside way finding) as well as RFID for carry-on luggage tracking and quick unattended luggage handling. In this paper, the authors will describe the risk based airport security management system which powers FLYSEC intelligence and serves as the backend on top of which FLYSEC's front end technologies reside for security services management, behaviour and risk analysis.

  5. Security mechanism based on Hospital Authentication Server for secure application of implantable medical devices.

    PubMed

    Park, Chang-Seop

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.

  6. Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices

    PubMed Central

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797

  7. Therapeutic efficacy of narrow band imaging-assisted transurethral electrocoagulation for ulcer-type interstitial cystitis/painful bladder syndrome.

    PubMed

    Kajiwara, Mitsuru; Inoue, Shougo; Kobayashi, Kanao; Ohara, Shinya; Teishima, Jun; Matsubara, Akio

    2014-04-01

    Narrow band imaging cystoscopy can increase the visualization and detection of Hunner's lesions. A single-center, prospective clinical trial was carried out aiming to show the effectiveness of narrow band imaging-assisted transurethral electrocoagulation for ulcer-type interstitial cystitis/painful bladder syndrome. A total of 23 patients (19 women and 4 men) diagnosed as having ulcer-type interstitial cystitis/painful bladder syndrome were included. All typical Hunner's lesions and suspected areas identified by narrow band imaging were electrocoagulated endoscopically after the biopsy of those lesions. Therapeutic efficacy was assessed prospectively by using visual analog scale score of pain, O'Leary-Sant's symptom index, O'Leary-Sant's problem index and overactive bladder symptom score. The mean follow-up period was 22 months. All patients (100%) experienced a substantial improvement in pain. The average visual analog scale pain scores significantly decreased from 7.3 preoperatively to 1.2 1 month postoperatively. A total of 21 patients (91.3%) who reported improvement had at least a 50% reduction in bladder pain, and five reported complete resolution. Daytime frequency was significantly decreased postoperatively. O'Leary-Sant's symptom index, O'Leary-Sant's problem index and overactive bladder symptom score were significantly decreased postoperatively. However, during the follow-up period, a total of six patients had recurrence, and repeat narrow band imaging-assisted transurethral electrocoagulation of the recurrent lesions was carried out for five of the six patients, with good response in relieving bladder pain. Our results showed that narrow band imaging-assisted transurethral electrocoagulation could be a valuable therapeutic alternative in patients with ulcer-type interstitial cystitis/painful bladder syndrome, with good efficacy and reduction of recurrence rate. © 2014 The Japanese Urological Association.

  8. An Ontology Based Approach to Information Security

    NASA Astrophysics Data System (ADS)

    Pereira, Teresa; Santos, Henrique

    The semantically structure of knowledge, based on ontology approaches have been increasingly adopted by several expertise from diverse domains. Recently ontologies have been moved from the philosophical and metaphysics disciplines to be used in the construction of models to describe a specific theory of a domain. The development and the use of ontologies promote the creation of a unique standard to represent concepts within a specific knowledge domain. In the scope of information security systems the use of an ontology to formalize and represent the concepts of security information challenge the mechanisms and techniques currently used. This paper intends to present a conceptual implementation model of an ontology defined in the security domain. The model presented contains the semantic concepts based on the information security standard ISO/IEC_JTC1, and their relationships to other concepts, defined in a subset of the information security domain.

  9. 77 FR 71369 - Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 [Release No. 34-68071; File No. S7-08-12] RIN 3235-AL12 Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major Security-Based Swap Participants and Capital Requirements for Broker-Dealers Correction In proposed rule...

  10. Supporting Case-Based Learning in Information Security with Web-Based Technology

    ERIC Educational Resources Information Center

    He, Wu; Yuan, Xiaohong; Yang, Li

    2013-01-01

    Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…

  11. Secure Base Priming Diminishes Conflict-Based Anger and Anxiety

    PubMed Central

    Koren, Tamara; Bartholomew, Kim

    2016-01-01

    This study examines the impact of a visual representation of a secure base (i.e. a secure base prime) on attenuating experimentally produced anger and anxiety. Specifically, we examined the assuaging of negative emotions through exposure to an image of a mother-infant embrace or a heterosexual couple embracing. Subjects seated at a computer terminal rated their affect (Pre Affect) using the Affect Adjective Checklist (AAC) then listened to two sets of intense two person conflicts. After the first conflict exposure they rated affect again (Post 1 AAC). Following the second exposure they saw a blank screen (control condition), pictures of everyday objects (distraction condition) or a photo of two people embracing (Secure Base Prime condition). They then reported emotions using the Post 2 AAC. Compared to either control or distraction subjects, Secure Base Prime (SBP) subjects reported significantly less anger and anxiety. These results were then replicated using an internet sample with control, SBP and two new controls: Smiling Man (to control for expression of positive affect) and Cold Mother (an unsmiling mother with infant). The SBP amelioration of anger and anxiety was replicated with the internet sample. No control groups produced this effect, which was generated only by a combination of positive affect in a physically embracing dyad. The results are discussed in terms of attachment theory and research on spreading activation. PMID:27606897

  12. n-Gram-Based Indexing for Korean Text Retrieval.

    ERIC Educational Resources Information Center

    Lee, Joon Ho; Cho, Hyun Yang; Park, Hyouk Ro

    1999-01-01

    Discusses indexing methods in Korean text retrieval and proposes a new indexing method based on n-grams which can handle compound nouns effectively without dictionaries and complex linguistic knowledge. Experimental results show that n-gram-based indexing is considerably faster than morpheme-based indexing, and also provides better retrieval…

  13. Demonstration of versatile whispering-gallery micro-lasers for remote refractive index sensing.

    PubMed

    Wan, Lei; Chandrahalim, Hengky; Zhou, Jian; Li, Zhaohui; Chen, Cong; Cho, Sangha; Zhang, Hui; Mei, Ting; Tian, Huiping; Oki, Yuji; Nishimura, Naoya; Fan, Xudong; Guo, L Jay

    2018-03-05

    We developed chip-scale remote refractive index sensors based on Rhodamine 6G (R6G)-doped polymer micro-ring lasers. The chemical, temperature, and mechanical sturdiness of the fused-silica host guaranteed a flexible deployment of dye-doped polymers for refractive index sensing. The introduction of the dye as gain medium demonstrated the feasibility of remote sensing based on the free-space optics measurement setup. Compared to the R6G-doped TZ-001, the lasing behavior of R6G-doped SU-8 polymer micro-ring laser under an aqueous environment had a narrower spectrum linewidth, producing the minimum detectable refractive index change of 4 × 10 -4 RIU. The maximum bulk refractive index sensitivity (BRIS) of 75 nm/RIU was obtained for SU-8 laser-based refractive index sensors. The economical, rapid, and simple realization of polymeric micro-scale whispering-gallery-mode (WGM) laser-based refractive index sensors will further expand pathways of static and dynamic remote environmental, chemical, biological, and bio-chemical sensing.

  14. A recycling index for food and health security: urban Taipei.

    PubMed

    Huang, Susana Tzy-Ying

    2010-01-01

    The modern food system has evolved into one with highly inefficient activities, producing waste at each step of the food pathway from growing to consumption and disposal. The present challenge is to improve recyclability in the food system as a fundamental need for food and health security. This paper develops a methodological approach for a Food Recycling Index (FRI) as a tool to assess recyclability in the food system, to identify opportunities to reduce waste production and environmental contamination, and to provide a self-assessment tool for participants in the food system. The urban Taipei framework was used to evaluate resource and nutrient flow within the food consumption and waste management processes of the food system. A stepwise approach for a FRI is described: (1) identification of the major inputs and outputs in the food chain; (2) classification of inputs and outputs into modules (energy, water, nutrients, and contaminants); (3) assignment of semi-quantitative scores for each module and food system process using a matrix; (4) assessment for recycling status and recyclability potential; (5) conversion of scores into sub-indices; (6) derivation of an aggregate FRI. A FRI of 1.24 was obtained on the basis of data for kitchen waste management in Taipei, a score which encompasses absolute and relative values for a comprehensive interpretation. It is apparent that a FRI could evolve into a broader ecosystem concept with health relevance. Community end-users and policy planners can adopt this approach to improve food and health security.

  15. 77 FR 70213 - Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-23

    ...In accordance with the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010 (``Dodd-Frank Act''), the Securities and Exchange Commission (``Commission''), pursuant to the Securities Exchange Act of 1934 (``Exchange Act''), is proposing capital and margin requirements for security-based swap dealers (``SBSDs'') and major security-based swap participants (``MSBSPs''), segregation requirements for SBSDs, and notification requirements with respect to segregation for SBSDs and MSBSPs. The Commission also is proposing to increase the minimum net capital requirements for broker-dealers permitted to use the alternative internal model-based method for computing net capital (``ANC broker-dealers'').

  16. Sensory Interactions for Head and Trunk Control in Space in Young and Older Adults During Normal and Narrow-Base Walking.

    PubMed

    Zhang, Fang; Deshpande, Nandini

    2016-01-01

    Fifteen young (20-30 years old) and 15 older (>65 years old) healthy participants were recruited to investigate age-related differences in head and trunk control under suboptimal vestibular conditions (galvanic vestibular stimulation, or GVS) and vision conditions during normal and narrow-based walking. Head-roll velocity decreased in the blurred-vision condition and marginally increased with GVS in older but not in young participants. Head pitch increased, whereas head-roll velocity decreased in narrow-base walking. Trunk pitch, trunk-pitch velocity, and gait speed increased with GVS, whereas trunk-pitch velocity and gait speed decreased in narrow-base walking. Marginally increased head-roll velocity in the older participants possibly suggests decreased integrative ability of the central nervous system in elderly people. The changes in head control during narrow-base walking may be an attempt to simplify the interpretation of the vestibular signal and increase otolith sensitivity. The complexity of controlling the trunk in the mediolateral direction was suggested by different strategies used for trunk control in different conditions.

  17. Provably Secure Password-based Authentication in TLS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised tomore » the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.« less

  18. Lack of weight recording in patients being administered narrow therapeutic index antibiotics: a prospective cross-sectional study.

    PubMed

    Charani, Esmita; Gharbi, Myriam; Hickson, Mary; Othman, Shokri; Alfituri, Aisha; Frost, Gary; Holmes, Alison

    2015-04-02

    Patient weight is a key measure for safe medication management and monitoring of patients. Here we report the recording of patient's body weight on admission in three hospitals in West London and its relationship with the prescription of antibiotic drugs where it is essential to have the body weight of the patient. A prospective cross-sectional study was conducted in three teaching hospitals in West London. Data were collected during March 2011-September 2011 and July 2012-August 2012, from adult admissions units, medical and surgical wards. Data from each ward were collected on a single day to provide a point prevalence data on weight recording. Patient medication charts, nursing and medical notes were reviewed for evidence of weight and height recording together with all the medication prescribed for the patients. An observational study collecting data on the weight recording process was conducted on two randomly selected wards to add context to the data. Data were collected on 1012 patients. Weight was not recorded for 46% (474) of patients. Eighty-nine patients were prescribed a narrow therapeutic antibiotic, in 39% (35/89) of these weight was not recorded for the patient. Intravenous vancomycin was the most commonly prescribed antibiotic requiring therapeutic monitoring. In total 61 patients were receiving intravenous vancomycin and of these 44% (27/61) did not have their weight recorded. In the observational study, the most frequently identified barrier to weight not being recorded was interruptions to the admission process. Despite the clinical importance of body weight measurement it is poorly recorded in hospitalised patients, due to interruptions to the workflow and heavy staff workloads. In antibiotics a correct, recent patient weight is required for accurate dosing and to keep drugs within the narrow therapeutic index, to ensure efficacy of prescribing and reduce toxicity. Published by the BMJ Publishing Group Limited. For permission to use (where not

  19. 77 FR 48207 - Further Definition of “Swap,” “Security-Based Swap,” and “Security-Based Swap Agreement”; Mixed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-13

    ...In accordance with section 712(a)(8), section 712(d)(1), sections 712(d)(2)(B) and (C), sections 721(b) and (c), and section 761(b) of the Dodd-Frank Wall Street Reform and Consumer Protection Act (``Dodd-Frank Act''), the Commodity Futures Trading Commission (``CFTC'') and the Securities and Exchange Commission (``SEC'') (collectively, ``Commissions''), in consultation with the Board of Governors of the Federal Reserve System (``Board''), are jointly adopting new rules and interpretations under the Commodity Exchange Act (``CEA'') and the Securities Exchange Act of 1934 (``Exchange Act'') to further define the terms ``swap,'' ``security-based swap,'' and ``security-based swap agreement'' (collectively, ``Product Definitions''); regarding ``mixed swaps;'' and governing books and records with respect to ``security-based swap agreements.'' The CFTC requests comment on its interpretation concerning forwards with embedded volumetric optionality, contained in Section II.B.2.(b)(ii) of this release.

  20. 17 CFR Appendix D to Part 30 - Information That a Foreign Board of Trade Should Submit When Seeking No-Action Relief To Offer...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Information That a Foreign Board of Trade Should Submit When Seeking No-Action Relief To Offer and Sell, to Persons Located in the United States, a Futures Contract on a Foreign Non-Narrow-Based Security Index Traded on That Foreign Board of Trade D Appendix D to Part 30...

  1. 76 FR 32880 - Further Definition of “Swap,” “Security-Based Swap,” and “Security-Based Swap Agreement”; Mixed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-07

    ... COMMODITY FUTURES TRADING COMMISSION 17 CFR Part 1 RIN 3038-AD46 SECURITIES AND EXCHANGE...-Based Swap Agreement Recordkeeping AGENCY: Commodity Futures Trading Commission; Securities and Exchange... Futures Trading Commission and the Securities and Exchange Commission published a document in the Federal...

  2. [Simulation of urban ecological security pattern based on cellular automata: a case of Dongguan City, Guangdong Province of South China].

    PubMed

    Yang, Qing-Sheng; Qiao, Ji-Gang; Ai, Bin

    2013-09-01

    Taking the Dongguan City with rapid urbanization as a case, and selecting landscape ecological security level as evaluation criterion, the urbanization cellular number of 1 km x 1 km ecological security cells was obtained, and imbedded into the transition rules of cellular automata (CA) as the restraint term to control urban development, establish ecological security urban CA, and simulate ecological security urban development pattern. The results showed the integrated landscape ecological security index of the City decreased from 0.497 in 1998 to 0.395 in 2005, indicating that the ecological security at landscape scale was decreased. The CA-simulated integrated ecological security index of the City in 2005 was increased from the measured 0.395 to 0.479, showing that the simulated urban landscape ecological pressure from human became lesser, ecological security became better, and integrated landscape ecological security became higher. CA could be used as an effective tool in researching urban ecological security.

  3. Multifractal detrended cross-correlations between the CSI 300 index futures and the spot markets based on high-frequency data

    NASA Astrophysics Data System (ADS)

    Cao, Guangxi; Han, Yan; Cui, Weijun; Guo, Yu

    2014-11-01

    The cross-correlation between the China Securities Index 300 (CSI 300) index futures and the spot markets based on high-frequency data is discussed in this paper. We empirically analyze the cross-correlation by using the multifractal detrended cross-correlation analysis (MF-DCCA), and investigate further the characteristics of asymmetry, frequency difference, and transmission direction of the cross-correlation. The results indicate that the cross-correlation between the two markets is significant and multifractal. Meanwhile, weak asymmetries exist in the cross-correlation, and higher data frequency results in a lower multifractality degree of the cross-correlation. The causal relationship between the two markets is bidirectional, but the CSI 300 index futures market has greater impact on the spot market.

  4. Neural activity underlying motor-action preparation and cognitive narrowing in approach-motivated goal states.

    PubMed

    Gable, Philip A; Threadgill, A Hunter; Adams, David L

    2016-02-01

    High-approach-motivated (pre-goal) positive affect states encourage tenacious goal pursuit and narrow cognitive scope. As such, high approach-motivated states likely enhance the neural correlates of motor-action preparation to aid in goal acquisition. These neural correlates may also relate to the cognitive narrowing associated with high approach-motivated states. In the present study, we investigated motor-action preparation during pre-goal and post-goal states using an index of beta suppression over the motor cortex. The results revealed that beta suppression was greatest in pre-goal positive states, suggesting that higher levels of motor-action preparation occur during high approach-motivated positive states. Furthermore, beta and alpha suppression in the high approach-motivated positive states predicted greater cognitive narrowing. These results suggest that approach-motivated pre-goal states engage the neural substrates of motor-action preparation and cognitive narrowing. Individual differences in motor-action preparation relate to the degree of cognitive narrowing.

  5. Narrow-headed garter snake (Thamnophis rufipunctatus)

    USGS Publications Warehouse

    Nowak, Erika M.

    2006-01-01

    The narrow-headed garter snake is a harmless, nonvenomous snake that is distinguished by its elongated, triangular-shaped head and the red or dark spots on its olive to tan body. Today, the narrow-headed garter snake is a species of special concern in the United States because of its decline over much of its historic range. Arizona's Oak Creek has historically contained the largest population of narrow-headed garter snakes in the United States. The U.S. Geological Survey (USGS) and the Arizona Game and Fish Department jointly funded research by USGS scientists in Oak Creek to shed light on the factors causing declining population numbers. The research resulted in better understanding of the snake's habitat needs, winter and summer range, and dietary habits. Based on the research findings, the U.S. Forest Service has developed recommendations that visitors and local residents can adopt to help slow the decline of the narrow-headed garter snake in Oak Creek.

  6. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET

    PubMed Central

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-01-01

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV’s research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV. PMID:28629142

  7. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    PubMed

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  8. PCF based high power narrow line width pulsed fiber laser

    NASA Astrophysics Data System (ADS)

    Chen, H.; Yan, P.; Xiao, Q.; Wang, Y.; Gong, M.

    2012-09-01

    Based on semiconductor diode seeded multi-stage cascaded fiber amplifiers, we have obtained 88-W average power of a 1063-nm laser with high repetition rate of up to 1.5 MHz and a constant 2-ns pulse duration. No stimulated Brillouin scattering pulse or optical damage occurred although the maximum pulse peak power has exceeded 112 kW. The output laser exhibits excellent beam quality (M2x = 1.24 and M2y = 1.18), associated with a spectral line width as narrow as 0.065 nm (FWHM). Additionally, we demonstrate high polarization extinction ratio of 18.4 dB and good pulse stabilities superior to 1.6 % (RMS).

  9. New methods for indexing multi-lattice diffraction data

    PubMed Central

    Gildea, Richard J.; Waterman, David G.; Parkhurst, James M.; Axford, Danny; Sutton, Geoff; Stuart, David I.; Sauter, Nicholas K.; Evans, Gwyndaf; Winter, Graeme

    2014-01-01

    A new indexing method is presented which is capable of indexing multiple crystal lattices from narrow wedges of diffraction data. The method takes advantage of a simplification of Fourier transform-based methods that is applicable when the unit-cell dimensions are known a priori. The efficacy of this method is demonstrated with both semi-synthetic multi-lattice data and real multi-lattice data recorded from crystals of ∼1 µm in size, where it is shown that up to six lattices can be successfully indexed and subsequently integrated from a 1° wedge of data. Analysis is presented which shows that improvements in data-quality indicators can be obtained through accurate identification and rejection of overlapping reflections prior to scaling. PMID:25286849

  10. New methods for indexing multi-lattice diffraction data.

    PubMed

    Gildea, Richard J; Waterman, David G; Parkhurst, James M; Axford, Danny; Sutton, Geoff; Stuart, David I; Sauter, Nicholas K; Evans, Gwyndaf; Winter, Graeme

    2014-10-01

    A new indexing method is presented which is capable of indexing multiple crystal lattices from narrow wedges of diffraction data. The method takes advantage of a simplification of Fourier transform-based methods that is applicable when the unit-cell dimensions are known a priori. The efficacy of this method is demonstrated with both semi-synthetic multi-lattice data and real multi-lattice data recorded from crystals of ∼1 µm in size, where it is shown that up to six lattices can be successfully indexed and subsequently integrated from a 1° wedge of data. Analysis is presented which shows that improvements in data-quality indicators can be obtained through accurate identification and rejection of overlapping reflections prior to scaling.

  11. New methods for indexing multi-lattice diffraction data

    DOE PAGES

    Gildea, Richard J.; Waterman, David G.; Parkhurst, James M.; ...

    2014-09-27

    A new indexing method is presented which is capable of indexing multiple crystal lattices from narrow wedges of diffraction data. The method takes advantage of a simplification of Fourier transform-based methods that is applicable when the unit-cell dimensions are known a priori. The efficacy of this method is demonstrated with both semi-synthetic multi-lattice data and real multi-lattice data recorded from crystals of ~1 µm in size, where it is shown that up to six lattices can be successfully indexed and subsequently integrated from a 1° wedge of data. Analysis is presented which shows that improvements in data-quality indicators can bemore » obtained through accurate identification and rejection of overlapping reflections prior to scaling.« less

  12. Secure electronic commerce communication system based on CA

    NASA Astrophysics Data System (ADS)

    Chen, Deyun; Zhang, Junfeng; Pei, Shujun

    2001-07-01

    In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.

  13. Cascaded chirped narrow bandpass filter with flat-top based on two-dimensional photonic crystals.

    PubMed

    Zhuang, Yuyang; Chen, Heming; Ji, Ke

    2017-05-10

    We propose a structure of a cascaded chirped narrow bandpass filter with a flat-top based on two-dimensional (2D) photonic crystals (PhCs). The filter discussed here consists of three filter units, each with a resonator and two reflectors. Coupled mode theory and transfer matrix method are methodologies applied in the analysis of the features. The calculations show that the bandwidth of the filter can be adjusted by changing the distances between resonators and reflectors, and based on this, a flat-top response can be achieved by chirped-cascading the filter units. According to the theoretical model, we design a narrow bandpass filter based on 2D PhCs with a triangular lattice of air holes, the parameters of which are calculated using the finite element method. The simulation results show that the filter has a center frequency of 193.40 THz, an insertion loss of 0.18 dB, a flat bandwidth of 40 GHz, and ripples of about 0.2 dB in the passband. The filter is suitable for dense-wavelength-division-multiplexed optical communication systems with 100 GHz channel spacing.

  14. 78 FR 4365 - Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-22

    ... 3235-AL12 Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major... public comment to establish capital, margin, and segregation requirements for security-based swap dealers... soliciting comment on proposed rules and rule amendments establishing capital, margin, and segregation...

  15. Safe and Secure Services Based on NGN

    NASA Astrophysics Data System (ADS)

    Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito

    Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.

  16. Security Considerations and Recommendations in Computer-Based Testing

    PubMed Central

    Al-Saleem, Saleh M.

    2014-01-01

    Many organizations and institutions around the globe are moving or planning to move their paper-and-pencil based testing to computer-based testing (CBT). However, this conversion will not be the best option for all kinds of exams and it will require significant resources. These resources may include the preparation of item banks, methods for test delivery, procedures for test administration, and last but not least test security. Security aspects may include but are not limited to the identification and authentication of examinee, the risks that are associated with cheating on the exam, and the procedures related to test delivery to the examinee. This paper will mainly investigate the security considerations associated with CBT and will provide some recommendations for the security of these kinds of tests. We will also propose a palm-based biometric authentication system incorporated with basic authentication system (username/password) in order to check the identity and authenticity of the examinee. PMID:25254250

  17. Security considerations and recommendations in computer-based testing.

    PubMed

    Al-Saleem, Saleh M; Ullah, Hanif

    2014-01-01

    Many organizations and institutions around the globe are moving or planning to move their paper-and-pencil based testing to computer-based testing (CBT). However, this conversion will not be the best option for all kinds of exams and it will require significant resources. These resources may include the preparation of item banks, methods for test delivery, procedures for test administration, and last but not least test security. Security aspects may include but are not limited to the identification and authentication of examinee, the risks that are associated with cheating on the exam, and the procedures related to test delivery to the examinee. This paper will mainly investigate the security considerations associated with CBT and will provide some recommendations for the security of these kinds of tests. We will also propose a palm-based biometric authentication system incorporated with basic authentication system (username/password) in order to check the identity and authenticity of the examinee.

  18. Analysis of Vehicle-Based Security Operations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carter, Jason M; Paul, Nate R

    Vehicle-to-vehicle (V2V) communications promises to increase roadway safety by providing each vehicle with 360 degree situational awareness of other vehicles in proximity, and by complementing onboard sensors such as radar or camera in detecting imminent crash scenarios. In the United States, approximately three hundred million automobiles could participate in a fully deployed V2V system if Dedicated Short-Range Communication (DSRC) device use becomes mandatory. The system s reliance on continuous communication, however, provides a potential means for unscrupulous persons to transmit false data in an attempt to cause crashes, create traffic congestion, or simply render the system useless. V2V communications mustmore » be highly scalable while retaining robust security and privacy preserving features to meet the intra-vehicle and vehicle-to-infrastructure communication requirements for a growing vehicle population. Oakridge National Research Laboratory is investigating a Vehicle-Based Security System (VBSS) to provide security and privacy for a fully deployed V2V and V2I system. In the VBSS an On-board Unit (OBU) generates short-term certificates and signs Basic Safety Messages (BSM) to preserve privacy and enhance security. This work outlines a potential VBSS structure and its operational concepts; it examines how a vehicle-based system might feasibly provide security and privacy, highlights remaining challenges, and explores potential mitigations to address those challenges. Certificate management alternatives that attempt to meet V2V security and privacy requirements have been examined previously by the research community including privacy-preserving group certificates, shared certificates, and functional encryption. Due to real-world operational constraints, adopting one of these approaches for VBSS V2V communication is difficult. Timely misbehavior detection and revocation are still open problems for any V2V system. We explore the alternative approaches that

  19. Provably secure identity-based identification and signature schemes from code assumptions

    PubMed Central

    Zhao, Yiming

    2017-01-01

    Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure. PMID:28809940

  20. Provably secure identity-based identification and signature schemes from code assumptions.

    PubMed

    Song, Bo; Zhao, Yiming

    2017-01-01

    Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure.

  1. Multiple Domains of Parental Secure Base Support During Childhood and Adolescence Contribute to Adolescents’ Representations of Attachment as a Secure Base Script

    PubMed Central

    Vaughn, Brian E.; Waters, Theodore E. A.; Steele, Ryan D.; Roisman, Glenn I.; Bost, Kelly K.; Truitt, Warren; Waters, Harriet S.; Booth-LaForce, Cathryn

    2016-01-01

    Although attachment theory claims that early attachment representations reflecting the quality of the child’s “lived experiences” are maintained across developmental transitions, evidence that has emerged over the last decade suggests that the association between early relationship quality and adolescents’ attachment representations is fairly modest in magnitude. We used aspects of parenting beyond sensitivity over childhood and adolescence and early security to predict adolescents’ scripted attachment representations. At age 18 years, 673 participants from the NICHD Study of Early Child Care and Youth Development (SECCYD) completed the Attachment Script Assessment (ASA) from which we derived an assessment of secure base script knowledge. Measures of secure base support from childhood through age 15 years (e.g., parental monitoring of child activity, father presence in the home) were selected as predictors and accounted for an additional 8% of the variance in secure base script knowledge scores above and beyond direct observations of sensitivity and early attachment status alone, suggesting that adolescents’ scripted attachment representations reflect multiple domains of parenting. Cognitive and demographic variables also significantly increased predicted variance in secure base script knowledge by 2% each. PMID:27032953

  2. Preparation of the spacer for narrow electrode gap configuration in ionization-based gas sensor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Saheed, Mohamed Shuaib Mohamed; Mohamed, Norani Muti; Burhanudin, Zainal Arif

    2012-09-26

    Carbon nanotubes (CNTs) have started to be developed as the sensing element for ionization-based gas sensors due to the demand for improved sensitivity, selectivity, stability and other sensing properties beyond what can be offered by the conventional ones. Although these limitations have been overcome, the problems still remain with the conventional ionization-based gas sensors in that they are bulky and operating with large breakdown voltage and high temperature. Recent studies have shown that the breakdown voltage can be reduced by using nanostructured electrodes and narrow electrode gap. Nanostructured electrode in the form of aligned CNTs array with evenly distributed nanotipsmore » can enhance the linear electric field significantly. The later is attributed to the shorter conductivity path through narrow electrode gap. The paper presents the study on the design consideration in order to realize ionization based gas sensor using aligned carbon nanotubes array in an optimum sensor configuration with narrow electrode gap. Several deposition techniques were studied to deposit the spacer, the key component that can control the electrode gap. Plasma spray deposition, electron beam deposition and dry oxidation method were employed to obtain minimum film thickness around 32 {mu}m. For plasma spray method, sand blasting process is required in order to produce rough surface for strong bonding of the deposited film onto the surface. Film thickness, typically about 39 {mu}m can be obtained. For the electron beam deposition and dry oxidation, the film thickness is in the range of nanometers and thus unsuitable to produce the spacer. The deposited multilayer film consisting of copper, alumina and ferum on which CNTs array will be grown was found to be removed during the etching process. This is attributed to the high etching rate on the thin film which can be prevented by reducing the rate and having a thicker conductive copper film.« less

  3. Security of fragile authentication watermarks with localization

    NASA Astrophysics Data System (ADS)

    Fridrich, Jessica

    2002-04-01

    In this paper, we study the security of fragile image authentication watermarks that can localize tampered areas. We start by comparing the goals, capabilities, and advantages of image authentication based on watermarking and cryptography. Then we point out some common security problems of current fragile authentication watermarks with localization and classify attacks on authentication watermarks into five categories. By investigating the attacks and vulnerabilities of current schemes, we propose a variation of the Wong scheme18 that is fast, simple, cryptographically secure, and resistant to all known attacks, including the Holliman-Memon attack9. In the new scheme, a special symmetry structure in the logo is used to authenticate the block content, while the logo itself carries information about the block origin (block index, the image index or time stamp, author ID, etc.). Because the authentication of the content and its origin are separated, it is possible to easily identify swapped blocks between images and accurately detect cropped areas, while being able to accurately localize tampered pixels.

  4. Wideband tunable optoelectronic oscillator based on a microwave photonic filter with an ultra-narrow passband.

    PubMed

    Tang, Haitao; Yu, Yuan; Wang, Ziwei; Xu, Lu; Zhang, Xinliang

    2018-05-15

    A novel wideband tunable optoelectronic oscillator based on a microwave photonic filter (MPF) with an ultra-narrow passband is proposed and experimentally demonstrated. The single-passband MPF is realized by cascading an MPF based on stimulated Brillouin scattering and an infinite impulse response (IIR) MPF based on an active fiber recirculating delay loop. The measured full width at half-maximum bandwidth of the cascaded MPFs is 150 kHz. To the best of my knowledge, this is the first time realizing such a narrow passband in single-passband MPF. The oscillation frequency of the OEO can be tuned from 0 to 40 GHz owing to the wideband tunability of the MPF. Thanks to the ultrahigh mode selectivity of the IIR filter, the mode hopping is successfully suppressed. A stable microwave signal at 8.18 GHz is obtained with a phase noise of -113  dBc/Hz at 10 kHz, and the side mode noise is below -95  dBc/Hz. The signal-to-noise ratio exceeds 50 dB during the tuning process.

  5. Reputation-Based Secure Sensor Localization in Wireless Sensor Networks

    PubMed Central

    He, Jingsha; Xu, Jing; Zhu, Xingye; Zhang, Yuqiang; Zhang, Ting; Fu, Wanqing

    2014-01-01

    Location information of sensor nodes in wireless sensor networks (WSNs) is very important, for it makes information that is collected and reported by the sensor nodes spatially meaningful for applications. Since most current sensor localization schemes rely on location information that is provided by beacon nodes for the regular sensor nodes to locate themselves, the accuracy of localization depends on the accuracy of location information from the beacon nodes. Therefore, the security and reliability of the beacon nodes become critical in the localization of regular sensor nodes. In this paper, we propose a reputation-based security scheme for sensor localization to improve the security and the accuracy of sensor localization in hostile or untrusted environments. In our proposed scheme, the reputation of each beacon node is evaluated based on a reputation evaluation model so that regular sensor nodes can get credible location information from highly reputable beacon nodes to accomplish localization. We also perform a set of simulation experiments to demonstrate the effectiveness of the proposed reputation-based security scheme. And our simulation results show that the proposed security scheme can enhance the security and, hence, improve the accuracy of sensor localization in hostile or untrusted environments. PMID:24982940

  6. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    NASA Astrophysics Data System (ADS)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  7. 75 FR 75207 - Regulation SBSR-Reporting and Dissemination of Security-Based Swap Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-02

    ...In accordance with Section 763 (``Section 763'') and Section 766 (``Section 766'') of Title VII (``Title VII'') of the Dodd-Frank Wall Street Reform and Consumer Protection Act (the ``Dodd-Frank Act''), the Securities and Exchange Commission (``SEC'' or ``Commission'') is proposing Regulation SBSR--Reporting and Dissemination of Security-Based Swap Information (``Regulation SBSR'') under the Securities Exchange Act of 1934 (``Exchange Act'').\\1\\ Proposed Regulation SBSR would provide for the reporting of security- based swap information to registered security-based swap data repositories or the Commission and the public dissemination of security-based swap transaction, volume, and pricing information. Registered security-based swap data repositories would be required to establish and maintain certain policies and procedures regarding how transaction data are reported and disseminated, and participants of registered security-based swap data repositories that are security- based swap dealers or major security-based swap participants would be required to establish and maintain policies and procedures that are reasonably designed to ensure that they comply with applicable reporting obligations. Finally, proposed Regulation SBSR also would require a registered SDR to register with the Commission as a securities information processor on existing Form SIP. ---------------------------------------------------------------------------

  8. Image-based electronic patient records for secured collaborative medical applications.

    PubMed

    Zhang, Jianguo; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen; Yao, Yihong; Cai, Weihua; Jin, Jin; Zhang, Guozhen; Sun, Kun

    2005-01-01

    We developed a Web-based system to interactively display image-based electronic patient records (EPR) for secured intranet and Internet collaborative medical applications. The system consists of four major components: EPR DICOM gateway (EPR-GW), Image-based EPR repository server (EPR-Server), Web Server and EPR DICOM viewer (EPR-Viewer). In the EPR-GW and EPR-Viewer, the security modules of Digital Signature and Authentication are integrated to perform the security processing on the EPR data with integrity and authenticity. The privacy of EPR in data communication and exchanging is provided by SSL/TLS-based secure communication. This presentation gave a new approach to create and manage image-based EPR from actual patient records, and also presented a way to use Web technology and DICOM standard to build an open architecture for collaborative medical applications.

  9. 78 FR 47041 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-02

    ... methodology developed by NationsShares, a firm that develops proprietary derivatives-based indexes and options... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To List Options... the Exchange of options on the Nations VolDex index, a new index that measures changes in implied...

  10. MDA-based EHR application security services.

    PubMed

    Blobel, Bernd; Pharow, Peter

    2004-01-01

    Component-oriented, distributed, virtual EHR systems have to meet enhanced security and privacy requirements. In the context of advanced architectural paradigms such as component-orientation, model-driven, and knowledge-based, standardised security services needed have to be specified and implemented in an integrated way following the same paradigm. This concerns the deployment of formal models, meta-languages, reference models such as the ISO RM-ODP, and development as well as implementation tools. International projects' results presented proceed on that streamline.

  11. An evidence-based concept of implant dentistry. Utilization of short and narrow platform implants.

    PubMed

    Ruiz, Jose-Luis

    2012-09-01

    As a profession, we must remember that tooth replacement is not a luxury; it is often a necessity for health reasons. Although bone augmentation and CBCT and expensive surgical guides are often indicated for complex cases, they are being overused. Simple or straightforward implant cases, when there is sufficient natural bone for narrow or shorter implant, can be predictable performed by well-trained GPs and other trained specialists. Complex cases requiring bone augmentation and other complexities as described herein, should be referred to a surgical specialist. Implant courses and curricula have to be based on the level of complexity of implant surgery that each clinician wishes to provide to his or her patients. Using a "logical approach" to implant dentistry keeps cases simple or straightforward, and more accessible to patients by the correct use of narrow and shorter implants.

  12. Effects of narrow-base walking and dual tasking on gait spatiotemporal characteristics in anterior cruciate ligament-injured adults compared to healthy adults.

    PubMed

    Mazaheri, Masood; Negahban, Hossein; Soltani, Maryam; Mehravar, Mohammad; Tajali, Shirin; Hessam, Masumeh; Salavati, Mahyar; Kingma, Idsart

    2017-08-01

    The present experiment was conducted to examine the hypothesis that challenging control through narrow-base walking and/or dual tasking affects ACL-injured adults more than healthy control adults. Twenty male ACL-injured adults and twenty healthy male adults walked on a treadmill at a comfortable speed under two base-of-support conditions, normal-base versus narrow-base, with and without a cognitive task. Gait patterns were assessed using mean and variability of step length and mean and variability of step velocity. Cognitive performance was assessed using the number of correct counts in a backward counting task. Narrow-base walking resulted in a larger decrease in step length and a more pronounced increase in variability of step length and of step velocity in ACL-injured adults than in healthy adults. For most of the gait parameters and for backward counting performance, the dual-tasking effect was similar between the two groups. ACL-injured adults adopt a more conservative and more unstable gait pattern during narrow-base walking. This can be largely explained by deficits of postural control in ACL-injured adults, which impairs gait under more balance-demanding conditions. The observation that the dual-tasking effect did not differ between the groups may be explained by the fact that walking is an automatic process that involves minimal use of attentional resources, even after ACL injury. Clinicians should consider the need to include aspects of terrain complexity, such as walking on a narrow walkway, in gait assessment and training of patients with ACL injury. III.

  13. Secure password-based authenticated key exchange for web services

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options inmore » the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.« less

  14. Approach to spatial information security based on digital certificate

    NASA Astrophysics Data System (ADS)

    Cong, Shengri; Zhang, Kai; Chen, Baowen

    2005-11-01

    With the development of the online applications of geographic information systems (GIS) and the spatial information services, the spatial information security becomes more important. This work introduced digital certificates and authorization schemes into GIS to protect the crucial spatial information combining the techniques of the role-based access control (RBAC), the public key infrastructure (PKI) and the privilege management infrastructure (PMI). We investigated the spatial information granularity suited for sensitivity marking and digital certificate model that fits the need of GIS security based on the semantics analysis of spatial information. It implements a secure, flexible, fine-grained data access based on public technologies in GIS in the world.

  15. Neural network based chemical structure indexing.

    PubMed

    Rughooputh, S D; Rughooputh, H C

    2001-01-01

    Searches on chemical databases are presently dominated by the text-based content of a paper which can be indexed into a keyword searchable form. Such traditional searches can prove to be very time-consuming and discouraging to the less frequent scientist. We report a simple chemical indexing based on the molecular structure alone. The method used is based on a one-to-one correspondence between the chemical structure presented as an image to a neural network and the corresponding binary output. The method is direct and less cumbersome (compared with traditional methods) and proves to be robust, elegant, and very versatile.

  16. Is Perceptual Narrowing Too Narrow?

    ERIC Educational Resources Information Center

    Cashon, Cara H.; Denicola, Christopher A.

    2011-01-01

    There is a growing list of examples illustrating that infants are transitioning from having earlier abilities that appear more "universal," "broadly tuned," or "unconstrained" to having later abilities that appear more "specialized," "narrowly tuned," or "constrained." Perceptual narrowing, a well-known phenomenon related to face, speech, and…

  17. The Association Between NIMH Funding and h-index in Psychiatry.

    PubMed

    Saraykar, Smita; Saleh, Ayman; Selek, Salih

    2017-08-01

    Academic productivity is measured under many domains: number of high impact publications, objective bibliometrics, securing extra-mural funding, etc. Citation impact is measured by an objective bibliometric called h-index. Securing funding from the National Institute of Mental Health (NIMH) is considered prestigious in the field of psychiatry. It is unknown if NIMH takes into consideration the author's h-index during the grant review process. The goal of this study was to determine the correlation between a principal investigator's (PI's) h-index and the NIMH funding. Correlational analysis was conducted on publicly available 2012 NIMH funding data to assess the relationship between NIMH funding and a PI's h-index. A simple linear regression was calculated to predict the h-index based on the amount of funding offered to the PI. A total of 139 PIs and their corresponding h-index and NIMH funding (direct, indirect, and total cost) were included. A strong correlation was found between h-index and NIMH funding: direct cost (r = 0.632, p < 0.001); indirect cost (r = 0.570, p < 0.001); and total cost (r = 0.639, p < 0.001). Total funding significantly predicted h-index, β = 0.821, t (2.599), p < 0.01, and explained a significant proportion of variance in h-index, R 2  = 0.410, F (3, 119) = 27.59, p < 0.001. A strong relationship was seen between h-index and securing NIMH funding. Thus, h-index stands out as a reliable measure for assessing the impact of scholarly contributions in academic psychiatry and can be used as an adjunct for performance evaluations, appointment, and promotions in academia.

