Sample records for rsa public key

  1. RSA-Based Password-Authenticated Key Exchange, Revisited

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.

  2. Proof Checking the RSA (Rivest, Shamir and Adleman) Public Key Encryption Algorithm.

    DTIC Science & Technology

    1982-09-01

    Pt- R136 626 PROOF CHECKING THE RSA (RIVEST SNAMIR AND ADLENRN) 1/i PUBLIC KEY ENCRYPTION.. (U) TEXAS UNIV AT AUSTIN INST FOR COMPUTING SCIENCE AND...Austin, Texas 78712 Ir t1 CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE - Software Systems Science Office of Naval Research September. 1982...properties are proved in [11. The third property is not proved; instead the authors of [li) argue that "all the obvious approaches to breaking our system are

  3. Modified Multi Prime RSA Cryptosystem

    NASA Astrophysics Data System (ADS)

    Ghazali Kamardan, M.; Aminudin, N.; Che-Him, Norziha; Sufahani, Suliadi; Khalid, Kamil; Roslan, Rozaini

    2018-04-01

    RSA [1] is one of the mostly used cryptosystem in securing data and information. Though, it has been recently discovered that RSA has some weaknesses and in advance technology, RSA is believed to be inefficient especially when it comes to decryption. Thus, a new algorithm called Multi prime RSA, an extended version of the standard RSA is studied. Then, a modification is made to the Multi prime RSA where another keys is shared secretly between the receiver and the sender to increase the securerity. As in RSA, the methodology used for modified Multi-prime RSA also consists of three phases; 1. Key Generation in which the secret and public keys are generated and published. In this phase, the secrecy is improved by adding more prime numbers and addition of secret keys. 2. Encryption of the message using the public and secret keys given. 3. Decryption of the secret message using the secret key generated. For the decryption phase, a method called Chinese Remainder Theorem is used which helps to fasten the computation. Since Multi prime RSA use more than two prime numbers, the algorithm is more efficient and secure when compared to the standard RSA. Furthermore, in modified Multi prime RSA another secret key is introduced to increase the obstacle to the attacker. Therefore, it is strongly believed that this new algorithm is better and can be an alternative to the RSA.

  4. Distributed Factorization Computation on Multiple Volunteered Mobile Resource to Break RSA Key

    NASA Astrophysics Data System (ADS)

    Jaya, I.; Hardi, S. M.; Tarigan, J. T.; Zamzami, E. M.; Sihombing, P.

    2017-01-01

    Similar to common asymmeric encryption, RSA can be cracked by usmg a series mathematical calculation. The private key used to decrypt the massage can be computed using the public key. However, finding the private key may require a massive amount of calculation. In this paper, we propose a method to perform a distributed computing to calculate RSA’s private key. The proposed method uses multiple volunteered mobile devices to contribute during the calculation process. Our objective is to demonstrate how the use of volunteered computing on mobile devices may be a feasible option to reduce the time required to break a weak RSA encryption and observe the behavior and running time of the application on mobile devices.

  5. Public-key encryption with chaos.

    PubMed

    Kocarev, Ljupco; Sterjev, Marjan; Fekete, Attila; Vattay, Gabor

    2004-12-01

    We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest-Shamir-Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.

  6. Public-key encryption with chaos

    NASA Astrophysics Data System (ADS)

    Kocarev, Ljupco; Sterjev, Marjan; Fekete, Attila; Vattay, Gabor

    2004-12-01

    We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest-Shamir-Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.

  7. Simple Backdoors on RSA Modulus by Using RSA Vulnerability

    NASA Astrophysics Data System (ADS)

    Sun, Hung-Min; Wu, Mu-En; Yang, Cheng-Ta

    This investigation proposes two methods for embedding backdoors in the RSA modulus N=pq rather than in the public exponent e. This strategy not only permits manufacturers to embed backdoors in an RSA system, but also allows users to choose any desired public exponent, such as e=216+1, to ensure efficient encryption. This work utilizes lattice attack and exhaustive attack to embed backdoors in two proposed methods, called RSASBLT and RSASBES, respectively. Both approaches involve straightforward steps, making their running time roughly the same as that of normal RSA key-generation time, implying that no one can detect the backdoor by observing time imparity.

  8. Public Key Cryptography.

    ERIC Educational Resources Information Center

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  9. RSA Key Development Using Fingerprint Image on Text Message

    NASA Astrophysics Data System (ADS)

    Rahman, Sayuti; Triana, Indah; Khairani, Sumi; Yasir, Amru; Sundari, Siti

    2017-12-01

    Along with the development of technology today, humans are very facilitated in accessing information and Communicate with various media, including through the Internet network . Messages are sent by media such as text are not necessarily guaranteed security. it is often found someone that wants to send a secret message to the recipient, but the messages can be known by irresponsible people. So the sender feels dissappointed because the secret message that should be known only to the recipient only becomes known by the irresponsible people . It is necessary to do security the message by using the RSA algorithm, Using fingerprint image to generate RSA key.This is a solution to enrich the security of a message,it is needed to process images firstly before generating RSA keys with feature extraction.

  10. Distributed generation of shared RSA keys in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  11. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  12. Short-Exponent RSA

    NASA Astrophysics Data System (ADS)

    Sun, Hung-Min; Yang, Cheng-Ta; Wu, Mu-En

    In some applications, a short private exponent d is chosen to improve the decryption or signing process for RSA public key cryptosystem. However, in a typical RSA, if the private exponent d is selected first, the public exponent e should be of the same order of magnitude as φ(N). Sun et al. devised three RSA variants using unbalanced prime factors p and q to lower the computational cost. Unfortunately, Durfee & Nguyen broke the illustrated instances of the first and third variants by solving small roots to trivariate modular polynomial equations. They also indicated that the instances with unbalanced primes p and q are more insecure than the instances with balanced p and q. This investigation focuses on designing a new RSA variant with balanced p and q, and short exponents d and e, to improve the security of an RSA variant against the Durfee & Nguyen's attack, and the other existing attacks. Furthermore, the proposed variant (Scheme A) is also extended to another RSA variant (Scheme B) in which p and q are balanced, and a trade-off between the lengths of d and e is enable. In addition, we provide the security analysis and feasibility analysis of the proposed schemes.

  13. Information hiding based on double random-phase encoding and public-key cryptography.

    PubMed

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-02

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  14. RSA and its Correctness through Modular Arithmetic

    NASA Astrophysics Data System (ADS)

    Meelu, Punita; Malik, Sitender

    2010-11-01

    To ensure the security to the applications of business, the business sectors use Public Key Cryptographic Systems (PKCS). An RSA system generally belongs to the category of PKCS for both encryption and authentication. This paper describes an introduction to RSA through encryption and decryption schemes, mathematical background which includes theorems to combine modular equations and correctness of RSA. In short, this paper explains some of the maths concepts that RSA is based on, and then provides a complete proof that RSA works correctly. We can proof the correctness of RSA through combined process of encryption and decryption based on the Chinese Remainder Theorem (CRT) and Euler theorem. However, there is no mathematical proof that RSA is secure, everyone takes that on trust!.

  15. RSA cryptography and multi prime RSA cryptography

    NASA Astrophysics Data System (ADS)

    Sani, Nur Atiqah Abdul; Kamarulhaili, Hailiza

    2017-08-01

    RSA cryptography is one of the most powerful and popular cryptosystem which is being applied until now. There is one variant of RSA cryptography named Multi Prime RSA (MPRSA) cryptography. MPRSA cryptography is the improved version of RSA cryptography. We only need to modify a few steps in key generation part and apply the Chinese Remainder Theorem (CRT) in the decryption part to get the MPRSA algorithm. The focus of this research is to compare between the standard RSA cryptography and MPRSA cryptography in a few aspects. The research shows that MPRSA cryptography is more efficient than the RSA cryptography. Time complexity using Mathematica software is also conducted and it is proven that MPRSA cryptography has shorter time taken. It also implies the computational time is less than RSA cryptography. Mathematica software version 9.0 and a laptop HP ProBook 4331s are used to check the timing and to implement both algorithms.

  16. Hybrid cryptosystem RSA - CRT optimization and VMPC

    NASA Astrophysics Data System (ADS)

    Rahmadani, R.; Mawengkang, H.; Sutarman

    2018-03-01

    Hybrid cryptosystem combines symmetric algorithms and asymmetric algorithms. This combination utilizes speeds on encryption/decryption processes of symmetric algorithms and asymmetric algorithms to secure symmetric keys. In this paper we propose hybrid cryptosystem that combine symmetric algorithms VMPC and asymmetric algorithms RSA - CRT optimization. RSA - CRT optimization speeds up the decryption process by obtaining plaintext with dp and p key only, so there is no need to perform CRT processes. The VMPC algorithm is more efficient in software implementation and reduces known weaknesses in RC4 key generation. The results show hybrid cryptosystem RSA - CRT optimization and VMPC is faster than hybrid cryptosystem RSA - VMPC and hybrid cryptosystem RSA - CRT - VMPC. Keyword : Cryptography, RSA, RSA - CRT, VMPC, Hybrid Cryptosystem.

  17. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  18. Key management of the double random-phase-encoding method using public-key encryption

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  19. Implementation of Rivest Shamir Adleman Algorithm (RSA) and Vigenere Cipher In Web Based Information System

    NASA Astrophysics Data System (ADS)

    Aryanti, Aryanti; Mekongga, Ikhthison

    2018-02-01

    Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the cryptography algorithm Rivest, Shamir Adleman (RSA) and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA) and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf. This application includes the process of encryption and decryption of data, which is created by using PHP software and my SQL. Data encryption is done on the transmit side through RSA cryptographic calculations using the public key, then proceed with Vigenere Cipher algorithm which also uses public key. As for the stage of the decryption side received by using the Vigenere Cipher algorithm still use public key and then the RSA cryptographic algorithm using a private key. Test results show that the system can encrypt files, decrypt files and transmit files. Tests performed on the process of encryption and decryption of files with different file sizes, file size affects the process of encryption and decryption. The larger the file size the longer the process of encryption and decryption.

  20. Deducing trapdoor primitives in public key encryption schemes

    NASA Astrophysics Data System (ADS)

    Pandey, Chandra

    2005-03-01

    Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.

  1. The Combination of RSA And Block Chiper Algorithms To Maintain Message Authentication

    NASA Astrophysics Data System (ADS)

    Yanti Tarigan, Sepri; Sartika Ginting, Dewi; Lumban Gaol, Melva; Lorensi Sitompul, Kristin

    2017-12-01

    RSA algorithm is public key algorithm using prime number and even still used today. The strength of this algorithm lies in the exponential process, and the factorial number into 2 prime numbers which until now difficult to do factoring. The RSA scheme itself adopts the block cipher scheme, where prior to encryption, the existing plaintext is divide in several block of the same length, where the plaintext and ciphertext are integers between 1 to n, where n is typically 1024 bit, and the block length itself is smaller or equal to log(n)+1 with base 2. With the combination of RSA algorithm and block chiper it is expected that the authentication of plaintext is secure. The secured message will be encrypted with RSA algorithm first and will be encrypted again using block chiper. And conversely, the chipertext will be decrypted with the block chiper first and decrypted again with the RSA algorithm. This paper suggests a combination of RSA algorithms and block chiper to secure data.

  2. Security of Color Image Data Designed by Public-Key Cryptosystem Associated with 2D-DWT

    NASA Astrophysics Data System (ADS)

    Mishra, D. C.; Sharma, R. K.; Kumar, Manish; Kumar, Kuldeep

    2014-08-01

    In present times the security of image data is a major issue. So, we have proposed a novel technique for security of color image data by public-key cryptosystem or asymmetric cryptosystem. In this technique, we have developed security of color image data using RSA (Rivest-Shamir-Adleman) cryptosystem with two-dimensional discrete wavelet transform (2D-DWT). Earlier proposed schemes for security of color images designed on the basis of keys, but this approach provides security of color images with the help of keys and correct arrangement of RSA parameters. If the attacker knows about exact keys, but has no information of exact arrangement of RSA parameters, then the original information cannot be recovered from the encrypted data. Computer simulation based on standard example is critically examining the behavior of the proposed technique. Security analysis and a detailed comparison between earlier developed schemes for security of color images and proposed technique are also mentioned for the robustness of the cryptosystem.

  3. Image encryption based on nonlinear encryption system and public-key cryptography

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Chi, Yingying

    2015-03-01

    Recently, optical asymmetric cryptosystem (OACS) has became the focus of discussion and concern of researchers. Some researchers pointed out that OACS was not tenable because of misunderstanding the concept of asymmetric cryptosystem (ACS). We propose an improved cryptosystem using RSA public-key algorithm based on existing OACS and the new system conforms to the basic agreement of public key cryptosystem. At the beginning of the encryption process, the system will produce an independent phase matrix and allocate the input image, which also conforms to one-time pad cryptosystem. The simulation results show that the validity of the improved cryptosystem and the high robustness against attack scheme using phase retrieval technique.

  4. Virtual-optical information security system based on public key infrastructure

    NASA Astrophysics Data System (ADS)

    Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben

    2005-01-01

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

  5. Range Scheduling Aid (RSA)

    NASA Technical Reports Server (NTRS)

    Logan, J. R.; Pulvermacher, M. K.

    1991-01-01

    Range Scheduling Aid (RSA) is presented in the form of the viewgraphs. The following subject areas are covered: satellite control network; current and new approaches to range scheduling; MITRE tasking; RSA features; RSA display; constraint based analytic capability; RSA architecture; and RSA benefits.

  6. Application Mail Tracking Using RSA Algorithm As Security Data and HOT-Fit a Model for Evaluation System

    NASA Astrophysics Data System (ADS)

    Permadi, Ginanjar Setyo; Adi, Kusworo; Gernowo, Rahmad

    2018-02-01

    RSA algorithm give security in the process of the sending of messages or data by using 2 key, namely private key and public key .In this research to ensure and assess directly systems are made have meet goals or desire using a comprehensive evaluation methods HOT-Fit system .The purpose of this research is to build a information system sending mail by applying methods of security RSA algorithm and to evaluate in uses the method HOT-Fit to produce a system corresponding in the faculty physics. Security RSA algorithm located at the difficulty of factoring number of large coiled factors prima, the results of the prime factors has to be done to obtain private key. HOT-Fit has three aspects assessment, in the aspect of technology judging from the system status, the quality of system and quality of service. In the aspect of human judging from the use of systems and satisfaction users while in the aspect of organization judging from the structure and environment. The results of give a tracking system sending message based on the evaluation acquired.

  7. On factoring RSA modulus using random-restart hill-climbing algorithm and Pollard’s rho algorithm

    NASA Astrophysics Data System (ADS)

    Budiman, M. A.; Rachmawati, D.

    2017-12-01

    The security of the widely-used RSA public key cryptography algorithm depends on the difficulty of factoring a big integer into two large prime numbers. For many years, the integer factorization problem has been intensively and extensively studied in the field of number theory. As a result, a lot of deterministic algorithms such as Euler’s algorithm, Kraitchik’s, and variants of Pollard’s algorithms have been researched comprehensively. Our study takes a rather uncommon approach: rather than making use of intensive number theories, we attempt to factorize RSA modulus n by using random-restart hill-climbing algorithm, which belongs the class of metaheuristic algorithms. The factorization time of RSA moduli with different lengths is recorded and compared with the factorization time of Pollard’s rho algorithm, which is a deterministic algorithm. Our experimental results indicates that while random-restart hill-climbing algorithm is an acceptable candidate to factorize smaller RSA moduli, the factorization speed is much slower than that of Pollard’s rho algorithm.