  18. A mobile agent-based moving objects indexing algorithm in location based service

    NASA Astrophysics Data System (ADS)

    Fang, Zhixiang; Li, Qingquan; Xu, Hong

    2006-10-01

    This paper will extends the advantages of location based service, specifically using their ability to management and indexing the positions of moving object, Moreover with this objective in mind, a mobile agent-based moving objects indexing algorithm is proposed in this paper to efficiently process indexing request and acclimatize itself to limitation of location based service environment. The prominent feature of this structure is viewing moving object's behavior as the mobile agent's span, the unique mapping between the geographical position of moving objects and span point of mobile agent is built to maintain the close relationship of them, and is significant clue for mobile agent-based moving objects indexing to tracking moving objects.

  19. Unsupervised Feature Selection Based on the Morisita Index for Hyperspectral Images

    NASA Astrophysics Data System (ADS)

    Golay, Jean; Kanevski, Mikhail

    2017-04-01

    Hyperspectral sensors are capable of acquiring images with hundreds of narrow and contiguous spectral bands. Compared with traditional multispectral imagery, the use of hyperspectral images allows better performance in discriminating between land-cover classes, but it also results in large redundancy and high computational data processing. To alleviate such issues, unsupervised feature selection techniques for redundancy minimization can be implemented. Their goal is to select the smallest subset of features (or bands) in such a way that all the information content of a data set is preserved as much as possible. The present research deals with the application to hyperspectral images of a recently introduced technique of unsupervised feature selection: the Morisita-Based filter for Redundancy Minimization (MBRM). MBRM is based on the (multipoint) Morisita index of clustering and on the Morisita estimator of Intrinsic Dimension (ID). The fundamental idea of the technique is to retain only the bands which contribute to increasing the ID of an image. In this way, redundant bands are disregarded, since they have no impact on the ID. Besides, MBRM has several advantages over benchmark techniques: in addition to its ability to deal with large data sets, it can capture highly-nonlinear dependences and its implementation is straightforward in any programming environment. Experimental results on freely available hyperspectral images show the good effectiveness of MBRM in remote sensing data processing. Comparisons with benchmark techniques are carried out and random forests are used to assess the performance of MBRM in reducing the data dimensionality without loss of relevant information. References [1] C. Traina Jr., A.J.M. Traina, L. Wu, C. Faloutsos, Fast feature selection using fractal dimension, in: Proceedings of the XV Brazilian Symposium on Databases, SBBD, pp. 158-171, 2000. [2] J. Golay, M. Kanevski, A new estimator of intrinsic dimension based on the multipoint

  20. A model based security testing method for protocol implementation.

    PubMed

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  1. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    ERIC Educational Resources Information Center

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  2. An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment

    PubMed Central

    Muthurajan, Vinothkumar; Narayanasamy, Balaji

    2016-01-01

    Cloud computing requires the security upgrade in data transmission approaches. In general, key-based encryption/decryption (symmetric and asymmetric) mechanisms ensure the secure data transfer between the devices. The symmetric key mechanisms (pseudorandom function) provide minimum protection level compared to asymmetric key (RSA, AES, and ECC) schemes. The presence of expired content and the irrelevant resources cause unauthorized data access adversely. This paper investigates how the integrity and secure data transfer are improved based on the Elliptic Curve based Schnorr scheme. This paper proposes a virtual machine based cloud model with Hybrid Cloud Security Algorithm (HCSA) to remove the expired content. The HCSA-based auditing improves the malicious activity prediction during the data transfer. The duplication in the cloud server degrades the performance of EC-Schnorr based encryption schemes. This paper utilizes the blooming filter concept to avoid the cloud server duplication. The combination of EC-Schnorr and blooming filter efficiently improves the security performance. The comparative analysis between proposed HCSA and the existing Distributed Hash Table (DHT) regarding execution time, computational overhead, and auditing time with auditing requests and servers confirms the effectiveness of HCSA in the cloud security model creation. PMID:26981584

  3. An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment.

    PubMed

    Muthurajan, Vinothkumar; Narayanasamy, Balaji

    2016-01-01

    Cloud computing requires the security upgrade in data transmission approaches. In general, key-based encryption/decryption (symmetric and asymmetric) mechanisms ensure the secure data transfer between the devices. The symmetric key mechanisms (pseudorandom function) provide minimum protection level compared to asymmetric key (RSA, AES, and ECC) schemes. The presence of expired content and the irrelevant resources cause unauthorized data access adversely. This paper investigates how the integrity and secure data transfer are improved based on the Elliptic Curve based Schnorr scheme. This paper proposes a virtual machine based cloud model with Hybrid Cloud Security Algorithm (HCSA) to remove the expired content. The HCSA-based auditing improves the malicious activity prediction during the data transfer. The duplication in the cloud server degrades the performance of EC-Schnorr based encryption schemes. This paper utilizes the blooming filter concept to avoid the cloud server duplication. The combination of EC-Schnorr and blooming filter efficiently improves the security performance. The comparative analysis between proposed HCSA and the existing Distributed Hash Table (DHT) regarding execution time, computational overhead, and auditing time with auditing requests and servers confirms the effectiveness of HCSA in the cloud security model creation.

  4. Secure Base Narrative Representations and Intimate Partner Violence: A Dyadic Perspective

    PubMed Central

    Karakurt, Gunnur; Silver, Kristin E.; Keiley, Margaret K.

    2015-01-01

    This study aimed to understand the relationship between secure base phenomena and dating violence among couples. Within a relationship, a secure base can be defined as a balancing act of proximity-seeking and exploration at various times and contexts with the assurance of a caregiver’s availability and responsiveness in emotionally distressing situations. Participants were 87 heterosexual couples. The Actor-Partner Interdependence Model was used to examine the relationship between each partner’s scores on secure base representational knowledge and intimate partner violence. Findings demonstrated that women’s secure base representational knowledge had a significant direct negative effect on the victimization of both men and women, while men’s secure base representational knowledge did not have any significant partner or actor effects. Therefore, findings suggest that women with insecure attachments may be more vulnerable to being both the victims and the perpetrators of PMID:27445432

  5. Risk assessment for sustainable food security in China according to integrated food security--taking Dongting Lake area for example.

    PubMed

    Qi, Xiaoxing; Liu, Liming; Liu, Yabin; Yao, Lan

    2013-06-01

    Integrated food security covers three aspects: food quantity security, food quality security, and sustainable food security. Because sustainable food security requires that food security must be compatible with sustainable development, the risk assessment of sustainable food security is becoming one of the most important issues. This paper mainly focuses on the characteristics of sustainable food security problems in the major grain-producing areas in China. We establish an index system based on land resources and eco-environmental conditions and apply a dynamic assessment method based on status assessments and trend analysis models to overcome the shortcomings of the static evaluation method. Using fuzzy mathematics, the risks are categorized into four grades: negligible risk, low risk, medium risk, and high risk. A case study was conducted in one of China's major grain-producing areas: Dongting Lake area. The results predict that the status of the sustainable food security in the Dongting Lake area is unsatisfactory for the foreseeable future. The number of districts at the medium-risk range will increase from six to ten by 2015 due to increasing population pressure, a decrease in the cultivated area, and a decrease in the effective irrigation area. Therefore, appropriate policies and measures should be put forward to improve it. The results could also provide direct support for an early warning system-which could be used to monitor food security trends or nutritional status so to inform policy makers of impending food shortages-to prevent sustainable food security risk based on some classical systematic methods. This is the first research of sustainable food security in terms of risk assessment, from the perspective of resources and the environment, at the regional scale.

  6. Method for secure electronic voting system: face recognition based approach

    NASA Astrophysics Data System (ADS)

    Alim, M. Affan; Baig, Misbah M.; Mehboob, Shahzain; Naseem, Imran

    2017-06-01

    In this paper, we propose a framework for low cost secure electronic voting system based on face recognition. Essentially Local Binary Pattern (LBP) is used for face feature characterization in texture format followed by chi-square distribution is used for image classification. Two parallel systems are developed based on smart phone and web applications for face learning and verification modules. The proposed system has two tire security levels by using person ID followed by face verification. Essentially class specific threshold is associated for controlling the security level of face verification. Our system is evaluated three standard databases and one real home based database and achieve the satisfactory recognition accuracies. Consequently our propose system provides secure, hassle free voting system and less intrusive compare with other biometrics.

  7. Securing Real-Time Sessions in an IMS-Based Architecture

    NASA Astrophysics Data System (ADS)

    Cennamo, Paolo; Fresa, Antonio; Longo, Maurizio; Postiglione, Fabio; Robustelli, Anton Luca; Toro, Francesco

    The emerging all-IP mobile network infrastructures based on 3rd Generation IP Multimedia Subsystem philosophy are characterised by radio access technology independence and ubiquitous connectivity for mobile users. Currently, great focus is being devoted to security issues since most of the security threats presently affecting the public Internet domain, and the upcoming ones as well, are going to be suffered by mobile users in the years to come. While a great deal of research activity, together with standardisation efforts and experimentations, is carried out on mechanisms for signalling protection, very few integrated frameworks for real-time multimedia data protection have been proposed in a context of IP Multimedia Subsystem, and even fewer experimental results based on testbeds are available. In this paper, after a general overview of the security issues arising in an advanced IP Multimedia Subsystem scenario, a comprehensive infrastructure for real-time multimedia data protection, based on the adoption of the Secure Real-Time Protocol, is proposed; then, the development of a testbed incorporating such functionalities, including mechanisms for key management and cryptographic context transfer, and allowing the setup of Secure Real-Time Protocol sessions is presented; finally, experimental results are provided together with quantitative assessments and comparisons of system performances for audio sessions with and without the adoption of the Secure Real-Time Protocol framework.

  8. A Model Based Security Testing Method for Protocol Implementation

    PubMed Central

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation. PMID:25105163

  9. Agents Based e-Commerce and Securing Exchanged Information

    NASA Astrophysics Data System (ADS)

    Al-Jaljouli, Raja; Abawajy, Jemal

    Mobile agents have been implemented in e-Commerce to search and filter information of interest from electronic markets. When the information is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent’s itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described, which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol usingSymbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data-authenticity, origin confidentiality and data non-repudiability.

  10. Terahertz plasmonic lasers with narrow beams and large tunability

    NASA Astrophysics Data System (ADS)

    Jin, Yuan; Wu, Chongzhao; Reno, John L.; Kumar, Sushil

    2017-02-01

    Plasmonic lasers generate coherent long-range or localized surface-plasmon-polaritons (SPPs), where the SPP mode exists at the interface of the metal (or a metallic nanoparticle) and a dielectric. Metallic-cavities sup- porting SPP modes are also utilized for terahertz quantum-cascade lasers (QCLs). Due to subwavelength apertures, plasmonic lasers have highly divergent radiation patterns. Recently, we theoretically and experimentally demonstrated a new technique for implementing distributed-feedback (DFB), which is termed as an antenna- feedback scheme, to establish a hybrid SPP mode in the surrounding medium of a plasmonic laser's cavity with a large wavefront. This technique allows such lasers to radiate in narrow beams without requirement of any specific design considerations for phase-matching. Experimental demonstration is done for terahertz QCLs that show beam-divergence as small as 4-degrees. The antenna-feedback scheme has a characteristic feature in that refractive-index of the laser's surrounding medium affects its radiative frequency in the same vein as refractive- index of the cavity. Hence, any perturbations in the refractive-index of the surrounding medium could lead to large modulation in the laser's emission frequency. Along this line, we report 57 GHz reversible, continuous, and mode-hop-free tuning of such QCLs operating at 78 K based on post-process deposition/etching of a dielectric on an already mounted QCL chip. This is the largest tuning range achieved for terahertz QCLs when operating much above the temperature of liquid-Helium. We review the aforementioned experimental results and discuss methods to increase optical power output from terahertz QCLs with antenna-feedback. Peak power output of 13 mW is realized for a 3.3 THz QCL operating in a Stirling cooler at 54 K. A new dual-slit photonic structure based on antenna-feedback scheme is proposed to further improve output power as well as provide enhanced tunability.

  11. Enhancing Heart-Beat-Based Security for mHealth Applications.

    PubMed

    Seepers, Robert M; Strydis, Christos; Sourdis, Ioannis; De Zeeuw, Chris I

    2017-01-01

    In heart-beat-based security, a security key is derived from the time difference between consecutive heart beats (the inter-pulse interval, IPI), which may, subsequently, be used to enable secure communication. While heart-beat-based security holds promise in mobile health (mHealth) applications, there currently exists no work that provides a detailed characterization of the delivered security in a real system. In this paper, we evaluate the strength of IPI-based security keys in the context of entity authentication. We investigate several aspects that should be considered in practice, including subjects with reduced heart-rate variability (HRV), different sensor-sampling frequencies, intersensor variability (i.e., how accurate each entity may measure heart beats) as well as average and worst-case-authentication time. Contrary to the current state of the art, our evaluation demonstrates that authentication using multiple, less-entropic keys may actually increase the key strength by reducing the effects of intersensor variability. Moreover, we find that the maximal key strength of a 60-bit key varies between 29.2 bits and only 5.7 bits, depending on the subject's HRV. To improve security, we introduce the inter-multi-pulse interval (ImPI), a novel method of extracting entropy from the heart by considering the time difference between nonconsecutive heart beats. Given the same authentication time, using the ImPI for key generation increases key strength by up to 3.4 × (+19.2 bits) for subjects with limited HRV, at the cost of an extended key-generation time of 4.8 × (+45 s).

  12. IoT security with one-time pad secure algorithm based on the double memory technique

    NASA Astrophysics Data System (ADS)

    Wiśniewski, Remigiusz; Grobelny, Michał; Grobelna, Iwona; Bazydło, Grzegorz

    2017-11-01

    Secure encryption of data in Internet of Things is especially important as many information is exchanged every day and the number of attack vectors on IoT elements still increases. In the paper a novel symmetric encryption method is proposed. The idea bases on the one-time pad technique. The proposed solution applies double memory concept to secure transmitted data. The presented algorithm is considered as a part of communication protocol and it has been initially validated against known security issues.

  13. Intramyocardial arterial narrowing in dogs with subaortic stenosis.

    PubMed

    Falk, T; Jönsson, L; Pedersen, H D

    2004-09-01

    Earlier studies have described intramyocardial arterial narrowing based on hyperplasia and hypertrophy of the vessel wall in dogs with subaortic stenosis (SAS). In theory, such changes might increase the risk of sudden death, as they seem to do in heart disease in other species. This retrospective pathological study describes and quantifies intramyocardial arterial narrowing in 44 dogs with naturally occurring SAS and in eight control dogs. The majority of the dogs with SAS died suddenly (n=27); nine had died or been euthanased with signs of heart failure and eight were euthanased without clinical signs. Dogs with SAS had significantly narrower intramyocardial arteries (P<0.001) and more myocardial fibrosis (P<0.001) than control dogs. Male dogs and those with more severe hypertrophy had more vessel narrowing (P=0.02 and P=0.02, respectively), whereas dogs with dilated hearts had slightly less pronounced arterial thickening (P=0.01). Arterial narrowing was not related to age, but fibrosis increased with age (P=0.047). Dogs that died suddenly did not have a greater number of arterial changes than other dogs with SAS. This study suggests that most dogs with SAS have intramyocardial arterial narrowing and that the risk of dying suddenly is not significantly related to the overall degree of vessel obliteration.

  14. Perimeter security alarm system based on fiber Bragg grating

    NASA Astrophysics Data System (ADS)

    Zhang, Cui; Wang, Lixin

    2010-11-01

    With the development of the society and economy and the improvement of living standards, people need more and more pressing security. Perimeter security alarm system is widely regarded as the first line of defense. A highly sensitive Fiber Bragg grating (FBG) vibration sensor based on the theory of the string vibration, combined with neural network adaptive dynamic programming algorithm for the perimeter security alarm system make the detection intelligently. Intelligent information processing unit identify the true cause of the vibration of the invasion or the natural environment by analyzing the frequency of vibration signals, energy, amplitude and duration. Compared with traditional perimeter security alarm systems, such as infrared perimeter security system and electric fence system, FBG perimeter security alarm system takes outdoor passive structures, free of electromagnetic interference, transmission distance through optical fiber can be as long as 20 km It is able to detect the location of event within short period of time (high-speed response, less than 3 second).This system can locate the fiber cable's breaking sites and alarm automatically if the cable were be cut. And the system can prevent effectively the false alarm from small animals, birds, strong wind, scattering things, snowfalls and vibration of sensor line itself. It can also be integrated into other security systems. This system can be widely used in variety fields such as military bases, nuclear sites, airports, warehouses, prisons, residence community etc. It will be a new force of perimeter security technology.

  15. Construction and Evolution of a Multidimensional Well-Being Index for the Spanish Regions

    ERIC Educational Resources Information Center

    Jurado, Antonio; Perez-Mayo, Jesus

    2012-01-01

    The study presented here is an attempt to calculate a comparative multidimensional index of economic well-being for the Spanish Autonomous Communities. Based on the dimensions of adjusted consumption, real wealth, equity and economic security per inhabitant, we obtain one relative index using a system of uniform weightings, a second resulting from…

  16. Distributed intrusion detection system based on grid security model

    NASA Astrophysics Data System (ADS)

    Su, Jie; Liu, Yahui

    2008-03-01

    Grid computing has developed rapidly with the development of network technology and it can solve the problem of large-scale complex computing by sharing large-scale computing resource. In grid environment, we can realize a distributed and load balance intrusion detection system. This paper first discusses the security mechanism in grid computing and the function of PKI/CA in the grid security system, then gives the application of grid computing character in the distributed intrusion detection system (IDS) based on Artificial Immune System. Finally, it gives a distributed intrusion detection system based on grid security system that can reduce the processing delay and assure the detection rates.

  17. An efficient and provable secure revocable identity-based encryption scheme.

    PubMed

    Wang, Changji; Li, Yuan; Xia, Xiaonan; Zheng, Kangjia

    2014-01-01

    Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE) has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters' identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters.

  18. Narrow Escape of Interacting Diffusing Particles

    NASA Astrophysics Data System (ADS)

    Agranov, Tal; Meerson, Baruch

    2018-03-01

    The narrow escape problem deals with the calculation of the mean escape time (MET) of a Brownian particle from a bounded domain through a small hole on the domain's boundary. Here we develop a formalism which allows us to evaluate the nonescape probability of a gas of diffusing particles that may interact with each other. In some cases the nonescape probability allows us to evaluate the MET of the first particle. The formalism is based on the fluctuating hydrodynamics and the recently developed macroscopic fluctuation theory. We also uncover an unexpected connection between the narrow escape of interacting particles and thermal runaway in chemical reactors.

  19. The lead-lag relationship between stock index and stock index futures: A thermal optimal path method

    NASA Astrophysics Data System (ADS)

    Gong, Chen-Chen; Ji, Shen-Dan; Su, Li-Ling; Li, Sai-Ping; Ren, Fei

    2016-02-01

    The study of lead-lag relationship between stock index and stock index futures is of great importance for its wide application in hedging and portfolio investments. Previous works mainly use conventional methods like Granger causality test, GARCH model and error correction model, and focus on the causality relation between the index and futures in a certain period. By using a non-parametric approach-thermal optimal path (TOP) method, we study the lead-lag relationship between China Securities Index 300 (CSI 300), Hang Seng Index (HSI), Standard and Poor 500 (S&P 500) Index and their associated futures to reveal the variance of their relationship over time. Our finding shows evidence of pronounced futures leadership for well established index futures, namely HSI and S&P 500 index futures, while index of developing market like CSI 300 has pronounced leadership. We offer an explanation based on the measure of an indicator which quantifies the differences between spot and futures prices for the surge of lead-lag function. Our results provide new perspectives for the understanding of the dynamical evolution of lead-lag relationship between stock index and stock index futures, which is valuable for the study of market efficiency and its applications.

  20. 76 FR 42395 - Business Conduct Standards for Security-Based Swap Dealers and Major Security-Based Swap...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-18

    ... received. Table of Contents I. Introduction A. Statutory Framework B. Consultations C. Approach to Drafting.... Generally B. Consistency With CFTC Approach IV. Paperwork Reduction Act A. Summary of Collections of... that may rely on security-based swaps to manage risk and reduce volatility. C. Approach to Drafting the...

  1. Practical security analysis of continuous-variable quantum key distribution with jitter in clock synchronization

    NASA Astrophysics Data System (ADS)

    Xie, Cailang; Guo, Ying; Liao, Qin; Zhao, Wei; Huang, Duan; Zhang, Ling; Zeng, Guihua

    2018-03-01

    How to narrow the gap of security between theory and practice has been a notoriously urgent problem in quantum cryptography. Here, we analyze and provide experimental evidence of the clock jitter effect on the practical continuous-variable quantum key distribution (CV-QKD) system. The clock jitter is a random noise which exists permanently in the clock synchronization in the practical CV-QKD system, it may compromise the system security because of its impact on data sampling and parameters estimation. In particular, the practical security of CV-QKD with different clock jitter against collective attack is analyzed theoretically based on different repetition frequencies, the numerical simulations indicate that the clock jitter has more impact on a high-speed scenario. Furthermore, a simplified experiment is designed to investigate the influence of the clock jitter.

  2. Attachment security and obesity in US preschool-aged children.

    PubMed

    Anderson, Sarah E; Whitaker, Robert C

    2011-03-01

    To estimate the association between attachment security in children aged 24 months and their risk for obesity at 4½ years of age. Insecure attachment is associated with unhealthy physiologic and behavioral responses to stress, which could lead to development of obesity. Cohort study. National sample of US children born in 2001. Children and mothers participating in the 2003 and 2005-2006 waves of the Early Childhood Longitudinal Study, Birth Cohort, conducted by the National Center for Education Statistics. Our analytic sample included 6650 children (76.0% of children assessed in both waves). Attachment security at 24 months was assessed by trained interviewers during observation in the child's home. Insecure attachment was defined as lowest quartile of attachment security, based on the security score from the Toddler Attachment Sort-45 Item. Obesity at 4½ years of age (sex-specific body mass index ≥95th percentile for age). The prevalence of obesity was 23.1% in children with insecure attachment and 16.6% in those with secure attachment. For children with insecure attachment, the odds of obesity were 1.30 (95% confidence interval, 1.05-1.62) times higher than for children with secure attachment after controlling for the quality of mother-child interaction during play, parenting practices related to obesity, maternal body mass index, and sociodemographic characteristics. Insecure attachment in early childhood may be a risk factor for obesity. Interventions to increase children's attachment security should examine the effects on children's weight.

  3. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.

    PubMed

    Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua

    2015-12-17

    Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  4. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks

    PubMed Central

    Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua

    2015-01-01

    Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism. PMID:26694409

  5. Two RFID standard-based security protocols for healthcare environments.

    PubMed

    Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E

    2013-10-01

    Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.

  6. A novel fuzzy logic-based image steganography method to ensure medical data security.

    PubMed

    Karakış, R; Güler, I; Çapraz, I; Bilir, E

    2015-12-01

    This study aims to secure medical data by combining them into one file format using steganographic methods. The electroencephalogram (EEG) is selected as hidden data, and magnetic resonance (MR) images are also used as the cover image. In addition to the EEG, the message is composed of the doctor׳s comments and patient information in the file header of images. Two new image steganography methods that are based on fuzzy-logic and similarity are proposed to select the non-sequential least significant bits (LSB) of image pixels. The similarity values of the gray levels in the pixels are used to hide the message. The message is secured to prevent attacks by using lossless compression and symmetric encryption algorithms. The performance of stego image quality is measured by mean square of error (MSE), peak signal-to-noise ratio (PSNR), structural similarity measure (SSIM), universal quality index (UQI), and correlation coefficient (R). According to the obtained result, the proposed method ensures the confidentiality of the patient information, and increases data repository and transmission capacity of both MR images and EEG signals. Copyright © 2015 Elsevier Ltd. All rights reserved.

  7. Can experience-based household food security scales help improve food security governance?

    PubMed

    Pérez-Escamilla, Rafael

    2012-12-01

    Experience-based food security scales (EBFSSs) have been shown to be valid across world regions. EBFSSs are increasingly been included in national food and nutrition assessments and food hardship items have been added to regional and global public opinion polls. EBFSSs meet the SMART criteria for identifying useful indicators. And have the potential to help improve accountability, transparency, intersectoral coordination and a more effective and equitable distribution of resources. EBFSSs have increased awareness about food and nutrition insecurity in the court of public opinion. Thus, it's important to understand the potential that EBFSSs have for improving food and nutrition security governance within and across countries. The case of Brazil illustrates the strong likelihood that EBFSSs do have a strong potential to influence food and governance from the national to the municipal level. A recent Gallup World Poll data analysis on the influence of the '2008 food crisis' on food hardship illustrates how even a single item from EBFSSs can help examine if food security governance in different world regions modifies the impact of crises on household food insecurity. Systematic research that bridges across economics, political science, ethics, public health and program evaluation is needed to better understand if and how measurement in general and EBFSSs in particular affect food security governance.

  8. Quantitative analysis of Indonesia's reserves and energy security as an evaluation by the nation in facing global competition

    NASA Astrophysics Data System (ADS)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede

    2015-12-01

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy

  9. Computer-Based Indexing on a Small Scale: Bibliography.

    ERIC Educational Resources Information Center

    Douglas, Kimberly; Wismer, Don

    The 131 references on small scale computer-based indexing cited in this bibliography are subdivided as follows: general, general (computer), index structure, microforms, specific systems, KWIC KWAC KWOC, and thesauri. (RAA)

  10. Narrow Band Filter at 1550 nm Based on Quasi-One-Dimensional Photonic Crystal with a Mirror-Symmetric Heterostructure.

    PubMed

    Wang, Fang; Cheng, Yong Zhi; Wang, Xian; Zhang, Yi Nan; Nie, Yan; Gong, Rong Zhou

    2018-06-27

    In this paper, we present a high-efficiency narrow band filter (NBF) based on quasi-one-dimensional photonic crystal (PC) with a mirror symmetric heterostructure. Similarly to the Fabry-Perot-like resonance cavity, the alternately-arranged dielectric layers on both sides act as the high reflectance and the junction layers used as the defect mode of the quasi-one-dimensional PC, which can be designed as a NBF. The critical conditions for the narrow pass band with high transmittance are demonstrated and analyzed by simulation and experiment. The simulation results indicate that the transmission peak of the quasi-one-dimensional PC-based NBF is up to 95.99% at the telecommunication wavelength of 1550 nm, which agrees well with the experiment. Furthermore, the influences of the periodicity and thickness of dielectric layers on the transmission properties of the PC-based NBF also have been studied numerically. Due to its favorable properties of PC-based NBF, it is can be found to have many potential applications, such as detection, sensing, and communication.

  11. Security analysis of quadratic phase based cryptography

    NASA Astrophysics Data System (ADS)

    Muniraj, Inbarasan; Guo, Changliang; Malallah, Ra'ed; Healy, John J.; Sheridan, John T.

    2016-09-01

    The linear canonical transform (LCT) is essential in modeling a coherent light field propagation through first-order optical systems. Recently, a generic optical system, known as a Quadratic Phase Encoding System (QPES), for encrypting a two-dimensional (2D) image has been reported. It has been reported together with two phase keys the individual LCT parameters serve as keys of the cryptosystem. However, it is important that such the encryption systems also satisfies some dynamic security properties. Therefore, in this work, we examine some cryptographic evaluation methods, such as Avalanche Criterion and Bit Independence, which indicates the degree of security of the cryptographic algorithms on QPES. We compare our simulation results with the conventional Fourier and the Fresnel transform based DRPE systems. The results show that the LCT based DRPE has an excellent avalanche and bit independence characteristics than that of using the conventional Fourier and Fresnel based encryption systems.

  12. Debating space security: Capabilities and vulnerabilities

    NASA Astrophysics Data System (ADS)

    Sankaran, Jaganath

    The U.S. position in the debate on space security has been that (1) space-based systems could be developed and used to obtain decisive warfighting superiority over an adversary, and (2) these space-based systems, because they might give such an inordinate advantage over any adversary, will be attacked. The Russians and Chinese, in contrast, claim to be threatened by U.S. aspirations in space but deny that they pose a serious threat to U.S. space-based systems. They view the development of advanced military space systems by the United States as evidence of a growing gap of military capabilities limited only by technological—not political—constraints. They argue that U.S. missile defense systems operating in coordination with advanced satellite sensors would weaken their nuclear retaliatory potential. This dissertation argues that the positions held by both of these parties are more extreme than warranted. An analytical evaluation quickly narrows the touted capabilities and assumed vulnerabilities of space systems to a much smaller set of concerns that can be addressed by collaboration. Chapter 2: Operationally Responsive Space (ORS): Is 24/7 Warfighter Support Feasible? demonstrates the infeasibility of dramatically increasing U.S. warfighting superiority by using satellites. Chapter 3: What Can be Achieved by Attacking Satellites? makes the case that although U.S. armed forces rely extensively on its satellite infrastructure, that does not immediately make them desirable targets. The functions performed by military satellites are diffused among large constellations with redundancies. Also, some of the functions performed by these satellites can be substituted for by other terrestrial and aerial systems. Chapter 4: The Limits of Chinese Anti-Satellite Missiles demonstrates that anti-satellite (ASAT) intercepts are very complex under realistic conditions and that a potential adversary with space capabilities comparable to China's has very limited capability to

  13. Transitions: Managing the Transfer of Security Responsibility

    DTIC Science & Technology

    2010-02-05

    Index 1.2_Transitions-ConceptNote_v2.0_draft Index Transitions: Managing the Transfer of Security Responsibility A Concept Paper...reporting burden for the collection of information is estimated to average 1 hour per response , including the time for reviewing instructions...TITLE AND SUBTITLE Transitions: Managing the Transfer of Security Responsibility 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  14. [An emergy-ecological footprint model based evaluation of ecological security at the old industrial area in Northeast China: A case study of Liaoning Province.

    PubMed

    Yang, Qing; Lu, Cheng Peng; Zhou, Feng; Geng, Yong; Jing, Hong Shuang; Ren, Wan Xia; Xue, Bing

    2016-05-01

    Based on the integrated model of emergy-ecological footprint approaches, the ecological security of Liaoning Province, a typical case for the old industrial area, was quantitatively evaluated from 2003 to 2012, followed by a scenario analysis on the development trend of the ecological secu-rity by employing the gray kinetic model. The results showed that, from 2003 to 2012, the value of emergy ecological-capacity per capita in Liaoning Province decreased from 3.13 hm 2 to 3.07 hm 2 , while the emergy-ecological footprint increased from 13.88 hm 2 to 21.96 hm 2 , which indicated that the ecological deficit existed in Liaoning Province and the situation was getting worse. The ecological pressure index increased from 4.43 to 7.16 during the studied period, and the alert level of ecological security changed from light to middle level. According to the development trend, the emergy ecological capacity per capita during 2013-2022 would correspondingly decrease from 3.04 hm 2 to 2.98 hm 2 , while the emergy ecological footprint would increase from 22.72 hm 2 to 35.87 hm 2 , the ecological pressure index would increase from 7.46 to 12.04, and the ecological deficit would keep increasing and the ecological security level would slide into slightly unsafe condition. The alert level of ecological security would turn to be middle or serious, suggesting the problems in ecological safety needed to be solved urgently.

  15. [The concept and measurement of food security].

    PubMed

    Kim, Kirang; Kim, Mi Kyung; Shin, Young Jeon

    2008-11-01

    During the past two decades, food deprivation and hunger have been recognized to be not just the concerns of only underdeveloped or developing countries, but as problems for many affluent Western nations as well. Many countries have made numerous efforts to define and measure the extent of these problems. Based on these efforts, the theory and practice of food security studies has significantly evolved during the last decades. Thus, this study aims to provide a comprehensive review of the concept and measurement of food security. In this review, we introduce the definition and background of food security, we describe the impact of food insecurity on nutrition and health, we provide its measurements and operational instruments and we discuss its applications and implications. Some practical information for the use of the food security index in South Korea is also presented. Food security is an essential element in achieving a good nutritional and health status and it has an influence to reduce poverty. The information about the current understanding of food security can help scientists, policy makers and program practitioners conduct research and maintain outreach programs that address the issues of poverty and the promotion of food security.

  16. Narrow-linewidth Q-switched random distributed feedback fiber laser.

    PubMed

    Xu, Jiangming; Ye, Jun; Xiao, Hu; Leng, Jinyong; Wu, Jian; Zhang, Hanwei; Zhou, Pu

    2016-08-22

    A narrow-linewidth Q-switched random fiber laser (RFL) based on a half-opened cavity, which is realized by narrow-linewidth fiber Bragg grating (FBG) and a section of 3 km passive fiber, has been proposed and experimentally investigated. The narrow-linewidth lasing is generated by the spectral filtering of three FBGs with linewidth of 1.21 nm, 0.56 nm, and 0.12 nm, respectively. The Q switching of the distributed cavity is achieved by placing an acousto-optical modulator (AOM) between the FBG and the passive fiber. The maximal output powers of the narrow-linewidth RFLs with the three different FBGs are 0.54 W, 0.27 W, and 0.08 W, respectively. Furthermore, the repetition rates of the output pulses are 500 kHz, and the pulse durations are about 500 ns. The corresponding pulse energies are about 1.08 μJ, 0.54 μJ, and 0.16 μJ, accordingly. The linewidth of FBG can influence the output characteristics in full scale. The narrower the FBG, the higher the pump threshold; the lower the output power at the same pump level, the more serious the linewidth broadening; and thus the higher the proportion of the CW-ground exists in the output pulse trains. Thanks to the assistance of the band-pass filter (BPF), the proportion of the CW-ground of narrow-linewidth Q-switched RFL under the relative high-pump-low-output condition can be reduced effectively. The experimental results indicate that it is challenging to demonstrate a narrow-linewidth Q-switched RFL with high quality output. But further power scaling and linewidth narrowing is possible in the case of operating parameters, optimization efforts, and a more powerful pump source. To the best of our knowledge, this is the first demonstration of narrow-linewidth generation in a Q-switched RFL.

  17. Atomic Force Microscopy Based Cell Shape Index

    NASA Astrophysics Data System (ADS)

    Adia-Nimuwa, Usienemfon; Mujdat Tiryaki, Volkan; Hartz, Steven; Xie, Kan; Ayres, Virginia

    2013-03-01

    Stellation is a measure of cell physiology and pathology for several cell groups including neural, liver and pancreatic cells. In the present work, we compare the results of a conventional two-dimensional shape index study of both atomic force microscopy (AFM) and fluorescent microscopy images with the results obtained using a new three-dimensional AFM-based shape index similar to sphericity index. The stellation of astrocytes is investigated on nanofibrillar scaffolds composed of electrospun polyamide nanofibers that has demonstrated promise for central nervous system (CNS) repair. Recent work by our group has given us the ability to clearly segment the cells from nanofibrillar scaffolds in AFM images. The clear-featured AFM images indicated that the astrocyte processes were longer than previously identified at 24h. It was furthermore shown that cell spreading could vary significantly as a function of environmental parameters, and that AFM images could record these variations. The new three-dimensional AFM-based shape index incorporates the new information: longer stellate processes and cell spreading. The support of NSF PHY-095776 is acknowledged.

  18. Refractive index sensor based on a polymer fiber directional coupler for low index sensing.

    PubMed

    Lee, Kwang Jo; Liu, Xiaoqi; Vuillemin, Nelly; Lwin, Richard; Leon-Saval, Sergio G; Argyros, Alexander; Kuhlmey, Boris T

    2014-07-14

    We propose, numerically analyze and experimentally demonstrate a novel refractive index sensor specialized for low index sensing. The device is based on a directional coupler architecture implemented in a single microstructured polymer optical fiber incorporating two waveguides within it: a single-mode core and a satellite waveguide consisting of a hollow high-index ring. This hollow channel is filled with fluid and the refractive index of the fluid is detected through changes to the wavelength at which resonant coupling occurs between the two waveguides. The sensor design was optimized for both higher sensitivity and lower detection limit, with simulations and experiments demonstrating a sensitivity exceeding 1.4 × 10(3) nm per refractive index unit. Simulations indicate a detection limit of ~2 × 10(-6) refractive index units is achievable. We also numerically investigate the performance for refractive index changes localized at the surface of the holes, a case of particular importance for biosensing.

  19. Secured web-based video repository for multicenter studies

    PubMed Central

    Yan, Ling; Hicks, Matt; Winslow, Korey; Comella, Cynthia; Ludlow, Christy; Jinnah, H. A; Rosen, Ami R; Wright, Laura; Galpern, Wendy R; Perlmutter, Joel S

    2015-01-01

    Background We developed a novel secured web-based dystonia video repository for the Dystonia Coalition, part of the Rare Disease Clinical Research network funded by the Office of Rare Diseases Research and the National Institute of Neurological Disorders and Stroke. A critical component of phenotypic data collection for all projects of the Dystonia Coalition includes a standardized video of each participant. We now describe our method for collecting, serving and securing these videos that is widely applicable to other studies. Methods Each recruiting site uploads standardized videos to a centralized secured server for processing to permit website posting. The streaming technology used to view the videos from the website does not allow downloading of video files. With appropriate institutional review board approval and agreement with the hosting institution, users can search and view selected videos on the website using customizable, permissions-based access that maintains security yet facilitates research and quality control. Results This approach provides a convenient platform for researchers across institutions to evaluate and analyze shared video data. We have applied this methodology for quality control, confirmation of diagnoses, validation of rating scales, and implementation of new research projects. Conclusions We believe our system can be a model for similar projects that require access to common video resources. PMID:25630890

  20. 33 CFR 165.1710 - Port Valdez and Valdez Narrows, Valdez, Alaska-security zones.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... following areas are security zones: (1) Trans-Alaska Pipeline (TAPS) Valdez Terminal complex (Terminal), Valdez, Alaska and TAPS tank vessels. All waters enclosed within a line beginning on the southern... TAPS tank vessel maneuvering to approach, moor, unmoor or depart the TAPS Terminal or transiting...

  1. Quantitative analysis of Indonesia’s reserves and energy security as an evaluation by the nation in facing global competition

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Selfmore » Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy

  2. [Calculation on ecological security baseline based on the ecosystem services value and the food security].

    PubMed

    He, Ling; Jia, Qi-jian; Li, Chao; Xu, Hao

    2016-01-01

    The rapid development of coastal economy in Hebei Province caused rapid transition of coastal land use structure, which has threatened land ecological security. Therefore, calculating ecosystem service value of land use and exploring ecological security baseline can provide the basis for regional ecological protection and rehabilitation. Taking Huanghua, a city in the southeast of Hebei Province, as an example, this study explored the joint point, joint path and joint method between ecological security and food security, and then calculated the ecological security baseline of Huanghua City based on the ecosystem service value and the food safety standard. The results showed that ecosystem service value of per unit area from maximum to minimum were in this order: wetland, water, garden, cultivated land, meadow, other land, salt pans, saline and alkaline land, constructive land. The order of contribution rates of each ecological function value from high to low was nutrient recycling, water conservation, entertainment and culture, material production, biodiversity maintenance, gas regulation, climate regulation and environmental purification. The security baseline of grain production was 0.21 kg · m⁻², the security baseline of grain output value was 0.41 yuan · m⁻², the baseline of ecosystem service value was 21.58 yuan · m⁻², and the total of ecosystem service value in the research area was 4.244 billion yuan. In 2081 the ecological security will reach the bottom line and the ecological system, in which human is the subject, will be on the verge of collapse. According to the ecological security status, Huanghua can be divided into 4 zones, i.e., ecological core protection zone, ecological buffer zone, ecological restoration zone and human activity core zone.

  3. Attribute based encryption for secure sharing of E-health data

    NASA Astrophysics Data System (ADS)

    Charanya, R.; Nithya, S.; Manikandan, N.

    2017-11-01

    Distributed computing is one of the developing innovations in IT part and information security assumes a real part. It includes sending gathering of remote server and programming that permit the unified information and online access to PC administrations. Distributed computing depends on offering of asset among different clients are additionally progressively reallocated on interest. Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. The reasons for security and protection issues, which rise on the grounds that the health information possessed by distinctive clients are put away in some cloud servers rather than under their own particular control”z. To deal with security problems, various schemes based on the Attribute-Based Encryption have been proposed. In this paper, in order to make ehealth data’s more secure we use multi party in cloud computing system. Where the health data is encrypted using attributes and key policy. And the user with a particular attribute and key policy alone will be able to decrypt the health data after it is verified by “key distribution centre” and the “secure data distributor”. This technique can be used in medical field for secure storage of patient details and limiting to particular doctor access. To make data’s scalable secure we need to encrypt the health data before outsourcing.

  4. 44 CFR 5.28 - Indexes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Indexes. 5.28 Section 5.28 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY... described in § 5.25. FEMA will publish quarterly and make available copies of each index or supplements...

  5. Constructing accountability in inter-organisational collaboration: the implications of a narrow performance-based focus.

    PubMed

    Andersson, Johanna; Wikström, Ewa

    2014-01-01

    The purpose of this paper is to analyse how accounts of collaboration practice were made and used to construct accountability in the empirical context of coordination associations, a Swedish form of collaboration between four authorities in health and social care. They feature pooled budgets, joint leadership and joint reporting systems, intended to facilitate both collaboration and (shared) accountability. Empirical data were collected in field observations in local, regional and national settings. In addition, the study is based on analysis of local association documents such as evaluations and annual reports, and analysis of national agency reports. Accountability is constructed hierarchically with a narrow focus on performance, and horizontal (shared) accountability as well as outcomes are de-emphasised. Through this narrow construction of accountability the coordination associations are re-created as hierarchical and accountability is delegated rather than shared. Features such as pooled budgets, joint leadership and joint reporting systems can support collaboration but do not necessarily translate into shared accountability if accountability is interpreted and constructed hierarchically. When practice conforms to what is counted and accounted for, using the hierarchical and narrow construction of accountability, the result may be that the associations become an additional authority. That would increase rather than decrease fragmentation in the field. This research derives from first-hand observations of actor-to-actor episodes complemented with the analysis of documents and reports. It provides critical analysis of the construction and evaluation of accounts and accountability related to practice and performance in collaboration. The main contribution is the finding that despite the conditions intended to facilitate inter-organisational collaboration and horizontal accountability, the hierarchical accountability persisted.

  6. 17 CFR 230.239 - Exemption for offers and sales of certain security-based swaps.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... specified Internet address or includes in its agreement covering the security-based swap that the eligible... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Exemption for offers and sales of certain security-based swaps. 230.239 Section 230.239 Commodity and Securities Exchanges...

  7. 17 CFR 230.239 - Exemption for offers and sales of certain security-based swaps.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... specified Internet address or includes in its agreement covering the security-based swap that the eligible... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Exemption for offers and sales of certain security-based swaps. 230.239 Section 230.239 Commodity and Securities Exchanges...

  8. Erbium-doped fiber ring laser based on few-mode-singlemode-few-mode fiber structure for refractive index measurement

    NASA Astrophysics Data System (ADS)

    Liu, Jingxuan; Wang, Muguang; Liang, Xiao; Dong, Yue; Xiao, Han; Jian, Shuisheng

    2017-08-01

    A novel Erbium-doped fiber ring cavity laser sensor for refractive index (RI) measurement based on a special designed few-mode-singlemode-few-mode structure is proposed and experimentally demonstrated. The few-mode fiber is a home-made concentric ring core fiber (CRCF) which can only support two scalar modes. Thus a stable mode interference occurs which functions as a sensing head and band-pass filter to select the lasing wavelength simultaneously. A sensitivity of -45.429 nm/RIU is obtained in the range of 1.333-1.363. High optical signal to noise ratio (OSNR) of ∼45 dB and narrow 3-dB bandwidth of ∼0.1 nm indicate that the fiber ring laser sensing system has a high resolution and accuracy RI measurement.

  9. Index to Computer Based Learning.

    ERIC Educational Resources Information Center

    Hoye, Robert E., Ed.; Wang, Anastasia C., Ed.

    The computer-based programs and projects described in this index are listed under 98 different subject matter fields. Descrptions of programs include information on: subject field, program name and number, author, source, the program's curriculum content, prerequisites, level of instruction, type of student for which it is intended, total hours of…

  10. Mechanisms of Power within a Community-Based Food Security Planning Process

    ERIC Educational Resources Information Center

    McCullum, Christine; Pelletier, David; Barr, Donald; Wilkins, Jennifer; Habicht, Jean-Pierre

    2004-01-01

    A community food security movement has begun to address problems of hunger and food insecurity by utilizing a community-based approach. Although various models have been implemented, little empirical research has assessed how power operates within community-based food security initiatives. The purpose of this research was to determine how power…

  11. Network Security Risk Assessment System Based on Attack Graph and Markov Chain

    NASA Astrophysics Data System (ADS)

    Sun, Fuxiong; Pi, Juntao; Lv, Jin; Cao, Tian

    2017-10-01

    Network security risk assessment technology can be found in advance of the network problems and related vulnerabilities, it has become an important means to solve the problem of network security. Based on attack graph and Markov chain, this paper provides a Network Security Risk Assessment Model (NSRAM). Based on the network infiltration tests, NSRAM generates the attack graph by the breadth traversal algorithm. Combines with the international standard CVSS, the attack probability of atomic nodes are counted, and then the attack transition probabilities of ones are calculated by Markov chain. NSRAM selects the optimal attack path after comprehensive measurement to assessment network security risk. The simulation results show that NSRAM can reflect the actual situation of network security objectively.

  12. Food Security: Selected Global and U.S. Resources

    ERIC Educational Resources Information Center

    Kocher, Megan

    2015-01-01

    Food security is researched and dealt with on local, regional, national, and global levels with solutions ranging from local farmers' market initiatives to increasing crop yields through genetically modified plants to streamlining global supply chains. Because of its broad, interdisciplinary nature, it is necessary to narrow the focus of this…

  13. Mobility based key management technique for multicast security in mobile ad hoc networks.

    PubMed

    Madhusudhanan, B; Chitra, S; Rajan, C

    2015-01-01

    In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  14. A blue/green water-based accounting framework for assessment of water security

    NASA Astrophysics Data System (ADS)

    Rodrigues, Dulce B. B.; Gupta, Hoshin V.; Mendiondo, Eduardo M.

    2014-09-01

    A comprehensive assessment of water security can incorporate several water-related concepts, while accounting for Blue and Green Water (BW and GW) types defined in accordance with the hydrological processes involved. Here we demonstrate how a quantitative analysis of provision probability and use of BW and GW can be conducted, so as to provide indicators of water scarcity and vulnerability at the basin level. To illustrate the approach, we use the Soil and Water Assessment Tool (SWAT) to model the hydrology of an agricultural basin (291 km2) within the Cantareira Water Supply System in Brazil. To provide a more comprehensive basis for decision making, we analyze the BW and GW-Footprint components against probabilistic levels (50th and 30th percentile) of freshwater availability for human activities, during a 23 year period. Several contrasting situations of BW provision are distinguished, using different hydrological-based methodologies for specifying monthly Environmental Flow Requirements (EFRs), and the risk of natural EFR violation is evaluated by use of a freshwater provision index. Our results reveal clear spatial and temporal patterns of water scarcity and vulnerability levels within the basin. Taking into account conservation targets for the basin, it appears that the more restrictive EFR methods are more appropriate than the method currently employed at the study basin. The blue/green water-based accounting framework developed here provides a useful integration of hydrologic, ecosystem and human needs information on a monthly basis, thereby improving our understanding of how and where water-related threats to human and aquatic ecosystem security can arise.

  15. A transmission security framework for email-based telemedicine.

    PubMed

    Caffery, Liam J; Smith, Anthony C

    2010-01-01

    Encryption is used to convert an email message to an unreadable format thereby securing patient privacy during the transmission of the message across the Internet. Two available means of encryption are: public key infrastructure (PKI) used in conjunction with ordinary email and secure hypertext transfer protocol (HTTPS) used by secure web-mail applications. Both of these approaches have advantages and disadvantages in terms of viability, cost, usability and compliance. The aim of this study was develop an instrument to identify the most appropriate means of encrypting email communication for telemedicine. A multi-method approach was used to construct the instrument. Technical assessment and existing bodies of knowledge regarding the utility of PKI were analyzed, along with survey results from users of Queensland Health's Child and Youth Mental Health Service secure web-mail service. The resultant decision support model identified that the following conditions affect the choice of encryption technology: correspondent's risk perception, correspondent's identification to the security afforded by encryption, email-client used by correspondents, the tolerance to human error and the availability of technical resources. A decision support model is presented as a flow chart to identify the most appropriate encryption for a specific email-based telemedicine service.

  16. [Evaluating the Significance of Odor Gas Released During the Directly Drying Process of Sludge: Based on the Multi-index Integrated Assessment Method].

    PubMed

    Ding, Wen-jie; Chen, Wen-he; Deng, Ming-jia; Luo, Hui; Li, Lin; Liu, Jun-xin

    2016-02-15

    Co-processing of sewage sludge using the cement kiln can realize sludge harmless treatment, quantity reduction, stabilization and reutilization. The moisture content should be reduced to below 30% to meet the requirement of combustion. Thermal drying is an effective way for sludge desiccation. Odors and volatile organic compounds are generated and released during the sludge drying process, which could lead to odor pollution. The main odor pollutants were selected by the multi-index integrated assessment method. The concentration, olfactory threshold, threshold limit value, smell security level and saturated vapor pressure were considered as indexes based on the related regulations in China and foreign countries. Taking the pollution potential as the evaluation target, and the risk index and odor emission intensity as evaluation indexes, the odor pollution potential rated evaluation model of the pollutants was built according to the Weber-Fechner law. The aim of the present study is to form the rating evaluation method of odor potential pollution capacity suitable for the directly drying process of sludge.

  17. The relationship between dietary patterns, body mass index percentile, and household food security in young urban children.

    PubMed

    Trapp, Christine M; Burke, Georgine; Gorin, Amy A; Wiley, James F; Hernandez, Dominica; Crowell, Rebecca E; Grant, Autherene; Beaulieu, Annamarie; Cloutier, Michelle M

    2015-04-01

    The relationship between food insecurity and child obesity is unclear. Few studies have examined dietary patterns in children with regard to household food security and weight status. The aim of this study was to examine the association between household food security, dietary intake, and BMI percentile in low-income, preschool children. Low-income caregivers (n=222) with children ages 2-4 years were enrolled in a primary-care-based obesity prevention/reversal study (Steps to Growing Up Healthy) between October 2010 and December 2011. At baseline, demographic data, household food security status (US Household Food Security Instrument) and dietary intake (Children's Dietary Questionnaire; CDQ) were collected. BMI percentile was calculated from anthropometric data. Participating children were primarily Hispanic (90%), Medicaid insured (95%), 50% female, 35±8.7 months of age (mean±standard deviation), 19% overweight (BMI 85th-94th percentile), and 29% obese (≥95th percentile). Thirty-eight percent of interviews were conducted in Spanish. Twenty-five percent of households reported food insecurity. There was no association between household food insecurity and child BMI percentile. Dietary patterns of the children based on the CDQ did not differ by household food security status. Food group subscale scores (fruit and vegetable, fat from dairy, sweetened beverages, and noncore foods) on the CDQ did not differ between normal weight and overweight/obese children. Maternal depression and stress did not mediate the relationship between household food insecurity and child weight status. Hispanic children were more likely to be overweight or obese in both food-secure and food-insecure households. Household food insecurity was not associated with child BMI percentile in this study. Dietary intake patterns of children from food-insecure households were not different compared to those from food-secure households.

  18. Unconditionally secure commitment in position-based quantum cryptography.

    PubMed

    Nadeem, Muhammad

    2014-10-27

    A new commitment scheme based on position-verification and non-local quantum correlations is presented here for the first time in literature. The only credential for unconditional security is the position of committer and non-local correlations generated; neither receiver has any pre-shared data with the committer nor does receiver require trusted and authenticated quantum/classical channels between him and the committer. In the proposed scheme, receiver trusts the commitment only if the scheme itself verifies position of the committer and validates her commitment through non-local quantum correlations in a single round. The position-based commitment scheme bounds committer to reveal valid commitment within allocated time and guarantees that the receiver will not be able to get information about commitment unless committer reveals. The scheme works for the commitment of both bits and qubits and is equally secure against committer/receiver as well as against any third party who may have interests in destroying the commitment. Our proposed scheme is unconditionally secure in general and evades Mayers and Lo-Chau attacks in particular.

  19. Study on Cloud Security Based on Trust Spanning Tree Protocol

    NASA Astrophysics Data System (ADS)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  20. Narrow band gap amorphous silicon semiconductors

    DOEpatents

    Madan, A.; Mahan, A.H.

    1985-01-10

    Disclosed is a narrow band gap amorphous silicon semiconductor comprising an alloy of amorphous silicon and a band gap narrowing element selected from the group consisting of Sn, Ge, and Pb, with an electron donor dopant selected from the group consisting of P, As, Sb, Bi and N. The process for producing the narrow band gap amorphous silicon semiconductor comprises the steps of forming an alloy comprising amorphous silicon and at least one of the aforesaid band gap narrowing elements in amount sufficient to narrow the band gap of the silicon semiconductor alloy below that of amorphous silicon, and also utilizing sufficient amounts of the aforesaid electron donor dopant to maintain the amorphous silicon alloy as an n-type semiconductor.

  1. Spatial Frequency Multiplexing of Fiber-Optic Interferometric Refractive Index Sensors Based on Graded-Index Multimode Fibers

    PubMed Central

    Liu, Li; Gong, Yuan; Wu, Yu; Zhao, Tian; Wu, Hui-Juan; Rao, Yun-Jiang

    2012-01-01

    Fiber-optic interferometric sensors based on graded-index multimode fibers have very high refractive-index sensitivity, as we previously demonstrated. In this paper, spatial-frequency multiplexing of this type of fiber-optic refractive index sensors is investigated. It is estimated that multiplexing of more than 10 such sensors is possible. In the multiplexing scheme, one of the sensors is used to investigate the refractive index and temperature responses. The fast Fourier transform (FFT) of the combined reflective spectra is analyzed. The intensity of the FFT spectra is linearly related with the refractive index and is not sensitive to the temperature.

  2. Automatic indexing of scanned documents: a layout-based approach

    NASA Astrophysics Data System (ADS)

    Esser, Daniel; Schuster, Daniel; Muthmann, Klemens; Berger, Michael; Schill, Alexander

    2012-01-01

    Archiving official written documents such as invoices, reminders and account statements in business and private area gets more and more important. Creating appropriate index entries for document archives like sender's name, creation date or document number is a tedious manual work. We present a novel approach to handle automatic indexing of documents based on generic positional extraction of index terms. For this purpose we apply the knowledge of document templates stored in a common full text search index to find index positions that were successfully extracted in the past.

  3. Implementing secure laptop-based testing in an undergraduate nursing program: a case study.

    PubMed

    Tao, Jinyuan; Lorentz, B Chris; Hawes, Stacey; Rugless, Fely; Preston, Janice

    2012-07-01

    This article presents the implementation of secure laptop-based testing in an undergraduate nursing program. Details on how to design, develop, implement, and secure tests are discussed. Laptop-based testing mode is also compared with the computer-laboratory-based testing model. Five elements of the laptop-based testing model are illustrated: (1) it simulates the national board examination, (2) security is achievable, (3) it is convenient for both instructors and students, (4) it provides students hands-on practice, (5) continuous technical support is the key.

  4. Perfect narrow band absorber for sensing applications.

    PubMed

    Luo, Shiwen; Zhao, Jun; Zuo, Duluo; Wang, Xinbing

    2016-05-02

    We design and numerically investigate a perfect narrow band absorber based on a metal-metal-dielectric-metal structure which consists of periodic metallic nanoribbon arrays. The absorber presents an ultra narrow absorption band of 1.11 nm with a nearly perfect absorption of over 99.9% in the infrared region. For oblique incidence, the absorber shows an absorption more than 95% for a wide range of incident angles from 0 to 50°. Structure parameters to the influence of the performance are investigated. The structure shows high sensing performance with a high sensitivity of 1170 nm/RIU and a large figure of merit of 1054. The proposed structure has great potential as a biosensor.

  5. A data fusion-based drought index

    NASA Astrophysics Data System (ADS)

    Azmi, Mohammad; Rüdiger, Christoph; Walker, Jeffrey P.

    2016-03-01

    Drought and water stress monitoring plays an important role in the management of water resources, especially during periods of extreme climate conditions. Here, a data fusion-based drought index (DFDI) has been developed and analyzed for three different locations of varying land use and climate regimes in Australia. The proposed index comprehensively considers all types of drought through a selection of indices and proxies associated with each drought type. In deriving the proposed index, weekly data from three different data sources (OzFlux Network, Asia-Pacific Water Monitor, and MODIS-Terra satellite) were employed to first derive commonly used individual standardized drought indices (SDIs), which were then grouped using an advanced clustering method. Next, three different multivariate methods (principal component analysis, factor analysis, and independent component analysis) were utilized to aggregate the SDIs located within each group. For the two clusters in which the grouped SDIs best reflected the water availability and vegetation conditions, the variables were aggregated based on an averaging between the standardized first principal components of the different multivariate methods. Then, considering those two aggregated indices as well as the classifications of months (dry/wet months and active/non-active months), the proposed DFDI was developed. Finally, the symbolic regression method was used to derive mathematical equations for the proposed DFDI. The results presented here show that the proposed index has revealed new aspects in water stress monitoring which previous indices were not able to, by simultaneously considering both hydrometeorological and ecological concepts to define the real water stress of the study areas.

  6. The risk of misclassifying subjects within principal component based asset index

    PubMed Central

    2014-01-01

    The asset index is often used as a measure of socioeconomic status in empirical research as an explanatory variable or to control confounding. Principal component analysis (PCA) is frequently used to create the asset index. We conducted a simulation study to explore how accurately the principal component based asset index reflects the study subjects’ actual poverty level, when the actual poverty level is generated by a simple factor analytic model. In the simulation study using the PC-based asset index, only 1% to 4% of subjects preserved their real position in a quintile scale of assets; between 44% to 82% of subjects were misclassified into the wrong asset quintile. If the PC-based asset index explained less than 30% of the total variance in the component variables, then we consistently observed more than 50% misclassification across quintiles of the index. The frequency of misclassification suggests that the PC-based asset index may not provide a valid measure of poverty level and should be used cautiously as a measure of socioeconomic status. PMID:24987446

  7. Virtual-optical information security system based on public key infrastructure

    NASA Astrophysics Data System (ADS)

    Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben

    2005-01-01

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

  8. Variance-based interaction index measuring heteroscedasticity

    NASA Astrophysics Data System (ADS)

    Ito, Keiichi; Couckuyt, Ivo; Poles, Silvia; Dhaene, Tom

    2016-06-01

    This work is motivated by the need to deal with models with high-dimensional input spaces of real variables. One way to tackle high-dimensional problems is to identify interaction or non-interaction among input parameters. We propose a new variance-based sensitivity interaction index that can detect and quantify interactions among the input variables of mathematical functions and computer simulations. The computation is very similar to first-order sensitivity indices by Sobol'. The proposed interaction index can quantify the relative importance of input variables in interaction. Furthermore, detection of non-interaction for screening can be done with as low as 4 n + 2 function evaluations, where n is the number of input variables. Using the interaction indices based on heteroscedasticity, the original function may be decomposed into a set of lower dimensional functions which may then be analyzed separately.

  9. Origins of Secure Base Script Knowledge and the Developmental Construction of Attachment Representations

    PubMed Central

    Waters, Theodore E. A.; Ruiz, Sarah K.; Roisman, Glenn I.

    2016-01-01

    Increasing evidence suggests that attachment representations take at least two forms—a secure base script and an autobiographical narrative of childhood caregiving experiences. This study presents data from the first 26 years of the Minnesota Longitudinal Study of Risk and Adaptation (N = 169), examining the developmental origins of secure base script knowledge in a high-risk sample, and testing alternative models of the developmental sequencing of the construction of attachment representations. Results demonstrated that secure base script knowledge was predicted by observations of maternal sensitivity across childhood and adolescence. Further, findings suggest that the construction of a secure base script supports the development of a coherent autobiographical representation of childhood attachment experiences with primary caregivers by early adulthood. PMID:27302650

  10. DNA-based random number generation in security circuitry.

    PubMed

    Gearheart, Christy M; Arazi, Benjamin; Rouchka, Eric C

    2010-06-01

    DNA-based circuit design is an area of research in which traditional silicon-based technologies are replaced by naturally occurring phenomena taken from biochemistry and molecular biology. This research focuses on further developing DNA-based methodologies to mimic digital data manipulation. While exhibiting fundamental principles, this work was done in conjunction with the vision that DNA-based circuitry, when the technology matures, will form the basis for a tamper-proof security module, revolutionizing the meaning and concept of tamper-proofing and possibly preventing it altogether based on accurate scientific observations. A paramount part of such a solution would be self-generation of random numbers. A novel prototype schema employs solid phase synthesis of oligonucleotides for random construction of DNA sequences; temporary storage and retrieval is achieved through plasmid vectors. A discussion of how to evaluate sequence randomness is included, as well as how these techniques are applied to a simulation of the random number generation circuitry. Simulation results show generated sequences successfully pass three selected NIST random number generation tests specified for security applications.

  11. A secure RFID-based WBAN for healthcare applications.

    PubMed

    Ullah, Sana; Alamri, Atif

    2013-10-01

    A Wireless Body Area Network (WBAN) allows the seamless integration of small and intelligent invasive or non-invasive sensor nodes in, on or around a human body for continuous health monitoring. These nodes are expected to use different power-efficient protocols in order to extend the WBAN lifetime. This paper highlights the power consumption and security issues of WBAN for healthcare applications. Numerous power saving mechanisms are discussed and a secure RFID-based protocol for WBAN is proposed. The performance of the proposed protocol is analyzed and compared with that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols using extensive simulations. It is shown that the proposed protocol is power-efficient and protects patients' data from adversaries. It is less vulnerable to different attacks compared to that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols. For a low traffic load and a single alkaline battery of capacity 2.6 Ah, the proposed protocol could extend the WBAN lifetime, when deployed on patients in hospitals or at homes, to approximately five years.

  12. Analysis of Human Disturbance and Ecological Security Evolution in Oasis in Arid Area Based on LUCC: A Case Study of Oasis in the Northern Tianshan Mountain Slope Economic Zone

    NASA Astrophysics Data System (ADS)

    Song, W. J.; Chen, M. H.; Zhang, Q.; Liu, S. S.; Yang, J. N.

    2017-07-01

    Oases in arid areas are environmentally and economically vulnerable regions. Study on ecological security of oases in arid areas is of great significance to the stability and the economic development of oases. Based on Land Use/Land Cover data in 1965, 1980, 1995, 2005 and 2015, the study analyze the temporal and spatial changes in human disturbance and ecological security of oases in the Northern Tianshan Mountain Slope Economic Zone (NTMSEZ) in recent 50 years by establishing the ecological security index (ESI) through human disturbance index and landscape vulnerability index. The results showed that: in recent 50 years, the human disturbance of the NTMSEZ has been increased to current moderate human impacts. Urban construction, oasis expansion and farmland reclamation are the main factors of the increment. The human disturbance in Urumchi, Shihezi, Kuitun, Miquan and Changji is higher than that in other oases and that in core areas of oasis is higher than other areas. The ESI of the NTMSEZ increases firstly and then decreases. In most areas, the ESI is “relatively unsafe” and “critical”. However, there are increasingly more vulnerable areas, moving northwestwards and expanding southwards. The ESI gradually presents a “NW-SE” trend of zonal distribution pattern.

  13. Coronary heart disease index based on longitudinal electrocardiography

    NASA Technical Reports Server (NTRS)

    Townsend, J. C.; Cronin, J. P.

    1977-01-01

    A coronary heart disease index was developed from longitudinal ECG (LCG) tracings to serve as a cardiac health measure in studies of working and, essentially, asymptomatic populations, such as pilots and executives. For a given subject, the index consisted of a composite score based on the presence of LCG aberrations and weighted values previously assigned to them. The index was validated by correlating it with the known presence or absence of CHD as determined by a complete physical examination, including treadmill, resting ECG, and risk factor information. The validating sample consisted of 111 subjects drawn by a stratified-random procedure from 5000 available case histories. The CHD index was found to be significantly more valid as a sole indicator of CHD than the LCG without the use of the index. The index consistently produced higher validity coefficients in identifying CHD than did treadmill testing, resting ECG, or risk factor analysis.

  14. 17 CFR 240.3a68-2 - Requests for interpretation of swaps, security-based swaps, and mixed swaps.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... swaps, security-based swaps, and mixed swaps. 240.3a68-2 Section 240.3a68-2 Commodity and Securities..., Security-Based Swap, and Security-Based Swap Agreement; Mixed Swaps; Security-Based Swap Agreement Recordkeeping § 240.3a68-2 Requests for interpretation of swaps, security-based swaps, and mixed swaps. (a) In...

  15. 17 CFR 240.3a68-2 - Requests for interpretation of swaps, security-based swaps, and mixed swaps.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... swaps, security-based swaps, and mixed swaps. 240.3a68-2 Section 240.3a68-2 Commodity and Securities..., Security-Based Swap, and Security-Based Swap Agreement; Mixed Swaps; Security-Based Swap Agreement Recordkeeping § 240.3a68-2 Requests for interpretation of swaps, security-based swaps, and mixed swaps. (a) In...

  16. 20 CFR 404.272 - Indexes we use to measure the rise in the cost-of-living.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Indexes we use to measure the rise in the cost-of-living. 404.272 Section 404.272 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD... Increases § 404.272 Indexes we use to measure the rise in the cost-of-living. (a) The bases. To measure...

  17. Novel indexes based on network structure to indicate financial market

    NASA Astrophysics Data System (ADS)

    Zhong, Tao; Peng, Qinke; Wang, Xiao; Zhang, Jing

    2016-02-01

    There have been various achievements to understand and to analyze the financial market by complex network model. However, current studies analyze the financial network model but seldom present quantified indexes to indicate or forecast the price action of market. In this paper, the stock market is modeled as a dynamic network, in which the vertices refer to listed companies and edges refer to their rank-based correlation based on price series. Characteristics of the network are analyzed and then novel indexes are introduced into market analysis, which are calculated from maximum and fully-connected subnets. The indexes are compared with existing ones and the results confirm that our indexes perform better to indicate the daily trend of market composite index in advance. Via investment simulation, the performance of our indexes is analyzed in detail. The results indicate that the dynamic complex network model could not only serve as a structural description of the financial market, but also work to predict the market and guide investment by indexes.

  18. Prototype of smart office system using based security system

    NASA Astrophysics Data System (ADS)

    Prasetyo, T. F.; Zaliluddin, D.; Iqbal, M.

    2018-05-01

    Creating a new technology in the modern era gives a positive impact on business and industry. Internet of Things (IoT) as a new communication technology is very useful in realizing smart systems such as: smart home, smart office, smart parking and smart city. This study presents a prototype of the smart office system which was designed as a security system based on IoT. Smart office system development method used waterfall model. IoT-based smart office system used platform (project builder) cayenne so that. The data can be accessed and controlled through internet network from long distance. Smart office system used arduino mega 2560 microcontroller as a controller component. In this study, Smart office system is able to detect threats of dangerous objects made from metals, earthquakes, fires, intruders or theft and perform security monitoring outside the building by using raspberry pi cameras on autonomous robots in real time to the security guard.

  19. Common Criteria Related Security Design Patterns for Intelligent Sensors—Knowledge Engineering-Based Implementation

    PubMed Central

    Bialas, Andrzej

    2011-01-01

    Intelligent sensors experience security problems very similar to those inherent to other kinds of IT products or systems. The assurance for these products or systems creation methodologies, like Common Criteria (ISO/IEC 15408) can be used to improve the robustness of the sensor systems in high risk environments. The paper presents the background and results of the previous research on patterns-based security specifications and introduces a new ontological approach. The elaborated ontology and knowledge base were validated on the IT security development process dealing with the sensor example. The contribution of the paper concerns the application of the knowledge engineering methodology to the previously developed Common Criteria compliant and pattern-based method for intelligent sensor security development. The issue presented in the paper has a broader significance in terms that it can solve information security problems in many application domains. PMID:22164064

  20. Common criteria related security design patterns for intelligent sensors--knowledge engineering-based implementation.

    PubMed

    Bialas, Andrzej

    2011-01-01

    Intelligent sensors experience security problems very similar to those inherent to other kinds of IT products or systems. The assurance for these products or systems creation methodologies, like Common Criteria (ISO/IEC 15408) can be used to improve the robustness of the sensor systems in high risk environments. The paper presents the background and results of the previous research on patterns-based security specifications and introduces a new ontological approach. The elaborated ontology and knowledge base were validated on the IT security development process dealing with the sensor example. The contribution of the paper concerns the application of the knowledge engineering methodology to the previously developed Common Criteria compliant and pattern-based method for intelligent sensor security development. The issue presented in the paper has a broader significance in terms that it can solve information security problems in many application domains.

  1. Incorporating voltage security into the planning, operation and monitoring of restructured electric energy markets

    NASA Astrophysics Data System (ADS)

    Nair, Nirmal-Kumar

    As open access market principles are applied to power systems, significant changes are happening in their planning, operation and control. In the emerging marketplace, systems are operating under higher loading conditions as markets focus greater attention to operating costs than stability and security margins. Since operating stability is a basic requirement for any power system, there is need for newer tools to ensure stability and security margins being strictly enforced in the competitive marketplace. This dissertation investigates issues associated with incorporating voltage security into the unbundled operating environment of electricity markets. It includes addressing voltage security in the monitoring, operational and planning horizons of restructured power system. This dissertation presents a new decomposition procedure to estimate voltage security usage by transactions. The procedure follows physical law and uses an index that can be monitored knowing the state of the system. The expression derived is based on composite market coordination models that have both PoolCo and OpCo transactions, in a shared stressed transmission grid. Our procedure is able to equitably distinguish the impacts of individual transactions on voltage stability, at load buses, in a simple and fast manner. This dissertation formulates a new voltage stability constrained optimal power flow (VSCOPF) using a simple voltage security index. In modern planning, composite power system reliability analysis that encompasses both adequacy and security issues is being developed. We have illustrated the applicability of our VSCOPF into composite reliability analysis. This dissertation also delves into the various applications of voltage security index. Increasingly, FACT devices are being used in restructured markets to mitigate a variety of operational problems. Their control effects on voltage security would be demonstrated using our VSCOPF procedure. Further, this dissertation investigates

  2. The household-based socio-economic deprivation index in Setiu Wetlands, Malaysia

    NASA Astrophysics Data System (ADS)

    Zakaria, Syerrina; May, Chin Sin; Rahman, Nuzlinda Abdul

    2017-08-01

    Deprivation index usually used in public health study. At the same time, deprivation index can also use to measure the level of deprivation in an area or a village. These indices are also referred as the index of inequalities or disadvantage. Even though, there are many indices that have been built before. But it is believed to be less appropriate to use the existing indices to be applied in other countries or areas which had different socio-economic conditions and different geographical characteristics. The objective of this study is to construct the index based on the socio-economic factors in Setiu Wetlands (Jajaran Merang, Jajaran Setiu and Jajaran Kuala Besut) in Terengganu Malaysia which is defined as weighted household-based socioeconomic deprivation index. This study has employed the variables based on income level, education level and employment rate obtained from questionnaire which are acquired from 64 villages included 1024 respondents. The factor analysis is used to extract the latent variables or observed variables into smaller amount of components or factors. By using factor analysis, one factor is extracted from 3 latent variables. This factor known as socioeconomic deprivation index. Based on the result, the areas with a lower index values until high index values were identified.

  3. Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ondrej Linda; Todd Vollmer; Jason Wright

    Resiliency and security in critical infrastructure control systems in the modern world of cyber terrorism constitute a relevant concern. Developing a network security system specifically tailored to the requirements of such critical assets is of a primary importance. This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented learning algorithm constructs a fuzzy logic rule based model of normal network behavior. Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. This learning algorithm was specifically developed to comply with the constrainedmore » computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.« less

  4. A Cluster-Based Framework for the Security of Medical Sensor Environments

    NASA Astrophysics Data System (ADS)

    Klaoudatou, Eleni; Konstantinou, Elisavet; Kambourakis, Georgios; Gritzalis, Stefanos

    The adoption of Wireless Sensor Networks (WSNs) in the healthcare sector poses many security issues, mainly because medical information is considered particularly sensitive. The security mechanisms employed are expected to be more efficient in terms of energy consumption and scalability in order to cope with the constrained capabilities of WSNs and patients’ mobility. Towards this goal, cluster-based medical WSNs can substantially improve efficiency and scalability. In this context, we have proposed a general framework for cluster-based medical environments on top of which security mechanisms can rely. This framework fully covers the varying needs of both in-hospital environments and environments formed ad hoc for medical emergencies. In this paper, we further elaborate on the security of our proposed solution. We specifically focus on key establishment mechanisms and investigate the group key agreement protocols that can best fit in our framework.

  5. Narrow line width dual wavelength semiconductor optical amplifier based random fiber laser

    NASA Astrophysics Data System (ADS)

    Shawki, Heba A.; Kotb, Hussein E.; Khalil, Diaa

    2018-02-01

    A novel narrow line-width Single longitudinal mode (SLM) dual wavelength random fiber laser of 20 nm separation between wavelengths of 1530 and 1550 nm is presented. The laser is based on Rayleigh backscattering in a standard single mode fiber of 2 Km length as distributed mirrors, and a semiconductor optical amplifier (SOA) as the optical amplification medium. Two optical bandpass filters are used for the two wavelengths selectivity, and two Faraday Rotator mirrors are used to stabilize the two lasing wavelengths against fiber random birefringence. The optical signal to noise ratio (OSNR) was measured to be 38 dB. The line-width of the laser was measured to be 13.3 and 14 KHz at 1530 and 1550 nm respectively, at SOA pump current of 370 mA.

  6. Origins of Secure Base Script Knowledge and the Developmental Construction of Attachment Representations.

    PubMed

    Waters, Theodore E A; Ruiz, Sarah K; Roisman, Glenn I

    2017-01-01

    Increasing evidence suggests that attachment representations take at least two forms: a secure base script and an autobiographical narrative of childhood caregiving experiences. This study presents data from the first 26 years of the Minnesota Longitudinal Study of Risk and Adaptation (N = 169), examining the developmental origins of secure base script knowledge in a high-risk sample and testing alternative models of the developmental sequencing of the construction of attachment representations. Results demonstrated that secure base script knowledge was predicted by observations of maternal sensitivity across childhood and adolescence. Furthermore, findings suggest that the construction of a secure base script supports the development of a coherent autobiographical representation of childhood attachment experiences with primary caregivers by early adulthood. © 2016 The Authors. Child Development © 2016 Society for Research in Child Development, Inc.

  7. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    PubMed Central

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied. PMID:23762851

  8. Homomorphic encryption-based secure SIFT for privacy-preserving feature extraction

    NASA Astrophysics Data System (ADS)

    Hsu, Chao-Yung; Lu, Chun-Shien; Pei, Soo-Chang

    2011-02-01

    Privacy has received much attention but is still largely ignored in the multimedia community. Consider a cloud computing scenario, where the server is resource-abundant and is capable of finishing the designated tasks, it is envisioned that secure media retrieval and search with privacy-preserving will be seriously treated. In view of the fact that scale-invariant feature transform (SIFT) has been widely adopted in various fields, this paper is the first to address the problem of secure SIFT feature extraction and representation in the encrypted domain. Since all the operations in SIFT must be moved to the encrypted domain, we propose a homomorphic encryption-based secure SIFT method for privacy-preserving feature extraction and representation based on Paillier cryptosystem. In particular, homomorphic comparison is a must for SIFT feature detection but is still a challenging issue for homomorphic encryption methods. To conquer this problem, we investigate a quantization-like secure comparison strategy in this paper. Experimental results demonstrate that the proposed homomorphic encryption-based SIFT performs comparably to original SIFT on image benchmarks, while preserving privacy additionally. We believe that this work is an important step toward privacy-preserving multimedia retrieval in an environment, where privacy is a major concern.

  9. Secure method for biometric-based recognition with integrated cryptographic functions.

    PubMed

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  10. 33 CFR 165.1120 - Security Zone; Naval Amphibious Base, San Diego, CA.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zone; Naval Amphibious Base, San Diego, CA. 165.1120 Section 165.1120 Navigation and Navigable Waters COAST GUARD, DEPARTMENT... § 165.1120 Security Zone; Naval Amphibious Base, San Diego, CA. (a) Location. The following area is a...

  11. 33 CFR 165.1120 - Security Zone; Naval Amphibious Base, San Diego, CA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; Naval Amphibious Base, San Diego, CA. 165.1120 Section 165.1120 Navigation and Navigable Waters COAST GUARD, DEPARTMENT... § 165.1120 Security Zone; Naval Amphibious Base, San Diego, CA. (a) Location. The following area is a...

  12. 33 CFR 165.1120 - Security Zone; Naval Amphibious Base, San Diego, CA.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Base, San Diego, CA. 165.1120 Section 165.1120 Navigation and Navigable Waters COAST GUARD, DEPARTMENT... § 165.1120 Security Zone; Naval Amphibious Base, San Diego, CA. (a) Location. The following area is a security zone: the waters of San Diego Bay, enclosed by lines connecting the following points: Beginning at...

  13. 33 CFR 165.1120 - Security Zone; Naval Amphibious Base, San Diego, CA.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Base, San Diego, CA. 165.1120 Section 165.1120 Navigation and Navigable Waters COAST GUARD, DEPARTMENT... § 165.1120 Security Zone; Naval Amphibious Base, San Diego, CA. (a) Location. The following area is a security zone: the waters of San Diego Bay, enclosed by lines connecting the following points: Beginning at...

  14. 33 CFR 165.1120 - Security Zone; Naval Amphibious Base, San Diego, CA.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Base, San Diego, CA. 165.1120 Section 165.1120 Navigation and Navigable Waters COAST GUARD, DEPARTMENT... § 165.1120 Security Zone; Naval Amphibious Base, San Diego, CA. (a) Location. The following area is a security zone: the waters of San Diego Bay, enclosed by lines connecting the following points: Beginning at...

  15. Identifying a National Death Index Match

    PubMed Central

    Burchett, Bruce M.; Blazer, Dan G.

    2009-01-01

    Data from the National Death Index (NDI) are frequently used to determine survival status in epidemiologic or clinical studies. On the basis of selected information submitted by the investigator, NDI returns a file containing a set of candidate matches. Although NDI deems some matches as perfect, multiple candidate matches may be available for other cases. Working across data from the Duke University site of the Established Populations for Epidemiologic Studies of the Elderly (EPESE), NDI, and the Social Security Death Index (SSDI), the authors found that, for this Established Populations for Epidemiologic Studies of the Elderly cohort of 1,896 cases born before 1922 and alive as of January 1, 1999, a match on Social Security number plus additional personal information (specific combinations of last name, first name, month of birth, day of birth) resulted in agreement between NDI and Social Security Death Index dates of death 94.7% of the time, while comparable agreement was found for only 12.3% of candidate decedents who did not have the required combination of information. Thus, an easy to apply algorithm facilitates accurate identification of NDI matches. PMID:19567777

  16. Impacts of Base-Case and Post-Contingency Constraint Relaxations on Static and Dynamic Operational Security

    NASA Astrophysics Data System (ADS)

    Salloum, Ahmed

    Constraint relaxation by definition means that certain security, operational, or financial constraints are allowed to be violated in the energy market model for a predetermined penalty price. System operators utilize this mechanism in an effort to impose a price-cap on shadow prices throughout the market. In addition, constraint relaxations can serve as corrective approximations that help in reducing the occurrence of infeasible or extreme solutions in the day-ahead markets. This work aims to capture the impact constraint relaxations have on system operational security. Moreover, this analysis also provides a better understanding of the correlation between DC market models and AC real-time systems and analyzes how relaxations in market models propagate to real-time systems. This information can be used not only to assess the criticality of constraint relaxations, but also as a basis for determining penalty prices more accurately. Constraint relaxations practice was replicated in this work using a test case and a real-life large-scale system, while capturing both energy market aspects and AC real-time system performance. System performance investigation included static and dynamic security analysis for base-case and post-contingency operating conditions. PJM peak hour loads were dynamically modeled in order to capture delayed voltage recovery and sustained depressed voltage profiles as a result of reactive power deficiency caused by constraint relaxations. Moreover, impacts of constraint relaxations on operational system security were investigated when risk based penalty prices are used. Transmission lines in the PJM system were categorized according to their risk index and each category was as-signed a different penalty price accordingly in order to avoid real-time overloads on high risk lines. This work also extends the investigation of constraint relaxations to post-contingency relaxations, where emergency limits are allowed to be relaxed in energy market models

  17. Retrieving the complex refractive index of atmospheric aerosols from ratios of solar spectral extinction measurements

    NASA Technical Reports Server (NTRS)

    Fymat, A. L.; Mease, K. D.