  8. Information security system based on virtual-optics imaging methodology and public key infrastructure

    NASA Astrophysics Data System (ADS)

    Peng, Xiang; Zhang, Peng; Cai, Lilong

    In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  9. Combinations of resting RSA and RSA reactivity impact maladaptive mood repair and depression symptoms

    PubMed Central

    Yaroslavsky, Ilya; Bylsma, Lauren M.; Rottenberg, Jonathan; Kovacs, Maria

    2013-01-01

    We examined whether the combined indices of respiratory sinus arrhythmia at rest (resting RSA) and in response to a sad film (RSA reactivity) predict effective and ineffective responses to reduce sadness (adaptive vs. maladaptive mood repair) in women with histories of juvenile-onset depression (n = 74) and no history of major mental disorders (n = 75). Structural equation models were used to estimate latent resting RSA, depression, and adaptive and maladaptive mood repair and to test the study hypotheses. Results indicated that combinations of resting RSA+RSA reactivity (RSA patterns) predicted maladaptive mood repair, which in turn, mediated the effects of RSA pattern on depression. Further, RSA patterns moderated the depressogenic effects of maladaptive mood repair. RSA patterns were unrelated to adaptive mood repair. Our findings suggest that mood repair is one mechanism through which physiological vulnerabilities adversely affect mental health. PMID:23827087

  10. Combinations of resting RSA and RSA reactivity impact maladaptive mood repair and depression symptoms.

    PubMed

    Yaroslavsky, Ilya; Bylsma, Lauren M; Rottenberg, Jonathan; Kovacs, Maria

    2013-10-01

    We examined whether the combined indices of respiratory sinus arrhythmia at rest (resting RSA) and in response to a sad film (RSA reactivity) predict effective and ineffective responses to reduce sadness (adaptive vs. maladaptive mood repair) in women with histories of juvenile-onset depression (n=74) and no history of major mental disorders (n=75). Structural equation models were used to estimate latent resting RSA, depression, and adaptive and maladaptive mood repair and to test the study hypotheses. Results indicated that combinations of resting RSA+RSA reactivity (RSA patterns) predicted maladaptive mood repair, which in turn, mediated the effects of RSA pattern on depression. Further, RSA patterns moderated the depressogenic effects of maladaptive mood repair. RSA patterns were unrelated to adaptive mood repair. Our findings suggest that mood repair is one mechanism through which physiological vulnerabilities adversely affect mental health. Copyright © 2013 Elsevier B.V. All rights reserved.

  11. VLSI design of an RSA encryption/decryption chip using systolic array based architecture

    NASA Astrophysics Data System (ADS)

    Sun, Chi-Chia; Lin, Bor-Shing; Jan, Gene Eu; Lin, Jheng-Yi

    2016-09-01

    This article presents the VLSI design of a configurable RSA public key cryptosystem supporting the 512-bit, 1024-bit and 2048-bit based on Montgomery algorithm achieving comparable clock cycles of current relevant works but with smaller die size. We use binary method for the modular exponentiation and adopt Montgomery algorithm for the modular multiplication to simplify computational complexity, which, together with the systolic array concept for electric circuit designs effectively, lower the die size. The main architecture of the chip consists of four functional blocks, namely input/output modules, registers module, arithmetic module and control module. We applied the concept of systolic array to design the RSA encryption/decryption chip by using VHDL hardware language and verified using the TSMC/CIC 0.35 m 1P4 M technology. The die area of the 2048-bit RSA chip without the DFT is 3.9 × 3.9 mm2 (4.58 × 4.58 mm2 with DFT). Its average baud rate can reach 10.84 kbps under a 100 MHz clock.

  12. RSA fluctuation in major depressive disorder.

    PubMed

    Rottenberg, Jonathan; Clift, April; Bolden, Sarah; Salomon, Kristen

    2007-05-01

    Cardiac vagal control, as measured by indices of respiratory sinus arrhythmia (RSA), has been investigated as a marker of impaired self-regulation in mental disorders, including depression. Past work in depressed samples has focused on deficits in resting RSA levels, with mixed results. This study tested the hypothesis that depression involves abnormal RSA fluctuation. RSA was measured in depressed and healthy control participants during rest and during two reactivity tasks, each followed by a recovery period. Relative to controls, depressed persons exhibited lower resting RSA levels as well as less RSA fluctuation, primarily evidenced by a lack of task-related vagal suppression. Group differences in RSA fluctuation were not accounted for by differences in physical health or respiration, whereas group differences in resting RSA level did not survive covariate analyses. Depression may involve multiple deficits in cardiac vagal control.

  13. Dynamic RSA: Examining parasympathetic regulatory dynamics via vector-autoregressive modeling of time-varying RSA and heart period.

    PubMed

    Fisher, Aaron J; Reeves, Jonathan W; Chi, Cyrus

    2016-07-01

    Expanding on recently published methods, the current study presents an approach to estimating the dynamic, regulatory effect of the parasympathetic nervous system on heart period on a moment-to-moment basis. We estimated second-to-second variation in respiratory sinus arrhythmia (RSA) in order to estimate the contemporaneous and time-lagged relationships among RSA, interbeat interval (IBI), and respiration rate via vector autoregression. Moreover, we modeled these relationships at lags of 1 s to 10 s, in order to evaluate the optimal latency for estimating dynamic RSA effects. The IBI (t) on RSA (t-n) regression parameter was extracted from individual models as an operationalization of the regulatory effect of RSA on IBI-referred to as dynamic RSA (dRSA). Dynamic RSA positively correlated with standard averages of heart rate and negatively correlated with standard averages of RSA. We propose that dRSA reflects the active downregulation of heart period by the parasympathetic nervous system and thus represents a novel metric that provides incremental validity in the measurement of autonomic cardiac control-specifically, a method by which parasympathetic regulatory effects can be measured in process. © 2016 Society for Psychophysiological Research.

  14. Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm

    NASA Astrophysics Data System (ADS)

    Meng, X. F.; Peng, X.; Cai, L. Z.; Li, A. M.; Gao, Z.; Wang, Y. R.

    2009-08-01

    A hybrid cryptosystem is proposed, in which one image is encrypted to two interferograms with the aid of double random-phase encoding (DRPE) and two-step phase-shifting interferometry (2-PSI), then three pairs of public-private keys are utilized to encode and decode the session keys (geometrical parameters, the second random-phase mask) and interferograms. In the stage of decryption, the ciphered image can be decrypted by wavefront reconstruction, inverse Fresnel diffraction, and real amplitude normalization. This approach can successfully solve the problem of key management and dispatch, resulting in increased security strength. The feasibility of the proposed cryptosystem and its robustness against some types of attack are verified and analyzed by computer simulations.

  15. RSA in Spine: A Review.

    PubMed

    Humadi, Ali; Dawood, Sulaf; Halldin, Klas; Freeman, Brian

    2017-12-01

    Systematic review of literature. This systematic review was conducted to investigate the accuracy of radiostereometric analysis (RSA), its assessment of spinal motion and disorders, and to investigate the limitations of this technique in spine assessment. Systematic review in all current literature to invesigate the role of RSA in spine. The results of this review concluded that RSA is a very powerful tool to detect small changes between 2 rigid bodies such as a vertebral segment. The technique is described for animal and human studies for cervical and lumbar spine and can be used to analyze range of motion, inducible displacement, and fusion of segments. However, there are a few disadvantages with the technique; RSA percutaneous procedure needs to be performed to implant the markers (and cannot be used preoperatively), one needs a specific knowledge to handle data and interpret the results, and is relatively time consuming and expensive. RSA should be looked at as a very powerful research instrument and there are many questions suitable for RSA studies.

  16. RSA in Spine: A Review

    PubMed Central

    Dawood, Sulaf; Halldin, Klas; Freeman, Brian

    2017-01-01

    Study Design: Systematic review of literature. Objectives: This systematic review was conducted to investigate the accuracy of radiostereometric analysis (RSA), its assessment of spinal motion and disorders, and to investigate the limitations of this technique in spine assessment. Methods: Systematic review in all current literature to invesigate the role of RSA in spine. Results: The results of this review concluded that RSA is a very powerful tool to detect small changes between 2 rigid bodies such as a vertebral segment. The technique is described for animal and human studies for cervical and lumbar spine and can be used to analyze range of motion, inducible displacement, and fusion of segments. However, there are a few disadvantages with the technique; RSA percutaneous procedure needs to be performed to implant the markers (and cannot be used preoperatively), one needs a specific knowledge to handle data and interpret the results, and is relatively time consuming and expensive. Conclusions: RSA should be looked at as a very powerful research instrument and there are many questions suitable for RSA studies. PMID:29238647

  17. An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm

    NASA Astrophysics Data System (ADS)

    Zhang, B.; Sang, Jun; Alam, Mohammad S.

    2013-03-01

    An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm was proposed. Firstly, the original secret image was encrypted into two phase-only masks M1 and M2 via cascaded iterative Fourier transform (CIFT) algorithm. Then, the public-key encryption algorithm RSA was adopted to encrypt M2 into M2' . Finally, a host image was enlarged by extending one pixel into 2×2 pixels and each element in M1 and M2' was multiplied with a superimposition coefficient and added to or subtracted from two different elements in the 2×2 pixels of the enlarged host image. To recover the secret image from the stego-image, the two masks were extracted from the stego-image without the original host image. By applying public-key encryption algorithm, the key distribution was facilitated, and also compared with the image hiding method based on optical interference, the proposed method may reach higher robustness by employing the characteristics of the CIFT algorithm. Computer simulations show that this method has good robustness against image processing.

  18. Modular multiplication in GF(p) for public-key cryptography

    NASA Astrophysics Data System (ADS)

    Olszyna, Jakub

    Modular multiplication forms the basis of modular exponentiation which is the core operation of the RSA cryptosystem. It is also present in many other cryptographic algorithms including those based on ECC and HECC. Hence, an efficient implementation of PKC relies on efficient implementation of modular multiplication. The paper presents a survey of most common algorithms for modular multiplication along with hardware architectures especially suitable for cryptographic applications in energy constrained environments. The motivation for studying low-power and areaefficient modular multiplication algorithms comes from enabling public-key security for ultra-low power devices that can perform under constrained environments like wireless sensor networks. Serial architectures for GF(p) are analyzed and presented. Finally proposed architectures are verified and compared according to the amount of power dissipated throughout the operation.

  19. Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm

    NASA Astrophysics Data System (ADS)

    Kim, Yoonjeong; Ohm, Seongyong; Yi, Kang

    In this letter, we propose a privacy-preserving authentication protocol with RSA cryptosystem in an RFID environment. For both overcoming the resource restriction and strengthening security, our protocol uses only modular exponentiation with exponent three at RFID tag side, with the padded random message whose length is greater than one-sixth of the whole message length.

  20. H1 in RSA galaxies

    NASA Technical Reports Server (NTRS)

    Richter, OTTO-G.

    1993-01-01

    The original Revised Shapley-Ames (RSA) galaxy sample of almost 1300 galaxies has been augmented with further bright galaxies from the RSA appendix as well as newer galaxy catalogs. A complete and homogeneous, strictly magnitude-limited all-sky sample of 2345 galaxies brighter than 13.4 in apparent blue magnitude was formed. New 21 cm H1 line observations for more than 600 RSA galaxies have been combined with all previously available H1 data from the literature. This new extentise data act allows detailed tests of widely accepted 'standard' reduction and analysis techniques.

  1. The utility of combining RSA indices in depression prediction.

    PubMed

    Yaroslavsky, Ilya; Rottenberg, Jonathan; Kovacs, Maria

    2013-05-01

    Depression is associated with protracted despondent mood, blunted emotional reactivity, and dysregulated parasympathetic nervous system (PNS) activity. PNS activity is commonly indexed via cardiac output, using indictors of its level (resting respiratory sinus arrhythmia [RSA]) or fluctuations (RSA reactivity). RSA reactivity can reflect increased or decreased PNS cardiac output (RSA augmentation and RSA withdrawal, respectively). Because a single index of a dynamic physiological system may be inadequate to characterize interindividual differences, we investigated whether the interaction of RSA reactivity and resting RSA is a better predictor of depression. Adult probands with childhood-onset depressive disorder histories (n = 113) and controls with no history of major mental disorders (n = 93) completed a psychophysiology protocol involving assessment of RSA at multiple rest periods and while watching a sad film. When examined independently, resting RSA and RSA reactivity were unrelated to depression, but their interaction predicted latent depression levels and proband status. In the context of high resting RSA, RSA withdrawal from the sad film predicted the lowest levels of depressive symptoms (irrespective of depression histories) and the greatest likelihood of having had no history of major mental disorder (irrespective of current distress). Our findings highlight the utility of combining indices of physiological responses in studying depression; combinations of RSA indices should be given future consideration as reflecting depression endophenotypes. © 2013 American Psychological Association

  2. 47 CFR 22.969 - Cellular RSA licenses subject to competitive bidding.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CARRIER SERVICES PUBLIC MOBILE SERVICES Cellular Radiotelephone Service § 22.969 Cellular RSA licenses subject to competitive bidding. Mutually exclusive applications for initial authorization for the...

  3. Hybrid information privacy system: integration of chaotic neural network and RSA coding

    NASA Astrophysics Data System (ADS)

    Hsu, Ming-Kai; Willey, Jeff; Lee, Ting N.; Szu, Harold H.

    2005-03-01

    Electronic mails are adopted worldwide; most are easily hacked by hackers. In this paper, we purposed a free, fast and convenient hybrid privacy system to protect email communication. The privacy system is implemented by combining private security RSA algorithm with specific chaos neural network encryption process. The receiver can decrypt received email as long as it can reproduce the specified chaos neural network series, so called spatial-temporal keys. The chaotic typing and initial seed value of chaos neural network series, encrypted by the RSA algorithm, can reproduce spatial-temporal keys. The encrypted chaotic typing and initial seed value are hidden in watermark mixed nonlinearly with message media, wrapped with convolution error correction codes for wireless 3rd generation cellular phones. The message media can be an arbitrary image. The pattern noise has to be considered during transmission and it could affect/change the spatial-temporal keys. Since any change/modification on chaotic typing or initial seed value of chaos neural network series is not acceptable, the RSA codec system must be robust and fault-tolerant via wireless channel. The robust and fault-tolerant properties of chaos neural networks (CNN) were proved by a field theory of Associative Memory by Szu in 1997. The 1-D chaos generating nodes from the logistic map having arbitrarily negative slope a = p/q generating the N-shaped sigmoid was given first by Szu in 1992. In this paper, we simulated the robust and fault-tolerance properties of CNN under additive noise and pattern noise. We also implement a private version of RSA coding and chaos encryption process on messages.

  4. Group Key Agreement Efficient in Communication

    DTIC Science & Technology

    2003-10-14

    Selected Areas in Communications, 17(9), September 1999. [13] David Chaum . Zero-knowledge undeniable signatures . In I.B. Damgard, editor, Advances in...sender with some sufficiently strong public key signature method such as DSA or RSA (and using a long-term private key).1 All receivers are required...to verify signatures on all received messages and check the aforementioned fields. Consequently, our security model is different from some recent

  5. RSA Reactivity in Current and Remitted Major Depressive Disorder

    PubMed Central

    Bylsma, Lauren M.; Salomon, Kristen; Taylor-Clift, April; Morris, Bethany H.; Rottenberg, Jonathan

    2014-01-01

    Objective Low resting respiratory sinus arrhythmia (RSA) levels and blunted RSA reactivity are thought to index impaired emotion regulation capacity. Major Depressive Disorder (MDD) has been associated with abberant RSA reactivity and recovery to a speech stressor task relative to healthy controls. Whether impaired RSA functioning reflects aspects of the depressed mood state or a stable vulnerability marker for depression is unknown. Methods We compared resting RSA and RSA reactivity between individuals with MDD (n=49), remitted depression (RMD, n=24), and healthy controls (n=45). ECG data were collected during a resting baseline, a paced-breathing baseline, and two reactivity tasks (speech stressor, cold exposure). Results A group by time quadratic effect emerged (F=4.36(2,109), p=.015) for RSA across phases of the speech stressor (baseline, instruction, preparation, speech, recovery). Follow-up analyses revealed that those with MDD uniquely exhibited blunted RSA reactivity, whereas RMD and controls both exhibited normal task-related vagal withdrawal and post-task recovery. The group by time interaction remained after covariation for age, sex, waist circumference, physical activity, and respiration, but not sleep quality. Conclusions These results provide new evidence that abberant RSA reactivity marks features that track the depressed state, such as poor sleep, rather than a stable trait evident among asymtomatic persons. PMID:24367127

  6. Simultaneous transmission for an encrypted image and a double random-phase encryption key

    NASA Astrophysics Data System (ADS)

    Yuan, Sheng; Zhou, Xin; Li, Da-Hai; Zhou, Ding-Fu

    2007-06-01

    We propose a method to simultaneously transmit double random-phase encryption key and an encrypted image by making use of the fact that an acceptable decryption result can be obtained when only partial data of the encrypted image have been taken in the decryption process. First, the original image data are encoded as an encrypted image by a double random-phase encryption technique. Second, a double random-phase encryption key is encoded as an encoded key by the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then the amplitude of the encrypted image is modulated by the encoded key to form what we call an encoded image. Finally, the encoded image that carries both the encrypted image and the encoded key is delivered to the receiver. Based on such a method, the receiver can have an acceptable result and secure transmission can be guaranteed by the RSA cipher system.

  7. Simultaneous transmission for an encrypted image and a double random-phase encryption key.

    PubMed

    Yuan, Sheng; Zhou, Xin; Li, Da-hai; Zhou, Ding-fu

    2007-06-20

    We propose a method to simultaneously transmit double random-phase encryption key and an encrypted image by making use of the fact that an acceptable decryption result can be obtained when only partial data of the encrypted image have been taken in the decryption process. First, the original image data are encoded as an encrypted image by a double random-phase encryption technique. Second, a double random-phase encryption key is encoded as an encoded key by the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then the amplitude of the encrypted image is modulated by the encoded key to form what we call an encoded image. Finally, the encoded image that carries both the encrypted image and the encoded key is delivered to the receiver. Based on such a method, the receiver can have an acceptable result and secure transmission can be guaranteed by the RSA cipher system.

  8. Dynamic measures of RSA predict distress and regulation in toddlers.

    PubMed

    Brooker, Rebecca J; Buss, Kristin A

    2010-05-01

    In this study, we examined a new method for quantifying individual variability using dynamic measures of respiratory sinus arrhythmia (RSA). This method incorporated temporal variation into the measurement of RSA and provided information beyond that offered by more traditional quantifications such as difference scores. Dynamic and static measures of change in RSA were tested in relation to displays of emotion and affective behaviors during a fear-eliciting episode in a sample of 88 typically developing and high-fear toddlers during a laboratory visit at age 24 months. Dynamic measures of RSA contributed information that was unique from traditionally employed, static change scores in predicting high-fear toddlers' displays of shyness during a fear-eliciting episode. In contrast, RSA change scores offered information related to boldness in nonhigh-fear children. In addition, several associations included estimates of nonlinear change in RSA. Implications for the study of individual differences in RSA and relations with emotion and emotion regulation are discussed.

  9. RSA migration of total knee replacements.

    PubMed

    Pijls, Bart G; Plevier, José W M; Nelissen, Rob G H H

    2018-06-01

    Purpose - We performed a systematic review and meta-analyses to evaluate the early and long-term migration patterns of tibial components of TKR of all known RSA studies. Methods - Migration pattern was defined as at least 2 postoperative RSA follow-up moments. Maximal total point motion (MTPM) at 6 weeks, 3 months, 6 months, 1 year, 2 years, 5 years, and 10 years were considered. Results - The literature search yielded 1,167 hits of which 53 studies were included, comprising 111 study groups and 2,470 knees. The majority of the early migration occurred in the first 6 months postoperatively followed by a period of stability, i.e., no or very little migration. Cemented and uncemented tibial components had different migration patterns. For cemented tibial components there was no difference in migration between all-poly and metal-backed components, between mobile bearing and fixed bearing, between cruciate retaining and posterior stabilized. Furthermore, no difference existed between TKR measured with model-based RSA or marker-based RSA methods. For uncemented TKR there was some variation in migration with the highest migration for uncoated TKR. Interpretation - The results from this meta-analysis on RSA migration of TKR are in line with both the survival analyses results from joint registries of these TKRs as well as revision rates results from meta-analyses, thus providing further proof for the association between early migration and late revision for loosening. The pooled migration patterns can be used both as benchmarks and for defining migration thresholds for future evaluation of new TKR.

  10. RSA Monitoring Redesign Initiative Informational Booklet #1

    ERIC Educational Resources Information Center

    US Department of Education, 2005

    2005-01-01

    This informational booklet contains background materials regarding the Rehabilitation Services Administration (RSA) initiative to redesign its monitoring system. The booklet is intended to expand the knowledge and understanding of those individuals selected to participate in the RSA-sponsored monitoring conference that was held August 24 and 25,…

  11. Center index method-an alternative for wear measurements with radiostereometry (RSA).

    PubMed

    Dahl, Jon; Figved, Wender; Snorrason, Finnur; Nordsletten, Lars; Röhrl, Stephan M

    2013-03-01

    Radiostereometry (RSA) is considered to be the most precise and accurate method for wear-measurements in total hip replacement. Post-operative stereoradiographs has so far been necessary for wear measurement. Hence, the use of RSA has been limited to studies planned for RSA measurements. We compared a new RSA method for wear measurements that does not require previous radiographs with conventional RSA. Instead of comparing present stereoradiographs with post-operative ones, we developed a method for calculating the post-operative position of the center of the femoral head on the present examination and using this as the index measurement. We compared this alternative method to conventional RSA in 27 hips in an ongoing RSA study. We found a high degree of agreement between the methods for both mean proximal (1.19 mm vs. 1.14 mm) and mean 3D wear (1.52 mm vs. 1.44 mm) after 10 years. Intraclass correlation coefficients (ICC) were 0.958 and 0.955, respectively (p<0.001 for both ICCs). The results were also within the limits of agreement when plotted subject-by-subject in a Bland-Altman plot. Our alternative method for wear measurements with RSA offers comparable results to conventional RSA measurements. It allows precise wear measurements without previous radiological examinations. Copyright © 2012 Orthopaedic Research Society.

  12. Use of the RSA/RCOD Index to Identify Training Priority in Soccer Players.

    PubMed

    Wong, Del P; Hjelde, Geir H; Cheng, Ching-Feng; Ngo, Jake K

    2015-10-01

    The use of RSA/RCOD index indicates the repeated change-of-direction (RCOD) performance relative to the repeated-sprint ability (RSA) and provides a standardized approach to prioritize training needs for RSA and RCOD. To compare the RSA/RCOD index among different age groups, RSA and RCOD were measured from 20 under-16 players (U16), 20 under-19 players (U19), and 17 first-team professional players (PRO) from a football (soccer) club that has regular participation in the UEFA Champions League. Each player performed the RSA and RCOD tests, during which the fastest time (FT), average time (AT), total time (TT), and percentage decrement score (%Dec) were recorded. No significant differences were found in RSA/RCOD index-FT, AT, TT, and %Dec among the 3 groups (p > 0.05) and between U19 and PRO in all RSA and RCOD measures (p > 0.05). Most values of RSA/RCOD index were 0.51 among the U16, U19, and PRO groups. Moreover, we concluded that the RSA/RCOD index might not be further changed after 16 years of age unless specific training programs for RSA and RCOD are prescribed. Therefore, this study provides an empirical case, and coaches can establish the RSA/RCOD index value relevant to their training system and monitor players' training needs of RSA and RCOD in a longer term.

  13. Effectiveness of leukocyte immunotherapy in primary recurrent spontaneous abortion (RSA).

    PubMed

    Gharesi-Fard, Behrouz; Zolghadri, Jaleh; Foroughinia, Leila; Tavazoo, Fahimeh; Samsami Dehaghani, Alamtaj

    2007-09-01

    Recurrent spontaneous abortion (RSA) is defined as three or more sequential abortions before the twentieth week of gestation. There are evidences to support an allo-immunologic mechanism for RSA. One of the methods for treatment of RSA is leukocyte therapy; however there is still controversy about effectiveness of this method. To evaluate the effectiveness of leukocyte therapy for treatment of RSA. Ninety two non-pregnant women with at least three sequential abortions (60 primary & 32 secondary aborters) recognized as RSA were referred to our Laboratory for immunotherapy. All the cases were immunized by isolated lymphocytes from their husbands. Fifty to 100 million washed and resuspended mononuclear cells were injected by I.V., S.C., and I.D. route. The result of each injection was checked by WBC cross matching between couples after four weeks of injections. Immunization was repeated in fifth week to a maximum of 3 times if needed. Eighty one age-matched non-pregnant RSA women (52 primary and 29 secondary aborters) with at least three sequential abortions were also included in this study as controls. The control group was not immunized. 67 out of 92 (72.8%) immunized cases and 44 out of 81 controls (54.3%) showed a successful outcome of pregnancy (p<0.02). Comparison of primary and secondary aborters indicated a significantly better outcome only in primary (75% vs. 42.3%. p<0.001) but not in secondary aborters (68.8% vs. 75.9%, p = 0.7). The present investigation showed the effectiveness of leukocyte therapy in primary but not in secondary RSA patients. Despite the current controversy and limitation of leukocyte therapy in RSA, the results of our investigation provide evidence supporting the use of allo-immunization in improving the outcome of pregnancy in primary RSA patients.

  14. Model-based RSA of a femoral hip stem using surface and geometrical shape models.

    PubMed

    Kaptein, Bart L; Valstar, Edward R; Spoor, Cees W; Stoel, Berend C; Rozing, Piet M

    2006-07-01

    Roentgen stereophotogrammetry (RSA) is a highly accurate three-dimensional measuring technique for assessing micromotion of orthopaedic implants. A drawback is that markers have to be attached to the implant. Model-based techniques have been developed to prevent using special marked implants. We compared two model-based RSA methods with standard marker-based RSA techniques. The first model-based RSA method used surface models, and the second method used elementary geometrical shape (EGS) models. We used a commercially available stem to perform experiments with a phantom as well as reanalysis of patient RSA radiographs. The data from the phantom experiment indicated the accuracy and precision of the elementary geometrical shape model-based RSA method is equal to marker-based RSA. For model-based RSA using surface models, the accuracy is equal to the accuracy of marker-based RSA, but its precision is worse. We found no difference in accuracy and precision between the two model-based RSA techniques in clinical data. For this particular hip stem, EGS model-based RSA is a good alternative for marker-based RSA.

  15. Compression-RSA technique: A more efficient encryption-decryption procedure

    NASA Astrophysics Data System (ADS)

    Mandangan, Arif; Mei, Loh Chai; Hung, Chang Ee; Che Hussin, Che Haziqah

    2014-06-01

    The efficiency of encryption-decryption procedures has become a major problem in asymmetric cryptography. Compression-RSA technique is developed to overcome the efficiency problem by compressing the numbers of kplaintext, where k∈Z+ and k > 2, becoming only 2 plaintext. That means, no matter how large the numbers of plaintext, they will be compressed to only 2 plaintext. The encryption-decryption procedures are expected to be more efficient since these procedures only receive 2 inputs to be processed instead of kinputs. However, it is observed that as the numbers of original plaintext are increasing, the size of the new plaintext becomes bigger. As a consequence, it will probably affect the efficiency of encryption-decryption procedures, especially for RSA cryptosystem since both of its encryption-decryption procedures involve exponential operations. In this paper, we evaluated the relationship between the numbers of original plaintext and the size of the new plaintext. In addition, we conducted several experiments to show that the RSA cryptosystem with embedded Compression-RSA technique is more efficient than the ordinary RSA cryptosystem.

  16. Compression-RSA: New approach of encryption and decryption method

    NASA Astrophysics Data System (ADS)

    Hung, Chang Ee; Mandangan, Arif

    2013-04-01

    Rivest-Shamir-Adleman (RSA) cryptosystem is a well known asymmetric cryptosystem and it has been applied in a very wide area. Many researches with different approaches have been carried out in order to improve the security and performance of RSA cryptosystem. The enhancement of the performance of RSA cryptosystem is our main interest. In this paper, we propose a new method to increase the efficiency of RSA by shortening the number of plaintext before it goes under encryption process without affecting the original content of the plaintext. Concept of simple Continued Fraction and the new special relationship between it and Euclidean Algorithm have been applied on this newly proposed method. By reducing the number of plaintext-ciphertext, the encryption-decryption processes of a secret message can be accelerated.

  17. Adolescent RSA Responses during an Anger Discussion Task: Relations to Emotion Regulation and Adjustment

    PubMed Central

    Cui, Lixian; Morris, Amanda Sheffield; Harrist, Amanda W.; Larzelere, Robert E.; Criss, Michael M.; Houltberg, Benjamin J.

    2015-01-01

    The current study examined associations between adolescent respiratory sinus arrhythmia (RSA) during an angry event discussion task and adolescents’ emotion regulation and adjustment. Data were collected from 206 adolescents (10–18 years old, M age = 13.37). Electrocardiogram (ECG) and respiration data were collected from adolescents, and RSA values and respiration rates were computed. Adolescents reported on their own emotion regulation, prosocial behavior, and aggressive behavior. Multi-level latent growth modeling was employed to capture RSA responses across time (i.e., linear and quadratic changes; time course approach), and adolescent emotion regulation and adjustment variables were included in the model to test their links to RSA responses. Results indicated that high RSA baseline was associated with more adolescent prosocial behavior. A pattern of initial RSA decreases (RSA suppression) in response to angry event recall and subsequent RSA increases (RSA rebound) were related to better anger and sadness regulation and more prosocial behavior. However, RSA was not significantly linked to adolescent aggressive behavior. We also compared the time course approach with the conventional linear approach and found that the time course approach provided more meaningful and rich information. The implications of adaptive RSA change patterns are discussed. PMID:25642723

  18. High-precision measurements of cementless acetabular components using model-based RSA: an experimental study.

    PubMed

    Baad-Hansen, Thomas; Kold, Søren; Kaptein, Bart L; Søballe, Kjeld

    2007-08-01

    In RSA, tantalum markers attached to metal-backed acetabular cups are often difficult to detect on stereo radiographs due to the high density of the metal shell. This results in occlusion of the prosthesis markers and may lead to inconclusive migration results. Within the last few years, new software systems have been developed to solve this problem. We compared the precision of 3 RSA systems in migration analysis of the acetabular component. A hemispherical and a non-hemispherical acetabular component were mounted in a phantom. Both acetabular components underwent migration analyses with 3 different RSA systems: conventional RSA using tantalum markers, an RSA system using a hemispherical cup algorithm, and a novel model-based RSA system. We found narrow confidence intervals, indicating high precision of the conventional marker system and model-based RSA with regard to migration and rotation. The confidence intervals of conventional RSA and model-based RSA were narrower than those of the hemispherical cup algorithm-based system regarding cup migration and rotation. The model-based RSA software combines the precision of the conventional RSA software with the convenience of the hemispherical cup algorithm-based system. Based on our findings, we believe that these new tools offer an improvement in the measurement of acetabular component migration.

  19. Adolescent RSA responses during an anger discussion task: Relations to emotion regulation and adjustment.

    PubMed

    Cui, Lixian; Morris, Amanda Sheffield; Harrist, Amanda W; Larzelere, Robert E; Criss, Michael M; Houltberg, Benjamin J

    2015-06-01

    The current study examined associations between adolescent respiratory sinus arrhythmia (RSA) during an angry event discussion task and adolescents' emotion regulation and adjustment. Data were collected from 206 adolescents (10-18 years of age, M age = 13.37). Electrocardiogram (ECG) and respiration data were collected from adolescents, and RSA values and respiration rates were computed. Adolescents reported on their own emotion regulation, prosocial behavior, and aggressive behavior. Multilevel latent growth modeling was employed to capture RSA responses across time (i.e., linear and quadratic changes; time course approach), and adolescent emotion regulation and adjustment variables were included in the model to test their links to RSA responses. Results indicated that high RSA baseline was associated with more adolescent prosocial behavior. A pattern of initial RSA decreases (RSA suppression) in response to angry event recall and subsequent RSA increases (RSA rebound) were related to better anger and sadness regulation and more prosocial behavior. However, RSA was not significantly linked to adolescent aggressive behavior. We also compared the time course approach with the conventional linear approach and found that the time course approach provided more meaningful and rich information. The implications of adaptive RSA change patterns are discussed. (c) 2015 APA, all rights reserved).

  20. Biometrics based key management of double random phase encoding scheme using error control codes

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2013-08-01

    In this paper, an optical security system has been proposed in which key of the double random phase encoding technique is linked to the biometrics of the user to make it user specific. The error in recognition due to the biometric variation is corrected by encoding the key using the BCH code. A user specific shuffling key is used to increase the separation between genuine and impostor Hamming distance distribution. This shuffling key is then further secured using the RSA public key encryption to enhance the security of the system. XOR operation is performed between the encoded key and the feature vector obtained from the biometrics. The RSA encoded shuffling key and the data obtained from the XOR operation are stored into a token. The main advantage of the present technique is that the key retrieval is possible only in the simultaneous presence of the token and the biometrics of the user which not only authenticates the presence of the original input but also secures the key of the system. Computational experiments showed the effectiveness of the proposed technique for key retrieval in the decryption process by using the live biometrics of the user.