    1978-01-01

    The technique proposed by Fymat (1976) for retrieving the complex refractive index of atmospheric aerosols using narrowband spectral transmission ratios, taken within an overall narrow spectral interval, is investigated in the case of modelled polydispersions of rural, maritime-continental, maritime-sea spray and meteoric dust aerosols. It is confirmed that for not too broad size distributions most of the information comes from a narrow size range of 'active' aerosols so that, under these circumstances, the refractive index components can indeed be retrieved essentially independently of the size distribution. For 0.1% accurate data in three colors, the technique can provide the real and imaginary components of the index respectively within 0.07% and 0.3% accuracy.

  18. Security patterns and a weighting scheme for mobile agents

    NASA Astrophysics Data System (ADS)

    Walker, Jessie J.

    The notion of mobility has always been a prime factor in human endeavor and achievement. This need to migrate by humans has been distilled into software entities, which are their representatives on distant environments. Software agents are developed to act on behalf of a user. Mobile agents were born from the understanding that many times it was much more useful to move the code (program) to where the resources are located, instead of connecting remotely. Within the mobile agent research community, security has traditionally been the most defining issue facing the community and preventing the paradigm from gaining wide acceptance. There are still numerous difficult problems being addressed with very few practical solutions, such as the malicious host and agent problems. These problems are some of the most active areas of research within the mobile agent community. The major principles, facets, fundamental concepts, techniques and architectures of the field are well understood within the community. This is evident by the many mobile agent systems developed in the last decade that share common core components such as agent management, communication facilities, and mobility services. In other words new mobile agent systems and frameworks do not provide any new insights into agent system architecture or mobility services, agent coordination, communication that could be useful to the agent research community, although these new mobile agent systems do in many instances validate, refine, demonstrate the reuse of many previously proposed and discussed mobile agent research elements. Since mobile agent research for the last decade has been defined by security and related issues, our research into security patterns are within this narrow arena of mobile agent research. The research presented in this thesis examines the issue of mobile agent security from the standpoint of security pattern documented from the universe of mobile agent systems. In addition, we explore how

  19. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.

    PubMed

    Ali, Bako; Awad, Ali Ismail

    2018-03-08

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  20. Assessment of the relationship between a narrow fragmented QRS complex and coronary slow flow.

    PubMed

    Cakmak, Huseyin Altug; Aslan, Serkan; Gul, Mehmet; Kalkan, Ali Kemal; Ozturk, Derya; Celik, Omer; Tasbulak, Omer; Satilmisoglu, Muhammet Hulusi

    2015-01-01

    The coronary slow flow (CSF) phenomenon is a delayed antegrade progression of contrast agent to the distal branch of a coronary artery in the absence of obstructive coronary artery disease (CAD). A narrow fragmented QRS (fQRS) has been reported as a significant predictor of sudden cardiac death in patients with idiopathic dilated cardiomyopathy. The present study aimed to investigate the relationship between a narrow fQRS on the admission electrocardiogram (ECG) and CSF on coronary angiography. This study included 165 consecutive patients (112 CSF, 53 controls) who underwent first-time diagnostic conventional coronary angiography for suspected CAD. Coronary flow was quantified by thrombolysis in myocardial infarction (TIMI) frame count (TFC). The patients were divided into two groups according to the presence or absence of a narrow fQRS complex on the admission ECG. Forty four patients were in the fQRS group (mean age, 52.97 ± 3.13 years). There was no difference between the two groups with respect to age, gender, body mass index, family history, hyperlipidemia, hypertension, or diabetes mellitus. The extent of CSF was significantly greater in the fQRS group compared to the non-fragmented group (p < 0.001). A significant correlation was also found between mean TFC values and fQRS (p < 0.001). On multivariate analysis, only CSF (p = 0.03) was a significant independent predictor for narrow fQRS, after adjustment for other parameters. The narrow fQRS is a simple, inexpensive, and readily available noninvasive ECG parameter that may be a new potential indicator of myocardial damage in patients with CSF.

  1. Enriched Title-Based Keyword Index Generation Using dBase II.

    ERIC Educational Resources Information Center

    Rajendran, P. P.

    1986-01-01

    Describes the use of a database management system (DBMS)--dBaseII--to create an enriched title-based keyword index for a collection of news items at the Renewable Energy Resources Information Center of the Asian Institute of Technology. The use of DBMSs in libraries in developing countries is emphasized. (Author/LRW)

  2. A copula-multifractal volatility hedging model for CSI 300 index futures

    NASA Astrophysics Data System (ADS)

    Wei, Yu; Wang, Yudong; Huang, Dengshi

    2011-11-01

    In this paper, we propose a new hedging model combining the newly introduced multifractal volatility (MFV) model and the dynamic copula functions. Using high-frequency intraday quotes of the spot Shanghai Stock Exchange Composite Index (SSEC), spot China Securities Index 300 (CSI 300), and CSI 300 index futures, we compare the direct and cross hedging effectiveness of the copula-MFV model with several popular copula-GARCH models. The main empirical results show that the proposed copula-MFV model obtains better hedging effectiveness than the copula-GARCH-type models in general. Furthermore, the hedge operating strategy based MFV hedging model involves fewer transaction costs than those based on the GARCH-type models. The finding of this paper indicates that multifractal analysis may offer a new way of quantitative hedging model design using financial futures.

  3. The method of a joint intraday security check system based on cloud computing

    NASA Astrophysics Data System (ADS)

    Dong, Wei; Feng, Changyou; Zhou, Caiqi; Cai, Zhi; Dan, Xu; Dai, Sai; Zhang, Chuancheng

    2017-01-01

    The intraday security check is the core application in the dispatching control system. The existing security check calculation only uses the dispatch center’s local model and data as the functional margin. This paper introduces the design of all-grid intraday joint security check system based on cloud computing and its implementation. To reduce the effect of subarea bad data on the all-grid security check, a new power flow algorithm basing on comparison and adjustment with inter-provincial tie-line plan is presented. And the numerical example illustrated the effectiveness and feasibility of the proposed method.

  4. The Chronicle Index of For-Profit Higher Education

    ERIC Educational Resources Information Center

    Blumenstyk, Goldie

    2007-01-01

    This Index tracks the performance of eight publicly traded higher-education companies. The index was developed for The Chronicle by the Center for Research in Security Prices at the University of Chicago's Graduate School of Business.

  5. Novel online security system based on rare-earth-doped glass microbeads

    NASA Astrophysics Data System (ADS)

    Officer, Simon; Prabhu, G. R.; Pollard, Pat; Hunter, Catherine; Ross, Gary A.

    2004-06-01

    A novel fluorescent security label has been produced that could replace numerous conventional fluorescent dyes in document security. This label utilizes rare earth ions doped in a borosilicate glass matrix to produce sharp spectral fluorescence peaks with characteristic long lifetimes due to the rare earth ions. These are subsequently detected by an online detection system based on fluorescence and the long lifetimes to avoid any interference from other fluorophores present in the background. Security is further enhanced by the interaction of the rare earth ions with each other and the effect of the host on the emission spectra and therefore the number of permutations that could be produced. This creates a very secure label with various applications for the security market.

  6. Refractive index inversion based on Mueller matrix method

    NASA Astrophysics Data System (ADS)

    Fan, Huaxi; Wu, Wenyuan; Huang, Yanhua; Li, Zhaozhao

    2016-03-01

    Based on Stokes vector and Jones vector, the correlation between Mueller matrix elements and refractive index was studied with the result simplified, and through Mueller matrix way, the expression of refractive index inversion was deduced. The Mueller matrix elements, under different incident angle, are simulated through the expression of specular reflection so as to analyze the influence of the angle of incidence and refractive index on it, which is verified through the measure of the Mueller matrix elements of polished metal surface. Research shows that, under the condition of specular reflection, the result of Mueller matrix inversion is consistent with the experiment and can be used as an index of refraction of inversion method, and it provides a new way for target detection and recognition technology.

  7. Laser-based ultrasonics by dual-probe interferometer detection and narrow-band ultrasound generation

    NASA Astrophysics Data System (ADS)

    Huang, Jin

    1993-01-01

    Despite the advantages of laser-based ultrasonic (LBU) systems, the overall sensitivity of LBU systems needs to be improved for practical applications. Progress is reported to achieve better LBU detection accuracy and sensitivity for applications with surface waves and Lamb waves. A novel dual-probe laser interferometer has been developed to measure the same signal at two points. The dual-probe interferometer is a modification of a conventional single-probe interferometer in that the reference beam is guided to a second detecting point on the specimen surface to form a differential measurement mode, which measure the difference of the displacements at the two points. This dual-probe interferometer is particularly useful for accurate measurements of the speed and attenuation of surface waves and Lamb waves. The dual-probe interferometer has been applied to obtain accurate measurements of the surface wave speed and attenuation on surfaces of increasing surface roughness. It has also been demonstrated that with an appropriate signal processing method, namely, the power cepstrum method, the dual-probe interferometer is applicable to measure the local surface wave speed even when the probe separation is so small that the two waveforms in the interferometer output signal overlap in the time domain. Narrow-band signal generation and detection improve the sensitivity of LBU systems. It is proposed to use a diffraction grating to form an array of illuminating strips which form a source of narrowband surface and Lamb waves. The line-array of thermoelastic sources generates narrow-band signals whose frequency and bandwidth can be easily controlled. The optimum line-array parameters, such as width, spacing and the number of lines in the array have been derived theoretically and verified experimentally. Narrow-band signal generation with optimum parameters has been demonstrated. The enhanced LBU system with dual-probe detection and narrowband signal generation has been

  8. Famine Early Warning Systems Network (FEWS NET) Agro-climatology Analysis Tools and Knowledge Base Products for Food Security Applications

    NASA Astrophysics Data System (ADS)

    Budde, M. E.; Rowland, J.; Anthony, M.; Palka, S.; Martinez, J.; Hussain, R.

    2017-12-01

    The U.S. Geological Survey (USGS) supports the use of Earth observation data for food security monitoring through its role as an implementing partner of the Famine Early Warning Systems Network (FEWS NET). The USGS Earth Resources Observation and Science (EROS) Center has developed tools designed to aid food security analysts in developing assumptions of agro-climatological outcomes. There are four primary steps to developing agro-climatology assumptions; including: 1) understanding the climatology, 2) evaluating current climate modes, 3) interpretation of forecast information, and 4) incorporation of monitoring data. Analysts routinely forecast outcomes well in advance of the growing season, which relies on knowledge of climatology. A few months prior to the growing season, analysts can assess large-scale climate modes that might influence seasonal outcomes. Within two months of the growing season, analysts can evaluate seasonal forecast information as indicators. Once the growing season begins, monitoring data, based on remote sensing and field information, can characterize the start of season and remain integral monitoring tools throughout the duration of the season. Each subsequent step in the process can lead to modifications of the original climatology assumption. To support such analyses, we have created an agro-climatology analysis tool that characterizes each step in the assumption building process. Satellite-based rainfall and normalized difference vegetation index (NDVI)-based products support both the climatology and monitoring steps, sea-surface temperature data and knowledge of the global climate system inform the climate modes, and precipitation forecasts at multiple scales support the interpretation of forecast information. Organizing these data for a user-specified area provides a valuable tool for food security analysts to better formulate agro-climatology assumptions that feed into food security assessments. We have also developed a knowledge

  9. 18 CFR 3a.91 - Data index system.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Data index system. 3a.91 Section 3a.91 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Data Index System § 3a.91 Data index system...

  10. 18 CFR 3a.91 - Data index system.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Data index system. 3a.91 Section 3a.91 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Data Index System § 3a.91 Data index system...

  11. 18 CFR 3a.91 - Data index system.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Data index system. 3a.91 Section 3a.91 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Data Index System § 3a.91 Data index system...

  12. 18 CFR 3a.91 - Data index system.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Data index system. 3a.91 Section 3a.91 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Data Index System § 3a.91 Data index system...

  13. Narrow band perfect absorber for maximum localized magnetic and electric field enhancement and sensing applications

    PubMed Central

    Yong, Zhengdong; Zhang, Senlin; Gong, Chensheng; He, Sailing

    2016-01-01

    Plasmonics offer an exciting way to mediate the interaction between light and matter, allowing strong field enhancement and confinement, large absorption and scattering at resonance. However, simultaneous realization of ultra-narrow band perfect absorption and electromagnetic field enhancement is challenging due to the intrinsic high optical losses and radiative damping in metals. Here, we propose an all-metal plasmonic absorber with an absorption bandwidth less than 8 nm and polarization insensitive absorptivity exceeding 99%. Unlike traditional Metal-Dielectric-Metal configurations, we demonstrate that the narrowband perfect absorption and field enhancement are ascribed to the vertical gap plasmonic mode in the deep subwavelength scale, which has a high quality factor of 120 and mode volume of about 10−4 × (λres/n)3. Based on the coupled mode theory, we verify that the diluted field enhancement is proportional to the absorption, and thus perfect absorption is critical to maximum field enhancement. In addition, the proposed perfect absorber can be operated as a refractive index sensor with a sensitivity of 885 nm/RIU and figure of merit as high as 110. It provides a new design strategy for narrow band perfect absorption and local field enhancement, and has potential applications in biosensors, filters and nonlinear optics. PMID:27046540

  14. Agent-based model for the h-index - exact solution

    NASA Astrophysics Data System (ADS)

    Żogała-Siudem, Barbara; Siudem, Grzegorz; Cena, Anna; Gagolewski, Marek

    2016-01-01

    Hirsch's h-index is perhaps the most popular citation-based measure of scientific excellence. In 2013, Ionescu and Chopard proposed an agent-based model describing a process for generating publications and citations in an abstract scientific community [G. Ionescu, B. Chopard, Eur. Phys. J. B 86, 426 (2013)]. Within such a framework, one may simulate a scientist's activity, and - by extension - investigate the whole community of researchers. Even though the Ionescu and Chopard model predicts the h-index quite well, the authors provided a solution based solely on simulations. In this paper, we complete their results with exact, analytic formulas. What is more, by considering a simplified version of the Ionescu-Chopard model, we obtained a compact, easy to compute formula for the h-index. The derived approximate and exact solutions are investigated on a simulated and real-world data sets.

  15. A Game Theory Based Solution for Security Challenges in CRNs

    NASA Astrophysics Data System (ADS)

    Poonam; Nagpal, Chander Kumar

    2018-03-01

    Cognitive radio networks (CRNs) are being envisioned to drive the next generation Ad hoc wireless networks due to their ability to provide communications resilience in continuously changing environments through the use of dynamic spectrum access. Conventionally CRNs are dependent upon the information gathered by other secondary users to ensure the accuracy of spectrum sensing making them vulnerable to security attacks leading to the need of security mechanisms like cryptography and trust. However, a typical cryptography based solution is not a viable security solution for CRNs owing to their limited resources. Effectiveness of trust based approaches has always been, in question, due to credibility of secondary trust resources. Game theory with its ability to optimize in an environment of conflicting interests can be quite a suitable tool to manage an ad hoc network in the presence of autonomous selfish/malevolent/malicious and attacker nodes. The literature contains several theoretical proposals for augmenting game theory in the ad hoc networks without explicit/detailed implementation. This paper implements a game theory based solution in MATLAB-2015 to secure the CRN environment and compares the obtained results with the traditional approaches of trust and cryptography. The simulation result indicates that as the time progresses the game theory performs much better with higher throughput, lower jitter and better identification of selfish/malicious nodes.

  16. 26 CFR 1.1286-2 - Stripped inflation-indexed debt instruments.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Stripped inflation-indexed debt instruments. 1....1286-2 Stripped inflation-indexed debt instruments. Stripped inflation-indexed debt instruments. If a Treasury Inflation-Indexed Security is stripped under the Department of the Treasury's Separate Trading of...

  17. SPLICS: a split green fluorescent protein-based contact site sensor for narrow and wide heterotypic organelle juxtaposition.

    PubMed

    Cieri, Domenico; Vicario, Mattia; Giacomello, Marta; Vallese, Francesca; Filadi, Riccardo; Wagner, Tina; Pozzan, Tullio; Pizzo, Paola; Scorrano, Luca; Brini, Marisa; Calì, Tito

    2018-06-01

    Contact sites are discrete areas of organelle proximity that coordinate essential physiological processes across membranes, including Ca 2+ signaling, lipid biosynthesis, apoptosis, and autophagy. However, tools to easily image inter-organelle proximity over a range of distances in living cells and in vivo are lacking. Here we report a split-GFP-based contact site sensor (SPLICS) engineered to fluoresce when organelles are in proximity. Two SPLICS versions efficiently measured narrow (8-10 nm) and wide (40-50 nm) juxtapositions between endoplasmic reticulum and mitochondria, documenting the existence of at least two types of contact sites in human cells. Narrow and wide ER-mitochondria contact sites responded differently to starvation, ER stress, mitochondrial shape modifications, and changes in the levels of modulators of ER-mitochondria juxtaposition. SPLICS detected contact sites in soma and axons of D. rerio Rohon Beard (RB) sensory neurons in vivo, extending its use to analyses of organelle juxtaposition in the whole animal.

  18. A provably-secure ECC-based authentication scheme for wireless sensor networks.

    PubMed

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-11-06

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.

  19. A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

    PubMed Central

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009

  20. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    PubMed Central

    2018-01-01

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes. PMID:29518023

  1. A Component-Based Approach for Securing Indoor Home Care Applications.

    PubMed

    Agirre, Aitor; Armentia, Aintzane; Estévez, Elisabet; Marcos, Marga

    2017-12-26

    eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly population. As these eHealth services are founded on the acquisition and processing of sensitive data (e.g., personal details, diagnosis, treatments and medical history), any security threat would damage the public's confidence in them. This paper proposes a solution for the design and runtime management of indoor eHealth applications with security requirements. The proposal allows applications definition customized to patient particularities, including the early detection of health deterioration and suitable reaction (events) as well as security needs. At runtime, security support is twofold. A secured component-based platform supervises applications execution and provides events management, whilst the security of the communications among application components is also guaranteed. Additionally, the proposed event management scheme adopts the fog computing paradigm to enable local event related data storage and processing, thus saving communication bandwidth when communicating with the cloud. As a proof of concept, this proposal has been validated through the monitoring of the health status in diabetic patients at a nursing home.

  2. Security clustering algorithm based on reputation in hierarchical peer-to-peer network

    NASA Astrophysics Data System (ADS)

    Chen, Mei; Luo, Xin; Wu, Guowen; Tan, Yang; Kita, Kenji

    2013-03-01

    For the security problems of the hierarchical P2P network (HPN), the paper presents a security clustering algorithm based on reputation (CABR). In the algorithm, we take the reputation mechanism for ensuring the security of transaction and use cluster for managing the reputation mechanism. In order to improve security, reduce cost of network brought by management of reputation and enhance stability of cluster, we select reputation, the historical average online time, and the network bandwidth as the basic factors of the comprehensive performance of node. Simulation results showed that the proposed algorithm improved the security, reduced the network overhead, and enhanced stability of cluster.

  3. MeSH indexing based on automatically generated summaries.

    PubMed

    Jimeno-Yepes, Antonio J; Plaza, Laura; Mork, James G; Aronson, Alan R; Díaz, Alberto

    2013-06-26

    MEDLINE citations are manually indexed at the U.S. National Library of Medicine (NLM) using as reference the Medical Subject Headings (MeSH) controlled vocabulary. For this task, the human indexers read the full text of the article. Due to the growth of MEDLINE, the NLM Indexing Initiative explores indexing methodologies that can support the task of the indexers. Medical Text Indexer (MTI) is a tool developed by the NLM Indexing Initiative to provide MeSH indexing recommendations to indexers. Currently, the input to MTI is MEDLINE citations, title and abstract only. Previous work has shown that using full text as input to MTI increases recall, but decreases precision sharply. We propose using summaries generated automatically from the full text for the input to MTI to use in the task of suggesting MeSH headings to indexers. Summaries distill the most salient information from the full text, which might increase the coverage of automatic indexing approaches based on MEDLINE. We hypothesize that if the results were good enough, manual indexers could possibly use automatic summaries instead of the full texts, along with the recommendations of MTI, to speed up the process while maintaining high quality of indexing results. We have generated summaries of different lengths using two different summarizers, and evaluated the MTI indexing on the summaries using different algorithms: MTI, individual MTI components, and machine learning. The results are compared to those of full text articles and MEDLINE citations. Our results show that automatically generated summaries achieve similar recall but higher precision compared to full text articles. Compared to MEDLINE citations, summaries achieve higher recall but lower precision. Our results show that automatic summaries produce better indexing than full text articles. Summaries produce similar recall to full text but much better precision, which seems to indicate that automatic summaries can efficiently capture the most

  4. MeSH indexing based on automatically generated summaries

    PubMed Central

    2013-01-01

    Background MEDLINE citations are manually indexed at the U.S. National Library of Medicine (NLM) using as reference the Medical Subject Headings (MeSH) controlled vocabulary. For this task, the human indexers read the full text of the article. Due to the growth of MEDLINE, the NLM Indexing Initiative explores indexing methodologies that can support the task of the indexers. Medical Text Indexer (MTI) is a tool developed by the NLM Indexing Initiative to provide MeSH indexing recommendations to indexers. Currently, the input to MTI is MEDLINE citations, title and abstract only. Previous work has shown that using full text as input to MTI increases recall, but decreases precision sharply. We propose using summaries generated automatically from the full text for the input to MTI to use in the task of suggesting MeSH headings to indexers. Summaries distill the most salient information from the full text, which might increase the coverage of automatic indexing approaches based on MEDLINE. We hypothesize that if the results were good enough, manual indexers could possibly use automatic summaries instead of the full texts, along with the recommendations of MTI, to speed up the process while maintaining high quality of indexing results. Results We have generated summaries of different lengths using two different summarizers, and evaluated the MTI indexing on the summaries using different algorithms: MTI, individual MTI components, and machine learning. The results are compared to those of full text articles and MEDLINE citations. Our results show that automatically generated summaries achieve similar recall but higher precision compared to full text articles. Compared to MEDLINE citations, summaries achieve higher recall but lower precision. Conclusions Our results show that automatic summaries produce better indexing than full text articles. Summaries produce similar recall to full text but much better precision, which seems to indicate that automatic summaries can

  5. Refractive index sensor based on optical fiber end face using pulse reference-based compensation technique

    NASA Astrophysics Data System (ADS)

    Bian, Qiang; Song, Zhangqi; Zhang, Xueliang; Yu, Yang; Chen, Yuzhong

    2018-03-01

    We proposed a refractive index sensor based on optical fiber end face using pulse reference-based compensation technique. With good compensation effect of this compensation technique, the power fluctuation of light source, the change of optic components transmission loss and coupler splitting ratio can be compensated, which largely reduces the background noise. The refractive index resolutions can achieve 3.8 × 10-6 RIU and1.6 × 10-6 RIU in different refractive index regions.

  6. Fabrication of Ag nanostructures with remarkable narrow plasmonic resonances by glancing angle deposition

    NASA Astrophysics Data System (ADS)

    Abbasian, Sara; Moshaii, Ahmad; Vayghan, Nader Sobhkhiz; Nikkhah, Maryam

    2018-05-01

    Glancing angle deposition (GLAD) is an efficient and inexpensive method to fabricate nanostructures with diverse complexities. However, this method has a limitation in fabrication of plasmonic nanostructures with narrow resonance peaks causing that the GLAD-nanostructures have rarely been used for refractive-index sensing. In this work, we proposed two approaches to overcome this limitation of GLAD and to fabricate Ag nanostructures with narrow plasmonic peaks. In the first approach, we introduce an effective method for seeding modification of the substrate and then growing the Ag nanocolumns on such seeded layer. The optical characterization shows that such pre-seeding of the substrate leads to nearly 40% narrowing of the plasmonic peak. In another approach, the nanostructures are grown by GLAD on a bare substrate and then are annealed at 200-400 °C. Such annealing converts the nanostructures to nanodomes with large inter-particle distances and about 60% reduction of their plasmonic width. Also, the annealing of the nanostructures at 400 °C provides a twofold improvement in figure of merit of sensing of the nanostructures. This improvement makes the GLAD comparative to other expensive alternate methods for fabrication of plasmonic sensors. In addition, the experimental plasmonic peaks are reproduced in a proper numerical simulation for similar nanostructures.

  7. Tracking photosynthetic efficiency with narrow-band spectroradiometry

    NASA Technical Reports Server (NTRS)

    Gamon, John A.; Field, Christopher B.

    1992-01-01

    Narrow-waveband spectroradiometry presents the possibility of detecting subtle signals closely related to the current physiological state of vegetation. One such signal related to the epoxidation state of the xanthophyll cycle pigments, violaxanthin, antheraxanthin, and zeaxanthin is discussed. Recent advances in plant ecophysiology demonstrated a close relationship between these pigments and the regulatory state of photosystem 2 in photosynthesis. Our recent field studies of sunflower (Helianthus annuus) and oak (Quercus agrifolia) demonstrated that a 'xanthophyll signal' can be isolated from the diurnal reflectance spectra of intact canopies. Furthermore, the xanthophyll signal can be used to derive a 'physiological reflectance index' (PRI) that closely correlates with the actual photosynthetic efficiency (defined as the photosynthetic rate divided by the incident PAR) in closed canopies. If these signals were detectable in Airborne Visible/Infrared Imaging Spectrometers (AVIRIS) images, they could lead to improved remote estimates of photosynthetic fluxes.

  8. Security of a sessional blind signature based on quantum cryptograph

    NASA Astrophysics Data System (ADS)

    Wang, Tian-Yin; Cai, Xiao-Qiu; Zhang, Rui-Ling

    2014-08-01

    We analyze the security of a sessional blind signature protocol based on quantum cryptograph and show that there are two security leaks in this protocol. One is that the legal user Alice can change the signed message after she gets a valid blind signature from the signatory Bob, and the other is that an external opponent Eve also can forge a valid blind message by a special attack, which are not permitted for blind signature. Therefore, this protocol is not secure in the sense that it does not satisfy the non-forgeability of blind signatures. We also discuss the methods to prevent the attack strategies in the end.

  9. Chaos-based CAZAC scheme for secure transmission in OFDM-PON

    NASA Astrophysics Data System (ADS)

    Fu, Xiaosong; Bi, Meihua; Zhou, Xuefang; Yang, Guowei; Lu, Yang; Hu, Miao

    2018-01-01

    To effectively resist malicious eavesdropping and performance deterioration, a novel chaos-based secure transmission scheme is proposed to enhance the physical layer security and reduce peak-to-average power ratio (PAPR) in orthogonal frequency division multiplexing passive optical network (OFDM-PON). By the randomly extracting operation of common CAZAC values, the specially-designed constant amplitude zero autocorrelation (CAZAC) is created for system encryption and PAPR reduction enhancing the transmission security. This method is verified in {10-Gb/s encrypted OFDM-PON with 20-km fiber transmission. Results show that, compared to common OFDM-PON, our scheme achieves {3-dB PAPR reduction and {1-dB receiver sensitivity improvement.

  10. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network.

    PubMed

    Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing

    2016-12-30

    Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods.

  11. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network

    PubMed Central

    Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing

    2016-01-01

    Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods. PMID:28042831

  12. 76 FR 34920 - Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-15

    ... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 230, 240 and 260 [Release Nos. 33-9222; 34-64639; 39-2474; File No. S7-22-11] RIN 3235-AL16 Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies AGENCY: Securities and Exchange Commission. ACTION: Proposed rules. SUMMARY: We are...

  13. 17 CFR 1.8 - Requests for interpretation of swaps, security-based swaps, and mixed swaps.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... swaps, security-based swaps, and mixed swaps. 1.8 Section 1.8 Commodity and Securities Exchanges... Requests for interpretation of swaps, security-based swaps, and mixed swaps. (a) In general. Any person may... Exchange Act and the rules and regulations promulgated thereunder; or (3) A mixed swap, as that term is...

  14. 17 CFR 1.8 - Requests for interpretation of swaps, security-based swaps, and mixed swaps.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... swaps, security-based swaps, and mixed swaps. 1.8 Section 1.8 Commodity and Securities Exchanges... Requests for interpretation of swaps, security-based swaps, and mixed swaps. (a) In general. Any person may... Exchange Act and the rules and regulations promulgated thereunder; or (3) A mixed swap, as that term is...

  15. Towards a Scalable Group Vehicle-based Security System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carter, Jason M

    2016-01-01

    In August 2014, the National Highway Traffic Safety Administration (NHTSA) proposed new rulemaking to require V2V communication in light vehicles. To establish trust in the basic safety messages (BSMs) that are exchanged by vehicles to improve driver safety, a vehicle public key infrastructure (VPKI) is required. We outline a system where a group or groups of vehicles manage and generate their own BSM signing keys and authenticating certificates -- a Vehicle-Based Security System (VBSS). Based on our preliminary examination, we assert the mechanisms exist to implement a VBSS that supports V2V communications; however, maintaining uniform trust throughout the system whilemore » protecting individual privacy does require reliance on nascent group signature technology which may require a significant amount of communication overhead for trust maintenance. To better evaluate the VBSS approach, we compare it to the proposed Security Credential Management System (SCMS) in four major areas including bootstrapping, pseudonym provisioning, BSM signing and authentication, and revocation. System scale, driver privacy, and the distribution and dynamics of participants make designing an effective VPKI an interesting and challenging problem; no clear-cut strategy exists to satisfy the security and privacy expectations in a highly efficient way. More work is needed in VPKI research, so the life-saving promise of V2V technology can be achieved.« less

  16. A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications

    NASA Astrophysics Data System (ADS)

    Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frédéric; Litzistorf, Gérald

    Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.

  17. Excessive Heat Events and National Security: Building Resilience based on Early Warning Systems

    NASA Astrophysics Data System (ADS)

    Vintzileos, A.

    2017-12-01

    Excessive heat events (EHE) affect security of Nations in multiple direct and indirect ways. EHE are the top cause for morbidity/mortality associated to any atmospheric extremes. Higher energy consumption used for cooling can lead to black-outs and social disorder. EHE affect the food supply chain reducing crop yield and increasing the probability of food contamination during delivery and storage. Distribution of goods during EHE can be severely disrupted due to mechanical failure of transportation equipment. EHE during athletic events e.g., marathons, may result to a high number of casualties. Finally, EHE may also affect military planning by e.g. reducing hours of exercise and by altering combat gear. Early warning systems for EHE allow for building resilience. In this paper we first define EHE as at least two consecutive heat days; a heat day is defined as a day with a maximum heat index with probability of occurrence that exceeds a certain threshold. We then use retrospective forecasts performed with a multitude of operational models and show that it is feasible to forecast EHE at forecast lead of week-2 and week-3 over the contiguous United States. We finally introduce an improved definition of EHE based on an intensity index and investigate forecast skill of the predictive system in the tropics and subtropics.

  18. A Security Monitoring Framework For Virtualization Based HEP Infrastructures

    NASA Astrophysics Data System (ADS)

    Gomez Ramirez, A.; Martinez Pedreira, M.; Grigoras, C.; Betev, L.; Lara, C.; Kebschull, U.; ALICE Collaboration

    2017-10-01

    High Energy Physics (HEP) distributed computing infrastructures require automatic tools to monitor, analyze and react to potential security incidents. These tools should collect and inspect data such as resource consumption, logs and sequence of system calls for detecting anomalies that indicate the presence of a malicious agent. They should also be able to perform automated reactions to attacks without administrator intervention. We describe a novel framework that accomplishes these requirements, with a proof of concept implementation for the ALICE experiment at CERN. We show how we achieve a fully virtualized environment that improves the security by isolating services and Jobs without a significant performance impact. We also describe a collected dataset for Machine Learning based Intrusion Prevention and Detection Systems on Grid computing. This dataset is composed of resource consumption measurements (such as CPU, RAM and network traffic), logfiles from operating system services, and system call data collected from production Jobs running in an ALICE Grid test site and a big set of malware samples. This malware set was collected from security research sites. Based on this dataset, we will proceed to develop Machine Learning algorithms able to detect malicious Jobs.

  19. 12 CFR 220.9 - Clearance of securities, options, and futures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... security (including options on any security, certificate of deposit, securities index or foreign currency); or (ii) Guarantees performance of contracts for the purchase or sale of a commodity for future... Exchange Commission or is the clearing agency for a contract market regulated by the Commodity Futures...

  20. 12 CFR 220.9 - Clearance of securities, options, and futures.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... security (including options on any security, certificate of deposit, securities index or foreign currency); or (ii) Guarantees performance of contracts for the purchase or sale of a commodity for future... Exchange Commission or is the clearing agency for a contract market regulated by the Commodity Futures...

  1. Finite-key security analysis of quantum key distribution with imperfect light sources

    DOE PAGES

    Mizutani, Akihiro; Curty, Marcos; Lim, Charles Ci Wen; ...

    2015-09-09

    In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily flawed optical receivers. The status for QKD systems with imperfect light sources is however less satisfactory, in the sense that the resulting secure key rates are often overly dependent on the quality of state preparation. This is especially the case when the channel loss is high. Very recently, to overcome this limitation, Tamaki et al proposed a QKD protocol based on the so-called 'rejected data analysis', and showed that its security in the limit of infinitelymore » long keys is almost independent of any encoding flaw in the qubit space, being this protocol compatible with the decoy state method. Here, as a step towards practical QKD, we show that a similar conclusion is reached in the finite-key regime, even when the intensity of the light source is unstable. More concretely, we derive security bounds for a wide class of realistic light sources and show that the bounds are also efficient in the presence of high channel loss. Our results strongly suggest the feasibility of long distance provably secure communication with imperfect light sources.« less

  2. Cloud-Based Virtual Laboratory for Network Security Education

    ERIC Educational Resources Information Center

    Xu, Le; Huang, Dijiang; Tsai, Wei-Tek

    2014-01-01

    Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…

  3. 77 FR 19408 - Reinstate Index to Chapter III in 20 CFR

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-30

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0018] Reinstate Index to Chapter III in 20 CFR AGENCY: Social Security Administration. ACTION: Notice; correction. SUMMARY: The Social Security... Chapter III in Title 20 of the Code of Federal Regulations. The document contains a misprinted Web site...

  4. 33 CFR 165.1102 - Security Zone; Naval Base Point Loma; San Diego Bay, San Diego, CA.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zone; Naval Base Point... Guard District § 165.1102 Security Zone; Naval Base Point Loma; San Diego Bay, San Diego, CA. (a) Location. The following area is a security zone: The water adjacent to the Naval Base Point Loma, San Diego...

  5. [Tourism ecological security early warning of Zhangjiajie, China based on the improved TOPSIS method and the grey GM (1,1)model].

    PubMed

    Xu, Mei; Liu, Chun la; Li, Dan; Zhong, Xiao Lin

    2017-11-01

    Tourism ecological security early warning is of great significance both to the coordination of ecological environment protection and tourism industry rapid development in tourism destination, and the sustainable and healthy development of regional social and economy. Firstly, based on the DPSIR model, the tourism ecological security early warning index system of Zhangjiajie was constructed from 5 aspects, which were driving force, pressure, state, impact and response. Then, by using the improved TOPSIS method, the tourism ecological security situation of Zhangjiajie from 2001 to 2014 was analyzed. Lastly, by using the grey GM (1,1) model, the tourism ecological security evolution trend of 2015-2020 was predicted. The results indicated that, on the whole, the close degree of Zhangjiajie's tourism ecological security showed a slightly upward trend during 2001-2014, the warning degree was the moderate warning. In terms of each subsystem, warning degree of the driving force system and the pressure system of Zhangjiajie's tourism ecological secu-rity were on the rise, which evolved from light warning to heavy warning; warning degree of the state system and the impact system had not changed so much, and had been in the moderate warning; warning degree of the response system was on the decline, which changed from huge warning to no warning during 2001-2014. According to the current development trend, the close degree of Zhangjiajie's tourism ecological security would rise further in 2015-2020, and the warning degree would turn from moderate warning into light warning, but the task of coordinating the relationship between tourism development and ecological construction and environmental protection would be still arduous.

  6. A Component-Based Approach for Securing Indoor Home Care Applications

    PubMed Central

    Estévez, Elisabet

    2017-01-01

    eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly population. As these eHealth services are founded on the acquisition and processing of sensitive data (e.g., personal details, diagnosis, treatments and medical history), any security threat would damage the public’s confidence in them. This paper proposes a solution for the design and runtime management of indoor eHealth applications with security requirements. The proposal allows applications definition customized to patient particularities, including the early detection of health deterioration and suitable reaction (events) as well as security needs. At runtime, security support is twofold. A secured component-based platform supervises applications execution and provides events management, whilst the security of the communications among application components is also guaranteed. Additionally, the proposed event management scheme adopts the fog computing paradigm to enable local event related data storage and processing, thus saving communication bandwidth when communicating with the cloud. As a proof of concept, this proposal has been validated through the monitoring of the health status in diabetic patients at a nursing home. PMID:29278370

  7. Content Sharing Based on Personal Information in Virtually Secured Space

    NASA Astrophysics Data System (ADS)

    Sohn, Hosik; Ro, Yong Man; Plataniotis, Kostantinos N.

    User generated contents (UGC) are shared in an open space like social media where users can upload and consume contents freely. Since the access of contents is not restricted, the contents could be delivered to unwanted users or misused sometimes. In this paper, we propose a method for sharing UGCs securely based on the personal information of users. With the proposed method, virtual secure space is created for contents delivery. The virtual secure space allows UGC creator to deliver contents to users who have similar personal information and they can consume the contents without any leakage of personal information. In order to verify the usefulness of the proposed method, the experiment was performed where the content was encrypted with personal information of creator, and users with similar personal information have decrypted and consumed the contents. The results showed that UGCs were securely shared among users who have similar personal information.

  8. 20 CFR 404.211 - Computing your average indexed monthly earnings.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... averages to make them comparable to the averages for 1951-1990. (d) Indexing your earnings. (1) The first step in indexing your social security earnings is to find the relationship (under paragraph (d)(2) of... average wage of all workers in your indexing year. As a general rule, your indexing year is the second...

  9. 20 CFR 404.211 - Computing your average indexed monthly earnings.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... averages to make them comparable to the averages for 1951-1990. (d) Indexing your earnings. (1) The first step in indexing your social security earnings is to find the relationship (under paragraph (d)(2) of... average wage of all workers in your indexing year. As a general rule, your indexing year is the second...

  10. 20 CFR 404.211 - Computing your average indexed monthly earnings.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... averages to make them comparable to the averages for 1951-1990. (d) Indexing your earnings. (1) The first step in indexing your social security earnings is to find the relationship (under paragraph (d)(2) of... average wage of all workers in your indexing year. As a general rule, your indexing year is the second...

  11. 20 CFR 404.211 - Computing your average indexed monthly earnings.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... averages to make them comparable to the averages for 1951-1990. (d) Indexing your earnings. (1) The first step in indexing your social security earnings is to find the relationship (under paragraph (d)(2) of... average wage of all workers in your indexing year. As a general rule, your indexing year is the second...

  12. 20 CFR 404.211 - Computing your average indexed monthly earnings.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... averages to make them comparable to the averages for 1951-1990. (d) Indexing your earnings. (1) The first step in indexing your social security earnings is to find the relationship (under paragraph (d)(2) of... average wage of all workers in your indexing year. As a general rule, your indexing year is the second...