  1. Estimating time-varying RSA to examine psychophysiological linkage of marital dyads.

    PubMed

    Gates, Kathleen M; Gatzke-Kopp, Lisa M; Sandsten, Maria; Blandon, Alysia Y

    2015-08-01

    One of the primary tenets of polyvagal theory dictates that parasympathetic influence on heart rate, often estimated by respiratory sinus arrhythmia (RSA), shifts rapidly in response to changing environmental demands. The current standard analytic approach of aggregating RSA estimates across time to arrive at one value fails to capture this dynamic property within individuals. By utilizing recent methodological developments that enable precise RSA estimates at smaller time intervals, we demonstrate the utility of computing time-varying RSA for assessing psychophysiological linkage (or synchrony) in husband-wife dyads using time-locked data collected in a naturalistic setting. © 2015 Society for Psychophysiological Research.

  2. RSA and registries: the quest for phased introduction of new implants.

    PubMed

    Nelissen, Rob G H H; Pijls, Bart G; Kärrholm, Johan; Malchau, Henrik; Nieuwenhuijse, Marc J; Valstar, Edward R

    2011-12-21

    Although the overall survival of knee and hip prostheses at ten years averages 90%, recent problems with several hip and knee prostheses have illustrated that the orthopaedic community, industry, and regulators can still further improve patient safety. Given the early predictive properties of roentgen stereophotogrammetric analysis (RSA) and the meticulous follow-up of national joint registries, these two methods are ideal tools for such a phased clinical introduction. In this paper, we elaborate on the predictive power of RSA within a two-year follow-up after arthroplasty and its relationship to national joint registries. The association between RSA prosthesis-migration data and registry data is evaluated. The five-year rate of revision of RSA-tested total knee replacements was compared with that of non-RSA-tested total knee replacements. Data were extracted from the published results of the national joint registries of Sweden, Australia, and New Zealand. There was a 22% to 35% reduction in the number of revisions of RSA-tested total knee replacements as compared with non-RSA-tested total knee replacements in the national joint registries. Assuming that the total cost of total knee arthroplasty is $37,000 in the United States, a 22% to 35% reduction in the number of revisions (currently close to 55,000 annually) could lead to an estimated annual savings of over $400 million to the health-care system. The phased clinical introduction of new prostheses with two-year RSA results as a qualitative tool could lead to better patient care and could reduce the costs associated with revision total knee arthroplasty. Follow-up in registries is necessary to substantiate these results and to improve post-market surveillance.

  3. Are CT Scans a Satisfactory Substitute for the Follow-Up of RSA Migration Studies of Uncemented Cups? A Comparison of RSA Double Examinations and CT Datasets of 46 Total Hip Arthroplasties

    PubMed Central

    Zeleznik, Michael P.; Nilsson, Kjell G.; Olivecrona, Henrik

    2017-01-01

    As part of the 14-year follow-up of a prospectively randomized radiostereometry (RSA) study on uncemented cup fixation, two pairs of stereo radiographs and a CT scan of 46 hips were compared. Tantalum beads, inserted during the primary operation, were detected in the CT volume and the stereo radiographs and used to produce datasets of 3D coordinates. The limit of agreement between the combined CT and RSA datasets was calculated in the same way as the precision of the double RSA examination. The precision of RSA corresponding to the 99% confidence interval was 1.36°, 1.36°, and 0.60° for X-, Y-, and Z-rotation and 0.40, 0.17, and 0.37 mm for X-, Y-, and Z-translation. The limit of agreement between CT and RSA was 1.51°, 2.17°, and 1.05° for rotation and 0.59, 0.56, and 0.74 mm for translation. The differences between CT and RSA are close to the described normal 99% confidence interval for precision in RSA: 0.3° to 2° for rotation and 0.15 to 0.6 mm for translation. We conclude that measurements using CT and RSA are comparable and that CT can be used for migration studies for longitudinal evaluations of patients with RSA markers. PMID:28243598

  4. Are CT Scans a Satisfactory Substitute for the Follow-Up of RSA Migration Studies of Uncemented Cups? A Comparison of RSA Double Examinations and CT Datasets of 46 Total Hip Arthroplasties.

    PubMed

    Otten, Volker; Maguire, Gerald Q; Noz, Marilyn E; Zeleznik, Michael P; Nilsson, Kjell G; Olivecrona, Henrik

    2017-01-01

    As part of the 14-year follow-up of a prospectively randomized radiostereometry (RSA) study on uncemented cup fixation, two pairs of stereo radiographs and a CT scan of 46 hips were compared. Tantalum beads, inserted during the primary operation, were detected in the CT volume and the stereo radiographs and used to produce datasets of 3D coordinates. The limit of agreement between the combined CT and RSA datasets was calculated in the same way as the precision of the double RSA examination. The precision of RSA corresponding to the 99% confidence interval was 1.36°, 1.36°, and 0.60° for X -, Y -, and Z -rotation and 0.40, 0.17, and 0.37 mm for X -, Y -, and Z -translation. The limit of agreement between CT and RSA was 1.51°, 2.17°, and 1.05° for rotation and 0.59, 0.56, and 0.74 mm for translation. The differences between CT and RSA are close to the described normal 99% confidence interval for precision in RSA: 0.3° to 2° for rotation and 0.15 to 0.6 mm for translation. We conclude that measurements using CT and RSA are comparable and that CT can be used for migration studies for longitudinal evaluations of patients with RSA markers.

  5. 50 CFR 648.207 - Herring Research Set-Aside (RSA).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Herring Research Set-Aside (RSA). 648.207... Measures for the Atlantic Herring Fishery § 648.207 Herring Research Set-Aside (RSA). (a) NMFS shall... established by NMFS, to solicit proposals from industry for the upcoming 3 fishing years, based on research...

  6. RSA/Legacy Wind Sensor Comparison. Part 2; Eastern Range

    NASA Technical Reports Server (NTRS)

    Short, David A.; Wheeler, Mark M.

    2006-01-01

    This report describes a comparison of data from ultrasonic and propeller-and-vane anemometers on 5 wind towers at Kennedy Space Center and Cape Canaveral Air Force Station. The ultrasonic sensors are scheduled to replace the Legacy propeller-and-vane sensors under the Range Standardization and Automation (RSA) program. Because previous studies have noted differences between peak wind speeds reported by mechanical and ultrasonic wind sensors, the latter having no moving parts, the 30th and 45th Weather Squadrons wanted to understand possible differences between the two sensor types. The period-of-record was 13-30 May 2005, A total of 357,626 readings of 1-minute average and peak wind speed/direction from each sensor type were used. Statistics of differences in speed and direction were used to identify 15 out of 19 RSA sensors having the most consistent performance, with respect to the Legacy sensors. RSA average wind speed data from these 15 showed a small positive bias of 0.38 kts. A slightly larger positive bias of 0.94 kts was found in the RSA peak wind speed.

  7. VLSI implementation of RSA encryption system using ancient Indian Vedic mathematics

    NASA Astrophysics Data System (ADS)

    Thapliyal, Himanshu; Srinivas, M. B.

    2005-06-01

    This paper proposes the hardware implementation of RSA encryption/decryption algorithm using the algorithms of Ancient Indian Vedic Mathematics that have been modified to improve performance. The recently proposed hierarchical overlay multiplier architecture is used in the RSA circuitry for multiplication operation. The most significant aspect of the paper is the development of a division architecture based on Straight Division algorithm of Ancient Indian Vedic Mathematics and embedding it in RSA encryption/decryption circuitry for improved efficiency. The coding is done in Verilog HDL and the FPGA synthesis is done using Xilinx Spartan library. The results show that RSA circuitry implemented using Vedic division and multiplication is efficient in terms of area/speed compared to its implementation using conventional multiplication and division architectures.

  8. Children's externalizing and internalizing symptoms over time: the role of individual differences in patterns of RSA responding.

    PubMed

    Hinnant, James Benjamin; El-Sheikh, Mona

    2009-11-01

    We examined associations between basal respiratory sinus arrhythmia (RSA) in conjunction with RSA regulation with the hypothesis that their interaction would explain unique variability in children's prospective adjustment 2 years later. Participants were 176 children (98 girls; 78 boys) in middle childhood. RSA regulation was assessed through social and problem-solving challenges. Parents reported on children's internalizing and externalizing symptoms. Interactions between RSA baseline and regulation to the social stressor predicted children's later internalizing symptoms. Interactions between RSA baseline and responding to the problem-solving stressor predicted children's externalizing symptoms. The highest levels of internalizing symptoms were predicted for children with both lower basal RSA and higher RSA suppression. The highest levels of externalizing symptoms were predicted for children who demonstrated lower basal RSA in conjunction with RSA augmentation. Findings highlight the importance of the contemporaneous consideration of basal RSA and RSA regulation in the prediction of developmental psychopathology symptomology.

  9. Decisive Routing and Admission Control According to Quality of Service Constraints

    DTIC Science & Technology

    2009-03-01

    Level &(Key Size) 1 1 RSA (1280); RSA (1536); Elg-E (1280) 1 2 Elg-E ( 768 ); Elg-E(1024); RSA (1024) 1 3 3DES, BlowFish, CAST5 2 1 Elg-E(1536); Elg-E(1792...upon the intractibility of the discrete logarithm problem [11] RSA A public key encryption scheme named after inventors R. Rivest, A. Shamir, and L...gpgTester would make system calls to the GNU Privacy Guard to choose from system and public key algorithms, ElGamal, RSA , AES, AES192, AES256, TwoFish

  10. Respiratory sinus arrhythmia responses to cognitive tasks: effects of task factors and RSA indices.

    PubMed

    Overbeek, Thérèse J M; van Boxtel, Anton; Westerink, Joyce H D M

    2014-05-01

    Many studies show that respiratory sinus arrhythmia (RSA) decreases while performing cognitive tasks. However, there is uncertainty about the role of contaminating factors such as physical activity and stress-inducing task variables. Different methods to quantify RSA may also contribute to variable results. In 83 healthy subjects, we studied RSA responses to a working memory task requiring varying levels of cognitive control and a perceptual attention task not requiring strong cognitive control. RSA responses were quantified in the time and frequency domain and were additionally corrected for differences in mean interbeat interval and respiration rate, resulting in eight different RSA indices. The two tasks were clearly differentiated by heart rate and facial EMG reference measures. Cognitive control induced inhibition of RSA whereas perceptual attention generally did not. However, the results show several differences between different RSA indices, emphasizing the importance of methodological variables. Age and sex did not influence the results. Copyright © 2014 Elsevier B.V. All rights reserved.

  11. Associations between respiratory sinus arrhythmia (RSA) reactivity and effortful control in preschool-age children.

    PubMed

    Sulik, Michael J; Eisenberg, Nancy; Spinrad, Tracy L; Silva, Kassondra M

    2015-07-01

    We tested whether respiratory sinus arrhythmia (RSA) reactivity in response to each of three self-regulation tasks (bird and dragon; knock-tap; and gift wrap) would predict self-regulation performance in a sample of 101 preschool-age children (M age = 4.49, SD = .64). While controlling for baseline RSA, decreases in RSA from bird and dragon to knock-tap (but not from baseline to bird and dragon) predicted a latent variable measuring self-regulation. Furthermore, increases in RSA from the knock-tap to gift wrap-the only task involving delay of gratification-were related to concurrent task performance while controlling for the relation between RSA reactivity and the latent self-regulation variable. Results suggest that the relations between RSA reactivity and self-regulatory ability are influenced by task-specific demands and possibly by task order. Furthermore, RSA reactivity appears to relate differently to performance on motivationally salient self-regulation tasks such as delay of gratification relative to cool executive function tasks. © 2015 Wiley Periodicals, Inc.

  12. RSA/Legacy Wind Sensor Comparison. Part 1; Western Range

    NASA Technical Reports Server (NTRS)

    Short, David A.; Wheeler, Mark M.

    2006-01-01

    This report describes a comparison of data from ultrasonic and cup-and-vane anemometers on 5 wind towers at Vandenberg AFB. The ultrasonic sensors are scheduled to replace the Legacy cup-and-vane sensors under the Range Standardization and Automation (RSA) program. Because previous studies have noted differences between peak wind speeds reported by mechanical and ultrasonic wind sensors, the latter having no moving parts, the 30th and 45th Weather Squadrons wanted to understand possible differences between the two sensor types. The period-of-record was 13-30 May 2005. A total of 153,961 readings of I-minute average and peak wind speed/direction from each sensor type were used. Statistics of differences in speed and direction were used to identify 18 out of 34 RSA sensors having the most consistent performance, with respect to the Legacy sensors. Data from these 18 were used to form a composite comparison. A small positive bias in the composite RSA average wind speed increased from +0.5 kts at 15 kts, to +1 kt at 25 kts. A slightly larger positive bias in the RSA peak wind speed increased from +1 kt at 15 kts, to +2 kts at 30 kts.

  13. Public-key quantum digital signature scheme with one-time pad private-key

    NASA Astrophysics Data System (ADS)

    Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua

    2018-01-01

    A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.

  14. Three-dimensional computer simulation of radiostereometric analysis (RSA) in distal radius fractures.

    PubMed

    Madanat, Rami; Moritz, Niko; Aro, Hannu T

    2007-01-01

    Physical phantom models have conventionally been used to determine the accuracy and precision of radiostereometric analysis (RSA) in various orthopaedic applications. Using a phantom model of a fracture of the distal radius it has previously been shown that RSA is a highly accurate and precise method for measuring both translation and rotation in three-dimensions (3-D). The main shortcoming of a physical phantom model is its inability to mimic complex 3-D motion. The goal of this study was to create a realistic computer model for preoperative planning of RSA studies and to test the accuracy of RSA in measuring complex movements in fractures of the distal radius using this new model. The 3-D computer model was created from a set of tomographic scans. The simulation of the radiographic imaging was performed using ray-tracing software (POV-Ray). RSA measurements were performed according to standard protocol. Using a two-part fracture model (AO/ASIF type A2), it was found that for simple movements in one axis, translations in the range of 25microm-2mm could be measured with an accuracy of +/-2microm. Rotations ranging from 16 degrees to 2 degrees could be measured with an accuracy of +/-0.015 degrees . Using a three-part fracture model the corresponding values of accuracy were found to be +/-4microm and +/-0.031 degrees for translation and rotation, respectively. For complex 3-D motion in a three-part fracture model (AO/ASIF type C1) the accuracy was +/-6microm for translation and +/-0.120 degrees for rotation. The use of 3-D computer modelling can provide a method for preoperative planning of RSA studies in complex fractures of the distal radius and in other clinical situations in which the RSA method is applicable.

  15. Children's dynamic RSA change during anger and its relations with parenting, temperament, and control of aggression.

    PubMed

    Miller, Jonas G; Chocol, Caroline; Nuselovici, Jacob N; Utendale, William T; Simard, Melissa; Hastings, Paul D

    2013-02-01

    This study examined the moderating effects of child temperament on the association between maternal socialization and 4-6-year-old children's dynamic respiratory sinus arrhythmia (RSA) change in response to anger-themed emotional materials (N=180). We used latent growth curve modeling to explore adaptive patterns of dynamic RSA change in response to anger. Greater change in RSA during anger-induction, characterized by more initial RSA suppression and a subsequent return to baseline, was related to children's better regulation of aggression. For anger-themed materials, low levels of authoritarian parenting predicted more RSA suppression and recovery for more anger-prone children, whereas more authoritative parenting predicted more RSA suppression and recovery for less anger-prone children. These findings suggest that children's adaptive patterns of dynamic RSA change can be characterized by latent growth curve modeling, and that these patterns may be differentially shaped by parent socialization experiences as a function of child temperament. Copyright © 2013 Elsevier B.V. All rights reserved.

  16. Security analysis of RSA cryptosystem algorithm and it’s properties

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liu, Chenglian; Guo, Yongning, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com; Lin, Juan, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com

    2014-10-06

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles tomore » discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.« less

  17. Emotion suppression moderates the quadratic association between RSA and executive function.

    PubMed

    Spangler, Derek P; Bell, Martha Ann; Deater-Deckard, Kirby

    2015-09-01

    There is uncertainty about whether respiratory sinus arrhythmia (RSA), a cardiac marker of adaptive emotion regulation, is involved in relatively low or high executive function performance. In the present study, we investigated (a) whether RSA during rest and tasks predict both relatively low and high executive function within a larger quadratic association among the two variables, and (b) the extent to which this quadratic trend was moderated by individual differences in emotion regulation. To achieve these aims, a sample of ethnically and socioeconomically diverse women self-reported reappraisal and emotion suppression. They next experienced a 2-min resting period during which electrocardiogram (ECG) was continually assessed. In the next phase, the women completed an array of executive function and nonexecutive cognitive tasks while ECG was measured throughout. As anticipated, resting RSA showed a quadratic association with executive function that was strongest for high suppression. These results suggest that relatively high resting RSA may predict poor executive function ability when emotion regulation consumes executive control resources needed for ongoing cognitive performance. © 2015 Society for Psychophysiological Research.

  18. Emotion suppression moderates the quadratic association between RSA and executive function

    PubMed Central

    Spangler, Derek P.; Bell, Martha Ann; Deater-Deckard, Kirby

    2016-01-01

    There is uncertainty about whether respiratory sinus arrhythmia (RSA), a cardiac marker of adaptive emotion regulation, is involved in relatively low or high executive function performance. In the present study, we investigated: (1) whether RSA during rest and tasks predict both relatively low and high executive function within a larger quadratic association among the two variables, and (2) the extent to which this quadratic trend was moderated by individual differences in emotion regulation. To achieve these aims, a sample of ethnically and socioeconomically diverse women self-reported reappraisal and emotion suppression. They next experienced a two-minute resting period during which ECG was continually assessed. In the next phase, the women completed an array of executive function and non-executive cognitive tasks while ECG was measured throughout. As anticipated, resting RSA showed a quadratic association with executive function that was strongest for high suppression. These results suggest that relatively high resting RSA may predict poor executive function ability when emotion regulation consumes executive control resources needed for ongoing cognitive performance. PMID:26018941

  19. The effect of personalized versus standard patient protocols for radiostereometric analysis (RSA).

    PubMed

    Muharemovic, O; Troelsen, A; Thomsen, M G; Kallemose, T; Gosvig, K K

    2018-05-01

    Increasing pressure in the clinic requires a more standardized approach to radiostereometric analysis (RSA) imaging. The aim of this study was to investigate whether implementation of personalized RSA patient protocols could increase image quality and decrease examination time and the number of exposure repetitions. Forty patients undergoing primary total hip arthroplasty were equally randomized to either a case or a control group. Radiographers in the case group were assisted by personalized patient protocols containing information about each patient's post-operative RSA imaging. Radiographers in the control group used a standard RSA protocol. At three months, radiographers in the case group significantly reduced (p < 0.001) the number of exposures by 1.6, examination time with 19.2 min, and distance between centrum of prosthesis and centrum of calibration field with 34.1 mm when compared to post-operative (baseline) results. At twelve months, the case group significantly reduced (p < 0.001) number of exposures by two, examination time with 22.5 min, and centrum of prosthesis to centrum of calibration field distance with 43.1 mm when compared to baseline results. No significant improvements were found in the control group at any time point. There is strong evidence that personalized RSA patient protocols have a positive effect on image quality and radiation dose savings. Implementation of personal patient protocols as a RSA standard will contribute to the reduction of examination time, thus ensuring a cost benefit for department and patient safety. Copyright © 2017 The College of Radiographers. Published by Elsevier Ltd. All rights reserved.

  20. Longitudinal Associations Between Temperament and Socioemotional Outcomes in Young Children: The Moderating Role of RSA and Gender

    PubMed Central

    Morales, Santiago; Beekman, Charles; Blandon, Alysia Y.; Stifter, Cynthia A.; Buss, Kristin A.

    2015-01-01

    Temperament is an important predictor of socioemotional adjustment, such as externalizing and internalizing symptoms. However, there is not a one-to-one correspondence between temperamental predispositions and these outcomes, implying that other factors also contribute to the development of internalizing and externalizing problems. Self-regulation is believed to interact with temperament, and has been studied as a predictor for later socioemotional outcomes. Respiratory sinus arrhythmia (RSA) is a psychophysiological measure of self-regulation that has been studied as a moderator of risk. The primary aim of the present study was to test if RSA baseline and RSA reactivity would moderate the link between temperament and socioemotional outcomes. Mothers reported the temperament of their infants (20 months; N=154), RSA was collected at 24- and 42-months, and mothers reported externalizing and internalizing behaviors at kindergarten entry. RSA baseline and RSA reactivity moderated the relation between exuberant temperament and externalizing behaviors. However, these results were only significant for girls, such that high RSA baseline and greater RSA suppression predicted more externalizing behaviors when exuberance was high. Fearful temperament predicted later internalizing behaviors, but no moderation was present. These results are discussed in light of recent evidence regarding gender differences in the role of RSA as a protective factor for risk. PMID:25399505

  1. Longitudinal associations between temperament and socioemotional outcomes in young children: the moderating role of RSA and gender.

    PubMed

    Morales, Santiago; Beekman, Charles; Blandon, Alysia Y; Stifter, Cynthia A; Buss, Kristin A

    2015-01-01

    Temperament is an important predictor of socioemotional adjustment, such as externalizing and internalizing symptoms. However, there is not a one-to-one correspondence between temperamental predispositions and these outcomes, implying that other factors also contribute to the development of internalizing and externalizing problems. Self-regulation is believed to interact with temperament, and has been studied as a predictor for later socioemotional outcomes. Respiratory sinus arrhythmia (RSA) is a psychophysiological measure of self-regulation that has been studied as a moderator of risk. The primary aim of the present study was to test if RSA baseline and RSA reactivity would moderate the link between temperament and socioemotional outcomes. Mothers reported the temperament of their infants (20 months; N = 154), RSA was collected at 24- and 42-months, and mothers reported externalizing and internalizing behaviors at kindergarten entry. RSA baseline and RSA reactivity moderated the relation between exuberant temperament and externalizing behaviors. However, these results were only significant for girls, such that high RSA baseline and greater RSA suppression predicted more externalizing behaviors when exuberance was high. Fearful temperament predicted later internalizing behaviors, but no moderation was present. These results are discussed in light of recent evidence regarding gender differences in the role of RSA as a protective factor for risk. © 2014 Wiley Periodicals, Inc.

  2. Image-based RSA: Roentgen stereophotogrammetric analysis based on 2D-3D image registration.

    PubMed

    de Bruin, P W; Kaptein, B L; Stoel, B C; Reiber, J H C; Rozing, P M; Valstar, E R

    2008-01-01

    Image-based Roentgen stereophotogrammetric analysis (IBRSA) integrates 2D-3D image registration and conventional RSA. Instead of radiopaque RSA bone markers, IBRSA uses 3D CT data, from which digitally reconstructed radiographs (DRRs) are generated. Using 2D-3D image registration, the 3D pose of the CT is iteratively adjusted such that the generated DRRs resemble the 2D RSA images as closely as possible, according to an image matching metric. Effectively, by registering all 2D follow-up moments to the same 3D CT, the CT volume functions as common ground. In two experiments, using RSA and using a micromanipulator as gold standard, IBRSA has been validated on cadaveric and sawbone scapula radiographs, and good matching results have been achieved. The accuracy was: |mu |< 0.083 mm for translations and |mu| < 0.023 degrees for rotations. The precision sigma in x-, y-, and z-direction was 0.090, 0.077, and 0.220 mm for translations and 0.155 degrees , 0.243 degrees , and 0.074 degrees for rotations. Our results show that the accuracy and precision of in vitro IBRSA, performed under ideal laboratory conditions, are lower than in vitro standard RSA but higher than in vivo standard RSA. Because IBRSA does not require radiopaque markers, it adds functionality to the RSA method by opening new directions and possibilities for research, such as dynamic analyses using fluoroscopy on subjects without markers and computer navigation applications.

  3. Association between HLA-E gene polymorphism and unexplained recurrent spontaneous abortion (RSA) in Iranian women.

    PubMed

    Fotoohi, Maryam; Ghasemi, Nasrin; Mirghanizadeh, Seyed Ali; Vakili, Mahmood; Samadi, Morteza

    2016-07-01

    Human leukocyte antigen-E (HLA-E)is a non-classical major histocompatibility complex (MHC) class I antigens which expressed on extra villous cytotrophoblast, which interacts with NKG2A, is an inhibitory receptor on natural killer (NK) cells and leading to down regulation of immune response in the maternal-fetal interface and provides maternal immune tolerance of the fetus. This study was designated to investigate the gene frequencies of E0101 and E0103 in HLA-E gene in Iranian women with recurrent spontaneous abortion (RSA). Amplification Refractory Mutation System (ARMS-PCR) technique was carried out to detect polymorphism in exon 3 of the HLA-E gene in women with RSA and controls (n=200). Differences between groups were analyzed by SPSS19 software using (2) test. There was no significant difference in the allele frequencies of the HLA-E polymorphism between RSA and fertile controls but HLA-E 0101/0103 heterozygous genotype was found to be significantly higher in RSA group (p=0.006, OR=1.73), so this genotype might confer susceptibility to RSA. Our results suggest that HLA-E 0101/0103 heterozygous genotype leads to increase of RSA risk. It seems that by genotyping of HLA-E polymorphism, we can predict the risk of RSA in infertile women.

  4. Sleep duration and RSA suppression as predictors of internalizing and externalizing behaviors

    PubMed Central

    Cho, Sunghye; Philbrook, Lauren E.; Davis, Elizabeth L.; Buss, Kristin A.

    2017-01-01

    Although the conceptual interplay among the biological and clinical features of sleep, arousal, and emotion regulation has been noted, little is understood about how indices of sleep duration and parasympathetic reactivity operate jointly to predict adjustment in early childhood. Using a sample of 123 toddlers, the present study examined sleep duration and RSA reactivity as predictors of internalizing and externalizing behaviors. Parents reported on children’s sleep duration and adjustment. RSA reactivity was assessed via children’s responses to fear-eliciting stimuli and an inhibitory control challenge. Findings demonstrated that greater RSA suppression to both types of tasks in combination with longer sleep duration was concurrently associated with less internalizing. In contrast, greater RSA augmentation to an inhibitory control task in the context of shorter sleep duration predicted more externalizing 1 year later. The significance of duration of toddlers’ sleep as well as the context in which physiological regulatory difficulties occurs is discussed. PMID:27577700

  5. Sleep duration and RSA suppression as predictors of internalizing and externalizing behaviors.

    PubMed

    Cho, Sunghye; Philbrook, Lauren E; Davis, Elizabeth L; Buss, Kristin A

    2017-01-01

    Although the conceptual interplay among the biological and clinical features of sleep, arousal, and emotion regulation has been noted, little is understood about how indices of sleep duration and parasympathetic reactivity operate jointly to predict adjustment in early childhood. Using a sample of 123 toddlers, the present study examined sleep duration and RSA reactivity as predictors of internalizing and externalizing behaviors. Parents reported on children's sleep duration and adjustment. RSA reactivity was assessed via children's responses to fear-eliciting stimuli and an inhibitory control challenge. Findings demonstrated that greater RSA suppression to both types of tasks in combination with longer sleep duration was concurrently associated with less internalizing. In contrast, greater RSA augmentation to an inhibitory control task in the context of shorter sleep duration predicted more externalizing 1 year later. The significance of duration of toddlers' sleep as well as the context in which physiological regulatory difficulties occurs is discussed. © 2016 Wiley Periodicals, Inc.

  6. Early adversity, RSA, and inhibitory control: evidence of children's neurobiological sensitivity to social context.

    PubMed

    Skowron, Elizabeth A; Cipriano-Essel, Elizabeth; Gatzke-Kopp, Lisa M; Teti, Douglas M; Ammerman, Robert T

    2014-07-01

    This study examined parasympathetic physiology as a moderator of the effects of early adversity (i.e., child abuse and neglect) on children's inhibitory control. Children's respiratory sinus arrhythmia (RSA) was assessed during a resting baseline, two joint challenge tasks with mother, and an individual frustration task. RSA assessed during each of the joint parent-child challenge tasks moderated the effects of child maltreatment (CM) status on children's independently-assessed inhibitory control. No moderation effect was found for RSA assessed at baseline or in the child-alone challenge task. Among CM-exposed children, lower RSA levels during the joint task predicted the lowest inhibitory control, whereas higher joint task RSA was linked to higher inhibitory control scores that were indistinguishable from those of non-CM children. Results are discussed with regard to the importance of considering context specificity (i.e., individual and caregiver contexts) in how biomarkers inform our understanding of individual differences in vulnerability among at-risk children. © 2013 Wiley Periodicals, Inc.

  7. Children’s dynamic RSA change during anger and its relations with parenting, temperament, and control of aggression☆

    PubMed Central

    Miller, Jonas G.; Chocol, Caroline; Nuselovici, Jacob N.; Utendale, William T.; Simard, Melissa; Hastings, Paul D.

    2014-01-01

    This study examined the moderating effects of child temperament on the association between maternal socialization and 4–6-year-old children’s dynamic respiratory sinus arrhythmia (RSA) change in response to anger-themed emotional materials (N = 180). We used latent growth curve modeling to explore adaptive patterns of dynamic RSA change in response to anger. Greater change in RSA during anger-induction, characterized by more initial RSA suppression and a subsequent return to baseline, was related to children’s better regulation of aggression. For anger-themed materials, low levels of authoritarian parenting predicted more RSA suppression and recovery for more anger-prone children, whereas more authoritative parenting predicted more RSA suppression and recovery for less anger-prone children. These findings suggest that children’s adaptive patterns of dynamic RSA change can be characterized by latent growth curve modeling, and that these patterns may be differentially shaped by parent socialization experiences as a function of child temperament. PMID:23274169

  8. [Study on the relationship between ER Rsa I gene polymorphism and children's dental fluorosis].

    PubMed

    Ba, Yue; Li, Hai-Xia; Yin, Gong-Ju; Wu, Wei-Hua; Yu, Bo; Cheng, Xue-Min; Cui, Liu-Xin

    2009-09-01

    To explore the distribution of ER Rsa I genotype in children who lived in the areas with or without high fluoride, and evaluate the relationship between ER Rsa I gene polymorphism and children's dental fluorosis. Children aged 8 to 12 years, born and raised in high fluoride areas and control areas in two counties of Henan Province were recruited. The Rsa I marker of ER gene was genotyped in 237 children composed of both dental fluorosis cases and controls by PCR-RFLP procedure. Urine fluoride was detected with fluoride ion selective electrode method. The frequency distribution of ER Rsa I genotype was rr 60.81% (45/74), Rr 27.02% (20/74), RR 12.16% (9/74) in children with fluorosis; rr 73.91% (51/69), Rr 20.29% (14/69), RR 5.80% (4/69) in children without fluorosis from high fluoride areas, and rr 63.83% (60/94), Rr 34.04% (32/94), RR 2.13% (2/94) in the children without fluorosis from control areas respectively. There were no significant differences in the three groups (P>0.05), but children carrying allele R of ER Rsa I had a significantly increased risk of dental fluorosis (OR=1.821, 95% CI: 1.013-3.274) compared to children carrying the allele r in endemic fluorosis areas. Although no significant difference was found in ER Rsa I genotype between cases and non-dental fluorosis in endemic fluorosis areas, children carrying R allele of ER Rsa I had a higher risk compared to children carrying r allele, and the further study is needed.

  9. Directly assessing interpersonal RSA influences in the frequency domain: An illustration with generalized partial directed coherence.

    PubMed

    Liu, Siwei; Gates, Kathleen M; Blandon, Alysia Y

    2018-06-01

    Despite recent research indicating that interpersonal linkage in physiology is a common phenomenon during social interactions, and the well-established role of respiratory sinus arrhythmia (RSA) in socially facilitative physiological regulation, little research has directly examined interpersonal influences in RSA, perhaps due to methodological challenges in analyzing multivariate RSA data. In this article, we aim to bridge this methodological gap by introducing a new method for quantifying interpersonal RSA influences. Specifically, we show that a frequency-domain statistic, generalized partial directed coherence (gPDC), can be used to capture lagged relations in RSA between social partners without first estimating RSA for each person. We illustrate its utility by examining the relation between gPDC and marital conflict in a sample of married couples. Finally, we discuss how gPDC complements existing methods in the time domain and provide guidelines for choosing among these different statistical techniques. © 2018 Society for Psychophysiological Research.