  13. 78 FR 30967 - Cross-Border Security-Based Swap Activities; Re-Proposal of Regulation SBSR and Certain Rules and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-23

    ... context of the security-based swap dealer definition, for affiliated groups with a registered security... for Affiliated Groups with Registered Security-Based Swap Dealers); Rule 3a71-5 (Substituted... 13n-12 (Exemption from Requirements Governing Security-Based Swap Data Repositories for Certain Non-U...

  14. NASA directives master list and index

    NASA Technical Reports Server (NTRS)

    1993-01-01

    This Handbook sets forth in two parts the following information for the guidance of users of the NASA Management Directives System. Part A is a master list of management directives in force as of March 31, 1993. Chapter 1 contains introductory informative material on how to use this Handbook. Chapter 2 is a complete master list of Agencywide management directives, describing each directive by type, number, effective date, expiration date, title, and organization code of the office responsible for the directive. Chapter 3 includes a consolidated numerical list of all delegations of authority and a breakdown of such delegation by the office or installation to which special authority is assigned. Chapter 4 sets forth a consolidated list of all NASA Handbooks (NHB's) and important footnotes covering the control and ordering of such documents. Chapter 5 is a consolidated list of NASA management directives applicable to the Jet Propulsion Laboratory. Chapter 6 is a consolidated list of NASA management directives published in the Code of Federal Regulations. Complementary manuals to the NASA Management Directives System are described in Chapter 7. Part B is the index to NASA management directives in force as of March 31, 1993. This part contains an in-depth alphabetical index to all NASA management directives other than Handbooks. NHB's 1610.6, 'NASA Personnel Security Handbook,' 1620.3, 'NASA Physical Security Handbook,' 1640.4, 'NASA Information Security Program,' 1900.1, 'Standards of Conduct for NASA Employees,' 5103.6, 'Source Evaluation Board Handbook,' and 7400.1, 'Budget Administration Manual,' are indexed in-depth. All other NHB's are indexed by titles only.

  15. Inherent secure communications using lattice based waveform design

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pugh, Matthew Owen

    2013-12-01

    The wireless communications channel is innately insecure due to the broadcast nature of the electromagnetic medium. Many techniques have been developed and implemented in order to combat insecurities and ensure the privacy of transmitted messages. Traditional methods include encrypting the data via cryptographic methods, hiding the data in the noise floor as in wideband communications, or nulling the signal in the spatial direction of the adversary using array processing techniques. This work analyzes the design of signaling constellations, i.e. modulation formats, to combat eavesdroppers from correctly decoding transmitted messages. It has been shown that in certain channel models the abilitymore » of an adversary to decode the transmitted messages can be degraded by a clever signaling constellation based on lattice theory. This work attempts to optimize certain lattice parameters in order to maximize the security of the data transmission. These techniques are of interest because they are orthogonal to, and can be used in conjunction with, traditional security techniques to create a more secure communication channel.« less

  16. Thin film-based optically variable security devices: From passive to active

    NASA Astrophysics Data System (ADS)

    Baloukas, Bill

    the possibility of creating various surprising optical effects. Such a system is obviously more challenging to duplicate due to its complexity, but also adds a second level of authentication accessible to specialized personnel. By designing a metameric filter which matches either the bleached or colored state of an electrochromic device, I show that one can generate two hidden image effects: one which appears when the structure is tilted, and the other one which disappears when the electrochromic material is colored under an applied potential. In this specific study, I present an example of a filter that is metameric with the colored state of a tungsten-oxide-based Deb-type electrochromic device. A hybrid device such as presented in the previous study is clearly interesting from a prototype point of view. Unfortunately, having to design and fabricate two individual components would make such a security feature very expensive. Consequently, my goal was to combine both the color shift and electrochromic color change into a single structure. The following study thus demonstrates, that by designing and fabricating an interference filter based on dense and porous WO3, this goal can be achieved. Finally, a second method of fabricating electrochromic interference filters is proposed which results in a significant decrease in the total numbers of layers of the filters. Replacing the porous WO3 films by a WO 3/SiO2 composite allows for much lower refractive indices to be obtained thus resulting in a larger index contrast (0.61 versus 0.22 in the previous study). In this study, I first explore the physical and electrochromic properties of WO3/SiO2 mixtures. I then combine high and low index films in tandem configurations to observe the bleaching/ coloration dynamics. To account for the poor performance of the ITO|Composite|WO 3 film configuration, I also present an explanation based on the differences in electron diffusion coefficients of the films. I conclude this study with

  17. 30 CFR 250.1200 - Question index table.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 2 2012-07-01 2012-07-01 false Question index table. 250.1200 Section 250.1200..., Surface Commingling, and Security § 250.1200 Question index table. The table in this section lists...(a) 20. What are the requirements for a periodic well test used for allocation? § 250.1204(b) 21...

  18. 30 CFR 250.1200 - Question index table.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 2 2014-07-01 2014-07-01 false Question index table. 250.1200 Section 250.1200..., Surface Commingling, and Security § 250.1200 Question index table. The table in this section lists...(a) 20. What are the requirements for a periodic well test used for allocation? § 250.1204(b) 21...

  19. 30 CFR 250.1200 - Question index table.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 2 2013-07-01 2013-07-01 false Question index table. 250.1200 Section 250.1200..., Surface Commingling, and Security § 250.1200 Question index table. The table in this section lists...(a) 20. What are the requirements for a periodic well test used for allocation? § 250.1204(b) 21...

  20. [Study on the Spectral Characteristics of the Narrow-Band Filter in SHS].

    PubMed

    Luo, Hai-yan; Shi, Hai-liang; Li, Zhi-wei; Li, Shuang; Xiong, Wei; Hong, Jin

    2015-04-01

    The spectral response of spatial heterodyne spectroscopy (SHS) is determined by the spectrum property of narrow-band filter. As discussed in previous studies, the symmetric heterodyned interferogram of high frequency waves modulated by SHS and lack of sample lead to spectral confusion, which is associated with the true and ghost spectra. Because of the deviation from theoretical index of narrow-band filter in the process of coating, the boarded spectral response and middle wave shift are presented, and conditions in the theoretical Littrow wavelength made the effective wavelength range of SHS reduced. According to the measured curve of filter, a new wavenumber of zero spatial frequency can be reset by tunable laser, and it is easy for SHS to improve the spectral aliasing distortion. The results show that it is utilized to the maximum extent of the effective bandwidth by adjusting the grating angle of rotation to change the Littrow wavelength of the basic frequency, and the spectral region increased to 14.9 nm from original 12.9 nm.

  1. An assessment study of the wavelet-based index of magnetic storm activity (WISA) and its comparison to the Dst index

    NASA Astrophysics Data System (ADS)

    Xu, Zhonghua; Zhu, Lie; Sojka, Jan; Kokoszka, Piotr; Jach, Agnieszka

    2008-08-01

    A wavelet-based index of storm activity (WISA) has been recently developed [Jach, A., Kokoszka, P., Sojka, L., Zhu, L., 2006. Wavelet-based index of magnetic storm activity. Journal of Geophysical Research 111, A09215, doi:10.1029/2006JA011635] to complement the traditional Dst index. The new index can be computed automatically by using the wavelet-based statistical procedure without human intervention on the selection of quiet days and the removal of secular variations. In addition, the WISA is flexible on data stretch and has a higher temporal resolution (1 min), which can provide a better description of the dynamical variations of magnetic storms. In this work, we perform a systematic assessment study on the WISA index. First, we statistically compare the WISA to the Dst for various quiet and disturbed periods and analyze the differences of their spectral features. Then we quantitatively assess the flexibility of the WISA on data stretch and study the effects of varying number of stations on the index. In addition, the ability of the WISA for handling the missing data is also quantitatively assessed. The assessment results show that the hourly averaged WISA index can describe storm activities equally well as the Dst index, but its full automation, high flexibility on data stretch, easiness of using the data from varying number of stations, high temporal resolution, and high tolerance to missing data from individual station can be very valuable and essential for real-time monitoring of the dynamical variations of magnetic storm activities and space weather applications, thus significantly complementing the existing Dst index.

  2. An assessment study of the wavelet-based index of magnetic storm activity (WISA) and its comparison to the Dst index

    NASA Astrophysics Data System (ADS)

    Xu, Z.; Zhu, L.; Sojka, J. J.; Kokoszka, P.; Jach, A.

    2006-12-01

    A wavelet-based index of storm activities (WISA) has been recently developed (Jach et al., 2006) to complement the traditional Dst index. The new index can be computed automatically using the wavelet-based statistical procedure without human intervention on the selection of quiet days and the removal of secular variations. In addition, the WISA is flexible on data stretch and has a higher temporal resolution (one minute), which can provide a better description of the dynamical variations of magnetic storms. In this work, we perform a systematic assessment study on the WISA index. First, we statistically compare the WISA to the Dst for various quiet and disturbing periods and analyze the differences of their spectrum features. Then we quantitatively assess the flexibility of the WISA on data stretch and study the effects of varying number of stations on the index. In addition, how well the WISA can handle the missing data is also quantitatively assessed. The assessment results show that the hourly-averaged WISA index can describe storm activities equally well as the Dst index, but its full automation, high flexibility on data stretch, easiness of using the data from varying number of stations, high temporal resolution, and high tolerance on missing data from individual station can be very valuable and essential for real-time monitoring of the dynamical variations of magnetic storm activities and space weather applications, thus significantly complementing the existing Dst index. Jach, A., P. Kokoszka, J. Sojka, and L. Zhu, Wavelet-based index of magnetic storm activity, J. Geophys. Res., in press, 2006.

  3. Fiber-optic refractometer based on an etched high-Q π-phase-shifted fiber-Bragg-grating.

    PubMed

    Zhang, Qi; Ianno, Natale J; Han, Ming

    2013-07-10

    We present a compact and highly-sensitive fiber-optic refractometer based on a high-Q π-phase-shifted fiber-Bragg-grating (πFBG) that is chemically etched to the core of the fiber. Due to the p phase-shift, a strong πFBG forms a high-Q optical resonator and the reflection spectrum features an extremely narrow notch that can be used for highly sensitivity refractive index measurement. The etched πFBG demonstrated here has a diameter of ~9.3 μm and a length of only 7 mm, leading to a refractive index responsivity of 2.9 nm/RIU (RIU: refractive index unit) at an ambient refractive index of 1.318. The reflection spectrum of the etched πFBG features an extremely narrow notch with a linewidth of only 2.1 pm in water centered at ~1,550 nm, corresponding to a Q-factor of 7.4 × 10(5), which allows for potentially significantly improved sensitivity over refractometers based on regular fiber Bragg gratings.

  4. Secured network sensor-based defense system

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Shen, Dan; Ge, Linqiang; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    Network sensor-based defense (NSD) systems have been widely used to defend against cyber threats. Nonetheless, if the adversary finds ways to identify the location of monitor sensors, the effectiveness of NSD systems can be reduced. In this paper, we propose both temporal and spatial perturbation based defense mechanisms to secure NSD systems and make the monitor sensor invisible to the adversary. The temporal-perturbation based defense manipulates the timing information of published data so that the probability of successfully recognizing monitor sensors can be reduced. The spatial-perturbation based defense dynamically redeploys monitor sensors in the network so that the adversary cannot obtain the complete information to recognize all of the monitor sensors. We carried out experiments using real-world traffic traces to evaluate the effectiveness of our proposed defense mechanisms. Our data shows that our proposed defense mechanisms can reduce the attack accuracy of recognizing detection sensors.

  5. Research on mobile electronic commerce security technology based on WPKI

    NASA Astrophysics Data System (ADS)

    Zhang, Bo

    2013-07-01

    Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.

  6. The Analysis of Basic Public Service Supply Regional Equalization in China’s Provinces——Based on the Theil Index Evaluation

    NASA Astrophysics Data System (ADS)

    Liao, Zangyi

    2017-12-01

    Accomplishing the regional equalization of basic public service supply among the provinces in China is an important objective that can promote the people’s livelihood construction. In order to measure the problem which is about the non-equalization of basic public service supply, this paper takes these aspects as the first index, such as the infrastructure construction, basic education services, public employment services, public health service and social security service. At the same time, it cooperates with 16 index as the second index to construct the performance evaluation systems, and then use the Theil index to evaluate the performance in provinces that using the panel data from the year 2000 to 2012.

  7. Constructing RBAC Based Security Model in u-Healthcare Service Platform

    PubMed Central

    Shin, Moon Sun; Jeon, Heung Seok; Ju, Yong Wan; Lee, Bum Ju; Jeong, Seon-Phil

    2015-01-01

    In today's era of aging society, people want to handle personal health care by themselves in everyday life. In particular, the evolution of medical and IT convergence technology and mobile smart devices has made it possible for people to gather information on their health status anytime and anywhere easily using biometric information acquisition devices. Healthcare information systems can contribute to the improvement of the nation's healthcare quality and the reduction of related cost. However, there are no perfect security models or mechanisms for healthcare service applications, and privacy information can therefore be leaked. In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. We propose and design u-healthcare service integration platform (u-HCSIP) applying RBAC security model. The proposed u-HCSIP performs four main functions: storing and exchanging personal health records (PHR), recommending meals and exercise, buying/selling private health information or experience, and managing personal health data using smart devices. PMID:25695104

  8. Constructing RBAC based security model in u-healthcare service platform.

    PubMed

    Shin, Moon Sun; Jeon, Heung Seok; Ju, Yong Wan; Lee, Bum Ju; Jeong, Seon-Phil

    2015-01-01

    In today's era of aging society, people want to handle personal health care by themselves in everyday life. In particular, the evolution of medical and IT convergence technology and mobile smart devices has made it possible for people to gather information on their health status anytime and anywhere easily using biometric information acquisition devices. Healthcare information systems can contribute to the improvement of the nation's healthcare quality and the reduction of related cost. However, there are no perfect security models or mechanisms for healthcare service applications, and privacy information can therefore be leaked. In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. We propose and design u-healthcare service integration platform (u-HCSIP) applying RBAC security model. The proposed u-HCSIP performs four main functions: storing and exchanging personal health records (PHR), recommending meals and exercise, buying/selling private health information or experience, and managing personal health data using smart devices.

  9. 75 FR 55575 - Joint Public Roundtable To Discuss Data for Swaps and Security-Based Swaps, Swap Data...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-13

    ...; File No. 4-611] Joint Public Roundtable To Discuss Data for Swaps and Security- Based Swaps, Swap Data Repositories, Security-Based Swap Data Repositories, and Real-Time Public Reporting AGENCY: Commodity Futures... public roundtable discussion at which invited participants will discuss data for swaps and security-based...

  10. Visible and Near-Infrared Spectroscopy of Seyfert 1 and Narrow-Line Seyfert 1 Galaxies

    NASA Astrophysics Data System (ADS)

    Rodríguez-Ardila, Alberto; Pastoriza, Miriani G.; Donzelli, Carlos J.

    2000-01-01

    This paper studies the continuum and emission-line properties of a sample composed of 16 normal Seyfert 1 and seven narrow-line Seyfert 1 (NLS1) galaxies using optical and near-IR CCD spectroscopy. The continuum emission of the galaxies can be described in terms of a combination of stellar population, a nonstellar continuum of power-law form, and Fe II emission. A significative difference in the optical spectral index between NLS1's and normal Seyfert 1's is observed; the latter is steeper. Most NLS1's show Fe II/Hβ ratios larger than those observed in the other Seyfert 1's. In the IRAS band, both groups of galaxies have very similar properties. We have searched for the presence of optically thin gas in the broad-line region (BLR) of the galaxies by comparing the broad O I λ8446 and Hα emission-line profiles. Our analysis show that in the NLS1's, both profiles are similar in shape and width. This result contradicts the hypothesis of thin gas emission in the high-velocity part of the BLR to explain the ``narrowness'' of broad optical permitted lines in these objects. Evidence of narrow O I λ8446 emission is found in six galaxies of our sample, implying that this line is not restricted to a pure BLR phenomenon. In the narrow-line region, we find similar luminosities in the permitted and high-ionization lines of NLS1's and normal Seyfert 1's. However, low-ionization lines such as [O I] λ6300, [O II] λ3727, and [S II] λλ6717, 6731 are intrinsically less luminous in NLS1's. Physical properties derived from density- and temperature-sensitive line ratios suggest that the [O II] and [S II] emitting zones are overlapping in normal Seyfert 1's and separated in NLS1's. Based on observations made at CASLEO. Complejo Astronómico El Leoncito (CASLEO) is operated under agreement between the Consejo Nacional de Investigaciones Científicas y técnicas de la República Argentina and the National Universities of La Plata, Córdoba and San Juán.

  11. Information Security Scheme Based on Computational Temporal Ghost Imaging.

    PubMed

    Jiang, Shan; Wang, Yurong; Long, Tao; Meng, Xiangfeng; Yang, Xiulun; Shu, Rong; Sun, Baoqing

    2017-08-09

    An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively.

  12. Multi-tap complex-coefficient incoherent microwave photonic filters based on optical single-sideband modulation and narrow band optical filtering.

    PubMed

    Sagues, Mikel; García Olcina, Raimundo; Loayssa, Alayn; Sales, Salvador; Capmany, José

    2008-01-07

    We propose a novel scheme to implement tunable multi-tap complex coefficient filters based on optical single sideband modulation and narrow band optical filtering. A four tap filter is experimentally demonstrated to highlight the enhanced tuning performance provided by complex coefficients. Optical processing is performed by the use of a cascade of four phase-shifted fiber Bragg gratings specifically fabricated for this purpose.

  13. 30 CFR 250.1200 - Question index table.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 2 2011-07-01 2011-07-01 false Question index table. 250.1200 Section 250.1200... Measurement, Surface Commingling, and Security § 250.1200 Question index table. The table in this section...? § 250.1204(a) 20. What are the requirements for a periodic well test used for allocation? § 250.1204(b...

  14. 30 CFR 250.1200 - Question index table.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Question index table. 250.1200 Section 250.1200... Security § 250.1200 Question index table. The table in this section lists questions concerning Oil and Gas... requirements for a periodic well test used for allocation? § 250.1204(b) 21. What are the requirements for site...

  15. Design and implementation of a secure workflow system based on PKI/PMI

    NASA Astrophysics Data System (ADS)

    Yan, Kai; Jiang, Chao-hui

    2013-03-01

    As the traditional workflow system in privilege management has the following weaknesses: low privilege management efficiency, overburdened for administrator, lack of trust authority etc. A secure workflow model based on PKI/PMI is proposed after studying security requirements of the workflow systems in-depth. This model can achieve static and dynamic authorization after verifying user's ID through PKC and validating user's privilege information by using AC in workflow system. Practice shows that this system can meet the security requirements of WfMS. Moreover, it can not only improve system security, but also ensures integrity, confidentiality, availability and non-repudiation of the data in the system.

  16. The influence of age on gait parameters during the transition from a wide to a narrow pathway.

    PubMed

    Shkuratova, Nataliya; Taylor, Nicholas

    2008-06-01

    The ability to negotiate pathways of different widths is a prerequisite of daily living. However, only a few studies have investigated changes in gait parameters in response to walking on narrow pathways. The aim of this study is to examine the influence of age on gait adjustments during the transition from a wide to a narrow pathway. Two-group repeated measures design. Gait Laboratory. Twenty healthy older participants (mean [M] = 74.3 years, Standard deviation [SD] = 7.2 years); 20 healthy young participants (M = 26.6 years, SD = 6.1 years). Making the transition from walking on a wide pathway (68 cm) to walking on a narrow pathway (15 cm). Step length, step time, step width, double support time and base of support. Healthy older participants were able to make the transition from a wide to a narrow pathway successfully. There was only one significant interaction, between age and base of support (p < 0.003). Older adults decreased their base of support only when negotiating the transition step, while young participants started decreasing their base of support prior to the negotiation of transition step (p < 0.01). Adjustments to the transition from a wide to a narrow pathway are largely unaffected by normal ageing. Difficulties in making the transition to a narrow pathway during walking should not be attributed to normal age-related changes. (c) 2008 John Wiley & Sons, Ltd.

  17. Index Fund Selections with GAs and Classifications Based on Turnover

    NASA Astrophysics Data System (ADS)

    Orito, Yukiko; Motoyama, Takaaki; Yamazaki, Genji

    It is well known that index fund selections are important for the risk hedge of investment in a stock market. The`selection’means that for`stock index futures’, n companies of all ones in the market are selected. For index fund selections, Orito et al.(6) proposed a method consisting of the following two steps : Step 1 is to select N companies in the market with a heuristic rule based on the coefficient of determination between the return rate of each company in the market and the increasing rate of the stock price index. Step 2 is to construct a group of n companies by applying genetic algorithms to the set of N companies. We note that the rule of Step 1 is not unique. The accuracy of the results using their method depends on the length of time data (price data) in the experiments. The main purpose of this paper is to introduce a more`effective rule’for Step 1. The rule is based on turnover. The method consisting of Step 1 based on turnover and Step 2 is examined with numerical experiments for the 1st Section of Tokyo Stock Exchange. The results show that with our method, it is possible to construct the more effective index fund than the results of Orito et al.(6). The accuracy of the results using our method depends little on the length of time data (turnover data). The method especially works well when the increasing rate of the stock price index over a period can be viewed as a linear time series data.

  18. AES based secure low energy adaptive clustering hierarchy for WSNs

    NASA Astrophysics Data System (ADS)

    Kishore, K. R.; Sarma, N. V. S. N.

    2013-01-01

    Wireless sensor networks (WSNs) provide a low cost solution in diversified application areas. The wireless sensor nodes are inexpensive tiny devices with limited storage, computational capability and power. They are being deployed in large scale in both military and civilian applications. Security of the data is one of the key concerns where large numbers of nodes are deployed. Here, an energy-efficient secure routing protocol, secure-LEACH (Low Energy Adaptive Clustering Hierarchy) for WSNs based on the Advanced Encryption Standard (AES) is being proposed. This crypto system is a session based one and a new session key is assigned for each new session. The network (WSN) is divided into number of groups or clusters and a cluster head (CH) is selected among the member nodes of each cluster. The measured data from the nodes is aggregated by the respective CH's and then each CH relays this data to another CH towards the gateway node in the WSN which in turn sends the same to the Base station (BS). In order to maintain confidentiality of data while being transmitted, it is necessary to encrypt the data before sending at every hop, from a node to the CH and from the CH to another CH or to the gateway node.

  19. Creating a spatially-explicit index: a method for assessing the global wildfire-water risk

    NASA Astrophysics Data System (ADS)

    Robinne, François-Nicolas; Parisien, Marc-André; Flannigan, Mike; Miller, Carol; Bladon, Kevin D.

    2017-04-01

    The wildfire-water risk (WWR) has been defined as the potential for wildfires to adversely affect water resources that are important for downstream ecosystems and human water needs for adequate water quantity and quality, therefore compromising the security of their water supply. While tools and methods are numerous for watershed-scale risk analysis, the development of a toolbox for the large-scale evaluation of the wildfire risk to water security has only started recently. In order to provide managers and policy-makers with an adequate tool, we implemented a method for the spatial analysis of the global WWR based on the Driving forces-Pressures-States-Impacts-Responses (DPSIR) framework. This framework relies on the cause-and-effect relationships existing between the five categories of the DPSIR chain. As this approach heavily relies on data, we gathered an extensive set of spatial indicators relevant to fire-induced hydrological hazards and water consumption patterns by human and natural communities. When appropriate, we applied a hydrological routing function to our indicators in order to simulate downstream accumulation of potentially harmful material. Each indicator was then assigned a DPSIR category. We collapsed the information in each category using a principal component analysis in order to extract the most relevant pixel-based information provided by each spatial indicator. Finally, we compiled our five categories using an additive indexation process to produce a spatially-explicit index of the WWR. A thorough sensitivity analysis has been performed in order to understand the relationship between the final risk values and the spatial pattern of each category used during the indexation. For comparison purposes, we aggregated index scores by global hydrological regions, or hydrobelts, to get a sense of regional DPSIR specificities. This rather simple method does not necessitate the use of complex physical models and provides a scalable and efficient tool

  20. A flash flood early warning system based on rainfall thresholds and daily soil moisture indexes

    NASA Astrophysics Data System (ADS)

    Brigandì, Giuseppina; Tito Aronica, Giuseppe

    2015-04-01

    Main focus of the paper is to present a flash flood early warning system, developed for Civil Protection Agency for the Sicily Region, for alerting extreme hydrometeorological events by using a methodology based on the combined use of rainfall thresholds and soil moisture indexes. As matter of fact, flash flood warning is a key element to improve the Civil Protection achievements to mitigate damages and safeguard the security of people. It is a rather complicated task, particularly in those catchments with flashy response where even brief anticipations are important and welcomed. In this context, some kind of hydrological precursors can be considered to improve the effectiveness of the emergency actions (i.e. early flood warning). Now, it is well known how soil moisture is an important factor in flood formation, because the runoff generation is strongly influenced by the antecedent soil moisture conditions of the catchment. The basic idea of the work here presented is to use soil moisture indexes derived in a continuous form to define a first alert phase in a flash flood forecasting chain and then define a unique rainfall threshold for a given day for the subsequent alarm phases activation, derived as a function of the soil moisture conditions at the beginning of the day. Daily soil moisture indexes, representative of the moisture condition of the catchment, were derived by using a parsimonious and simply to use approach based on the IHACRES model application in a modified form developed by the authors. It is a simple, spatially-lumped rainfall-streamflow model, based on the SCS-CN method and on the unit hydrograph approach that requires only rainfall, streamflow and air temperature data. It consists of two modules. In the first a non linear loss model, based on the SCS-CN method, was used to transform total rainfall into effective rainfall. In the second, a linear convolution of effective rainfall was performed using a total unit hydrograph with a configuration of

  1. SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks

    NASA Astrophysics Data System (ADS)

    Hung, Lexuan; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    For many sensor network applications such as military, homeland security, it is necessary for users (sinks) to access sensor networks while they are moving. However, sink mobility brings new challenges to secure routing in large-scale sensor networks. Mobile sinks have to constantly propagate their current location to all nodes, and these nodes need to exchange messages with each other so that the sensor network can establish and maintain a secure multi-hop path between a source node and a mobile sink. This causes significant computation and communication overhead for sensor nodes. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. In this paper, we propose a secure and energy-efficient data dissemination protocol — Secure COodination-based Data dissEmination (SCODE) — for mobile sinks in sensor networks. We take advantages of coordination networks (grid structure) based on Geographical Adaptive Fidelity (GAF) protocol to construct a secure and efficient routing path between sources and sinks. Our security analysis demonstrates that the proposed protocol can defend against common attacks in sensor network routing such as replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Our performance evaluation both in mathematical analysis and simulation shows that the SCODE significantly reduces communication overhead and energy consumption while the latency is similar compared with the existing routing protocols, and it always delivers more than 90 percentage of packets successfully.

  2. Index-based reactive power compensation scheme for voltage regulation

    NASA Astrophysics Data System (ADS)

    Dike, Damian Obioma

    2008-10-01

    Increasing demand for electrical power arising from deregulation and the restrictions posed to the construction of new transmission lines by environment, socioeconomic, and political issues had led to higher grid loading. Consequently, voltage instability has become a major concern, and reactive power support is vital to enhance transmission grid performance. Improved reactive power support to distressed grid is possible through the application of relatively unfamiliar emerging technologies of "Flexible AC Transmission Systems (FACTS)" devices and "Distributed Energy Resources (DERS)." In addition to these infrastructure issues, a lack of situational awareness by system operators can cause major power outages as evidenced by the August 14, 2003 widespread North American blackout. This and many other recent major outages have highlighted the inadequacies of existing power system indexes. In this work, a novel "Index-based reactive compensation scheme" appropriate for both on-line and off-line computation of grid status has been developed. A new voltage stability index (Ls-index) suitable for long transmission lines was developed, simulated, and compared to the existing two-machine modeled L-index. This showed the effect of long distance power wheeling amongst regional transmission organizations. The dissertation further provided models for index modulated voltage source converters (VSC) and index-based load flow analysis of both FACTS and microgrid interconnected power systems using the Newton-Raphson's load flow model incorporated with multi-FACTS devices. The developed package has been made user-friendly through the embodiment of interactive graphical user interface and implemented on the IEEE 14, 30, and 300 bus systems. The results showed reactive compensation has system wide-effect, provided readily accessible system status indicators, ensured seamless DERs interconnection through new islanding modes and enhanced VSC utilization. These outcomes may contribute

  3. Experimental study on occupant evacuation in narrow seat aisle

    NASA Astrophysics Data System (ADS)

    Huang, Shenshi; Lu, Shouxiang; Lo, Siuming; Li, Changhai; Guo, Yafei

    2018-07-01

    Narrow seat aisle is an important area in the train car interior due to the large passenger population, however evacuation therein has not gained enough concerns. In this experimental study, the occupant evacuation of the narrow seat aisle area is investigated, with the aisle width of 0.4-0.6 m and the evacuation direction of forward and backward. The evacuation behaviors are analyzed based on the video record, and the discussion is carried out in the aspect of evacuation time, crowdedness, evacuation order, and aisle conflicts. The result shows that with the increasing aisle width, total evacuation time and the average specific evacuation rate decrease. The aisle is crowded for some time, with a large linear occupant densities. The evacuation order of each occupant is mainly related to the seat position. Moreover, it is found that the aisle conflicts can be well described by Burstedde's model. This study gives a useful benchmark for evacuation simulation of narrow seat aisle, and provides reference to safety design of seat area in train cars.

  4. The Secure-Base Hypothesis: Global Attachment, Attachment to Counselor, and Session Exploration in Psychotherapy

    ERIC Educational Resources Information Center

    Romano, Vera; Fitzpatrick, Marilyn; Janzen, Jennifer

    2008-01-01

    This study explored J. Bowlby's (1988) secure-base hypothesis, which predicts that a client's secure attachment to the therapist, as well as the client's and the therapist's global attachment security, will facilitate in-session exploration. Volunteer clients (N = 59) and trainee counselors (N = 59) in short-term therapy completed the Experiences…

  5. A novel, fuzzy-based air quality index (FAQI) for air quality assessment

    NASA Astrophysics Data System (ADS)

    Sowlat, Mohammad Hossein; Gharibi, Hamed; Yunesian, Masud; Tayefeh Mahmoudi, Maryam; Lotfi, Saeedeh

    2011-04-01

    The ever increasing level of air pollution in most areas of the world has led to development of a variety of air quality indices for estimation of health effects of air pollution, though the indices have their own limitations such as high levels of subjectivity. Present study, therefore, aimed at developing a novel, fuzzy-based air quality index (FAQI ) to handle such limitations. The index developed by present study is based on fuzzy logic that is considered as one of the most common computational methods of artificial intelligence. In addition to criteria air pollutants (i.e. CO, SO 2, PM 10, O 3, NO 2), benzene, toluene, ethylbenzene, xylene, and 1,3-butadiene were also taken into account in the index proposed, because of their considerable health effects. Different weighting factors were then assigned to each pollutant according to its priority. Trapezoidal membership functions were employed for classifications and the final index consisted of 72 inference rules. To assess the performance of the index, a case study was carried out employing air quality data at five different sampling stations in Tehran, Iran, from January 2008 to December 2009, results of which were then compared to the results obtained from USEPA air quality index (AQI). According to the results from present study, fuzzy-based air quality index is a comprehensive tool for classification of air quality and tends to produce accurate results. Therefore, it can be considered useful, reliable, and suitable for consideration by local authorities in air quality assessment and management schemes. Fuzzy-based air quality index (FAQI).

  6. Evaluation of a Secure Laptop-Based Testing Program in an Undergraduate Nursing Program: Students' Perspective.

    PubMed

    Tao, Jinyuan; Gunter, Glenda; Tsai, Ming-Hsiu; Lim, Dan

    2016-01-01

    Recently, the many robust learning management systems, and the availability of affordable laptops, have made secure laptop-based testing a reality on many campuses. The undergraduate nursing program at the authors' university began to implement a secure laptop-based testing program in 2009, which allowed students to use their newly purchased laptops to take quizzes and tests securely in classrooms. After nearly 5 years' secure laptop-based testing program implementation, a formative evaluation, using a mixed method that has both descriptive and correlational data elements, was conducted to seek constructive feedback from students to improve the program. Evaluation data show that, overall, students (n = 166) believed the secure laptop-based testing program helps them get hands-on experience of taking examinations on the computer and gets them prepared for their computerized NCLEX-RN. Students, however, had a lot of concerns about laptop glitches and campus wireless network glitches they experienced during testing. At the same time, NCLEX-RN first-time passing rate data were analyzed using the χ2 test, and revealed no significant association between the two testing methods (paper-and-pencil testing and the secure laptop-based testing) and students' first-time NCLEX-RN passing rate. Based on the odds ratio, however, the odds of students passing NCLEX-RN the first time was 1.37 times higher if they were taught with the secure laptop-based testing method than if taught with the traditional paper-and-pencil testing method in nursing school. It was recommended to the institution that better quality of laptops needs to be provided to future students, measures needed to be taken to further stabilize the campus wireless Internet network, and there was a need to reevaluate the Laptop Initiative Program.

  7. A model of airport security work flow based on petri net

    NASA Astrophysics Data System (ADS)

    Dong, Xinming

    2017-09-01

    Extremely long lines at airports in the United States have been sharply criticized. In order to find out the bottleneck in the existing security system and put forward reasonable improvement plans and proposal, the Petri net model and the Markov Chain are introduced in this paper. This paper uses data collected by transportation Security Agency (TSA), assuming the data can represent the average level of all airports in the Unites States, to analysis the performance of security check system. By calculating the busy probabilities and the utilization probabilities, the bottleneck is found. Moreover, recommendation is given based on the parameters’ modification in Petri net model.

  8. From Secure Memories to Smart Card Security

    NASA Astrophysics Data System (ADS)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  9. Food security for community-living elderly people in Beijing, China.

    PubMed

    Cheng, Yang; Rosenberg, Mark; Yu, Jie; Zhang, Hua

    2016-11-01

    Food security has been identified as an important issue for elderly people's quality of life and ageing in place. A food security index composed of three indicators (food intake, food quality and food affordability) was developed to measure the food security status of community-living elderly people. Food security was then examined among community-living elderly in the central urban districts of Beijing, China. Data were collected by a questionnaire survey in the summer of 2013 and the response rate was 78.5%. Descriptive statistics and binary logistic regression were applied to analyse food security and the associations between food security and demographic and socioeconomic factors. The results showed that 54.2% of the surveyed elderly experienced food security. Participants with better education (OR = 1.68) and better health (OR = 1.47) were more likely to experience food security. The young-old were less likely to experience food security than the older old (OR = 0.94). Elderly people who lived with their children were less likely to experience food security than those who lived alone (OR = 0.43). The results of impact factors on food security highlight both similarities with studies from more developed countries and the unique challenges faced in a rapidly changing China with its unique social, cultural and political systems. The food security index we developed in this study is a simple and effective measure of food security status, which can be used in surveys for evaluating the food security status of elderly people in the future. © 2015 John Wiley & Sons Ltd.

  10. 75 FR 79992 - End-User Exception to Mandatory Clearing of Security-Based Swaps

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-21

    ...In accordance with the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010 (``Dodd-Frank Act''), the Securities and Exchange Commission (``Commission'') is proposing new Rule 3Cg-1 under the Securities Exchange Act of 1934 (``Exchange Act'') governing the exception to mandatory clearing of security-based swaps available for counterparties meeting certain conditions. The Commission is requesting comments on the proposed rule and related matters.

  11. Refractive index sensor based on the leaky radiation of a microfiber.

    PubMed

    Gao, F; Liu, H; Sheng, C; Zhu, C; Zhu, S N

    2014-05-19

    In this work we present a refractive index sensor based on the leaky radiation of a microfiber. The 5.3um diameter microfiber is fabricated by drawing a commercial optical fiber. When the microfiber is immersed into a liquid with larger refractive index than the effective index of fiber mode, the light will leak out through the leaky radiation process. The variation of refractive index of liquid can be monitored by measuring radiation angle of light. The refractive index sensitivity can be over 400 degree/RIU in theory. In the experiment, the variation value 0.001 of refractive index of liquid around this microfiber can be detected through this technique. This work provides a simple and sensitive method for refractive index sensing application.

  12. 33 CFR 165.1102 - Security Zone; Naval Base Point Loma; San Diego Bay, CA.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Loma; San Diego Bay, CA. 165.1102 Section 165.1102 Navigation and Navigable Waters COAST GUARD... § 165.1102 Security Zone; Naval Base Point Loma; San Diego Bay, CA. (a) Location. The following area is a security zone: The water adjacent to the Naval Base Point Loma, San Diego, CA, enclosed by the...

  13. Large tuning of narrow-beam terahertz plasmonic lasers operating at 78 K

    DOE PAGES

    Wu, Chongzhao; Jin, Yuan; Reno, John L.; ...

    2016-12-19

    A new tuning mechanism is demonstrated for single-mode metal-clad plasmonic lasers, in which the refractive-index of the laser’s surrounding medium affects the resonant-cavity mode in the same vein as the refractive-index of gain medium inside the cavity. Reversible, continuous, and mode-hop-free tuning of ~57 GHz is realized for single-mode narrow-beam terahertz plasmonic quantum-cascade lasers (QCLs), which is demonstrated at a much more practical temperature of 78 K. The tuning is based on post-process deposition/etching of a dielectric (silicon-dioxide) on a QCL chip that has already been soldered and wire-bonded onto a copper mount. This is a considerably larger tuning rangemore » compared to previously reported results for terahertz QCLs with directional far-field radiation patterns. The key enabling mechanism for tuning is a recently developed antenna-feedback scheme for plasmonic lasers, which leads to the generation of hybrid surface-plasmon-polaritons propagating outside the cavity of the laser with a large spatial extent. The effect of dielectric deposition on QCL’s characteristics is investigated in detail including that on maximum operating temperature, peak output power, and far-field radiation patterns. Single-lobed beam with low divergence (<7°) is maintained through the tuning range. The antenna-feedback scheme is ideally suited for modulation of plasmonic lasers and their sensing applications due to the sensitive dependence of spectral and radiative properties of the laser on its surrounding medium.« less

  14. Reflection based Extraordinary Optical Transmission Fiber Optic Probe for Refractive Index Sensing.

    PubMed

    Lan, Xinwei; Cheng, Baokai; Yang, Qingbo; Huang, Jie; Wang, Hanzheng; Ma, Yinfa; Shi, Honglan; Xiao, Hai

    2014-03-31

    Fiber optic probes for chemical sensing based on the extraordinary optical transmission (EOT) phenomenon are designed and fabricated by perforating subwavelength hole arrays on the gold film coated optical fiber endface. The device exhibits a red shift in response to the surrounding refractive index increases with high sensitivity, enabling a reflection-based refractive index sensor with a compact and simple configuration. By choosing the period of hole arrays, the sensor can be designed to operate in the near infrared telecommunication wavelength range, where the abundant source and detectors are available for easy instrumentation. The new sensor probe is demonstrated for refractive index measurement using refractive index matching fluids. The sensitivity reaches 573 nm/RIU in the 1.333~1.430 refractive index range.

  15. Knowledge-based machine indexing from natural language text: Knowledge base design, development, and maintenance

    NASA Technical Reports Server (NTRS)

    Genuardi, Michael T.

    1993-01-01

    One strategy for machine-aided indexing (MAI) is to provide a concept-level analysis of the textual elements of documents or document abstracts. In such systems, natural-language phrases are analyzed in order to identify and classify concepts related to a particular subject domain. The overall performance of these MAI systems is largely dependent on the quality and comprehensiveness of their knowledge bases. These knowledge bases function to (1) define the relations between a controlled indexing vocabulary and natural language expressions; (2) provide a simple mechanism for disambiguation and the determination of relevancy; and (3) allow the extension of concept-hierarchical structure to all elements of the knowledge file. After a brief description of the NASA Machine-Aided Indexing system, concerns related to the development and maintenance of MAI knowledge bases are discussed. Particular emphasis is given to statistically-based text analysis tools designed to aid the knowledge base developer. One such tool, the Knowledge Base Building (KBB) program, presents the domain expert with a well-filtered list of synonyms and conceptually-related phrases for each thesaurus concept. Another tool, the Knowledge Base Maintenance (KBM) program, functions to identify areas of the knowledge base affected by changes in the conceptual domain (for example, the addition of a new thesaurus term). An alternate use of the KBM as an aid in thesaurus construction is also discussed.