  10. Comparison of two different Radiostereometric analysis (RSA) systems with markerless elementary geometrical shape modeling for the measurement of stem migration.

    PubMed

    Li, Ye; Röhrl, Stephan M; Bøe, B; Nordsletten, Lars

    2014-09-01

    Radiostereometric analysis (RSA) is the gold standard of measurement for in vivo 3D implants migration. The aim of this study was to evaluate the in vivo precision of 2 RSA marker-based systems compared with that of marker-free, elementary geometrical shape modeling RSA. Stem migration was measured in 50 patients recruited from an on-going Randomized Controlled Trial. We performed marker-based analysis with the Um RSA and RSAcore systems and compared these results with those of the elementary geometrical shape RSA. The precision for subsidence was 0.118 mm for Um RSA, 0.141 mm for RSAcore, and 0.136 mm for elementary geometrical shape RSA. The precision for retroversion was 1.3° for elementary geometrical shape RSA, approximately 2-fold greater than that for the other methods. The intraclass correlation coefficient between the marker-based systems and elementary geometrical shape RSA was approximately 0.5 for retroversion. All 3 methods yielded ICCs for subsidence and varus-valgus rotation above 0.9. We found an excellent correlation between marker-based RSA and elementary geometrical shape RSA for subsidence and varus-valgus rotation, independent of the system used. The precisions for out-of-plane migration were inferior for elementary geometrical shape RSA. Therefore, as a mechanism of failure, retroversion may be more difficult to detect early. This is to our knowledge the first study to compare different RSA systems with or without markers on the implant. Marker-based RSA has high precision in all planes, independent of the system used. Elementary geometrical shape RSA is inferior in out-of-plane migration. Copyright © 2014 Elsevier Ltd. All rights reserved.

  11. [Health care economic guidance in Germany from the example Morbi-RSA].

    PubMed

    Litmathe, Jens

    2016-04-01

    Increasing costs in health care represent still a major challenge in most industrial contries. A lot of attempts especially in Germany have been made to manage such problems and for a fair allocation oft he underlying resources. One of this ist the Morbi-RSA. The current review reflects all historical, medical and economical aspects of the Morbi-RSA and gives a perspective to possible future developments.

  12. Dual-Layer Video Encryption using RSA Algorithm

    NASA Astrophysics Data System (ADS)

    Chadha, Aman; Mallik, Sushmit; Chadha, Ankit; Johar, Ravdeep; Mani Roja, M.

    2015-04-01

    This paper proposes a video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at applications requiring sensitive video information transfers. The system is primarily designed to work with files encoded using the Audio Video Interleaved (AVI) codec, although it can be easily ported for use with Moving Picture Experts Group (MPEG) encoded files. The audio and video components of the source separately undergo two layers of encryption to ensure a reasonable level of security. Encryption of the video component involves applying the RSA algorithm followed by the PN-based encryption. Similarly, the audio component is first encrypted using PN and further subjected to encryption using the Discrete Cosine Transform. Combining these techniques, an efficient system, invulnerable to security breaches and attacks with favorable values of parameters such as encryption/decryption speed, encryption/decryption ratio and visual degradation; has been put forth. For applications requiring encryption of sensitive data wherein stringent security requirements are of prime concern, the system is found to yield negligible similarities in visual perception between the original and the encrypted video sequence. For applications wherein visual similarity is not of major concern, we limit the encryption task to a single level of encryption which is accomplished by using RSA, thereby quickening the encryption process. Although some similarity between the original and encrypted video is observed in this case, it is not enough to comprehend the happenings in the video.

  13. Precision assessment of model-based RSA for a total knee prosthesis in a biplanar set-up.

    PubMed

    Trozzi, C; Kaptein, B L; Garling, E H; Shelyakova, T; Russo, A; Bragonzoni, L; Martelli, S

    2008-10-01

    Model-based Roentgen Stereophotogrammetric Analysis (RSA) was recently developed for the measurement of prosthesis micromotion. Its main advantage is that markers do not need to be attached to the implants as traditional marker-based RSA requires. Model-based RSA has only been tested in uniplanar radiographic set-ups. A biplanar set-up would theoretically facilitate the pose estimation algorithm, since radiographic projections would show more different shape features of the implants than in uniplanar images. We tested the precision of model-based RSA and compared it with that of the traditional marker-based method in a biplanar set-up. Micromotions of both tibial and femoral components were measured with both the techniques from double examinations of patients participating in a clinical study. The results showed that in the biplanar set-up model-based RSA presents a homogeneous distribution of precision for all the translation directions, but an inhomogeneous error for rotations, especially internal-external rotation presented higher errors than rotations about the transverse and sagittal axes. Model-based RSA was less precise than the marker-based method, although the differences were not significant for the translations and rotations of the tibial component, with the exception of the internal-external rotations. For both prosthesis components the precisions of model-based RSA were below 0.2 mm for all the translations, and below 0.3 degrees for rotations about transverse and sagittal axes. These values are still acceptable for clinical studies aimed at evaluating total knee prosthesis micromotion. In a biplanar set-up model-based RSA is a valid alternative to traditional marker-based RSA where marking of the prosthesis is an enormous disadvantage.

  14. The C. elegans RSA complex localizes protein phosphatase 2A to centrosomes and regulates mitotic spindle assembly.

    PubMed

    Schlaitz, Anne-Lore; Srayko, Martin; Dammermann, Alexander; Quintin, Sophie; Wielsch, Natalie; MacLeod, Ian; de Robillard, Quentin; Zinke, Andrea; Yates, John R; Müller-Reichert, Thomas; Shevchenko, Andrei; Oegema, Karen; Hyman, Anthony A

    2007-01-12

    Microtubule behavior changes during the cell cycle and during spindle assembly. However, it remains unclear how these changes are regulated and coordinated. We describe a complex that targets the Protein Phosphatase 2A holoenzyme (PP2A) to centrosomes in C. elegans embryos. This complex includes Regulator of Spindle Assembly 1 (RSA-1), a targeting subunit for PP2A, and RSA-2, a protein that binds and recruits RSA-1 to centrosomes. In contrast to the multiple functions of the PP2A catalytic subunit, RSA-1 and RSA-2 are specifically required for microtubule outgrowth from centrosomes and for spindle assembly. The centrosomally localized RSA-PP2A complex mediates these functions in part by regulating two critical mitotic effectors: the microtubule destabilizer KLP-7 and the C. elegans regulator of spindle assembly TPXL-1. By regulating a subset of PP2A functions at the centrosome, the RSA complex could therefore provide a means of coordinating microtubule outgrowth from centrosomes and kinetochore microtubule stability during mitotic spindle assembly.

  15. Marker-based or model-based RSA for evaluation of hip resurfacing arthroplasty? A clinical validation and 5-year follow-up.

    PubMed

    Lorenzen, Nina Dyrberg; Stilling, Maiken; Jakobsen, Stig Storgaard; Gustafson, Klas; Søballe, Kjeld; Baad-Hansen, Thomas

    2013-11-01

    The stability of implants is vital to ensure a long-term survival. RSA determines micro-motions of implants as a predictor of early implant failure. RSA can be performed as a marker- or model-based analysis. So far, CAD and RE model-based RSA have not been validated for use in hip resurfacing arthroplasty (HRA). A phantom study determined the precision of marker-based and CAD and RE model-based RSA on a HRA implant. In a clinical study, 19 patients were followed with stereoradiographs until 5 years after surgery. Analysis of double-examination migration results determined the clinical precision of marker-based and CAD model-based RSA, and at the 5-year follow-up, results of the total translation (TT) and the total rotation (TR) for marker- and CAD model-based RSA were compared. The phantom study showed that comparison of the precision (SDdiff) in marker-based RSA analysis was more precise than model-based RSA analysis in TT (p CAD < 0.001; p RE = 0.04) and TR (p CAD = 0.01; p RE < 0.001). The clinical precision (double examination in 8 patients) comparing the precision SDdiff was better evaluating the TT using the marker-based RSA analysis (p = 0.002), but showed no difference between the marker- and CAD model-based RSA analysis regarding the TR (p = 0.91). Comparing the mean signed values regarding the TT and the TR at the 5-year follow-up in 13 patients, the TT was lower (p = 0.03) and the TR higher (p = 0.04) in the marker-based RSA compared to CAD model-based RSA. The precision of marker-based RSA was significantly better than model-based RSA. However, problems with occluded markers lead to exclusion of many patients which was not a problem with model-based RSA. HRA were stable at the 5-year follow-up. The detection limit was 0.2 mm TT and 1° TR for marker-based and 0.5 mm TT and 1° TR for CAD model-based RSA for HRA.

  16. Implementation and validation of an implant-based coordinate system for RSA migration calculation.

    PubMed

    Laende, Elise K; Deluzio, Kevin J; Hennigar, Allan W; Dunbar, Michael J

    2009-10-16

    An in vitro radiostereometric analysis (RSA) phantom study of a total knee replacement was carried out to evaluate the effect of implementing two new modifications to the conventional RSA procedure: (i) adding a landmark of the tibial component as an implant marker and (ii) defining an implant-based coordinate system constructed from implant landmarks for the calculation of migration results. The motivation for these two modifications were (i) to improve the representation of the implant by the markers by including the stem tip marker which increases the marker distribution (ii) to recover clinical RSA study cases with insufficient numbers of markers visible in the implant polyethylene and (iii) to eliminate errors in migration calculations due to misalignment of the anatomical axes with the RSA global coordinate system. The translational and rotational phantom studies showed no loss of accuracy with the two new measurement methods. The RSA system employing these methods has a precision of better than 0.05 mm for translations and 0.03 degrees for rotations, and an accuracy of 0.05 mm for translations and 0.15 degrees for rotations. These results indicate that the new methods to improve the interpretability, relevance, and standardization of the results do not compromise precision and accuracy, and are suitable for application to clinical data.

  17. Adherence of hip and knee arthroplasty studies to RSA standardization guidelines

    PubMed Central

    Mäkinen, Tatu J; Aro, Hannu T; Bragdon, Charles; Malchau, Henrik

    2014-01-01

    Background and purpose Guidelines for standardization of radiostereometry (RSA) of implants were published in 2005 to facilitate comparison of outcomes between various research groups. In this systematic review, we determined how well studies have adhered to these guidelines. Methods We carried out a literature search to identify all articles published between January 2000 and December 2011 that used RSA in the evaluation of hip or knee prosthesis migration. 2 investigators independently evaluated each of the studies for adherence to the 13 individual guideline items. Since some of the 13 points included more than 1 criterion, studies were assessed on whether each point was fully met, partially met, or not met. Results 153 studies that met our inclusion criteria were identified. 61 of these were published before the guidelines were introduced (2000–2005) and 92 after the guidelines were introduced (2006–2011). The methodological quality of RSA studies clearly improved from 2000 to 2011. None of the studies fully met all 13 guidelines. Nearly half (43) of the studies published after the guidelines demonstrated a high methodological quality and adhered at least partially to 10 of the 13 guidelines, whereas less than one-fifth (11) of the studies published before the guidelines had the same methodological quality. Commonly unaddressed guideline items were related to imaging methodology, determination of precision from double examinations, and also mean error of rigid-body fitting and condition number cutoff levels. Interpretation The guidelines have improved methodological reporting in RSA studies, but adherence to these guidelines is still relatively low. There is a need to update and clarify the guidelines for clinical hip and knee arthroplasty RSA studies. PMID:24954489

  18. Early Adversity, RSA, and Inhibitory Control: Evidence of Children’s Neurobiological Sensitivity to Social Context

    PubMed Central

    Skowron, Elizabeth A.; Cipriano-Essel, Elizabeth; Gatzke-Kopp, Lisa M.; Teti, Douglas M.; Ammerman, Robert T.

    2014-01-01

    This study examined parasympathetic physiology as a moderator of the effects of early adversity (i.e., child abuse and neglect) on children’s inhibitory control. Children’s respiratory sinus arrhythmia (RSA) was assessed during a resting baseline, two joint challenge tasks with mother, and an individual frustration task. RSA assessed during each of the joint parent–child challenge tasks moderated the effects of child maltreatment (CM) status on children’s independently-assessed inhibitory control. No moderation effect was found for RSA assessed at baseline or in the child-alone challenge task. Among CM-exposed children, lower RSA levels during the joint task predicted the lowest inhibitory control, whereas higher joint task RSA was linked to higher inhibitory control scores that were indistinguishable from those of non-CM children. Results are discussed with regard to the importance of considering context specificity (i.e., individual and caregiver contexts) in how biomarkers inform our understanding of individual differences in vulnerability among at-risk children. PMID:24142832

  19. Federation for a Secure Enterprise

    DTIC Science & Technology

    2016-09-10

    12 October 2005 e. RFC Internet X.509 Public Key Infrastructure: Certification Path Building, 2005 f. Public Key Cryptography Standard, PKCS #1...v2.2: RSA Cryptography Standard, RSA Laboratories, October 27, 2012 g. PKCS#12 format PKCS #12 v1.0: Personal Information Exchange Syntax Standard, RSA...ClientHello padding extension, 2015-02-17 f. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier

  20. Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes

    NASA Astrophysics Data System (ADS)

    Tavallaei, Saeed Ebadi; Falahati, Abolfazl

    Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as "key escrow" in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.

  1. Children's Externalizing and Internalizing Symptoms over Time: The Role of Individual Differences in Patterns of RSA Responding

    ERIC Educational Resources Information Center

    Hinnant, James Benjamin; El-Sheikh, Mona

    2009-01-01

    We examined associations between basal respiratory sinus arrhythmia (RSA) in conjunction with RSA regulation with the hypothesis that their interaction would explain unique variability in children's prospective adjustment 2 years later. Participants were 176 children (98 girls; 78 boys) in middle childhood. RSA regulation was assessed through…

  2. Characterization of the interaction between protein Snu13p/15.5K and the Rsa1p/NUFIP factor and demonstration of its functional importance for snoRNP assembly

    PubMed Central

    Rothé, Benjamin; Back, Régis; Quinternet, Marc; Bizarro, Jonathan; Robert, Marie-Cécile; Blaud, Magali; Romier, Christophe; Manival, Xavier; Charpentier, Bruno; Bertrand, Edouard; Branlant, Christiane

    2014-01-01

    The yeast Snu13p protein and its 15.5K human homolog both bind U4 snRNA and box C/D snoRNAs. They also bind the Rsa1p/NUFIP assembly factor, proposed to scaffold immature snoRNPs and to recruit the Hsp90-R2TP chaperone complex. However, the nature of the Snu13p/15.5K–Rsa1p/NUFIP interaction and its exact role in snoRNP assembly remained to be elucidated. By using biophysical, molecular and imaging approaches, here, we identify residues needed for Snu13p/15.5K–Rsa1p/NUFIP interaction. By NMR structure determination and docking approaches, we built a 3D model of the Snup13p–Rsa1p interface, suggesting that residues R249, R246 and K250 in Rsa1p and E72 and D73 in Snu13p form a network of electrostatic interactions shielded from the solvent by hydrophobic residues from both proteins and that residue W253 of Rsa1p is inserted in a hydrophobic cavity of Snu13p. Individual mutations of residues in yeast demonstrate the functional importance of the predicted interactions for both cell growth and snoRNP formation. Using archaeal box C/D sRNP 3D structures as templates, the association of Snu13p with Rsa1p is predicted to be exclusive of interactions in active snoRNPs. Rsa1p and NUFIP may thus prevent premature activity of pre-snoRNPs, and their removal may be a key step for active snoRNP production. PMID:24234454

  3. Cross-cultural validation of the Resilience Scale for Adults (RSA) in Iran.

    PubMed

    Jowkar, Bahram; Friborg, Oddgeir; Hjemdal, Odin

    2010-10-01

    Resilience, as an ability to withstand and rebound from crisis and adversity, is becoming an increasingly popular concept in research on intervention and prevention of mental health. The present study examined psychometric properties of a Persian version of the Resilience Scale for Adults (RSA), a scale intended to measure protective factors presumed to enhance resilience. The participants were 373 university undergraduate students, as well as 30 pairs of run-away girls and a matched control group. A confirmatory factor analysis verified the Norwegian five-factor structure. All subscale scores, personal competence, social competence, family cohesion, social resources and structured style, had good reliability. The convergent validity of the RSA was supported by showing positive associations with another resilience scale, i.e., a Persian version of the Connor-Davidson Resilience Scale (CD-RISC). Predictive validity of the RSA was supported, as well, by significantly differentiating between girls who had run away from home and a matched control group. The results indicate that the RSA may be a valid and reliable scale for the assessment of resilience protective resources in an Iranian population. © 2010 The Authors. Scandinavian Journal of Psychology © 2010 The Scandinavian Psychological Associations.

  4. The effect of decreasing computed tomography dosage on radiostereometric analysis (RSA) accuracy at the glenohumeral joint.

    PubMed

    Fox, Anne-Marie V; Kedgley, Angela E; Lalone, Emily A; Johnson, James A; Athwal, George S; Jenkyn, Thomas R

    2011-11-10

    Standard, beaded radiostereometric analysis (RSA) and markerless RSA often use computed tomography (CT) scans to create three-dimensional (3D) bone models. However, ethical concerns exist due to risks associated with CT radiation exposure. Therefore, the aim of this study was to investigate the effect of decreasing CT dosage on RSA accuracy. Four cadaveric shoulder specimens were scanned using a normal-dose CT protocol and two low-dose protocols, where the dosage was decreased by 89% and 98%. 3D computer models of the humerus and scapula were created using each CT protocol. Bi-planar fluoroscopy was used to image five different static glenohumeral positions and two dynamic glenohumeral movements, of which a total of five static and four dynamic poses were selected for analysis. For standard RSA, negligible differences were found in bead (0.21±0.31mm) and bony landmark (2.31±1.90mm) locations when the CT dosage was decreased by 98% (p-values>0.167). For markerless RSA kinematic results, excellent agreement was found between the normal-dose and lowest-dose protocol, with all Spearman rank correlation coefficients greater than 0.95. Average root mean squared errors of 1.04±0.68mm and 2.42±0.81° were also found at this reduced dosage for static positions. In summary, CT dosage can be markedly reduced when performing shoulder RSA to minimize the risks of radiation exposure. Standard RSA accuracy was negligibly affected by the 98% CT dose reduction and for markerless RSA, the benefits of decreasing CT dosage to the subject outweigh the introduced errors. Copyright © 2011 Elsevier Ltd. All rights reserved.

  5. RSA Monitoring Redesign Initiative Informational Booklet #2

    ERIC Educational Resources Information Center

    US Department of Education, 2005

    2005-01-01

    The U.S. Department of Education's Rehabilitation Services Administration (RSA) is undertaking a major initiative to substantially redesign its program monitoring and improvement system. The overriding goal is to improve vocational rehabilitation (VR) services and employment outcomes for individuals with disabilities through the development of a…

  6. An Inexpensive Device for Teaching Public Key Encryption

    ERIC Educational Resources Information Center

    Pendegraft, Norman

    2009-01-01

    An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…

  7. Respiratory sinus arrhythmia responses to induced emotional states: effects of RSA indices, emotion induction method, age, and sex.

    PubMed

    Overbeek, Thérèse J M; van Boxtel, Anton; Westerink, Joyce H D M

    2012-09-01

    The literature shows large inconsistencies in respiratory sinus arrhythmia (RSA) responses to induced emotional states. This may be caused by differences in emotion induction methods, RSA quantification, and non-emotional demands of the situation. In 83 healthy subjects, we studied RSA responses to pictures and film fragments eliciting six different discrete emotions relative to neutral baseline stimuli. RSA responses were quantified in the time and frequency domain and were additionally corrected for differences in mean heart rate and respiration rate, resulting in eight different RSA response measures. Subjective ratings of emotional stimuli and facial electromyographic responses indicated that pictures and film fragments elicited the intended emotions. Although RSA measures showed various emotional effects, responses were quite heterogeneous and frequently nonsignificant. They were substantially influenced by methodological factors, in particular time vs. frequency domain response measures, correction for changes in respiration rate, use of pictures vs. film fragments, and sex of participants. Copyright © 2012 Elsevier B.V. All rights reserved.

  8. Quantum Public Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2017-11-01

    Classical public key cryptosystems ( P K C), such as R S A, E I G a m a l, E C C, are no longer secure in quantum algorithms, and quantum cryptography has become a novel research topic. In this paper we present a quantum asymmetrical cryptosystem i.e. quantum public key cryptosystem ( Q P K C) based on the Bell states. In particular, in the proposed QPKC the public key are given by the first n particles of Bell states and generalized Pauli operations. The corresponding secret key are the last n particles of Bell states and the inverse of generalized Pauli operations. The proposed QPKC encrypts the message using a public key and decrypts the ciphertext using a private key. By H o l e v o ' s theorem, we proved the security of the secret key and messages during the QPKC.

  9. Association of the IL4R single-nucleotide polymorphism I50V with recurrent spontaneous abortion (RSA).

    PubMed

    Tavasolian, Fataneh; Abdollahi, Elham; Samadi, Morteza

    2014-07-01

    Recurrent spontaneous abortion (RSA) is defined as three or more consecutive abortions before the 20th week of gestation. There is increasing evidence to support an immunological mechanism for the occurrence of RSA. The purpose of our study was to examine whether single-nucleotide polymorphisms (SNPs) of the interleukin-4 receptor gene IL4R influence susceptibility to, recurrent spontaneous abortion. This is a case-control study. We recruited 200 patients with RSA (case group) using established diagnostic criteria and 200, normal individuals (control group) at the fertility and infertility center in Yazd city and Isfahan city during 2012 to 2013. We screened the I50V variant in IL-4R in patients and controls by PCR-RFLF method, and we performed an association analysis between I50V variant and RSA.the data was analyzed by spss 16 software using Chi-square test. No differences in the genotype and allele frequencies of the I50V SNPs were identified between patients with RSA and healthy controls. The frequency of SNP in IL-4 receptor (I50V) in patients with recurrent spontaneous abortion did not differ significantly compared with the control group. Analysis of IL4R SNP haplotypes or complex alleles suggested no dominant protection in patients with RSA.

  10. Measurement of migration of soft tissue by modified Roentgen stereophotogrammetric analysis (RSA): validation of a new technique to monitor rotator cuff tears.

    PubMed

    Cashman, P M M; Baring, T; Reilly, P; Emery, R J H; Amis, A A

    2010-04-01

    The purpose of this study was to develop a technique to use Roentgen stereophotogrammetric analysis (RSA) to measure migration of soft-tissue structures after rotator cuff repair. RSA stereo films were obtained; images were analysed using a semi-automatic software program allowing 3D viewing of results. RSA imaging experiments were performed to validate the technique, using a glass phantom with implanted RSA beads and an animal model with steel sutures as RSA markers which were moved known distances. Repeated measurements allowed assessment of inter- and intra-observer variability at a maximum of 1.06 mm. RSA analysis of the phantom showed a variation up to 0.22 mm for static and 0.28 mm for dynamic studies. The ovine tissue specimen demonstrated that using steel sutures as RSA markers in soft tissue is feasible, although less accurate than when measuring bone motion. This novel application of RSA to measure soft tissue migration is practicable and can be extended to in vivo studies.

  11. On the improvement of Wiener attack on RSA with small private exponent.

    PubMed

    Wu, Mu-En; Chen, Chien-Ming; Lin, Yue-Hsun; Sun, Hung-Min

    2014-01-01

    RSA system is based on the hardness of the integer factorization problem (IFP). Given an RSA modulus N = pq, it is difficult to determine the prime factors p and q efficiently. One of the most famous short exponent attacks on RSA is the Wiener attack. In 1997, Verheul and van Tilborg use an exhaustive search to extend the boundary of the Wiener attack. Their result shows that the cost of exhaustive search is 2r + 8 bits when extending the Weiner's boundary r bits. In this paper, we first reduce the cost of exhaustive search from 2r + 8 bits to 2r + 2 bits. Then, we propose a method named EPF. With EPF, the cost of exhaustive search is further reduced to 2r - 6 bits when we extend Weiner's boundary r bits. It means that our result is 2(14) times faster than Verheul and van Tilborg's result. Besides, the security boundary is extended 7 bits.

  12. On the Improvement of Wiener Attack on RSA with Small Private Exponent

    PubMed Central

    Chen, Chien-Ming; Lin, Yue-Hsun

    2014-01-01

    RSA system is based on the hardness of the integer factorization problem (IFP). Given an RSA modulus N = pq, it is difficult to determine the prime factors p and q efficiently. One of the most famous short exponent attacks on RSA is the Wiener attack. In 1997, Verheul and van Tilborg use an exhaustive search to extend the boundary of the Wiener attack. Their result shows that the cost of exhaustive search is 2r + 8 bits when extending the Weiner's boundary r bits. In this paper, we first reduce the cost of exhaustive search from 2r + 8 bits to 2r + 2 bits. Then, we propose a method named EPF. With EPF, the cost of exhaustive search is further reduced to 2r − 6 bits when we extend Weiner's boundary r bits. It means that our result is 214 times faster than Verheul and van Tilborg's result. Besides, the security boundary is extended 7 bits. PMID:24982974

  13. Public Key Infrastructure Study

    DTIC Science & Technology

    1994-04-01

    commerce. This Public Key Infrastructure (PKI) study focuses on the United States Federal Government operations, but also addresses national and global ... issues in order to facilitate the interoperation of protected electronic commerce among the various levels of government in the U.S., private citizens

  14. Least loaded and route fragmentation aware RSA strategies for elastic optical networks

    NASA Astrophysics Data System (ADS)

    Batham, Deepak; Yadav, Dharmendra Singh; Prakash, Shashi

    2017-12-01

    Elastic optical networks (EONs) provide flexibility to assign wide range of spectral resources to the connection requests. In this manuscript, we address two issues related to spectrum assignment in EONs: the non uniform spectrum assignment along different links of the route and the spectrum fragmentation in the network. To address these issues, two routing and spectrum assignment (RSA) strategies have been proposed: Least Loaded RSA (LLRSA) and Route Fragmentation Aware RSA (RFARSA). The LLRSA allocates spectrum homogeneously along different links in the network, where as RFARSA accords priority to the routes which are less fragmented. To highlight the salient features of the two strategies, two new metrics, route fragmentation index (RFI) and standard deviation (SD) are introduced. RFI is defined as the ratio of non-contiguous FSs to the total available free FSs on the route, and SD relates to the measure of non-uniformity in the allocation of resources on the links in the network. A simulation program has been developed to evaluate the performance of the proposed (LLRSA and RFARSA) strategies, and the existing strategies of shortest path RSA (SPRSA) and spectrum compactness based defragmentation (SCD) strategies, on the metric of RFI, bandwidth blocking probability (BBP), network capacity utilized, and SD. The variation in the metrics on the basis of number of requests and the bandwidth (number of FSs) requested has been studied. It has been conclusively established that the proposed strategies (LLRSA and RFARSA) outperform the existing strategies in terms of all the metrics.

  15. RsaM: a transcriptional regulator of Burkholderia spp. with novel fold

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Michalska, Karolina; Chhor, Gekleng; Clancy, Shonda

    2014-07-04

    Burkholderia cepacia complex (Bcc) is a set of closely related bacterial species that are notorious pathogens of cystic fibrosis patients, responsible for life-threatening lung infections. Expression of several virulence factors of Bcc is controlled by a mechanism known as quorum sensing (QS). QS is a means of bacterial communication used to coordinate gene expression in a cell-density-dependent manner. The system involves the production of diffusible signaling molecules (N-acyl-L-homoserine lactones, AHLs), that bind to cognate transcriptional regulators and influence their ability to regulate gene expression. One such system that is highly conserved in Bcc consists of CepI and CepR. CepI ismore » AHL synthase, while CepR is an AHL-dependent transcription factor. In most members of the Bcc group, the cepI and cepR genes are divergently transcribed and separated by additional genes. One of them, bcam1869, encodes the BcRsaM protein, which was recently postulated to modulate the abundance or activity of CepI or CepR. Here we show the crystal structure of BcRsaM from B. cenocepacia J2315. It is a single-domain protein with unique topology and presents a novel fold. The protein is a dimer in the crystal and in solution. This regulator has no known DNA binding motifs and direct binding of BcRsaM to the cepI promoter could not be detected in in vitro assays. Therefore, we propose that the modulatory action of RsaM might result from interactions with other components of the QS machinery rather than from direct association with the DNA promoter.« less

  16. Resilience in a reborn nation: Validation of the Lithuanian Resilience Scale for Adults (RSA).

    PubMed

    Hilbig, Jan; Viliūnienė, Rima; Friborg, Oddgeir; Pakalniškienė, Vilmantė; Danilevičiūtė, Vita

    2015-07-01

    Resilience, as an ability to withstand or rebound from crisis or adversity, is becoming an increasingly significant concept in health promotion and well-being. Individuals exhibiting resilience use skills or resources flexibly to solve situational demands. The Resilience Scale for Adults (RSA) may be used to assess protective resources, and the aim of the present study was to validate the Lithuanian translation. The translated RSA was administered to a clinical (n=125) and a non clinical sample (n=499) to examine the discriminant validity of the RSA items with a confirmatory factor analysis, the internal consistency as well as construct validity by correlating it with the Quick Psycho-Affective Symptoms Scan (QPASS). The internal consistency, the test-retest stability and the factor structure were replicated as adequate, thus indicating good psychometric properties and support of discriminant validity. Females reported more resilience resources for the domains of social competence, family cohesion and social resources compared to men. The RSA subscales correlated negatively with the QPASS scores, and patients reported significantly less resilience resources than non-patients, thus indicating construct validity. Valid psychometric tools for research purposes and routine every-day use are urgently needed in Lithuania, a young nation still under numerous challenges due to social, economic and political transitions. The RSA represents a reliable and valid tool for assessing protective factors. Assessing resilience factors may extend the understanding of factors relevant for mental health problems as well as treatment prognosis beyond the capabilities of mere symptom oriented approaches. Copyright © 2015 Elsevier Inc. All rights reserved.

  17. RSA Opening Minds: A Curriculum for the 21st Century

    ERIC Educational Resources Information Center

    Candy, Sara

    2011-01-01

    This article discusses the RSA Opening Minds competence framework, an innovative curriculum to meet the needs of young people as future employees, lifelong learners and as citizens of the twenty-first century.

  18. Validation of the brief version of the Recovery Self-Assessment (RSA-B) using Rasch measurement theory.

    PubMed

    Barbic, Skye P; Kidd, Sean A; Davidson, Larry; McKenzie, Kwame; O'Connell, Maria J

    2015-12-01

    In psychiatry, the recovery paradigm is increasingly identified as the overarching framework for service provision. Currently, the Recovery Self-Assessment (RSA), a 36-item rating scale, is commonly used to assess the uptake of a recovery orientation in clinical services. However, the consumer version of the RSA has been found challenging to complete because of length and the reading level required. In response to this feedback, a brief 12-item version of the RSA was developed (RSA-B). This article describes the development of the modified instrument and the application of traditional psychometric analysis and Rasch Measurement Theory to test the psychometrics properties of the RSA-B. Data from a multisite study of adults with serious mental illnesses (n = 1256) who were followed by assertive community treatment teams were examined for reliability, clinical meaning, targeting, response categories, model fit, reliability, dependency, and raw interval-level measurement. Analyses were performed using the Rasch Unidimensional Measurement Model (RUMM 2030). Adequate fit to the Rasch model was observed (χ2 = 112.46, df = 90, p = .06) and internal consistency was good (r = .86). However, Rasch analysis revealed limitations of the 12-item version, with items covering only 39% of the targeted theoretical continuum, 2 misfitting items, and strong evidence for the 5 option response categories not working as intended. This study revealed areas for improvement in the shortened version of the 12-item RSA-B. A revisit of the conceptual model and original 36-item rating scale is encouraged to select items that will help practitioners and researchers measure the full range of recovery orientation. (c) 2015 APA, all rights reserved).