  16. A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    PubMed Central

    Almalkawi, Islam T.; Zapata, Manel Guerrero; Al-Karaki, Jamal N.

    2011-01-01

    The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images) as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature) in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption. PMID:22163854

  17. A secure cluster-based multipath routing protocol for WMSNs.

    PubMed

    Almalkawi, Islam T; Zapata, Manel Guerrero; Al-Karaki, Jamal N

    2011-01-01

    The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images) as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature) in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption.

  18. Secure smart grid communications and information integration based on digital watermarking in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Yan, Xin; Zhang, Ling; Wu, Yang; Luo, Youlong; Zhang, Xiaoxing

    2017-02-01

    As more and more wireless sensor nodes and networks are employed to acquire and transmit the state information of power equipment in smart grid, we are in urgent need of some viable security solutions to ensure secure smart grid communications. Conventional information security solutions, such as encryption/decryption, digital signature and so forth, are not applicable to wireless sensor networks in smart grid any longer, where bulk messages need to be exchanged continuously. The reason is that these cryptographic solutions will account for a large portion of the extremely limited resources on sensor nodes. In this article, a security solution based on digital watermarking is adopted to achieve the secure communications for wireless sensor networks in smart grid by data and entity authentications at a low cost of operation. Our solution consists of a secure framework of digital watermarking, and two digital watermarking algorithms based on alternating electric current and time window, respectively. Both watermarking algorithms are composed of watermark generation, embedding and detection. The simulation experiments are provided to verify the correctness and practicability of our watermarking algorithms. Additionally, a new cloud-based architecture for the information integration of smart grid is proposed on the basis of our security solutions.

  19. Hierarchical content-based image retrieval by dynamic indexing and guided search

    NASA Astrophysics Data System (ADS)

    You, Jane; Cheung, King H.; Liu, James; Guo, Linong

    2003-12-01

    This paper presents a new approach to content-based image retrieval by using dynamic indexing and guided search in a hierarchical structure, and extending data mining and data warehousing techniques. The proposed algorithms include: a wavelet-based scheme for multiple image feature extraction, the extension of a conventional data warehouse and an image database to an image data warehouse for dynamic image indexing, an image data schema for hierarchical image representation and dynamic image indexing, a statistically based feature selection scheme to achieve flexible similarity measures, and a feature component code to facilitate query processing and guide the search for the best matching. A series of case studies are reported, which include a wavelet-based image color hierarchy, classification of satellite images, tropical cyclone pattern recognition, and personal identification using multi-level palmprint and face features.

  20. Validation of the Social Security Death Index (SSDI): An Important Readily-Available Outcomes Database for Researchers.

    PubMed

    Quinn, James; Kramer, Nathan; McDermott, Daniel

    2008-01-01

    To determine the accuracy of the online Social Security Death Index (SSDI) for determining death outcomes. We selected 30 patients who were determined to be dead and 90 patients thought to be alive after an ED visit as determined by a web-based searched of the SSDI. For those thought to be dead we requested death certificates. We then had a research coordinator blinded to the results of the SSDI search, complete direct follow-up by contacting the patients, family or primary care physicians to determine vital status. To determine the sensitivity and specificity of the SSDI for death at six months in this cohort, we used direct follow-up as the criterion reference and calculated 95% confidence intervals. Direct follow-up was completed for 90% (108 of 120) of the patients. For those patients 20 were determined to be dead and 88 alive. The dead were more likely to be male (57%) and older [(mean age 83.9 (95% CI 79.1 - 88.7) vs. 60.9 (95% CI 56.4 - 65.4) for those alive]. The sensitivity of the SSDI for those with completed direct follow-up was 100% (95% CI 91 -100%) with specificity of 100% (95% CI 98-100%). Of the 12 patients who were not able to be contacted through direct follow-up, the SSDI indicated that 10 were dead and two were alive. SSDI is an accurate measure of death outcomes and appears to have the advantage of finding deaths among patients lost to follow-up.

  1. Invisible Security Printing on Photoresist Polymer Readable by Terahertz Spectroscopy.

    PubMed

    Shin, Hee Jun; Lim, Min-Cheol; Park, Kisang; Kim, Sae-Hyung; Choi, Sung-Wook; Ok, Gyeongsik

    2017-12-06

    We experimentally modulate the refractive index and the absorption coefficient of an SU-8 dry film in the terahertz region by UV light (362 nm) exposure with time dependency. Consequently, the refractive index of SU-8 film is increased by approximately 6% after UV light exposure. Moreover, the absorption coefficient also changes significantly. Using the reflective terahertz imaging technique, in addition, we can read security information printed by UV treatment on an SU-8 film that is transparent in the visible spectrum. From these results, we successfully demonstrate security printing and reading by using photoresist materials and the terahertz technique. This investigation would provide a new insight into anti-counterfeiting applications in fields that need security.

  2. Refractive index sensing with Fano resonances in silicon oligomers

    PubMed Central

    Chong, Katie E.; Orton, Henry W.; Decker, Manuel; Miroshnichenko, Andrey E.; Brener, Igal; Kivshar, Yuri S.

    2017-01-01

    We demonstrate experimentally refractive index sensing with localized Fano resonances in silicon oligomers, consisting of six disks surrounding a central one of slightly different diameter. Owing to the low absorption and narrow Fano-resonant spectral features appearing as a result of the interference of the modes of the outer and the central disks, we demonstrate refractive index sensitivity of more than 150 nm RIU−1 with a figure of merit of 3.8. This article is part of the themed issue ‘New horizons for nanophotonics’. PMID:28220001

  3. 33 CFR 165.768 - Security Zone; MacDill Air Force Base, Tampa Bay, FL.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security Zone; MacDill Air Force....768 Security Zone; MacDill Air Force Base, Tampa Bay, FL. (a) Location. The following area is a security zone which exists concurrent with an Army Corps of Engineers restricted area in § 334.635 of this...

  4. 33 CFR 165.768 - Security Zone; MacDill Air Force Base, Tampa Bay, FL.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security Zone; MacDill Air Force....768 Security Zone; MacDill Air Force Base, Tampa Bay, FL. (a) Location. The following area is a security zone which exists concurrent with an Army Corps of Engineers restricted area in § 334.635 of this...

  5. 33 CFR 165.768 - Security Zone; MacDill Air Force Base, Tampa Bay, FL.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zone; MacDill Air Force....768 Security Zone; MacDill Air Force Base, Tampa Bay, FL. (a) Location. The following area is a security zone which exists concurrent with an Army Corps of Engineers restricted area in § 334.635 of this...

  6. 33 CFR 165.768 - Security Zone; MacDill Air Force Base, Tampa Bay, FL.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security Zone; MacDill Air Force....768 Security Zone; MacDill Air Force Base, Tampa Bay, FL. (a) Location. The following area is a security zone which exists concurrent with an Army Corps of Engineers restricted area in § 334.635 of this...

  7. Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things.

    PubMed

    Cha, Shi-Cho; Yeh, Kuo-Hui; Chen, Jyun-Fu

    2017-10-14

    Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim's devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts.

  8. 33 CFR 165.768 - Security Zone; MacDill Air Force Base, Tampa Bay, FL.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone; MacDill Air Force....768 Security Zone; MacDill Air Force Base, Tampa Bay, FL. (a) Location. The following area is a... title. All waters within Tampa Bay, Florida in the vicinity of MacDill Air Force Base, including...

  9. A Learning-Based Approach to Reactive Security

    NASA Astrophysics Data System (ADS)

    Barth, Adam; Rubinstein, Benjamin I. P.; Sundararajan, Mukund; Mitchell, John C.; Song, Dawn; Bartlett, Peter L.

    Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the reactive defender learns from past attacks instead of myopically overreacting to the last attack. Our game-theoretic model follows common practice in the security literature by making worst-case assumptions about the attacker: we grant the attacker complete knowledge of the defender's strategy and do not require the attacker to act rationally. In this model, we bound the competitive ratio between a reactive defense algorithm (which is inspired by online learning theory) and the best fixed proactive defense. Additionally, we show that, unlike proactive defenses, this reactive strategy is robust to a lack of information about the attacker's incentives and knowledge.

  10. Intercomparison of Unmanned Aerial Vehicle and Ground-Based Narrow Band Spectrometers Applied to Crop Trait Monitoring in Organic Potato Production

    PubMed Central

    Domingues Franceschini, Marston Héracles; Bartholomeus, Harm; van Apeldoorn, Dirk; Suomalainen, Juha; Kooistra, Lammert

    2017-01-01

    Vegetation properties can be estimated using optical sensors, acquiring data on board of different platforms. For instance, ground-based and Unmanned Aerial Vehicle (UAV)-borne spectrometers can measure reflectance in narrow spectral bands, while different modelling approaches, like regressions fitted to vegetation indices, can relate spectra with crop traits. Although monitoring frameworks using multiple sensors can be more flexible, they may result in higher inaccuracy due to differences related to the sensors characteristics, which can affect information sampling. Also organic production systems can benefit from continuous monitoring focusing on crop management and stress detection, but few studies have evaluated applications with this objective. In this study, ground-based and UAV spectrometers were compared in the context of organic potato cultivation. Relatively accurate estimates were obtained for leaf chlorophyll (RMSE = 6.07 µg·cm−2), leaf area index (RMSE = 0.67 m2·m−2), canopy chlorophyll (RMSE = 0.24 g·m−2) and ground cover (RMSE = 5.5%) using five UAV-based data acquisitions, from 43 to 99 days after planting. These retrievals are slightly better than those derived from ground-based measurements (RMSE = 7.25 µg·cm−2, 0.85 m2·m−2, 0.28 g·m−2 and 6.8%, respectively), for the same period. Excluding observations corresponding to the first acquisition increased retrieval accuracy and made outputs more comparable between sensors, due to relatively low vegetation cover on this date. Intercomparison of vegetation indices indicated that indices based on the contrast between spectral bands in the visible and near-infrared, like OSAVI, MCARI2 and CIg provided, at certain extent, robust outputs that could be transferred between sensors. Information sampling at plot level by both sensing solutions resulted in comparable discriminative potential concerning advanced stages of late blight incidence. These results indicate that optical sensors, and

  11. Intercomparison of Unmanned Aerial Vehicle and Ground-Based Narrow Band Spectrometers Applied to Crop Trait Monitoring in Organic Potato Production.

    PubMed

    Domingues Franceschini, Marston Héracles; Bartholomeus, Harm; van Apeldoorn, Dirk; Suomalainen, Juha; Kooistra, Lammert

    2017-06-18

    Vegetation properties can be estimated using optical sensors, acquiring data on board of different platforms. For instance, ground-based and Unmanned Aerial Vehicle (UAV)-borne spectrometers can measure reflectance in narrow spectral bands, while different modelling approaches, like regressions fitted to vegetation indices, can relate spectra with crop traits. Although monitoring frameworks using multiple sensors can be more flexible, they may result in higher inaccuracy due to differences related to the sensors characteristics, which can affect information sampling. Also organic production systems can benefit from continuous monitoring focusing on crop management and stress detection, but few studies have evaluated applications with this objective. In this study, ground-based and UAV spectrometers were compared in the context of organic potato cultivation. Relatively accurate estimates were obtained for leaf chlorophyll (RMSE = 6.07 µg·cm -2 ), leaf area index (RMSE = 0.67 m²·m -2 ), canopy chlorophyll (RMSE = 0.24 g·m -2 ) and ground cover (RMSE = 5.5%) using five UAV-based data acquisitions, from 43 to 99 days after planting. These retrievals are slightly better than those derived from ground-based measurements (RMSE = 7.25 µg·cm -2 , 0.85 m²·m -2 , 0.28 g·m -2 and 6.8%, respectively), for the same period. Excluding observations corresponding to the first acquisition increased retrieval accuracy and made outputs more comparable between sensors, due to relatively low vegetation cover on this date. Intercomparison of vegetation indices indicated that indices based on the contrast between spectral bands in the visible and near-infrared, like OSAVI, MCARI2 and CI g provided, at certain extent, robust outputs that could be transferred between sensors. Information sampling at plot level by both sensing solutions resulted in comparable discriminative potential concerning advanced stages of late blight incidence. These results indicate that optical sensors

  12. A secure medical data exchange protocol based on cloud environment.

    PubMed

    Chen, Chin-Ling; Yang, Tsai-Tung; Shih, Tzay-Farn

    2014-09-01

    In recent years, health care technologies already became matured such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concern issue. In spite of many literatures discussed about medical systems, but these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a secure medical data exchange protocol based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples use medical resources on the cloud environment to seek medical advice conveniently.

  13. A secure biometrics-based authentication scheme for telecare medicine information systems.

    PubMed

    Yan, Xiaopeng; Li, Weiheng; Li, Ping; Wang, Jiantao; Hao, Xinhong; Gong, Peng

    2013-10-01

    The telecare medicine information system (TMIS) allows patients and doctors to access medical services or medical information at remote sites. Therefore, it could bring us very big convenient. To safeguard patients' privacy, authentication schemes for the TMIS attracted wide attention. Recently, Tan proposed an efficient biometrics-based authentication scheme for the TMIS and claimed their scheme could withstand various attacks. However, in this paper, we point out that Tan's scheme is vulnerable to the Denial-of-Service attack. To enhance security, we also propose an improved scheme based on Tan's work. Security and performance analysis shows our scheme not only could overcome weakness in Tan's scheme but also has better performance.

  14. Vehicle security encryption based on unlicensed encryption

    NASA Astrophysics Data System (ADS)

    Huang, Haomin; Song, Jing; Xu, Zhijia; Ding, Xiaoke; Deng, Wei

    2018-03-01

    The current vehicle key is easy to be destroyed and damage, proposing the use of elliptical encryption algorithm is improving the reliability of vehicle security system. Based on the encryption rules of elliptic curve, the chip's framework and hardware structure are designed, then the chip calculation process simulation has been analyzed by software. The simulation has been achieved the expected target. Finally, some issues pointed out in the data calculation about the chip's storage control and other modules.

  15. A Collaborative Secure Localization Algorithm Based on Trust Model in Underwater Wireless Sensor Networks

    PubMed Central

    Han, Guangjie; Liu, Li; Jiang, Jinfang; Shu, Lei; Rodrigues, Joel J.P.C.

    2016-01-01

    Localization is one of the hottest research topics in Underwater Wireless Sensor Networks (UWSNs), since many important applications of UWSNs, e.g., event sensing, target tracking and monitoring, require location information of sensor nodes. Nowadays, a large number of localization algorithms have been proposed for UWSNs. How to improve location accuracy are well studied. However, few of them take location reliability or security into consideration. In this paper, we propose a Collaborative Secure Localization algorithm based on Trust model (CSLT) for UWSNs to ensure location security. Based on the trust model, the secure localization process can be divided into the following five sub-processes: trust evaluation of anchor nodes, initial localization of unknown nodes, trust evaluation of reference nodes, selection of reference node, and secondary localization of unknown node. Simulation results demonstrate that the proposed CSLT algorithm performs better than the compared related works in terms of location security, average localization accuracy and localization ratio. PMID:26891300

  16. Information security system based on virtual-optics imaging methodology and public key infrastructure

    NASA Astrophysics Data System (ADS)

    Peng, Xiang; Zhang, Peng; Cai, Lilong

    In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  17. 33 CFR 52.81 - Reading room and index.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Reading room and index. 52.81 Section 52.81 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PERSONNEL BOARD FOR CORRECTION OF MILITARY RECORDS OF THE COAST GUARD Public Access to Decisions § 52.81 Reading room and index. After deleting only so much...

  18. 33 CFR 52.81 - Reading room and index.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Reading room and index. 52.81 Section 52.81 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PERSONNEL BOARD FOR CORRECTION OF MILITARY RECORDS OF THE COAST GUARD Public Access to Decisions § 52.81 Reading room and index. After deleting only so much...

  19. 33 CFR 52.81 - Reading room and index.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Reading room and index. 52.81 Section 52.81 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PERSONNEL BOARD FOR CORRECTION OF MILITARY RECORDS OF THE COAST GUARD Public Access to Decisions § 52.81 Reading room and index. After deleting only so much...

  20. 33 CFR 52.81 - Reading room and index.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Reading room and index. 52.81 Section 52.81 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PERSONNEL BOARD FOR CORRECTION OF MILITARY RECORDS OF THE COAST GUARD Public Access to Decisions § 52.81 Reading room and index. After deleting only so much...

  1. 33 CFR 52.81 - Reading room and index.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Reading room and index. 52.81 Section 52.81 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PERSONNEL BOARD FOR CORRECTION OF MILITARY RECORDS OF THE COAST GUARD Public Access to Decisions § 52.81 Reading room and index. After deleting only so much...

  2. 17 CFR 1.7 - Books and records requirements for security-based swap agreements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Books and records requirements... FUTURES TRADING COMMISSION GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Definitions § 1.7 Books... not be required to keep and maintain additional books and records regarding security-based swap...

  3. 17 CFR 1.7 - Books and records requirements for security-based swap agreements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Books and records requirements... FUTURES TRADING COMMISSION GENERAL REGULATIONS UNDER THE COMMODITY EXCHANGE ACT Definitions § 1.7 Books... not be required to keep and maintain additional books and records regarding security-based swap...

  4. Iris indexing based on local intensity order pattern

    NASA Astrophysics Data System (ADS)

    Emerich, Simina; Malutan, Raul; Crisan, Septimiu; Lefkovits, Laszlo

    2017-03-01

    In recent years, iris biometric systems have increased in popularity and have been proven that are capable of handling large-scale databases. The main advantage of these systems is accuracy and reliability. A proper iris patterns classification is expected to reduce the matching time in huge databases. This paper presents an iris indexing technique based on Local Intensity Order Pattern. The performance of the present approach is evaluated on UPOL database and is compared with other recent systems designed for iris indexing. The results illustrate the potential of the proposed method for large scale iris identification.

  5. Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things

    PubMed Central

    Cha, Shi-Cho; Chen, Jyun-Fu

    2017-01-01

    Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim’s devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts. PMID:29036900

  6. [Spatio-temporal characteristics of agricultural drought in Shaanxi Province, China based on integrated disaster risk index].

    PubMed

    He, Bin; Wang, Quan Jiu; Wu, Di; Zhou, Bei Bei

    2016-10-01

    With the change of climate, agricultural drought has directly threatened the food security. Based on the natural disaster risk theory, we analyzed the spatial and temporal characteristics of agricultural drought in Shanxi Province from 2009 to 2013. Four risk factors (hazard, exposure, vulnerability, and drought resistance ability) were selected with the consideration of influence factors of drought disasters. Subsequently, the index weight was determined by the analytic hierarchy process (AHP) and the aggregative indicator of natural disaster risk was established. The results showed that during the study period, the agricultural drought risk slightly declined in the northern Shaanxi, but increased sharply in the southern Shaanxi, especially in Shangluo City. While for the central part of Shaanxi Province, it maintained good stability, which was the highest in Xianyang City and the lowest in Xi'an City. Generally, the agricultural drought risk in Shaanxi Province gradually increased from south to north.

  7. A security framework for nationwide health information exchange based on telehealth strategy.

    PubMed

    Zaidan, B B; Haiqi, Ahmed; Zaidan, A A; Abdulnabi, Mohamed; Kiah, M L Mat; Muzamel, Hussaen

    2015-05-01

    This study focuses on the situation of health information exchange (HIE) in the context of a nationwide network. It aims to create a security framework that can be implemented to ensure the safe transmission of health information across the boundaries of care providers in Malaysia and other countries. First, a critique of the major elements of nationwide health information networks is presented from the perspective of security, along with such topics as the importance of HIE, issues, and main approaches. Second, a systematic evaluation is conducted on the security solutions that can be utilized in the proposed nationwide network. Finally, a secure framework for health information transmission is proposed within a central cloud-based model, which is compatible with the Malaysian telehealth strategy. The outcome of this analysis indicates that a complete security framework for a global structure of HIE is yet to be defined and implemented. Our proposed framework represents such an endeavor and suggests specific techniques to achieve this goal.

  8. Fiber-Optic Refractometer Based on an Etched High-Q π-Phase-Shifted Fiber-Bragg-Grating

    PubMed Central

    Zhang, Qi; Ianno, Natale J.; Han, Ming

    2013-01-01

    We present a compact and highly-sensitive fiber-optic refractometer based on a high-Q π-phase-shifted fiber-Bragg-grating (πFBG) that is chemically etched to the core of the fiber. Due to the π phase-shift, a strong πFBG forms a high-Q optical resonator and the reflection spectrum features an extremely narrow notch that can be used for highly sensitivity refractive index measurement. The etched πFBG demonstrated here has a diameter of ∼9.3 μm and a length of only 7 mm, leading to a refractive index responsivity of 2.9 nm/RIU (RIU: refractive index unit) at an ambient refractive index of 1.318. The reflection spectrum of the etched πFBG features an extremely narrow notch with a linewidth of only 2.1 pm in water centered at ∼1,550 nm, corresponding to a Q-factor of 7.4 × 105, which allows for potentially significantly improved sensitivity over refractometers based on regular fiber Bragg gratings. PMID:23845932

  9. Dynamic film thickness between bubbles and wall in a narrow channel

    NASA Astrophysics Data System (ADS)

    Ito, Daisuke; Damsohn, Manuel; Prasser, Horst-Michael; Aritomi, Masanori

    2011-09-01

    The present paper describes a novel technique to characterize the behavior of the liquid film between gas bubbles and the wall in a narrow channel. The method is based on the electrical conductance. Two liquid film sensors are installed on both opposite walls in a narrow rectangular channel. The liquid film thickness underneath the gas bubbles is recorded by the first sensor, while the void fraction information is obtained by measuring the conductance between the pair of opposite sensors. Both measurements are taken on a large two-dimensional domain and with a high speed. This makes it possible to obtain the two-dimensional distribution of the dynamic liquid film between the bubbles and the wall. In this study, this method was applied to an air-water flow ranging from bubbly to churn regimes in the narrow channel with a gap width of 1.5 mm.

  10. An E-Hospital Security Architecture

    NASA Astrophysics Data System (ADS)

    Tian, Fang; Adams, Carlisle

    In this paper, we introduce how to use cryptography in network security and access control of an e-hospital. We first define the security goal of the e-hospital system, and then we analyze the current application system. Our idea is proposed on the system analysis and the related regulations of patients' privacy protection. The security of the whole application system is strengthened through layered security protection. Three security domains in the e-hospital system are defined according to their sensitivity level, and for each domain, we propose different security protections. We use identity based cryptography to establish secure communication channel in the backbone network and policy based cryptography to establish secure communication channel between end users and the backbone network. We also use policy based cryptography in the access control of the application system. We use a symmetric key cryptography to protect the real data in the database. The identity based and policy based cryptography are all based on elliptic curve cryptography—a public key cryptography.

  11. Construction of monitoring model and algorithm design on passenger security during shipping based on improved Bayesian network.

    PubMed

    Wang, Jiali; Zhang, Qingnian; Ji, Wenfeng

    2014-01-01

    A large number of data is needed by the computation of the objective Bayesian network, but the data is hard to get in actual computation. The calculation method of Bayesian network was improved in this paper, and the fuzzy-precise Bayesian network was obtained. Then, the fuzzy-precise Bayesian network was used to reason Bayesian network model when the data is limited. The security of passengers during shipping is affected by various factors, and it is hard to predict and control. The index system that has the impact on the passenger safety during shipping was established on basis of the multifield coupling theory in this paper. Meanwhile, the fuzzy-precise Bayesian network was applied to monitor the security of passengers in the shipping process. The model was applied to monitor the passenger safety during shipping of a shipping company in Hainan, and the effectiveness of this model was examined. This research work provides guidance for guaranteeing security of passengers during shipping.

  12. Construction of Monitoring Model and Algorithm Design on Passenger Security during Shipping Based on Improved Bayesian Network

    PubMed Central

    Wang, Jiali; Zhang, Qingnian; Ji, Wenfeng

    2014-01-01

    A large number of data is needed by the computation of the objective Bayesian network, but the data is hard to get in actual computation. The calculation method of Bayesian network was improved in this paper, and the fuzzy-precise Bayesian network was obtained. Then, the fuzzy-precise Bayesian network was used to reason Bayesian network model when the data is limited. The security of passengers during shipping is affected by various factors, and it is hard to predict and control. The index system that has the impact on the passenger safety during shipping was established on basis of the multifield coupling theory in this paper. Meanwhile, the fuzzy-precise Bayesian network was applied to monitor the security of passengers in the shipping process. The model was applied to monitor the passenger safety during shipping of a shipping company in Hainan, and the effectiveness of this model was examined. This research work provides guidance for guaranteeing security of passengers during shipping. PMID:25254227

  13. Fiber-integrated refractive index sensor based on a diced Fabry-Perot micro-resonator.

    PubMed

    Suntsov, Sergiy; Rüter, Christian E; Schipkowski, Tom; Kip, Detlef

    2017-11-20

    We report on a fiber-integrated refractive index sensor based on a Fabry-Perot micro-resonator fabricated using simple diamond blade dicing of a single-mode step-index fiber. The performance of the device has been tested for the refractive index measurements of sucrose solutions as well as in air. The device shows a sensitivity of 1160 nm/RIU (refractive index unit) at a wavelength of 1.55 μm and a temperature cross-sensitivity of less than 10 -7   RIU/°C. Based on evaluation of the broadband reflection spectra, refractive index steps of 10 -5 of the solutions were accurately measured. The conducted coating of the resonator sidewalls with layers of a high-index material with real-time reflection spectrum monitoring could help to significantly improve the sensor performance.

  14. Cavity mode-width spectroscopy with widely tunable ultra narrow laser.

    PubMed

    Cygan, Agata; Lisak, Daniel; Morzyński, Piotr; Bober, Marcin; Zawada, Michał; Pazderski, Eugeniusz; Ciuryło, Roman

    2013-12-02

    We explore a cavity-enhanced spectroscopic technique based on determination of the absorbtion coefficient from direct measurement of spectral width of the mode of the optical cavity filled with absorbing medium. This technique called here the cavity mode-width spectroscopy (CMWS) is complementary to the cavity ring-down spectroscopy (CRDS). While both these techniques use information on interaction time of the light with the cavity to determine absorption coefficient, the CMWS does not require to measure very fast signals at high absorption conditions. Instead the CMWS method require a very narrow line width laser with precise frequency control. As an example a spectral line shape of P7 Q6 O₂ line from the B-band was measured with use of an ultra narrow laser system based on two phase-locked external cavity diode lasers (ECDL) having tunability of ± 20 GHz at wavelength range of 687 to 693 nm.

  15. A Security Audit Framework to Manage Information System Security

    NASA Astrophysics Data System (ADS)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  16. Reliability, Compliance, and Security in Web-Based Course Assessments

    ERIC Educational Resources Information Center

    Bonham, Scott

    2008-01-01

    Pre- and postcourse assessment has become a very important tool for education research in physics and other areas. The web offers an attractive alternative to in-class paper administration, but concerns about web-based administration include reliability due to changes in medium, student compliance rates, and test security, both question leakage…

  17. Development of a lumbar EMG-based coactivation index for the assessment of complex dynamic tasks.

    PubMed

    Le, Peter; Aurand, Alexander; Walter, Benjamin A; Best, Thomas M; Khan, Safdar N; Mendel, Ehud; Marras, William S

    2018-03-01

    The objective of this study was to develop and test an EMG-based coactivation index and compare it to a coactivation index defined by a biologically assisted lumbar spine model to differentiate between tasks. The purpose was to provide a universal approach to assess coactivation of a multi-muscle system when a computational model is not accessible. The EMG-based index developed utilised anthropometric-defined muscle characteristics driven by torso kinematics and EMG. Muscles were classified as agonists/antagonists based upon 'simulated' moments of the muscles relative to the total 'simulated' moment. Different tasks were used to test the range of the index including lifting, pushing and Valsalva. Results showed that the EMG-based index was comparable to the index defined by a biologically assisted model (r 2  = 0.78). Overall, the EMG-based index provides a universal, usable method to assess the neuromuscular effort associated with coactivation for complex dynamic tasks when the benefit of a biomechanical model is not available. Practitioner Summary: A universal coactivation index for the lumbar spine was developed to assess complex dynamic tasks. This method was validated relative to a model-based index for use when a high-end computational model is not available. Its simplicity allows for fewer inputs and usability for assessment of task ergonomics and rehabilitation.

  18. Marine data security based on blockchain technology

    NASA Astrophysics Data System (ADS)

    Yang, Zhao; Xie, Weiwei; Huang, Lei; Wei, Zhiqiang

    2018-03-01

    With the development of marine observation technology and network technology, the volume of marine data growing rapidly. This brings new challenges for data storage and transmission. How to protect data security of marine big data has become an urgent problem. The traditional information security methods’ characteristic is centralization. These technologies cannot provide whole process protection, e.g., data storage, data management and application of data. The blockchain technology is a novel technology, which can keep the data security and reliability by using decentralized methodology. It has aroused wide interest in the financial field. In this paper, we describe the concept, characteristics and key technologies of blockchain technology and introduce it into the field of marine data security.

  19. Mere exposure revisited: the influence of growth versus security cues on evaluations of novel and familiar stimuli.

    PubMed

    Gillebaart, Marleen; Förster, Jens; Rotteveel, Mark

    2012-11-01

    Combining regulatory focus theory (Higgins, 1997) and novelty categorization theory (Förster, Marguc, & Gillebaart, 2010), we predicted that novel stimuli would be more positively evaluated when focused on growth as compared with security and that familiar stimuli would be more negatively evaluated when focused on growth as compared with security. This would occur, at least in part, because of changes in category breadth. We tested effects of several variables linked to growth and security on evaluations of novel and familiar stimuli. Using a subliminal mere exposure paradigm, results showed novel stimuli were evaluated more positively in a promotion focus compared to a prevention focus (Experiments 1A-1C), with high power compared to low power (Experiment 2A), and with the color blue compared to red (Experiment 2B). For familiar stimuli, all effects were reversed. Additionally, as predicted by novelty categorization theory, novel stimuli were liked better after broad compared to narrow category priming, and familiar stimuli were liked better after narrow compared with broad category priming (Experiment 3). We suggest, therefore, that although familiarity glows warmly in security-related contexts, people prefer novelty when they are primarily focused on growth. (PsycINFO Database Record (c) 2012 APA, all rights reserved).

  20. Ocular Biometrics of Myopic Eyes With Narrow Angles.

    PubMed

    Chong, Gabriel T; Wen, Joanne C; Su, Daniel Hsien-Wen; Stinnett, Sandra; Asrani, Sanjay

    2016-02-01

    The purpose of this study was to compare the ocular biometrics between myopic patients with and without narrow angles. Patients with a stable myopic refraction (myopia worse than -1.00 D spherical equivalent) were prospectively recruited. Angle status was assessed using gonioscopy and biometric measurements were performed using an anterior segment optical coherence tomography and an IOLMaster. A total of 29 patients (58 eyes) were enrolled with 13 patients (26 eyes) classified as having narrow angles and 16 patients (32 eyes) classified as having open angles. Baseline demographics of age, sex, and ethnicity did not differ significantly between the 2 groups. The patients with narrow angles were on average older than those with open angles but the difference did not reach statistical significance (P=0.12). The central anterior chamber depth was significantly less in the eyes with narrow angles (P=0.05). However, the average lens thickness, although greater in the eyes with narrow angles, did not reach statistical significance (P=0.10). Refractive error, axial lengths, and iris thicknesses did not differ significantly between the 2 groups (P=0.32, 0.47, 0.15). Narrow angles can occur in myopic eyes. Routine gonioscopy is therefore recommended for all patients regardless of refractive error.

  1. How Ending Impunity for Conflict-Related Sexual Violence Overwhelmed the UN Women, Peace, and Security Agenda: A Discursive Genealogy.

    PubMed

    Reilly, Niamh

    2018-05-01

    The recent unprecedented focus on ending impunity for conflict-related sexual violence (CRSV) is positive in many respects. However, it has narrowed the scope of Security Council Resolution 1325 and the women, peace, and security (WPS) agenda it established in 2000. Through a critical discursive genealogy of the interrelation of two UN agendas-protection of civilians in armed conflict and women, peace, and security-the author traces how CRSV emerged as the defining issue of the latter while the transformative imperative of making women's participation central to every UN endeavor for peace and security has failed to gain traction.

  2. A compressive sensing based secure watermark detection and privacy preserving storage framework.

    PubMed

    Qia Wang; Wenjun Zeng; Jun Tian

    2014-03-01

    Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service, such as the cloud. In this paper, we identify a cloud computing application scenario that requires simultaneously performing secure watermark detection and privacy preserving multimedia data storage. We then propose a compressive sensing (CS)-based framework using secure multiparty computation (MPC) protocols to address such a requirement. In our framework, the multimedia data and secret watermark pattern are presented to the cloud for secure watermark detection in a CS domain to protect the privacy. During CS transformation, the privacy of the CS matrix and the watermark pattern is protected by the MPC protocols under the semi-honest security model. We derive the expected watermark detection performance in the CS domain, given the target image, watermark pattern, and the size of the CS matrix (but without the CS matrix itself). The correctness of the derived performance has been validated by our experiments. Our theoretical analysis and experimental results show that secure watermark detection in the CS domain is feasible. Our framework can also be extended to other collaborative secure signal processing and data-mining applications in the cloud.

  3. Security management based on trust determination in cognitive radio networks

    NASA Astrophysics Data System (ADS)

    Li, Jianwu; Feng, Zebing; Wei, Zhiqing; Feng, Zhiyong; Zhang, Ping

    2014-12-01

    Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.

  4. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network

    PubMed Central

    Rajagopalan, S. P.

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network. PMID:29040290

  5. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    PubMed

    Alagarsamy, Sumithra; Rajagopalan, S P

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  6. 75 FR 79320 - Security-Based Swap Data Repository Registration, Duties, and Core Principles

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-20

    ... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 240 and 249 [Release No. 34-63347; File No. S7-35-10] RIN 3235-AK79 Security-Based Swap Data Repository Registration, Duties, and Core Principles Correction In proposed rule document 2010-29719 beginning on page 77306 in the issue of December 10, 2010...

  7. Medical image security using modified chaos-based cryptography approach

    NASA Astrophysics Data System (ADS)

    Talib Gatta, Methaq; Al-latief, Shahad Thamear Abd

    2018-05-01

    The progressive development in telecommunication and networking technologies have led to the increased popularity of telemedicine usage which involve storage and transfer of medical images and related information so security concern is emerged. This paper presents a method to provide the security to the medical images since its play a major role in people healthcare organizations. The main idea in this work based on the chaotic sequence in order to provide efficient encryption method that allows reconstructing the original image from the encrypted image with high quality and minimum distortion in its content and doesn’t effect in human treatment and diagnosing. Experimental results prove the efficiency of the proposed method using some of statistical measures and robust correlation between original image and decrypted image.

  8. A global assessment of wildfire risks to human and environmental water security

    NASA Astrophysics Data System (ADS)

    Robinne, François-Nicolas; Parisien, Marc-André; Flannigan, Mike; Miller, Carol; Bladon, Kevin D.

    2017-04-01

    Extreme wildfire events extensively affect hydrosystem stability and generate an important threat to the reliability of the water supply for human and natural communities. While actively studied at the watershed scale, the development of a global vision of wildfire risk to water security has only been undertaken recently, pointing at potential water security concerns in an era of global changes. In order to address this concern, we propose a global-scale analysis of the wildfire risk to surface water supplies based on the Driving forces-Pressures-States-Impacts-Responses (DPSIR) framework. This framework relies on the cause-and-effect relationships existing between the five categories of the DPSIR chain. Based on the literature, we gathered an extensive set of spatial indicators relevant to fire-induced hydrological hazards and water consumption patterns by human and natural communities. Each indicator was assigned a DPSIR category. Then, we collapsed the information in each category using a principal component analysis in order to extract the most relevant pixel-based information provided by each spatial indicator. Finally, we compiled our five categories using an additive indexation process to produce a spatially-explicit index of the wildfire-water risk (WWR). For comparison purposes, we aggregated index scores by global hydrological regions, or hydrobelts, for analysis. Overall, our results show a distinct pattern of medium-to-high risk levels in areas where sizeable wildfire activity, water resources, and water consumption are concomitant, which mainly encompasses temperate and sub-tropical zones. A closer look at hydrobelts reveals differences in the factors driving the risk, with fire activity being the primary factor of risk in the circumboreal forest, and freshwater resource density being prevalent in tropical areas. We also identified major urban areas across the world whose source waters should be protected from extreme fire events, particularly when

  9. Ultra-narrow band perfect absorbers based on Fano resonance in MIM metamaterials

    NASA Astrophysics Data System (ADS)

    Zhang, Ming; Fang, Jiawen; Zhang, Fei; Chen, Junyan; Yu, Honglin

    2017-12-01

    Metallic nanostructures have attracted numerous attentions in the past decades due to their attractive plasmonic properties. Resonant plasmonic perfect absorbers have promising applications in a wide range of technologies including photothermal therapy, thermophotovoltaics, heat-assisted magnetic recording and biosensing. However, it remains to be a great challenge to achieve ultra-narrow band in near-infrared band with plasmonic materials due to the large optical losses in metals. In this letter, we introduced Fano resonance in MIM metamaterials composed of an asymmetry double elliptic cylinders (ADEC), which can achieve ultra-narrow band perfect absorbers. In theoretical calculations, we observed an ultranarrow band resonant absorption peak with the full width at half maximum (FWHM) of 8 nm and absorption amplitude exceeding 99% at 930 nm. Moreover, we demonstrate that the absorption increases with the increase of asymmetry and the absorption resonant wavelength can be tuned by changing the size and arrangement of the unit cell. The asymmetry metallic nanostructure also exhibit a higher refractive sensitivity as large as 503 nm/RIU with high figure of merit of 63, which is promising for high sensitive sensors. Results of this work are desirable for various potential applications in micro-technological structures such as biological sensors, narrowband emission, photodetectors and solar thermophotovoltaic (STPV) cells.

  10. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy.

    PubMed

    Muhammad, Khan; Sajjad, Muhammad; Baik, Sung Wook

    2016-05-01

    In this paper, the problem of secure transmission of sensitive contents over the public network Internet is addressed by proposing a novel data hiding method in encrypted images with dual-level security. The secret information is divided into three blocks using a specific pattern, followed by an encryption mechanism based on the three-level encryption algorithm (TLEA). The input image is scrambled using a secret key, and the encrypted sub-message blocks are then embedded in the scrambled image by cyclic18 least significant bit (LSB) substitution method, utilizing LSBs and intermediate LSB planes. Furthermore, the cover image and its planes are rotated at different angles using a secret key prior to embedding, deceiving the attacker during data extraction. The usage of message blocks division, TLEA, image scrambling, and the cyclic18 LSB method results in an advanced security system, maintaining the visual transparency of resultant images and increasing the security of embedded data. In addition, employing various secret keys for image scrambling, data encryption, and data hiding using the cyclic18 LSB method makes the data recovery comparatively more challenging for attackers. Experimental results not only validate the effectiveness of the proposed framework in terms of visual quality and security compared to other state-of-the-art methods, but also suggest its feasibility for secure transmission of diagnostically important keyframes to healthcare centers and gastroenterologists during wireless capsule endoscopy.

  11. Brain waves-based index for workload estimation and mental effort engagement recognition

    NASA Astrophysics Data System (ADS)

    Zammouri, A.; Chraa-Mesbahi, S.; Ait Moussa, A.; Zerouali, S.; Sahnoun, M.; Tairi, H.; Mahraz, A. M.

    2017-10-01

    The advent of the communication systems and considering the complexity that some impose in their use, it is necessary to incorporate and equip these systems with a certain intelligence which takes into account the cognitive and mental capacities of the human operator. In this work, we address the issue of estimating the mental effort of an operator according to the cognitive tasks difficulty levels. Based on the Electroencephalogram (EEG) measurements, the proposed approach analyzes the user’s brain activity from different brain regions while performing cognitive tasks with several levels of difficulty. At a first time, we propose a variances comparison-based classifier (VCC) that makes use of the Power Spectral Density (PSD) of the EEG signal. The aim of using such a classifier is to highlight the brain regions that enter into interaction according to the cognitive task difficulty. In a second time, we present and describe a new EEG-based index for the estimation of mental efforts. The designed index is based on information recorded from two EEG channels. Results from the VCC demonstrate that powers of the Theta [4-7 Hz] (θ) and Alpha [8-12 Hz] (α) oscillations decrease while increasing the cognitive task difficulty. These decreases are mainly located in parietal and temporal brain regions. Based on the Kappa coefficients, decisions of the introduced index are compared to those obtained from an existing index. This performance assessment method revealed strong agreements. Hence the efficiency of the introduced index.

  12. [Assessment on ecological security spatial differences of west areas of Liaohe River based on GIS].

    PubMed

    Wang, Geng; Wu, Wei

    2005-09-01

    Ecological security assessment and early warning research have spatiality; non-linearity; randomicity, it is needed to deal with much spatial information. Spatial analysis and data management are advantages of GIS, it can define distribution trend and spatial relations of environmental factors, and show ecological security pattern graphically. The paper discusses the method of ecological security spatial differences of west areas of Liaohe River based on GIS and ecosystem non-health. First, studying on pressure-state-response (P-S-R) assessment indicators system, investigating in person and gathering information; Second, digitizing the river, applying fuzzy AHP to put weight, quantizing and calculating by fuzzy comparing; Last, establishing grid data-base; expounding spatial differences of ecological security by GIS Interpolate and Assembly.

  13. Use of motor abundance in old adults in the regulation of a narrow-based stance.

    PubMed

    Hsu, Wei-Li; Lin, Kwan-Hwa; Yang, Rong-Sen; Cheng, Chih-Hsiu

    2014-02-01

    The ability to maintain stable balance while standing decreases with age. The body must coordinate multiple joints using "freeze" or "free" strategy, or a combination of both to ensure balance stability. The purpose of this study was to examine age-related changes in the use of motor abundance during upright stance on a narrow base without visual input. Uncontrolled manifold (UCM) analysis was used to decompose the movement variability of joints into goal-equivalent variability (GEV) and non-goal-equivalent variability (NGEV). The ratio between GEV and NGEV (UCM(ratio)) quantifies the joint coordination related to postural stability, and a high UCM(ratio) value indicates flexible control of joints. To perform balance tests, participants in this study (healthy young and old adults, 20 each) were asked to stand on a flat platform and on narrow wooden blocks with their eyes open and then eyes closed. In upright balance tests, both old and young adults maintained postural stability. GEV was greater than NGEV across all participants and conditions. However, GEV was higher in the young adults than in the old adults, whereas NGEV was higher in the old adults than in the young adults. Therefore, the old adults exhibited a lower UCM(ratio) than the young adults. The old adults were unable to exploit motor abundance and used a less flexible multi-joint coordination pattern to achieve stable balance. The UCM(ratio) value reflects the quality of postural control and can be used for assessing joint coordination in balance disorders.

  14. FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption

    PubMed Central

    2015-01-01

    Background The increasing availability of genome data motivates massive research studies in personalized treatment and precision medicine. Public cloud services provide a flexible way to mitigate the storage and computation burden in conducting genome-wide association studies (GWAS). However, data privacy has been widely concerned when sharing the sensitive information in a cloud environment. Methods We presented a novel framework (FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption) to fully outsource GWAS (i.e., chi-square statistic computation) using homomorphic encryption. The proposed framework enables secure divisions over encrypted data. We introduced two division protocols (i.e., secure errorless division and secure approximation division) with a trade-off between complexity and accuracy in computing chi-square statistics. Results The proposed framework was evaluated for the task of chi-square statistic computation with two case-control datasets from the 2015 iDASH genome privacy protection challenge. Experimental results show that the performance of FORESEE can be significantly improved through algorithmic optimization and parallel computation. Remarkably, the secure approximation division provides significant performance gain, but without missing any significance SNPs in the chi-square association test using the aforementioned datasets. Conclusions Unlike many existing HME based studies, in which final results need to be computed by the data owner due to the lack of the secure division operation, the proposed FORESEE framework support complete outsourcing to the cloud and output the final encrypted chi-square statistics. PMID:26733391

  15. FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption.

    PubMed

    Zhang, Yuchen; Dai, Wenrui; Jiang, Xiaoqian; Xiong, Hongkai; Wang, Shuang

    2015-01-01

    The increasing availability of genome data motivates massive research studies in personalized treatment and precision medicine. Public cloud services provide a flexible way to mitigate the storage and computation burden in conducting genome-wide association studies (GWAS). However, data privacy has been widely concerned when sharing the sensitive information in a cloud environment. We presented a novel framework (FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption) to fully outsource GWAS (i.e., chi-square statistic computation) using homomorphic encryption. The proposed framework enables secure divisions over encrypted data. We introduced two division protocols (i.e., secure errorless division and secure approximation division) with a trade-off between complexity and accuracy in computing chi-square statistics. The proposed framework was evaluated for the task of chi-square statistic computation with two case-control datasets from the 2015 iDASH genome privacy protection challenge. Experimental results show that the performance of FORESEE can be significantly improved through algorithmic optimization and parallel computation. Remarkably, the secure approximation division provides significant performance gain, but without missing any significance SNPs in the chi-square association test using the aforementioned datasets. Unlike many existing HME based studies, in which final results need to be computed by the data owner due to the lack of the secure division operation, the proposed FORESEE framework support complete outsourcing to the cloud and output the final encrypted chi-square statistics.

  16. OpenID Connect as a security service in cloud-based medical imaging systems

    PubMed Central

    Ma, Weina; Sartipi, Kamran; Sharghigoorabi, Hassan; Koff, David; Bak, Peter

    2016-01-01

    Abstract. The evolution of cloud computing is driving the next generation of medical imaging systems. However, privacy and security concerns have been consistently regarded as the major obstacles for adoption of cloud computing by healthcare domains. OpenID Connect, combining OpenID and OAuth together, is an emerging representational state transfer-based federated identity solution. It is one of the most adopted open standards to potentially become the de facto standard for securing cloud computing and mobile applications, which is also regarded as “Kerberos of cloud.” We introduce OpenID Connect as an authentication and authorization service in cloud-based diagnostic imaging (DI) systems, and propose enhancements that allow for incorporating this technology within distributed enterprise environments. The objective of this study is to offer solutions for secure sharing of medical images among diagnostic imaging repository (DI-r) and heterogeneous picture archiving and communication systems (PACS) as well as Web-based and mobile clients in the cloud ecosystem. The main objective is to use OpenID Connect open-source single sign-on and authorization service and in a user-centric manner, while deploying DI-r and PACS to private or community clouds should provide equivalent security levels to traditional computing model. PMID:27340682

  17. OpenID Connect as a security service in cloud-based medical imaging systems.

    PubMed

    Ma, Weina; Sartipi, Kamran; Sharghigoorabi, Hassan; Koff, David; Bak, Peter

    2016-04-01

    The evolution of cloud computing is driving the next generation of medical imaging systems. However, privacy and security concerns have been consistently regarded as the major obstacles for adoption of cloud computing by healthcare domains. OpenID Connect, combining OpenID and OAuth together, is an emerging representational state transfer-based federated identity solution. It is one of the most adopted open standards to potentially become the de facto standard for securing cloud computing and mobile applications, which is also regarded as "Kerberos of cloud." We introduce OpenID Connect as an authentication and authorization service in cloud-based diagnostic imaging (DI) systems, and propose enhancements that allow for incorporating this technology within distributed enterprise environments. The objective of this study is to offer solutions for secure sharing of medical images among diagnostic imaging repository (DI-r) and heterogeneous picture archiving and communication systems (PACS) as well as Web-based and mobile clients in the cloud ecosystem. The main objective is to use OpenID Connect open-source single sign-on and authorization service and in a user-centric manner, while deploying DI-r and PACS to private or community clouds should provide equivalent security levels to traditional computing model.

  18. Fiber ring laser based on SMF-TCF-SMF structure for strain and refractive index sensing

    NASA Astrophysics Data System (ADS)

    Yu, Fen; Xu, Ben; Zhang, Yixin; Wang, Dongning

    2017-12-01

    An erbium-doped fiber ring laser with embedded Mach-Zehnder interferometer (MZI) is constructed and experimentally demonstrated for strain and refractive index (RI) measurement. The MZI consists of a segment of thin-core fiber sandwiched between two single-mode fibers and acts as both the sensing component as well as a bandpass filter to select the lasing wavelength. The strain sensitivity of ˜-0.97 pm/μɛ and RI sensitivity of ˜44.88 nm/RIU are obtained in the range of 0 to 1750 μɛ and 1.3300 to 1.3537, respectively. The high-optical signal-to-noise ratio of >50 dB and narrow 3-dB bandwidth of <0.11 nm obtained indicate that the fiber ring laser sensor is promising for high-precision strain and RI measurement.

  19. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2010-09-01

    secure ad-hoc networks of mobile sensors deployed in a hostile environment . These sensors are normally small 86 and resource...Communications Magazine, 51, 2008. 45. Kumar, S.A. “Classification and Review of Security Schemes in Mobile Comput- ing”. Wireless Sensor Network , 2010... Networks ”. Wireless /Mobile Network Security , 2008. 85. Xiao, Y. “Accountability for Wireless LANs, Ad Hoc Networks , and Wireless

  20. Document Indexing for Image-Based Optical Information Systems.

    ERIC Educational Resources Information Center

    Thiel, Thomas J.; And Others

    1991-01-01

    Discussion of image-based information retrieval systems focuses on indexing. Highlights include computerized information retrieval; multimedia optical systems; optical mass storage and personal computers; and a case study that describes an optical disk system which was developed to preserve, access, and disseminate military documents. (19…

  1. Unconditional security of entanglement-based continuous-variable quantum secret sharing

    NASA Astrophysics Data System (ADS)

    Kogias, Ioannis; Xiang, Yu; He, Qiongyi; Adesso, Gerardo

    2017-01-01

    The need for secrecy and security is essential in communication. Secret sharing is a conventional protocol to distribute a secret message to a group of parties, who cannot access it individually but need to cooperate in order to decode it. While several variants of this protocol have been investigated, including realizations using quantum systems, the security of quantum secret sharing schemes still remains unproven almost two decades after their original conception. Here we establish an unconditional security proof for entanglement-based continuous-variable quantum secret sharing schemes, in the limit of asymptotic keys and for an arbitrary number of players. We tackle the problem by resorting to the recently developed one-sided device-independent approach to quantum key distribution. We demonstrate theoretically the feasibility of our scheme, which can be implemented by Gaussian states and homodyne measurements, with no need for ideal single-photon sources or quantum memories. Our results contribute to validating quantum secret sharing as a viable primitive for quantum technologies.

  2. Secure Base Scripts are Associated with Maternal Parenting Behavior across Contexts and Reflective Functioning among Trauma-Exposed Mothers

    PubMed Central

    Huth-Bocks, Alissa C.; Muzik, Maria; Beeghly, Marjorie; Earls, Lauren; Stacks, Ann M.

    2015-01-01

    There is growing evidence that ‘secure-base scripts’ (Waters & Waters, 2006) are an important part of the cognitive underpinnings of internal working models of attachment. Recent research in middle class samples has shown that secure-base scripts are linked to maternal attachment-oriented behavior and child outcomes. However, little is known about the correlates of secure base scripts in higher-risk samples. Participants in the current study included 115 mothers who were oversampled for childhood maltreatment and their infants. Results revealed that a higher level of secure base scriptedness was significantly related to more positive and less negative maternal parenting in both unstructured free play and structured teaching contexts, and to higher reflective functioning scores on the Parent Development Interview-Revised Short Form (Slade, Aber, Berger, Bresgi, & Kaplan, 2003). Associations with parent-child secure base scripts, specifically, indicate some level of relationship-specificity in attachment scripts. Many, but not all, significant associations remained after controlling for family income and maternal age. Findings suggest that assessing secure base scripts among mothers known to be at risk for parenting difficulties may be important for interventions aimed at altering problematic parental representations and caregiving behavior. PMID:25319230

  3. Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks

    PubMed Central

    Guo, Xianfeng; Zhang, Jiashu; Khan, Muhammad Khurram; Alghathbar, Khaled

    2011-01-01

    Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys. Unfortunately, we discovered that their scheme is unable to withstand key stream attack. To improve its security, this paper proposes a novel chaotic map based block cryptosystem. At the same time, a secure architecture for camera sensor network is constructed. The network comprises a set of inexpensive camera sensors to capture the images, a sink node equipped with sufficient computation and storage capabilities and a data processing server. The transmission security between the sink node and the server is gained by utilizing the improved cipher. Both theoretical analysis and simulation results indicate that the improved algorithm can overcome the flaws and maintain all the merits of the original cryptosystem. In addition, computational costs and efficiency of the proposed scheme are encouraging for the practical implementation in the real environment as well as camera sensor network. PMID:22319371

  4. Secure chaotic map based block cryptosystem with application to camera sensor networks.

    PubMed

    Guo, Xianfeng; Zhang, Jiashu; Khan, Muhammad Khurram; Alghathbar, Khaled

    2011-01-01

    Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys. Unfortunately, we discovered that their scheme is unable to withstand key stream attack. To improve its security, this paper proposes a novel chaotic map based block cryptosystem. At the same time, a secure architecture for camera sensor network is constructed. The network comprises a set of inexpensive camera sensors to capture the images, a sink node equipped with sufficient computation and storage capabilities and a data processing server. The transmission security between the sink node and the server is gained by utilizing the improved cipher. Both theoretical analysis and simulation results indicate that the improved algorithm can overcome the flaws and maintain all the merits of the original cryptosystem. In addition, computational costs and efficiency of the proposed scheme are encouraging for the practical implementation in the real environment as well as camera sensor network.

  5. Modeling of a Single-Notch Microfiber Coupler for High-Sensitivity and Low Detection-Limit Refractive Index Sensing.

    PubMed

    Zhang, Jiali; Shi, Lei; Zhu, Song; Xu, Xinbiao; Zhang, Xinliang

    2016-05-11

    A highly sensitive refractive index sensor with low detection limit based on an asymmetric optical microfiber coupler is proposed. It is composed of a silica optical microfiber and an As₂Se₃ optical microfiber. Due to the asymmetry of the microfiber materials, a single-notch transmission spectrum is demonstrated by the large refractive index difference between the two optical microfibers. Compared with the symmetric coupler, the bandwidth of the asymmetric structure is over one order of magnitude narrower than that of the former. Therefore, the asymmetric optical microfiber coupler based sensor can reach over one order of magnitude smaller detection limit, which is defined as the minimal detectable refractive index change caused by the surrounding analyte. With the advantage of large evanescent field, the results also show that a sensitivity of up to 3212 nm per refractive index unit with a bandwidth of 12 nm is achieved with the asymmetric optical microfiber coupler. Furthermore, a maximum sensitivity of 4549 nm per refractive index unit can be reached while the radii of the silica optical microfiber and As₂Se₃ optical microfiber are 0.5 μm and a 0.128 μm, respectively. This sensor component may have important potential for low detection-limit physical and biochemical sensing applications.

  6. QKD-Based Secured Burst Integrity Design for Optical Burst Switched Networks

    NASA Astrophysics Data System (ADS)

    Balamurugan, A. M.; Sivasubramanian, A.; Parvathavarthini, B.

    2016-03-01

    The field of optical transmission has undergone numerous advancements and is still being researched mainly due to the fact that optical data transmission can be done at enormous speeds. It is quite evident that people prefer optical communication when it comes to large amount of data involving its transmission. The concept of switching in networks has matured enormously with several researches, architecture to implement and methods starting with Optical circuit switching to Optical Burst Switching. Optical burst switching is regarded as viable solution for switching bursts over networks but has several security vulnerabilities. However, this work exploited the security issues associated with Optical Burst Switching with respect to integrity of burst. This proposed Quantum Key based Secure Hash Algorithm (QKBSHA-512) with enhanced compression function design provides better avalanche effect over the conventional integrity algorithms.

  7. Construction of road network vulnerability evaluation index based on general travel cost

    NASA Astrophysics Data System (ADS)

    Leng, Jun-qiang; Zhai, Jing; Li, Qian-wen; Zhao, Lin

    2018-03-01

    With the development of China's economy and the continuous improvement of her urban road network, the vulnerability of the urban road network has attracted increasing attention. Based on general travel cost, this work constructs the vulnerability evaluation index for the urban road network, and evaluates the vulnerability of the urban road network from the perspective of user generalised travel cost. Firstly, the generalised travel cost model is constructed based on vehicle cost, travel time, and traveller comfort. Then, the network efficiency index is selected as an evaluation index of vulnerability: the network efficiency index is composed of the traffic volume and the generalised travel cost, which are obtained from the equilibrium state of the network. In addition, the research analyses the influence of traffic capacity decrease, road section attribute value, and location of road section, on vulnerability. Finally, the vulnerability index is used to analyse the local area network of Harbin and verify its applicability.

  8. A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.

    PubMed

    Gope, Prosanta; Amin, Ruhul

    2016-11-01

    Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.

  9. U. S. statutes of general interest to safeguards and security officers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cadwell, J.J.

    1988-01-01

    A handbook of enforcement provisions of Federal law and regulations was prepared for use by U.S. DOE Security Inspectors. This handbook provides security inspectors for the U.S. Department of Energy, security officers at Nuclear Regulatory Licensee facilities, and others with a single document containing most of the Federal law provisions available to assist them in enforcing agency regulations. The handbook contains selected enforcement provisions of Titles 18, 42 and 50 of the United States Code (USC). Topical coverage of Title 18 includes Espionage and Misrepresentation or Impersonation; Theft and Embezzlement; Malicious Mischief; Conspiracy; Search and Seizure. A miscellaneous section dealsmore » with explosives, blackmail, firearms, and other subjects. Certain enforcement sections of Title 42 of the USC (The Atomic Energy Act) and of the Internal Security Act of the United States Code (Title 50) are also provided. Finally, relevant parts of the Federal Property Management Regulations of Title 50, Chapter 101 of the Code of Federal Regulations are presented. A comprehensive index is provided based on key words.« less

  10. Telemedicine with integrated data security in ATM-based networks

    NASA Astrophysics Data System (ADS)

    Thiel, Andreas; Bernarding, Johannes; Kurth, Ralf; Wenzel, Rudiger; Villringer, Arno; Tolxdorff, Thomas

    1997-05-01

    Telemedical services rely on the digital transfer of large amounts of data in a short time. The acceptance of these services requires therefore new hard- and software concepts. The fast exchange of data is well performed within a high- speed ATM-based network. The fast access to the data from different platforms imposes more difficult problems, which may be divided into those relating to standardized data formats and those relating to different levels of data security across nations. For a standardized access to the formats and those relating to different levels of data security across nations. For a standardized access to the image data, a DICOM 3.0 server was implemented.IMages were converted into the DICOM 3.0 standard if necessary. The access to the server is provided by an implementation of DICOM in JAVA allowing access to the data from different platforms. Data protection measures to ensure the secure transfer of sensitive patient data are not yet solved within the DICOM concept. We investigated different schemes to protect data using the DICOM/JAVA modality with as little impact on data transfer speed as possible.

  11. A MEMS-based, wireless, biometric-like security system

    NASA Astrophysics Data System (ADS)

    Cross, Joshua D.; Schneiter, John L.; Leiby, Grant A.; McCarter, Steven; Smith, Jeremiah; Budka, Thomas P.

    2010-04-01

    We present a system for secure identification applications that is based upon biometric-like MEMS chips. The MEMS chips have unique frequency signatures resulting from fabrication process variations. The MEMS chips possess something analogous to a "voiceprint". The chips are vacuum encapsulated, rugged, and suitable for low-cost, highvolume mass production. Furthermore, the fabrication process is fully integrated with standard CMOS fabrication methods. One is able to operate the MEMS-based identification system similarly to a conventional RFID system: the reader (essentially a custom network analyzer) detects the power reflected across a frequency spectrum from a MEMS chip in its vicinity. We demonstrate prototype "tags" - MEMS chips placed on a credit card-like substrate - to show how the system could be used in standard identification or authentication applications. We have integrated power scavenging to provide DC bias for the MEMS chips through the use of a 915 MHz source in the reader and a RF-DC conversion circuit on the tag. The system enables a high level of protection against typical RFID hacking attacks. There is no need for signal encryption, so back-end infrastructure is minimal. We believe this system would make a viable low-cost, high-security system for a variety of identification and authentication applications.

  12. Discovery of a narrow line quasar

    NASA Technical Reports Server (NTRS)

    Stocke, J.; Liebert, J.; Maccacaro, T.; Griffiths, R. E.; Steiner, J. E.

    1982-01-01

    A stellar object is reported which, while having X-ray and optical luminosities typical of quasars, has narrow permitted and forbidden emission lines over the observed spectral range. The narrow-line spectrum is high-excitation, the Balmer lines seem to be recombinational, and a redder optical spectrum than that of most quasars is exhibited, despite detection as a weak radio source. The object does not conform to the relationships between H-beta parameters and X-ray flux previously claimed for a large sample of the active galactic nuclei. Because reddish quasars with narrow lines, such as the object identified, may not be found by the standard techniques for the discovery of quasars, the object may be a prototype of a new class of quasars analogous to high-luminosity Seyfert type 2 galaxies. It is suggested that these objects cannot comprise more than 10% of all quasars.

  13. Infants Experience Perceptual Narrowing for Nonprimate Faces

    ERIC Educational Resources Information Center

    Simpson, Elizabeth A.; Varga, Krisztina; Frick, Janet E.; Fragaszy, Dorothy

    2011-01-01

    Perceptual narrowing--a phenomenon in which perception is broad from birth, but narrows as a function of experience--has previously been tested with primate faces. In the first 6 months of life, infants can discriminate among individual human and monkey faces. Though the ability to discriminate monkey faces is lost after about 9 months, infants…

  14. Screw Loosening and Pelvic Canal Narrowing After Lateral Plating of Feline Ilial Fractures With Locking and Nonlocking Plates.

    PubMed

    Schmierer, Philipp A; Kircher, Patrick R; Hartnack, Sonja; Knell, Sebastian C

    2015-10-01

    To compare the frequency of complications, including screw loosening and pelvic canal narrowing, associated with dynamic compression plating, locking plating, and double locking plating of ilial fractures in cats. Historical cohort study. The radiographs and medical records of cats with pelvic fractures that were presented between 2004 and 2013 were reviewed. The cases were categorized based on the plate type and number as dynamic compression plate (DCP), single locking plate (LPS) and double locking plates (dLPS). The frequency of screw loosening was compared across categories using a Fisher's exact test. The change in pelvic alignment, described by the change in sacral index (postoperative sacral index-followup sacral index), was compared across plate categories using ANOVA. The frequency of screw loosening for DCP (5/10) was significantly higher than LPS (1/13) and dLPS (0/11) (P = .05, P = .012, respectively). There was no significant difference in the SI change across plate categories. The mean change in sacral index for DCP was -0.11 (95%CI -0.25 to 0.03), for LPS was 0.0007 (95%CI -0.07 to 0.08), and for dLPS was -0.01 (95%CI -0.04 to 0.02). None of the cats showed constipation postoperatively. Screw loosening occurred less often but the change in pelvic canal alignment was not significantly different in ilial fractures repaired with LPS or dLPS compared to ilial fractures repaired with DCP. Locking plating of ilial fractures in cats may offer advantages compared to nonlocking plating. © Copyright 2015 by The American College of Veterinary Surgeons.

  15. Trust-Based Security Level Evaluation Using Bayesian Belief Networks

    NASA Astrophysics Data System (ADS)

    Houmb, Siv Hilde; Ray, Indrakshi; Ray, Indrajit; Chakraborty, Sudip

    Security is not merely about technical solutions and patching vulnerabilities. Security is about trade-offs and adhering to realistic security needs, employed to support core business processes. Also, modern systems are subject to a highly competitive market, often demanding rapid development cycles, short life-time, short time-to-market, and small budgets. Security evaluation standards, such as ISO 14508 Common Criteria and ISO/IEC 27002, are not adequate for evaluating the security of many modern systems for resource limitations, time-to-market, and other constraints. Towards this end, we propose an alternative time and cost effective approach for evaluating the security level of a security solution, system or part thereof. Our approach relies on collecting information from different sources, who are trusted to varying degrees, and on using a trust measure to aggregate available information when deriving security level. Our approach is quantitative and implemented as a Bayesian Belief Network (BBN) topology, allowing us to reason over uncertain information and seemingly aggregating disparate information. We illustrate our approach by deriving the security level of two alternative Denial of Service (DoS) solutions. Our approach can also be used in the context of security solution trade-off analysis.

  16. Switchable narrow linewidth fiber laser with LP11 transverse mode output

    NASA Astrophysics Data System (ADS)

    Shen, Ya; Ren, Guobin; Yang, Yuguang; Yao, Shuzhi; Wu, Yue; Jiang, Youchao; Xu, Yao; Jin, Wenxing; Zhu, Bofeng; Jian, Shuisheng

    2018-01-01

    We experimentally demonstrate a switchable narrow linewidth single-longitudinal-mode (SLM) erbium-doped fiber (EDF) ring laser with LP11 transverse mode output. The laser is based on a mode selective all-fiber fused coupler which is composed of a single-mode fiber (SMF) and a two-mode fiber (TMF). By controlling the polarization state of the output light, the laser can provide narrow linewidth SLM output with LP11 transverse mode at two specific wavelengths, which correspond to two transmission peaks of the chirped moiré fiber grating (CMFBG). The 20 dB linewidth of the fiber laser for each wavelength is approximately 7.2 and 6.4 kHz.

  17. Determination of Seed Soundness in Conifers Cryptomeria japonica and Chamaecyparis obtusa Using Narrow-Multiband Spectral Imaging in the Short-Wavelength Infrared Range

    PubMed Central

    Matsuda, Osamu; Hara, Masashi; Tobita, Hiroyuki; Yazaki, Kenichi; Nakagawa, Toshinori; Shimizu, Kuniyoshi; Uemura, Akira; Utsugi, Hajime

    2015-01-01

    Regeneration of planted forests of Cryptomeria japonica (sugi) and Chamaecyparis obtuse (hinoki) is the pressing importance to the forest administration in Japan. Low seed germination rate of these species, however, has hampered low-cost production of their seedlings for reforestation. The primary cause of the low germinability has been attributed to highly frequent formation of anatomically unsound seeds, which are indistinguishable from sound germinable seeds by visible observation and other common criteria such as size and weight. To establish a method for sound seed selection in these species, hyperspectral imaging technique was used to identify a wavelength range where reflectance spectra differ clearly between sound and unsound seeds. In sound seeds of both species, reflectance in a narrow waveband centered at 1,730 nm, corresponding to a lipid absorption band in the short-wavelength infrared (SWIR) range, was greatly depressed relative to that in adjacent wavebands on either side. Such depression was absent or less prominent in unsound seeds. Based on these observations, a reflectance index SQI, abbreviated for seed quality index, was formulated using reflectance at three narrow SWIR wavebands so that it represents the extent of the depression. SQI calculated from seed area-averaged reflectance spectra and spatial distribution patterns of pixelwise SQI within each seed area were both proven as reliable criteria for sound seed selection. Enrichment of sound seeds was accompanied by an increase in germination rate of the seed lot. Thus, the methods described are readily applicable toward low-cost seedling production in combination with single seed sowing technology. PMID:26083366

  18. Secure relay selection based on learning with negative externality in wireless networks

    NASA Astrophysics Data System (ADS)

    Zhao, Caidan; Xiao, Liang; Kang, Shan; Chen, Guiquan; Li, Yunzhou; Huang, Lianfen

    2013-12-01

    In this paper, we formulate relay selection into a Chinese restaurant game. A secure relay selection strategy is proposed for a wireless network, where multiple source nodes send messages to their destination nodes via several relay nodes, which have different processing and transmission capabilities as well as security properties. The relay selection utilizes a learning-based algorithm for the source nodes to reach their best responses in the Chinese restaurant game. In particular, the relay selection takes into account the negative externality of relay sharing among the source nodes, which learn the capabilities and security properties of relay nodes according to the current signals and the signal history. Simulation results show that this strategy improves the user utility and the overall security performance in wireless networks. In addition, the relay strategy is robust against the signal errors and deviations of some user from the desired actions.

  19. Positional Asphyxia: Death Due to Unusual Head-Down Position in a Narrow Space.

    PubMed

    Chaudhari, Vinod Ashok; Ghodake, Dattatray G; Kharat, Rajesh D

    2016-06-01

    Death due to a head-down position with hyperflexion of the neck is a rare event. A person accidentally falling into a narrow space and remaining in an upside-down position with no timely recovery may experience positional or postural asphyxia. It is a critical condition arising out of particular body positions, leading to mechanical obstruction of respiration. The precipitating factors are intoxication due to alcohol, drugs, obesity, psychiatric illnesses, and injuries. A 30-year-old unmarried woman, weighing 82 kg and with a body mass index of 31.24, was found in a narrow space between the bed and the wall in a naked state and in a head-down position with hyperflexion of the neck. The distribution of lividity was consistent with the position of the body at the scene. Blood was oozing from the mouth and nostrils, and signs of asphyxia were present. The toxicological analyses of viscera, blood, and urine were negative for alcohol, drugs, and poisons. Glucose levels in the blood (86 mg/dL) as well as urine and vitreous humor levels (68 mg/dL) were within normal limits. On microscopic examination, there were no findings of coronary atherosclerosis, whereas the brain and lung were edematous. After meticulous examination, we ruled out sexual assault, autoerotic asphyxia, epilepsy, psychiatric illness, diabetes, toxicity, and coronary artery disease. Death was attributed to the accidental fall of the obese individual being stuck in a narrow space, resulting in positional asphyxia. It is imperative to recognize the precipitating or risk factors before labeling positional asphyxia as a cause of death.

  20. Atomic Dynamics in Simple Liquid: de Gennes Narrowing Revisited

    NASA Astrophysics Data System (ADS)

    Wu, Bin; Iwashita, Takuya; Egami, Takeshi

    2018-03-01

    The de Gennes narrowing phenomenon is frequently observed by neutron or x -ray scattering measurements of the dynamics of complex systems, such as liquids, proteins, colloids, and polymers. The characteristic slowing down of dynamics in the vicinity of the maximum of the total scattering intensity is commonly attributed to enhanced cooperativity. In this Letter, we present an alternative view on its origin through the examination of the time-dependent pair correlation function, the van Hove correlation function, for a model liquid in two, three, and four dimensions. We find that the relaxation time increases monotonically with distance and the dependence on distance varies with dimension. We propose a heuristic explanation of this dependence based on a simple geometrical model. This finding sheds new light on the interpretation of the de Gennes narrowing phenomenon and the α -relaxation time.

  1. Toward DNA-based Security Circuitry: First Step - Random Number Generation.

    PubMed

    Bogard, Christy M; Arazi, Benjamin; Rouchka, Eric C

    2008-08-10

    DNA-based circuit design is an area of research in which traditional silicon-based technologies are replaced by naturally occurring phenomena taken from biochemistry and molecular biology. Our team investigates the implications of DNA-based circuit design in serving security applications. As an initial step we develop a random number generation circuitry. A novel prototype schema employs solid-phase synthesis of oligonucleotides for random construction of DNA sequences. Temporary storage and retrieval is achieved through plasmid vectors.

  2. 75 FR 13258 - Announcing a Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-19

    .../index.html/ . Agenda: --Cloud Computing Implementations --Health IT --OpenID --Pending Cyber Security... will be available for the public and media. --OpenID --Cloud Computing Implementations --Security...

  3. QCAPUF: QCA-based physically unclonable function as a hardware security primitive

    NASA Astrophysics Data System (ADS)

    Abutaleb, M. M.

    2018-04-01

    Physically unclonable functions (PUFs) are increasingly used as innovative security primitives to provide the hardware authentication and identification as well as the secret key generation based on unique and random variations in identically fabricated devices. Security and low power have appeared to become two crucial necessities to modern designs. As an emerging nanoelectronic technology, a quantum-dot cellular automata (QCA) can achieve ultra-low power consumption as well as an extremely small area for implementing digital designs. However, there are various classes of permanent defects that can happen during the manufacture of QCA devices. The recent extensive research has been focused on how to eliminate errors in QCA structures resulting from fabrication variances. By a completely different vision, to turn this disadvantage into an advantage, this paper presents a novel QCA-based PUF (QCAPUF) architecture to exploit the unique physical characteristics of fabricated QCA cells in order to produce different hardware fingerprint instances. This architecture is composed of proposed logic and interconnect blocks that have critical vulnerabilities and perform unexpected logical operations. The behaviour of QCAPUF is thoroughly analysed through physical relations and simulations. Results confirm that the proposed QCAPUF has state of the art PUF characteristics in the QCA technology. This paper will serve as a basis for further research into QCA-based hardware security primitives and applications.

  4. Secure Web-based Ground System User Interfaces over the Open Internet

    NASA Technical Reports Server (NTRS)

    Langston, James H.; Murray, Henry L.; Hunt, Gary R.

    1998-01-01

    A prototype has been developed which makes use of commercially available products in conjunction with the Java programming language to provide a secure user interface for command and control over the open Internet. This paper reports successful demonstration of: (1) Security over the Internet, including encryption and certification; (2) Integration of Java applets with a COTS command and control product; (3) Remote spacecraft commanding using the Internet. The Java-based Spacecraft Web Interface to Telemetry and Command Handling (Jswitch) ground system prototype provides these capabilities. This activity demonstrates the use and integration of current technologies to enable a spacecraft engineer or flight operator to monitor and control a spacecraft from a user interface communicating over the open Internet using standard World Wide Web (WWW) protocols and commercial off-the-shelf (COTS) products. The core command and control functions are provided by the COTS Epoch 2000 product. The standard WWW tools and browsers are used in conjunction with the Java programming technology. Security is provided with the current encryption and certification technology. This system prototype is a step in the direction of giving scientist and flight operators Web-based access to instrument, payload, and spacecraft data.

  5. An IPSO-SVM algorithm for security state prediction of mine production logistics system

    NASA Astrophysics Data System (ADS)

    Zhang, Yanliang; Lei, Junhui; Ma, Qiuli; Chen, Xin; Bi, Runfang

    2017-06-01

    A theoretical basis for the regulation of corporate security warning and resources was provided in order to reveal the laws behind the security state in mine production logistics. Considering complex mine production logistics system and the variable is difficult to acquire, a superior security status predicting model of mine production logistics system based on the improved particle swarm optimization and support vector machine (IPSO-SVM) is proposed in this paper. Firstly, through the linear adjustments of inertia weight and learning weights, the convergence speed and search accuracy are enhanced with the aim to deal with situations associated with the changeable complexity and the data acquisition difficulty. The improved particle swarm optimization (IPSO) is then introduced to resolve the problem of parameter settings in traditional support vector machines (SVM). At the same time, security status index system is built to determine the classification standards of safety status. The feasibility and effectiveness of this method is finally verified using the experimental results.

  6. Measuring Global Water Security Towards Sustainable Development Goals

    NASA Technical Reports Server (NTRS)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  7. The Army Did Not Effectively Monitor Contractor Performance for the Kuwait Base Operations and Security Support Services Contract

    DTIC Science & Technology

    2017-03-07

    H 7 , 2 0 1 7 Report No. DODIG-2017-062 The Army Did Not Effectively Monitor Contractor Performance for the Kuwait Base Operations and Security...The Army Did Not Effectively Monitor Contractor Performance for the Kuwait Base Operations and Security Support Services Contract March 7, 2017... contractor performance for the Kuwait Base Operations and Security Support Services (KBOSSS) contract. The KBOSSS contract is a cost-plus-award-fee

  8. Deep UV Narrow-Band Photodetector Based on Ion Beam Synthesized Indium Oxide Quantum Dots in Al2O3 Matrix.

    PubMed

    Rajamani, Saravanan; Arora, Kanika; Konakov, Anton; Belov, Alexey; Korolev, Dmitry; Nikolskaya, Alyona; Mikhaylov, Alexey N; Surodin, Sergey; Kryukov, Ruslan; Nikolichev, Dmitri; Sushkov, Artem; Pavlov, Dmitry; Tetelbaum, David; Kumar, Mukesh; Kumar, Mahesh

    2018-04-20

    Semiconductor quantum dots (QDs) have attracted tremendous attention owing to their novel electrical and optical properties due to the size dependent quantum confinement effects. This provides an advantage of tunable wavelength detection, which is essential to realize spectrally selective photodetectors. We report the fabrication and characterization of high performance narrow band ultraviolet photodetector (UV-B) based on In2O3 nanocrystals embedded in Al2O3 matrices. The In2O3 nanocrystals are synthesized in Al2O3 matrix by sequential implantation of In+ and N2+ ions and post-implantation annealing. The photodetector exhibits excellent optoelectronic performances with high spectral responsivity and external quantum efficiency. The spectral response showed a band-selective nature with a full width half maximum of ∼ 60 nm, and the responsivity reaches up to 70 A/W under 290 nm at 5 V bias. The corresponding rejection ratio to visible region was as high as 8400. The high performance of this photodetector makes it highly suitable for practical applications such as narrow-band spectrum-selective photodetectors. The device design based on ion-synthesized nanocrystals would provide a new approach for realizing a visible-blind photodetector. © 2018 IOP Publishing Ltd.

  9. Beyond grid security

    NASA Astrophysics Data System (ADS)

    Hoeft, B.; Epting, U.; Koenig, T.

    2008-07-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls.

  10. Attachment Security and Obesity in US Preschool-Aged Children

    PubMed Central

    Anderson, Sarah E.; Whitaker, Robert C.

    2011-01-01

    Objective Insecure attachment is associated with unhealthy physiologic and behavioral responses to stress, which could lead to the development of obesity. We estimated the association between children’s attachment security at 24 months of age and risk for obesity at 4.5 years of age. Design Cohort study. Setting National sample of US children born in 2001. Participants Children and mothers participating in the 2003 and 2005-2006 waves of the Early Childhood Longitudinal Study, Birth Cohort, conducted by the National Center for Education Statistics. Our analytic sample included 6650 children (76% of children assessed at both waves). Main Exposure Attachment security at 24 months was assessed by trained interviewers following observation in the child’s home. Insecure attachment was defined as lowest quartile of attachment security, based on the security score from the Toddler Attachment Sort. Outcome Measure Obesity at 4.5 years of age (sex-specific BMI ≥95th percentile for age). Results The prevalence of obesity was 23.1% in children with insecure attachment and 16.6% in those with secure attachment. For children with insecure attachment, the odds (95% confidence interval) of obesity was 1.30 (1.05, 1.62) times higher than for children with secure attachment, after controlling for the quality of mother-child interaction during play, parenting practices related to obesity, maternal body mass index, and sociodemographic characteristics. Conclusions Insecure attachment in early childhood may be a previously unrecognized risk factor for obesity. Interventions to increase children’s attachment security should also examine impacts on children’s weight. PMID:21383273

  11. Practical life log video indexing based on content and context

    NASA Astrophysics Data System (ADS)

    Tancharoen, Datchakorn; Yamasaki, Toshihiko; Aizawa, Kiyoharu

    2006-01-01

    Today, multimedia information has gained an important role in daily life and people can use imaging devices to capture their visual experiences. In this paper, we present our personal Life Log system to record personal experiences in form of wearable video and environmental data; in addition, an efficient retrieval system is demonstrated to recall the desirable media. We summarize the practical video indexing techniques based on Life Log content and context to detect talking scenes by using audio/visual cues and semantic key frames from GPS data. Voice annotation is also demonstrated as a practical indexing method. Moreover, we apply body media sensors to record continuous life style and use body media data to index the semantic key frames. In the experiments, we demonstrated various video indexing results which provided their semantic contents and showed Life Log visualizations to examine personal life effectively.

  12. Angle and Context Free Grammar Based Precarious Node Detection and Secure Data Transmission in MANETs.

    PubMed

    Veerasamy, Anitha; Madane, Srinivasa Rao; Sivakumar, K; Sivaraman, Audithan

    2016-01-01

    Growing attractiveness of Mobile Ad Hoc Networks (MANETs), its features, and usage has led to the launching of threats and attacks to bring negative consequences in the society. The typical features of MANETs, especially with dynamic topology and open wireless medium, may leave MANETs vulnerable. Trust management using uncertain reasoning scheme has previously attempted to solve this problem. However, it produces additional overhead while securing the network. Hence, a Location and Trust-based secure communication scheme (L&TS) is proposed to overcome this limitation. Since the design securing requires more than two data algorithms, the cost of the system goes up. Another mechanism proposed in this paper, Angle and Context Free Grammar (ACFG) based precarious node elimination and secure communication in MANETs, intends to secure data transmission and detect precarious nodes in a MANET at a comparatively lower cost. The Elliptic Curve function is used to isolate a malicious node, thereby incorporating secure data transfer. Simulation results show that the dynamic estimation of the metrics improves throughput by 26% in L&TS when compared to the TMUR. ACFG achieves 33% and 51% throughput increase when compared to L&TS and TMUR mechanisms, respectively.

  13. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    PubMed

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  14. A sharable cloud-based pancreaticoduodenectomy collaborative database for physicians: emphasis on security and clinical rule supporting.

    PubMed

    Yu, Hwan-Jeu; Lai, Hong-Shiee; Chen, Kuo-Hsin; Chou, Hsien-Cheng; Wu, Jin-Ming; Dorjgochoo, Sarangerel; Mendjargal, Adilsaikhan; Altangerel, Erdenebaatar; Tien, Yu-Wen; Hsueh, Chih-Wen; Lai, Feipei

    2013-08-01

    Pancreaticoduodenectomy (PD) is a major operation with high complication rate. Thereafter, patients may develop morbidity because of the complex reconstruction and loss of pancreatic parenchyma. A well-designed database is very important to address both the short-term and long-term outcomes after PD. The objective of this research was to build an international PD database implemented with security and clinical rule supporting functions, which made the data-sharing easier and improve the accuracy of data. The proposed system is a cloud-based application. To fulfill its requirements, the system comprises four subsystems: a data management subsystem, a clinical rule supporting subsystem, a short message notification subsystem, and an information security subsystem. After completing the surgery, the physicians input the data retrospectively, which are analyzed to study factors associated with post-PD common complications (delayed gastric emptying and pancreatic fistula) to validate the clinical value of this system. Currently, this database contains data from nearly 500 subjects. Five medical centers in Taiwan and two cancer centers in Mongolia are participating in this study. A data mining model of the decision tree analysis showed that elderly patients (>76 years) with pylorus-preserving PD (PPPD) have higher proportion of delayed gastric emptying. About the pancreatic fistula, the data mining model of the decision tree analysis revealed that cases with non-pancreaticogastrostomy (PG) reconstruction - body mass index (BMI)>29.65 or PG reconstruction - BMI>23.7 - non-classic PD have higher proportion of pancreatic fistula after PD. The proposed system allows medical staff to collect and store clinical data in a cloud, sharing the data with other physicians in a secure manner to achieve collaboration in research. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  15. In Internet-Based Visualization System Study about Breakthrough Applet Security Restrictions

    NASA Astrophysics Data System (ADS)

    Chen, Jie; Huang, Yan

    In the process of realization Internet-based visualization system of the protein molecules, system needs to allow users to use the system to observe the molecular structure of the local computer, that is, customers can generate the three-dimensional graphics from PDB file on the client computer. This requires Applet access to local file, related to the Applet security restrictions question. In this paper include two realization methods: 1.Use such as signature tools, key management tools and Policy Editor tools provided by the JDK to digital signature and authentication for Java Applet, breakthrough certain security restrictions in the browser. 2. Through the use of Servlet agent implement indirect access data methods, breakthrough the traditional Java Virtual Machine sandbox model restriction of Applet ability. The two ways can break through the Applet's security restrictions, but each has its own strengths.

  16. Concepts for a standard based cross-organisational information security management system in the context of a nationwide EHR.

    PubMed

    Mense, Alexander; Hoheiser-Pförtner, Franz; Schmid, Martin; Wahl, Harald

    2013-01-01

    Working with health related data necessitates appropriate levels of security and privacy. Information security, meaning ensuring confidentiality, integrity, and availability, is more organizational, than technical in nature. It includes many organizational and management measures, is based on well-defined security roles, processes, and documents, and needs permanent adaption of security policies, continuously monitoring, and measures assessment. This big challenge for any organization leads to implementation of an information security management system (ISMS). In the context of establishing a regional or national electronic health record for integrated care (ICEHR), the situation is worse. Changing the medical information exchange from on-demand peer-to-peer connections to health information networks requires all organizations participating in the EHR system to have consistent security levels and to follow the same security guidelines and rules. Also, the implementation must be monitored and audited, establishing cross-organizational information security management systems (ISMS) based on international standards. This paper evaluates requirements and defines basic concepts for an ISO 27000 series-based cross-organizational ISMS in the healthcare domain and especially for the implementation of the nationwide electronic health record in Austria (ELGA).

  17. Secure communication based on spatiotemporal chaos

    NASA Astrophysics Data System (ADS)

    Ren, Hai-Peng; Bai, Chao

    2015-08-01

    In this paper, we propose a novel approach to secure communication based on spatiotemporal chaos. At the transmitter end, the state variables of the coupled map lattice system are divided into two groups: one is used as the key to encrypt the plaintext in the N-shift encryption function, and the other is used to mix with the output of the N-shift function to further confuse the information to transmit. At the receiver end, the receiver lattices are driven by the received signal to synchronize with the transmitter lattices and an inverse procedure of the encoding is conducted to decode the information. Numerical simulation and experiment based on the TI TMS320C6713 Digital Signal Processor (DSP) show the feasibility and the validity of the proposed scheme. Project supported by the National Natural Science Foundation of China (Grant No. 61172070) and the Funds from the Science and Technology Innovation Team of Shaanxi Province, China (Grant No. 2013CKT-04).

  18. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    PubMed

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  19. Heavy drinking, impulsivity and attentional narrowing following alcohol cue exposure.

    PubMed

    Hicks, Joshua A; Fields, Sherecce; Davis, William E; Gable, Philip A

    2015-08-01

    Research shows that alcohol-related stimuli have the propensity to capture attention among individuals motivated to consume alcohol. Research has further demonstrated that impulsive individuals are especially prone to this type of attentional bias. Recently, it is suggested that alcohol cue exposure can also produce a general narrowing of attention consistent with the activation of approach motivational states. Based on previous models of addiction and recent research on the activation of approach motivational states, we predicted that impulsive individuals would demonstrate a constriction of attentional focus in response to alcohol cue exposure. Participants (n = 392) completed a task assessing attentional breadth in response to alcohol and non-alcohol cues, followed by measures of alcohol use and impulsivity. The findings revealed that impulsivity scores predicted narrowing of attentional scope following the presentation of alcohol cues for heavier drinkers but not for light drinkers. These results suggest that impulsive individuals who drink more heavily demonstrate a narrowing of attention in the presence of alcohol-related incentive cues. Implications for how these findings might account for the link between impulsivity and alcohol use and misuse are discussed.

  20. [Frail-VIG index: Design and evaluation of a new frailty index based on the Comprehensive Geriatric Assessment].

    PubMed

    Amblàs-Novellas, Jordi; Martori, Joan Carles; Molist Brunet, Núria; Oller, Ramon; Gómez-Batiste, Xavier; Espaulella Panicot, Joan

    Frailty is closely linked to health results. Frailty indexes (FI) and the Comprehensive Geriatric Assessment (CGA) are multidimensional tools. FI serve to quantitatively measure frailty levels. They have shown to have an excellent correlation with mortality. However, they are infrequently used in clinical practice. Given the need for new, more concise, and pragmatic FI, a new FI is proposed based on a CGA (Frail-VIG Index). A prospective, observational, longitudinal study was conducted, with cohort follow up at 12 months or death. Participants were patients admitted in the Geriatric Unit of the University Hospital of Vic (Barcelona, Spain) during 2014. Contrast of hypothesis log-rank for survival curves according to Frail-VIG index, and analysis of ROC curves were performed to assess prognostic capacity. A total of 590 patients were included (mean age=86.39). Mortality rate at 12 months was 46.4%. The comparative analysis showed statistically significant differences (P<.05) for almost all variables included in the Frail-VIG index. Survival curves also show significant differences (X 2 =445, P<.001) for the different Frail-VIG index scores. The area under the ROC curve at 12 months was 0.9 (0.88-0.92). An administration time of the Index is estimated at less than 10minutes. Results endorse the Frail-VIG index as a simple (as for contents), rapid (for administration time) tool, with discriminative (for situational diagnosis) and predictive capacity (high correlation with mortality). Copyright © 2016 SEGG. Publicado por Elsevier España, S.L.U. All rights reserved.

  1. The Impact of the Security Competency on "Self-Efficacy in Information Security" for Effective Health Information Security in Iran.

    PubMed

    Shahri, Ahmad Bakhtiyari; Ismail, Zuraini; Mohanna, Shahram

    2016-11-01

    The security effectiveness based on users' behaviors is becoming a top priority of Health Information System (HIS). In the first step of this study, through the review of previous studies 'Self-efficacy in Information Security' (SEIS) and 'Security Competency' (SCMP) were identified as the important factors to transforming HIS users to the first line of defense in the security. Subsequently, a conceptual model was proposed taking into mentioned factors for HIS security effectiveness. Then, this quantitative study used the structural equation modeling to examine the proposed model based on survey data collected from a sample of 263 HIS users from eight hospitals in Iran. The result shows that SEIS is one of the important factors to cultivate of good end users' behaviors toward HIS security effectiveness. However SCMP appears a feasible alternative to providing SEIS. This study also confirms the mediation effects of SEIS on the relationship between SCMP and HIS security effectiveness. The results of this research paper can be used by HIS and IT managers to implement their information security process more effectively.

  2. Potential impacts of robust surface roughness indexes on DTM-based segmentation

    NASA Astrophysics Data System (ADS)

    Trevisani, Sebastiano; Rocca, Michele

    2017-04-01

    In this study, we explore the impact of robust surface texture indexes based on MAD (median absolute differences), implemented by Trevisani and Rocca (2015), in the unsupervised morphological segmentation of an alpine basin. The area was already object of a geomorphometric analysis, consisting in the roughness-based segmentation of the landscape (Trevisani et al. 2012); the roughness indexes were calculated on a high resolution DTM derived by means of airborne Lidar using the variogram as estimator. The calculated roughness indexes have been then used for the fuzzy clustering (Odeh et al., 1992; Burrough et al., 2000) of the basin, revealing the high informative geomorphometric content of the roughness-based indexes. However, the fuzzy clustering revealed a high fuzziness and a high degree of mixing between textural classes; this was ascribed both to the morphological complexity of the basin and to the high sensitivity of variogram to non-stationarity and signal-noise. Accordingly, we explore how the new implemented roughness indexes based on MAD affect the morphological segmentation of the studied basin. References Burrough, P.A., Van Gaans, P.F.M., MacMillan, R.A., 2000. High-resolution landform classification using fuzzy k-means. Fuzzy Sets and Systems 113, 37-52. Odeh, I.O.A., McBratney, A.B., Chittleborough, D.J., 1992. Soil pattern recognition with fuzzy-c-means: application to classification and soil-landform interrelationships. Soil Sciences Society of America Journal 56, 505-516. Trevisani, S., Cavalli, M. & Marchi, L. 2012, "Surface texture analysis of a high-resolution DTM: Interpreting an alpine basin", Geomorphology, vol. 161-162, pp. 26-39. Trevisani, S. & Rocca, M. 2015, "MAD: Robust image texture analysis for applications in high resolution geomorphometry", Computers and Geosciences, vol. 81, pp. 78-92.

  3. Selection of an evaluation index for water ecological civilizations of water-shortage cities based on the grey rough set

    NASA Astrophysics Data System (ADS)

    Zhang, X. Y.; Zhu, J. W.; Xie, J. C.; Liu, J. L.; Jiang, R. G.

    2017-08-01

    According to the characteristics and existing problems of water ecological civilization of water-shortage cities, the evaluation index system of water ecological civilization was established using a grey rough set. From six aspects of water resources, water security, water environment, water ecology, water culture and water management, this study established the prime frame of the evaluation system, including 28 items, and used rough set theory to undertake optimal selection of the index system. Grey correlation theory then was used for weightings in order that the integrated evaluation index system for water ecology civilization of water-shortage cities could be constituted. Xi’an City was taken as an example, for which the results showed that 20 evaluation indexes could be obtained after optimal selection of the preliminary framework of evaluation index. The most influential indices were the water-resource category index and water environment category index. The leakage rate of the public water supply pipe network, as well as the disposal, treatment and usage rate of polluted water, urban water surface area ratio, the water quality of the main rivers, and so on also are important. It was demonstrated that the evaluation index could provide an objectively reflection of regional features and key points for the development of water ecology civilization for cities with scarce water resources. It is considered that the application example has universal applicability.

  4. Narrow-Line Seyfert 1 Galaxies

    NASA Technical Reports Server (NTRS)

    Leighly, Karen M.

    2000-01-01

    The primary work during this year has been the analysis and interpretation of our HST spectra from two extreme Narrow-line Seyfert 1 galaxies (NLS1s) Infrared Astronomy Satellite (IRAS) 13224-3809 and 1H 0707-495. This work has been presented as an invited talk at the workshop entitled "Observational and theoretical progress in the Study of Narrow-line Seyfert 1 Galaxies" held in Bad Honnef, Germany December 8-11, as a contributed talk at the January 2000 AAS meeting in Atlanta, Georgia, and as a contributed talk at the workshop "Probing the Physics of Active Galactic Nuclei by Multiwavelength Monitoring" held at Goddard Space Flight Center June 20-22, 2000.

  5. An Index of Competition Based on Relative Crown Position and Size

    Treesearch

    Dwight D. O' Neal; Allan E. Houston; Edward R. Buckner; James S. Meadows

    1995-01-01

    A new competition index, the Crown Position Index (CPI) was evaluated using a 41-year-old, well stocked, upland hardwood stand in southwestern Tennessee. CPI wss based on relative crown position and crown size as expressed by crown projections and relative heights of crop trees and their competitors. Comparisons were made among CPI, the Hegyl (1974)...

  6. Refractive Index Measurement of Fibers Through Fizeau Interferometry

    DTIC Science & Technology

    2013-08-01

    15. SUBJECT TERMS composite, transparent, refractive index, refractometry , interferometer 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...transparent fibers has long presented a significant challenge. Abbe refractometry , the typical measurement technique for bulk materials and liquids

  7. An Associative Index Model for the Results List Based on Vannevar Bush's Selection Concept

    ERIC Educational Resources Information Center

    Cole, Charles; Julien, Charles-Antoine; Leide, John E.

    2010-01-01

    Introduction: We define the results list problem in information search and suggest the "associative index model", an ad-hoc, user-derived indexing solution based on Vannevar Bush's description of an associative indexing approach for his memex machine. We further define what selection means in indexing terms with reference to Charles…

  8. 33 CFR 165.776 - Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico 165.776 Section 165.776 Navigation and Navigable Waters COAST... Guard District § 165.776 Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico (a...

  9. 33 CFR 165.776 - Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico 165.776 Section 165.776 Navigation and Navigable Waters COAST... Guard District § 165.776 Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico (a...

  10. 33 CFR 165.776 - Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico. 165.776 Section 165.776 Navigation and Navigable Waters COAST... Guard District § 165.776 Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico. (a...

  11. 33 CFR 165.776 - Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico. 165.776 Section 165.776 Navigation and Navigable Waters COAST... Guard District § 165.776 Security Zone; Coast Guard Base San Juan, San Juan Harbor, Puerto Rico. (a...

  12. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    PubMed Central

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887

  13. 2. Photocopied July 1971 from photostat Jordan Narrows Folder #1, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    2. Photocopied July 1971 from photostat Jordan Narrows Folder #1, Engineering Department, Utah Power and Light Co., Salt Lake City, Utah. JORDAN NARROWS STATION. PLAN AND SECTION. - Salt Lake City Water & Electrical Power Company, Jordan Narrows Hydroelectric Plant, Jordan River, Riverton, Salt Lake County, UT

  14. [Spatial-temporal pattern and obstacle factors of cultivated land ecological security in major grain producing areas of northeast China: a case study in Jilin Province].

    PubMed

    Zhao, Hong-Bo; Ma, Yan-Ji

    2014-02-01

    According to the cultivated land ecological security in major grain production areas of Northeast China, this paper selected 48 counties of Jilin Province as the research object. Based on the PSR-EES conceptual framework model, an evaluation index system of cultivated land ecological security was built. By using the improved TOPSIS, Markov chains, GIS spatial analysis and obstacle degree models, the spatial-temporal pattern of cultivated land ecological security and the obstacle factors were analyzed from 1995 to 2011 in Jilin Province. The results indicated that, the composite index of cultivated land ecological security appeared in a rising trend in Jilin Province from 1995 to 2011, and the cultivated land ecological security level changed from being sensitive to being general. There was a pattern of 'Club Convergence' in cultivated land ecological security level in each county and the spatial discrepancy tended to become larger. The 'Polarization' trend of cultivated land ecological security level was obvious. The distributions of sensitive level and critical security level with ribbon patterns tended to be dispersed, the general security level and relative security levels concentrated, and the distributions of security level scattered. The unstable trend of cultivated land ecological security level was more and more obvious. The main obstacle factors that affected the cultivated land ecological security level in Jilin Province were rural net income per capita, economic density, the proportion of environmental protection investment in GDP, degree of machinery cultivation and the comprehensive utilization rate of industrial solid wastes.

  15. Atomic Dynamics in Simple Liquid: de Gennes Narrowing Revisited

    DOE PAGES

    Wu, Bin; Iwashita, Takuya; Egami, Takeshi

    2018-03-27

    The de Gennes narrowing phenomenon is frequently observed by neutron or x-ray scattering measurements of the dynamics of complex systems, such as liquids, proteins, colloids, and polymers. The characteristic slowing down of dynamics in the vicinity of the maximum of the total scattering intensity is commonly attributed to enhanced cooperativity. In this Letter, we present an alternative view on its origin through the examination of the time-dependent pair correlation function, the van Hove correlation function, for a model liquid in two, three, and four dimensions. We find that the relaxation time increases monotonically with distance and the dependence on distancemore » varies with dimension. We propose a heuristic explanation of this dependence based on a simple geometrical model. Furthermore, this finding sheds new light on the interpretation of the de Gennes narrowing phenomenon and the α-relaxation time.« less

  16. Atomic Dynamics in Simple Liquid: de Gennes Narrowing Revisited

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wu, Bin; Iwashita, Takuya; Egami, Takeshi

    The de Gennes narrowing phenomenon is frequently observed by neutron or x-ray scattering measurements of the dynamics of complex systems, such as liquids, proteins, colloids, and polymers. The characteristic slowing down of dynamics in the vicinity of the maximum of the total scattering intensity is commonly attributed to enhanced cooperativity. In this Letter, we present an alternative view on its origin through the examination of the time-dependent pair correlation function, the van Hove correlation function, for a model liquid in two, three, and four dimensions. We find that the relaxation time increases monotonically with distance and the dependence on distancemore » varies with dimension. We propose a heuristic explanation of this dependence based on a simple geometrical model. Furthermore, this finding sheds new light on the interpretation of the de Gennes narrowing phenomenon and the α-relaxation time.« less

  17. Ultra-narrow pulse generator with precision-adjustable pulse width

    NASA Astrophysics Data System (ADS)

    Fu, Zaiming; Liu, Hanglin

    2018-05-01

    In this paper, a novel ultra-narrow pulse generation approach is proposed. It is based on the decomposition and synthesis of pulse edges. Through controlling their relative delay, an ultra-narrow pulse could be generated. By employing field programmable gate array digital synthesis technology, the implemented pulse generator is with programmable ability. The amplitude of pulse signals is controlled by the radio frequency amplifiers and bias tees, and high precision can be achieved. More importantly, the proposed approach can break through the limitation of device's propagation delay and optimize the resolution and the accuracy of the pulse width significantly. The implemented pulse generator has two channels, whose minimum pulse width, frequency range, and amplitude range are 100 ps, 15 MHz-1.5 GHz, and 0.1 Vpp-1.8 Vpp, respectively. Both resolution of pulse width and channel delay are 1 ps, and amplitude resolution is 10 mVpp.

  18. Large scale integration of CVD-graphene based NEMS with narrow distribution of resonance parameters

    NASA Astrophysics Data System (ADS)

    Arjmandi-Tash, Hadi; Allain, Adrien; (Vitto Han, Zheng; Bouchiat, Vincent

    2017-06-01

    We present a novel method for the fabrication of the arrays of suspended micron-sized membranes, based on monolayer pulsed-CVD graphene. Such devices are the source of an efficient integration of graphene nano-electro-mechanical resonators, compatible with production at the wafer scale using standard photolithography and processing tools. As the graphene surface is continuously protected by the same polymer layer during the whole process, suspended graphene membranes are clean and free of imperfections such as deposits, wrinkles and tears. Batch fabrication of 100 μm-long multi-connected suspended ribbons is presented. At room temperature, mechanical resonance of electrostatically-actuated devices show narrow distribution of their characteristic parameters with high quality factor and low effective mass and resonance frequencies, as expected for low stress and adsorbate-free membranes. Upon cooling, a sharp increase of both resonant frequency and quality factor is observed, enabling to extract the thermal expansion coefficient of CVD graphene. Comparison with state-of-the-art graphene NEMS is presented.

  19. Ultra narrow flat-top filter based on multiple equivalent phase shifts

    NASA Astrophysics Data System (ADS)

    Wang, Fei; Zou, Xihua; Yin, Zuowei; Chen, Xiangfei; Shen, Haisong

    2008-11-01

    Instead of real phase shifts, equivalent phase shifts (EPS) are adopted to construct ultra narrow phase-shifted band-pass filer in sampled Bragg gratings (SBG). Two optimized distributions of multiple equivalent phase shifts, using 2 and 5 EPSs respectively, are given in this paper to realize flat-top and ripple-free transmission characteristics simultaneously. Also two demonstrations with 5 EPSs both on hydrogen-loaded and photosensitive fibers are presented and their spectrums are examined by an optical vector analyzer (OVA). Given only ordinary phase mask and sub-micrometer precision control, ultra-narrowband flat-top filters with expected performance can be achieved flexibly and cost-effectively.

  20. 76 FR 2287 - Security-Based Swap Data Repository Registration, Duties, and Core Principles; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-13

    ... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 240 and 249 [Release No. 34-63347; File No. S7-35-10] RIN 3235-AK79 Security-Based Swap Data Repository Registration, Duties, and Core Principles; Correction Correction In proposed rule document C1-2010-29719 beginning on page 79320 in the issue of...

  1. Broad- versus Narrow-Spectrum Oral Antibiotic Transition and Outcomes in Health Care-associated Pneumonia.

    PubMed

    Buckel, Whitney R; Stenehjem, Edward; Sorensen, Jeff; Dean, Nathan; Webb, Brandon

    2017-02-01

    Guidelines recommend a switch from intravenous to oral antibiotics once patients who are hospitalized with pneumonia achieve clinical stability. However, little evidence guides the selection of an oral antibiotic for patients with health care-associated pneumonia, especially where no microbiological diagnosis is made. To compare outcomes between patients who were transitioned to broad- versus narrow-spectrum oral antibiotics after initially receiving broad-spectrum intravenous antibiotic coverage. We performed a secondary analysis of an existing database of adults with community-onset pneumonia admitted to seven Utah hospitals. We identified 220 inpatients with microbiology-negative health care-associated pneumonia from 2010 to 2012. After excluding inpatient deaths and treatment failures, 173 patients remained in which broad-spectrum intravenous antibiotics were transitioned to an oral regimen. We classified oral regimens as broad-spectrum (fluoroquinolone) versus narrow-spectrum (usually a β-lactam). We compared demographic and clinical characteristics between groups. Using a multivariable regression model, we adjusted outcomes by severity (electronically calculated CURB-65), comorbidity (Charlson Index), time to clinical stability, and length of intravenous therapy. Age, severity, comorbidity, length of intravenous therapy, and clinical response were similar between the two groups. Observed 30-day readmission (11.9 vs. 21.4%; P = 0.26) and 30-day all-cause mortality (2.3 vs. 5.3%; P = 0.68) were also similar between the narrow and broad oral antibiotic groups. In multivariable analysis, we found no statistically significant differences for adjusted odds of 30-day readmission (adjusted odds ratio, 0.56; 95% confidence interval, 0.06-5.2; P = 0.61) or 30-day all-cause mortality (adjusted odds ratio, 0.55; 95% confidence interval, 0.19-1.6; P = 0.26) between narrow and broad oral antibiotic groups. On the basis of analysis of a limited number of patients

  2. 33 CFR 165.1102 - Security Zone; Naval Base Point Loma; San Diego Bay, San Diego, CA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Loma; San Diego Bay, San Diego, CA. 165.1102 Section 165.1102 Navigation and Navigable Waters COAST... Guard District § 165.1102 Security Zone; Naval Base Point Loma; San Diego Bay, San Diego, CA. (a) Location. The following area is a security zone: The water adjacent to the Naval Base Point Loma, San Diego...

  3. 33 CFR 165.1102 - Security Zone; Naval Base Point Loma; San Diego Bay, San Diego, CA.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Loma; San Diego Bay, San Diego, CA. 165.1102 Section 165.1102 Navigation and Navigable Waters COAST... Guard District § 165.1102 Security Zone; Naval Base Point Loma; San Diego Bay, San Diego, CA. (a) Location. The following area is a security zone: The water adjacent to the Naval Base Point Loma, San Diego...

  4. 33 CFR 165.1102 - Security Zone; Naval Base Point Loma; San Diego Bay, San Diego, CA.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Loma; San Diego Bay, San Diego, CA. 165.1102 Section 165.1102 Navigation and Navigable Waters COAST... Guard District § 165.1102 Security Zone; Naval Base Point Loma; San Diego Bay, San Diego, CA. (a) Location. The following area is a security zone: The water adjacent to the Naval Base Point Loma, San Diego...

  5. Resting-State Seed-Based Analysis: An Alternative to Task-Based Language fMRI and Its Laterality Index.

    PubMed

    Smitha, K A; Arun, K M; Rajesh, P G; Thomas, B; Kesavadas, C

    2017-06-01

    Language is a cardinal function that makes human unique. Preservation of language function poses a great challenge for surgeons during resection. The aim of the study was to assess the efficacy of resting-state fMRI in the lateralization of language function in healthy subjects to permit its further testing in patients who are unable to perform task-based fMRI. Eighteen healthy right-handed volunteers were prospectively evaluated with resting-state fMRI and task-based fMRI to assess language networks. The laterality indices of Broca and Wernicke areas were calculated by using task-based fMRI via a voxel-value approach. We adopted seed-based resting-state fMRI connectivity analysis together with parameters such as amplitude of low-frequency fluctuation and fractional amplitude of low-frequency fluctuation (fALFF). Resting-state fMRI connectivity maps for language networks were obtained from Broca and Wernicke areas in both hemispheres. We performed correlation analysis between the laterality index and the z scores of functional connectivity, amplitude of low-frequency fluctuation, and fALFF. Pearson correlation analysis between signals obtained from the z score of fALFF and the laterality index yielded a correlation coefficient of 0.849 ( P < .05). Regression analysis of the fALFF with the laterality index yielded an R 2 value of 0.721, indicating that 72.1% of the variance in the laterality index of task-based fMRI could be predicted from the fALFF of resting-state fMRI. The present study demonstrates that fALFF can be used as an alternative to task-based fMRI for assessing language laterality. There was a strong positive correlation between the fALFF of the Broca area of resting-state fMRI with the laterality index of task-based fMRI. Furthermore, we demonstrated the efficacy of fALFF for predicting the laterality of task-based fMRI. © 2017 by American Journal of Neuroradiology.

  6. Low-loss curved subwavelength grating waveguide based on index engineering

    NASA Astrophysics Data System (ADS)

    Wang, Zheng; Xu, Xiaochuan; Fan, D. L.; Wang, Yaoguo; Chen, Ray T.

    2016-03-01

    Subwavelength grating (SWG) waveguide is an intriguing alternative to conventional optical waveguides due to its freedom to tune a few important waveguide properties such as dispersion and refractive index. Devices based on SWG waveguide have demonstrated impressive performances compared to those of conventional waveguides. However, the large loss of SWG waveguide bends jeopardizes their applications in integrated photonics circuits. In this work, we propose that a predistorted refractive index distribution in SWG waveguide bends can effectively decrease the mode mismatch noise and radiation loss simultaneously, and thus significantly reduce the bend loss. Here, we achieved the pre-distortion refractive index distribution by using trapezoidal silicon pillars. This geometry tuning approach is numerically optimized and experimentally demonstrated. The average insertion loss of a 5 μm SWG waveguide bend can be reduced drastically from 5.58 dB to 1.37 dB per 90° bend for quasi-TE polarization. In the future, the proposed approach can be readily adopted to enhance performance of an array of SWG waveguide-based photonics devices.

  7. An enhanced narrow-band imaging method for the microvessel detection

    NASA Astrophysics Data System (ADS)

    Yu, Feng; Song, Enmin; Liu, Hong; Wan, Youming; Zhu, Jun; Hung, Chih-Cheng

    2018-02-01

    A medical endoscope system combined with the narrow-band imaging (NBI), has been shown to be a superior diagnostic tool for early cancer detection. The NBI can reveal the morphologic changes of microvessels in the superficial cancer. In order to improve the conspicuousness of microvessel texture, we propose an enhanced NBI method to improve the conspicuousness of endoscopic images. To obtain the more conspicuous narrow-band images, we use the edge operator to extract the edge information of the narrow-band blue and green images, and give a weight to the extracted edges. Then, the weighted edges are fused with the narrow-band blue and green images. Finally, the displayed endoscopic images are reconstructed with the enhanced narrow-band images. In addition, we evaluate the performance of enhanced narrow-band images with different edge operators. Experimental results indicate that the Sobel and Canny operators achieve the best performance of all. Compared with traditional NBI method of Olympus company, our proposed method has more conspicuous texture of microvessel.

  8. Novel fiber-based technique for inspection of holes in narrow-bore tubes

    NASA Astrophysics Data System (ADS)

    Bernard, Fabien; Flaherty, Tony; O'Connor, Gerard M.

    2009-06-01

    Optical tools offer a route to increasing throughput and efficiency in industrial inspection operations, one of the most time-consuming and labour-intensive aspects of modern manufacturing. One prominent example in the medical device industry is inspection of drilled holes, particularly in narrow-bore tubes (precision-flow devices, such as catheters for drug delivery, radio-opaque contrast agents, etc). The products in which these holes feature are increasing in complexity (reduced dimensions, increasing number of drilled features- in some products now reaching into the hundreds). These trends present a number of technical challenges, not least to ensure that holes are completed and that no damage to the part occurs as a result of over-drilling, for example. This paper will present a novel sensor based on back-side illumination of the drilled hole using side-glowing optical fibers to detect, qualify and quantify drilled holes. The concept is based on inserting a laser-coupled side-glowing optical fiber into the lumen of the tube to be drilled, and imaging the light emitted from this fiber through a drilled hole using a vision system mounted external to the tube. The light from the fiber allows rapid determination of hole completion, shape and size, as well as quantity in the case of products with multiple holes. If the fiber is mounted in the tube prior to drilling, the light emitted from the fiber can be used as a real-time hole breakthrough sensor, preventing under or overdrilling of the tube.

  9. 78 FR 62867 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of a...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-22

    ... sales by customers in a narrow set of instances, such as when an issuer has made a tender offer for the... municipal securities transaction, to disclose to its customer, at or prior to the time of trade, all... Prepay Principal (March 19, 1991), Notice Concerning Disclosure of Call Information to Customers of...

  10. 76 FR 27677 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-12

    ...] Index and other specified exchange traded products.\\5\\ \\3\\ See ISE Rule 2100(c)(13). \\4\\ See Securities... that this threshold differentiation is appropriate because lower priced securities tend to be more...

  11. Acquisition and visualization techniques for narrow spectral color imaging.

    PubMed

    Neumann, László; García, Rafael; Basa, János; Hegedüs, Ramón

    2013-06-01

    This paper introduces a new approach in narrow-band imaging (NBI). Existing NBI techniques generate images by selecting discrete bands over the full visible spectrum or an even wider spectral range. In contrast, here we perform the sampling with filters covering a tight spectral window. This image acquisition method, named narrow spectral imaging, can be particularly useful when optical information is only available within a narrow spectral window, such as in the case of deep-water transmittance, which constitutes the principal motivation of this work. In this study we demonstrate the potential of the proposed photographic technique on nonunderwater scenes recorded under controlled conditions. To this end three multilayer narrow bandpass filters were employed, which transmit at 440, 456, and 470 nm bluish wavelengths, respectively. Since the differences among the images captured in such a narrow spectral window can be extremely small, both image acquisition and visualization require a novel approach. First, high-bit-depth images were acquired with multilayer narrow-band filters either placed in front of the illumination or mounted on the camera lens. Second, a color-mapping method is proposed, using which the input data can be transformed onto the entire display color gamut with a continuous and perceptually nearly uniform mapping, while ensuring optimally high information content for human perception.

  12. Tunable and switchable dual-wavelength single polarization narrow linewidth SLM erbium-doped fiber laser based on a PM-CMFBG filter.

    PubMed

    Yin, Bin; Feng, Suchun; Liu, Zhibo; Bai, Yunlong; Jian, Shuisheng

    2014-09-22

    A tunable and switchable dual-wavelength single polarization narrow linewidth single-longitudinal-mode (SLM) erbium-doped fiber (EDF) ring laser based on polarization-maintaining chirped moiré fiber Bragg grating (PM-CMFBG) filter is proposed and demonstrated. For the first time as we know, the CMFBG inscribed on the PM fiber is applied for the wavelength-tunable and-switchable dual-wavelength laser. The PM-CMFBG filter with ultra-narrow transmission band (0.1 pm) and a uniform polarization-maintaining fiber Bragg grating (PM-FBG) are used to select the laser longitudinal mode. The stable single polarization SLM operation is guaranteed by the PM-CMFBG filter and polarization controller. A tuning range of about 0.25 nm with about 0.075 nm step is achieved by stretching the uniform PM-FBG. Meanwhile, the linewidth of the fiber laser for each wavelength is approximate 6.5 and 7.1 kHz with a 20 dB linewidth, which indicates the laser linewidth is approximate 325 Hz and 355 Hz FWHM.

  13. Enviromental Assessment: Security Forces Regional Training Center at Little Rock Air Force Base Arkansas

    DTIC Science & Technology

    2004-07-14

    stream valleys in the northwest and southwest corners of the base. Long, narrow ridges, oriented from east to west, typify the region to the north of...found in the grassy areas on base were limited to the three-toed box turtle (Terrapene carolina triunguis) and Fowler’s toad (Bufo woodhousei fowleri...other tribes as “Ugaxpa,” or “downstream people.” They settled four villages at the mouth of the Arkansas River where they remained until they were

  14. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs

    PubMed Central

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-01-01

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme. PMID:28338620

  15. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs.

    PubMed

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-03-24

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme.

  16. An Evaluation Methodology for the Usability and Security of Cloud-based File Sharing Technologies

    DTIC Science & Technology

    2012-09-01

    FISMA, ISO 27001 , FIPS 140-2, and ISO 270001) indicate a cloud-based service’s compliance with industry standard security controls, management and...Information Assurance IEEE Institute of Electrical and Electronics Engineers IT Information Technology ITS Insider Threat Study ISO International...effectively, efficiently and with satisfaction” (International Organization for Standardization [ ISO ], 1998). Alternately, information security

  17. Parental history of hypertension is associated with narrower retinal arteriolar caliber in young girls.

    PubMed

    Gopinath, Bamini; Baur, Louise A; Hardy, Louise L; Wang, Jie Jin; Teber, Erdahl; Wong, Tien Y; Mitchell, Paul

    2011-09-01

    We aimed to assess the associations between parental history of hypertension and indicators of cardiovascular risk (retinal vessel diameter, presence of obesity, and elevated blood pressure) in prepubertal children. There were 1739 (77.7% of those eligible) 6-year-old students (863 girls and 876 boys) who were examined from a random cluster sample of 34 Sydney schools. Parents completed questionnaires about their medical conditions, including whether they have/had hypertension. Retinal images were taken with a digital fundus camera, and retinal vessel caliber was quantified using computer software. Anthropometric (height, weight, percentage of body fat, and body mass index) and blood pressure measures were collected. There were 160 children (9.2%) with a positive parental history of hypertension (either biological mother and/or father). Children with a positive versus negative parental history of hypertension had significantly higher body mass index (16.8 versus 16.5 kg/m(2); P=0.04) and systolic blood pressure (101.3 versus 99.8 mm Hg; P=0.01). Girls with positive versus negative parental history of hypertension had significantly higher diastolic blood pressure (≈3.1 mm Hg; P=0.01) and narrower retinal arteriolar caliber (≈4.3 μm; P=0.0004). Positive parental history of hypertension was not associated with mean retinal vascular caliber among boys. We show that a positive parental history of hypertension in healthy prepubertal girls, but not boys, is associated with narrower retinal arteriolar vessels, likely conveying a predisposition to develop hypertension later in life. These findings may indicate the need for cardiovascular disease prevention measures starting early in life among offspring of hypertensive parents.

  18. Comparison of Ground-Based and Satellite-Derived Solar UV Index Levels at Six South African Sites.

    PubMed

    Cadet, Jean-Maurice; Bencherif, Hassan; Portafaix, Thierry; Lamy, Kévin; Ncongwane, Katlego; Coetzee, Gerrie J R; Wright, Caradee Y

    2017-11-14

    South Africa has been measuring the ground-based solar UV index for more than two decades at six sites to raise awareness about the impacts of the solar UV index on human health. This paper is an exploratory study based on comparison with satellite UV index measurements from the OMI/AURA experiment. Relative UV index differences between ground-based and satellite-derived data ranged from 0 to 45% depending on the site and year. Most of time, these differences appear in winter. Some ground-based stations' data had closer agreement with satellite-derived data. While the ground-based instruments are not intended for long-term trend analysis, they provide UV index information for public awareness instead, with some weak signs suggesting such long-term trends may exist in the ground-based data. The annual cycle, altitude, and latitude effects clearly appear in the UV index data measured in South Africa. This variability must be taken into account for the development of an excess solar UV exposure prevention strategy.

  19. Comparison of Ground-Based and Satellite-Derived Solar UV Index Levels at Six South African Sites

    PubMed Central

    Cadet, Jean-Maurice; Bencherif, Hassan; Portafaix, Thierry; Lamy, Kévin; Ncongwane, Katlego; Coetzee, Gerrie J. R.; Wright, Caradee Y.

    2017-01-01

    South Africa has been measuring the ground-based solar UV index for more than two decades at six sites to raise awareness about the impacts of the solar UV index on human health. This paper is an exploratory study based on comparison with satellite UV index measurements from the OMI/AURA experiment. Relative UV index differences between ground-based and satellite-derived data ranged from 0 to 45% depending on the site and year. Most of time, these differences appear in winter. Some ground-based stations’ data had closer agreement with satellite-derived data. While the ground-based instruments are not intended for long-term trend analysis, they provide UV index information for public awareness instead, with some weak signs suggesting such long-term trends may exist in the ground-based data. The annual cycle, altitude, and latitude effects clearly appear in the UV index data measured in South Africa. This variability must be taken into account for the development of an excess solar UV exposure prevention strategy. PMID:29135965

  20. Plasmonically enhanced electromotive force of narrow bandgap PbS QD-based photovoltaics.

    PubMed

    Li, Xiaowei; McNaughter, Paul D; O'Brien, Paul; Minamimoto, Hiro; Murakoshi, Kei

    2018-05-30

    Electromotive force of photovoltaics is a key to define the output power density of photovoltaics. Multiple exciton generation (MEG) exhibited by semiconductor quantum dots (QDs) has great potential to enhance photovoltaic performance owing to the ability to generate more than one electron-hole pairs when absorbing a single photon. However, even in MEG-based photovoltaics, limitation of modifying the electromotive force exists due to the intrinsic electrochemical potential of the conduction band-edges of QDs. Here we report a pronouncedly improved photovoltaic performance by constructing a PbS QD-sensitized electrode that comprises plasmon-active Au nanoparticles embedded in a titanium dioxide thin film. Significant enhancement on electromotive force is characterized by the onset potential of photocurrent generation using MEG-effective PbS QDs with a narrow bandgap energy (Eg = 0.9 eV). By coupling with localized surface plasmon resonance (LSPR), such QDs exhibit improved photoresponses and the highest output power density over the other QDs with larger bandgap energies (Eg = 1.1 and 1.7 eV) under visible light irradiation. The wavelength-dependent onset potential and the output power density suggest effective electron injection owing to the enhanced density of electrons excited by energy overlapping between MEG and LSPR.