  19. RSA cryptosystem with fuzzy set theory for encryption and decryption

    NASA Astrophysics Data System (ADS)

    Abdullah, Kamilah; Bakar, Sumarni Abu; Kamis, Nor Hanimah; Aliamis, Hardi

    2017-11-01

    In the communication area, user is more focus on communication instead of security of the data communication. Many cryptosystems have been improvised to achieved the effectiveness in communication. RSA cryptosystem is one of well-known cryptosystem used to secure the information and protect the communication by providing a difficulty to the attackers specifically in encryption and decryption. As need arises for guarantee the security of the cryptosystem while the communication must be ensured, we propose a new RSA cryptosystem which is based on fuzzy set theory whereby the plaintext and the ciphertext are in terms of Triangular Fuzzy Number (TFN). Decryption result shows that the message obtained is the same as the original plaintext. This study reveals that the fuzzy set theory is suitable to be used as an alternative tool in securing other cryptosystem.

  20. Adherence of hip and knee arthroplasty studies to RSA standardization guidelines. A systematic review.

    PubMed

    Madanat, Rami; Mäkinen, Tatu J; Aro, Hannu T; Bragdon, Charles; Malchau, Henrik

    2014-09-01

    Guidelines for standardization of radiostereometry (RSA) of implants were published in 2005 to facilitate comparison of outcomes between various research groups. In this systematic review, we determined how well studies have adhered to these guidelines. We carried out a literature search to identify all articles published between January 2000 and December 2011 that used RSA in the evaluation of hip or knee prosthesis migration. 2 investigators independently evaluated each of the studies for adherence to the 13 individual guideline items. Since some of the 13 points included more than 1 criterion, studies were assessed on whether each point was fully met, partially met, or not met. 153 studies that met our inclusion criteria were identified. 61 of these were published before the guidelines were introduced (2000-2005) and 92 after the guidelines were introduced (2006-2011). The methodological quality of RSA studies clearly improved from 2000 to 2011. None of the studies fully met all 13 guidelines. Nearly half (43) of the studies published after the guidelines demonstrated a high methodological quality and adhered at least partially to 10 of the 13 guidelines, whereas less than one-fifth (11) of the studies published before the guidelines had the same methodological quality. Commonly unaddressed guideline items were related to imaging methodology, determination of precision from double examinations, and also mean error of rigid-body fitting and condition number cutoff levels. The guidelines have improved methodological reporting in RSA studies, but adherence to these guidelines is still relatively low. There is a need to update and clarify the guidelines for clinical hip and knee arthroplasty RSA studies.

  1. Improved prediction of residue flexibility by embedding optimized amino acid grouping into RSA-based linear models.

    PubMed

    Zhang, Hua; Kurgan, Lukasz

    2014-12-01

    Knowledge of protein flexibility is vital for deciphering the corresponding functional mechanisms. This knowledge would help, for instance, in improving computational drug design and refinement in homology-based modeling. We propose a new predictor of the residue flexibility, which is expressed by B-factors, from protein chains that use local (in the chain) predicted (or native) relative solvent accessibility (RSA) and custom-derived amino acid (AA) alphabets. Our predictor is implemented as a two-stage linear regression model that uses RSA-based space in a local sequence window in the first stage and a reduced AA pair-based space in the second stage as the inputs. This method is easy to comprehend explicit linear form in both stages. Particle swarm optimization was used to find an optimal reduced AA alphabet to simplify the input space and improve the prediction performance. The average correlation coefficients between the native and predicted B-factors measured on a large benchmark dataset are improved from 0.65 to 0.67 when using the native RSA values and from 0.55 to 0.57 when using the predicted RSA values. Blind tests that were performed on two independent datasets show consistent improvements in the average correlation coefficients by a modest value of 0.02 for both native and predicted RSA-based predictions.

  2. RSA prediction of high failure rate for the uncoated Interax TKA confirmed by meta-analysis.

    PubMed

    Pijls, Bart G; Nieuwenhuijse, Marc J; Schoones, Jan W; Middeldorp, Saskia; Valstar, Edward R; Nelissen, Rob G H H

    2012-04-01

    In a previous radiostereometric (RSA) trial the uncoated, uncemented, Interax tibial components showed excessive migration within 2 years compared to HA-coated and cemented tibial components. It was predicted that this type of fixation would have a high failure rate. The purpose of this systematic review and meta-analysis was to investigate whether this RSA prediction was correct. We performed a systematic review and meta-analysis to determine the revision rate for aseptic loosening of the uncoated and cemented Interax tibial components. 3 studies were included, involving 349 Interax total knee arthroplasties (TKAs) for the comparison of uncoated and cemented fixation. There were 30 revisions: 27 uncoated and 3 cemented components. There was a 3-times higher revision rate for the uncoated Interax components than that for cemented Interax components (OR = 3; 95% CI: 1.4-7.2). This meta-analysis confirms the prediction of a previous RSA trial. The uncoated Interax components showed the highest migration and turned out to have the highest revision rate for aseptic loosening. RSA appears to enable efficient detection of an inferior design as early as 2 years postoperatively in a small group of patients.

  3. miR-520 promotes DNA-damage-induced trophoblast cell apoptosis by targeting PARP1 in recurrent spontaneous abortion (RSA).

    PubMed

    Dong, Xiujuan; Yang, Long; Wang, Hui

    2017-04-01

    The establishment and maintenance of successful pregnancy mainly depends on trophoblast cells. Their dysfunction has been implicated in recurrent spontaneous abortion (RSA), a major complication of pregnancy. However, the underlying mechanisms of trophoblasts dysfunction remain unclear. DNA-damage-induced cell apoptosis has been reported to play a vital role in cell death. In this study, we identified a novel microRNA (miR-520) in RSA progression via regulating trophoblast cell apoptosis. Microarray analysis showed that miR-520 was highly expressed in villus of RSA patients. By using flow cytometry analysis, we observed miR-520 expression was correlated with human trophoblast cell apoptosis in vitro, along with decreased poly (ADP-ribose) polymerase-1 (PARP1) expression. With the analysis of clinic samples, we observed that miR-520 level was negatively correlated with PARP1 level in RSA villus. In addition, overexpression of PARP1 restored the miR-520-induced trophoblast cell apoptosis in vitro. The status of chromosome in trophoblast implied that miR-520-promoted DNA-damage-induced cell apoptosis to regulate RSA progression. These results indicated that the level of miR-520 might associate with RSA by prompting trophoblast cell apoptosis via PARP1 dependent DNA-damage pathway.

  4. Accuracy and Precision of Three-Dimensional Low Dose CT Compared to Standard RSA in Acetabular Cups: An Experimental Study.

    PubMed

    Brodén, Cyrus; Olivecrona, Henrik; Maguire, Gerald Q; Noz, Marilyn E; Zeleznik, Michael P; Sköldenberg, Olof

    2016-01-01

    Background and Purpose. The gold standard for detection of implant wear and migration is currently radiostereometry (RSA). The purpose of this study is to compare a three-dimensional computed tomography technique (3D CT) to standard RSA as an alternative technique for measuring migration of acetabular cups in total hip arthroplasty. Materials and Methods. With tantalum beads, we marked one cemented and one uncemented cup and mounted these on a similarly marked pelvic model. A comparison was made between 3D CT and standard RSA for measuring migration. Twelve repeated stereoradiographs and CT scans with double examinations in each position and gradual migration of the implants were made. Precision and accuracy of the 3D CT were calculated. Results. The accuracy of the 3D CT ranged between 0.07 and 0.32 mm for translations and 0.21 and 0.82° for rotation. The precision ranged between 0.01 and 0.09 mm for translations and 0.06 and 0.29° for rotations, respectively. For standard RSA, the precision ranged between 0.04 and 0.09 mm for translations and 0.08 and 0.32° for rotations, respectively. There was no significant difference in precision between 3D CT and standard RSA. The effective radiation dose of the 3D CT method, comparable to RSA, was estimated to be 0.33 mSv. Interpretation. Low dose 3D CT is a comparable method to standard RSA in an experimental setting.

  5. Public key infrastructure for DOE security research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aiken, R.; Foster, I.; Johnston, W.E.

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-keymore » infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.« less

  6. Does respiratory sinus arrhythmia (RSA) predict anxiety reduction during cognitive behavioral therapy (CBT) for social anxiety disorder (SAD)?

    PubMed

    Mathewson, Karen J; Schmidt, Louis A; Miskovic, Vladimir; Santesso, Diane L; Duku, Eric; McCabe, Randi E; Antony, Martin M; Moscovitch, David A

    2013-05-01

    Modifying dysfunctional emotion regulation is an important goal in psychological treatments for social anxiety disorder (SAD). Antecedent-focused strategies learned in cognitive behavioral therapy (CBT), such as cognitive reappraisal, have proven more effective in reducing social anxiety than response-focused strategies, such as expressive suppression. Still, not all patients with SAD respond well to CBT. Medications and physiological factors may also influence the clinical response. The purpose of the present study was to examine the role that these factors play in determining treatment response following CBT for SAD. Using multilevel modeling, we examined associations across four separate laboratory visits between change in self-reported anxiety and indices of reappraisal, suppression, medication status, and resting respiratory sinus arrhythmia (RSA), a proxy measure of self-regulatory capacity, in 23 socially anxious adults during a 12-week program of CBT. Most participants were ultimately classified as responders to CBT (n=15), but in some, anxiety levels remained unchanged (n=8). Medication use explained substantial variance related to individual differences in anxiety among participants. When modeled separately, reappraisal, suppression, and RSA each accounted for significant variance related to anxiety. However, the best-fitting model included reappraisal and RSA. Moreover, RSA reactivity (change in RSA levels over time) was more important for predicting anxiety reduction than were baseline levels of RSA. These findings suggest that reappraisal and parasympathetic responsiveness may be important in reducing anxiety in adults with SAD who respond well to CBT. Copyright © 2013 Elsevier B.V. All rights reserved.

  7. Delay and cost performance analysis of the diffie-hellman key exchange protocol in opportunistic mobile networks

    NASA Astrophysics Data System (ADS)

    Soelistijanto, B.; Muliadi, V.

    2018-03-01

    Diffie-Hellman (DH) provides an efficient key exchange system by reducing the number of cryptographic keys distributed in the network. In this method, a node broadcasts a single public key to all nodes in the network, and in turn each peer uses this key to establish a shared secret key which then can be utilized to encrypt and decrypt traffic between the peer and the given node. In this paper, we evaluate the key transfer delay and cost performance of DH in opportunistic mobile networks, a specific scenario of MANETs where complete end-to-end paths rarely exist between sources and destinations; consequently, the end-to-end delays in these networks are much greater than typical MANETs. Simulation results, driven by a random node movement model and real human mobility traces, showed that DH outperforms a typical key distribution scheme based on the RSA algorithm in terms of key transfer delay, measured by average key convergence time; however, DH performs as well as the benchmark in terms of key transfer cost, evaluated by total key (copies) forwards.

  8. Aspects of ultra-high-precision diamond machining of RSA 443 optical aluminium

    NASA Astrophysics Data System (ADS)

    Mkoko, Z.; Abou-El-Hossein, K.

    2015-08-01

    Optical aluminium alloys such as 6061-T6 are traditionally used in ultra-high precision manufacturing for making optical mirrors for aerospace and other applications. However, the optics industry has recently witnessed the development of more advanced optical aluminium grades that are capable of addressing some of the issues encountered when turning with single-point natural monocrystalline diamond cutters. The advent of rapidly solidified aluminium (RSA) grades has generally opened up new possibilities for ultra-high precision manufacturing of optical components. In this study, experiments were conducted with single-point diamond cutters on rapidly solidified aluminium RSA 443 material. The objective of this study is to observe the effects of depth of cut and feed rate at a fixed rotational speed on the tool wear rate and resulting surface roughness of diamond turned specimens. This is done to gain further understanding of the rate of wear on the diamond cutters versus the surface texture generated on the RSA 443 material. The diamond machining experiments yielded machined surfaces which are less reflective but with consistent surface roughness values. Cutting tools were observed for wear through scanning microscopy; relatively low wear pattern was evident on the diamond tool edge. The highest tool wear were obtained at higher depth of cut and increased feed rate.

  9. Modeling, Simulation and Analysis of Public Key Infrastructure

    NASA Technical Reports Server (NTRS)

    Liu, Yuan-Kwei; Tuey, Richard; Ma, Paul (Technical Monitor)

    1998-01-01

    Security is an essential part of network communication. The advances in cryptography have provided solutions to many of the network security requirements. Public Key Infrastructure (PKI) is the foundation of the cryptography applications. The main objective of this research is to design a model to simulate a reliable, scalable, manageable, and high-performance public key infrastructure. We build a model to simulate the NASA public key infrastructure by using SimProcess and MatLab Software. The simulation is from top level all the way down to the computation needed for encryption, decryption, digital signature, and secure web server. The application of secure web server could be utilized in wireless communications. The results of the simulation are analyzed and confirmed by using queueing theory.

  10. Dual mobility hip arthroplasty wear measurement: Experimental accuracy assessment using radiostereometric analysis (RSA).

    PubMed

    Pineau, V; Lebel, B; Gouzy, S; Dutheil, J-J; Vielpeau, C

    2010-10-01

    The use of dual mobility cups is an effective method to prevent dislocations. However, the specific design of these implants can raise the suspicion of increased wear and subsequent periprosthetic osteolysis. Using radiostereometric analysis (RSA), migration of the femoral head inside the cup of a dual mobility implant can be defined to apprehend polyethylene wear rate. The study aimed to establish the precision of RSA measurement of femoral head migration in the cup of a dual mobility implant, and its intra- and interobserver variability. A total hip prosthesis phantom was implanted and placed under weight loading conditions in a simulator. Model-based RSA measurement of implant penetration involved specially machined polyethylene liners with increasing concentric wear (no wear, then 0.25, 0.5 and 0.75mm). Three examiners, blinded to the level of wear, analyzed (10 times) the radiostereometric films of the four liners. There was one experienced, one trained, and one inexperienced examiner. Statistical analysis measured the accuracy, precision, and intra- and interobserver variability by calculating Root Mean Square Error (RMSE), Concordance Correlation Coefficient (CCC), Intra Class correlation Coefficient (ICC), and Bland-Altman plots. Our protocol, that used a simple geometric model rather than the manufacturer's CAD files, showed precision of 0.072mm and accuracy of 0.034mm, comparable with machining tolerances with low variability. Correlation between wear measurement and true value was excellent with a CCC of 0.9772. Intraobserver reproducibility was very good with an ICC of 0.9856, 0.9883 and 0.9842, respectively for examiners 1, 2 and 3. Interobserver reproducibility was excellent with a CCC of 0.9818 between examiners 2 and 1, and 0.9713 between examiners 3 and 1. Quantification of wear is indispensable for the surveillance of dual mobility implants. This in vitro study validates our measurement method. Our results, and comparison with other studies using

  11. Precision measurements of the RSA method using a phantom model of hip prosthesis.

    PubMed

    Mäkinen, Tatu J; Koort, Jyri K; Mattila, Kimmo T; Aro, Hannu T

    2004-04-01

    Radiostereometric analysis (RSA) has become one of the recommended techniques for pre-market evaluation of new joint implant designs. In this study we evaluated the effect of repositioning of X-ray tubes and phantom model on the precision of the RSA method. In precision measurements, we utilized mean error of rigid body fitting (ME) values as an internal control for examinations. ME value characterizes relative motion among the markers within each rigid body and is conventionally used to detect loosening of a bone marker. Three experiments, each consisting of 10 double examinations, were performed. In the first experiment, the X-ray tubes and the phantom model were not repositioned between one double examination. In experiments two and three, the X-ray tubes were repositioned between one double examination. In addition, the position of the phantom model was changed in experiment three. Results showed that significant differences could be found in 2 of 12 comparisons when evaluating the translation and rotation of the prosthetic components. Repositioning procedures increased ME values mimicking deformation of rigid body segments. Thus, ME value seemed to be a more sensitive parameter than migration values in this study design. These results confirmed the importance of standardized radiographic technique and accurate patient positioning for RSA measurements. Standardization and calibration procedures should be performed with phantom models in order to avoid unnecessary radiation dose of the patients. The present model gives the means to establish and to follow the intra-laboratory precision of the RSA method. The model is easily applicable in any research unit and allows the comparison of the precision values in different laboratories of multi-center trials.

  12. Trochanteric fracture-implant motion during healing - A radiostereometry (RSA) study.

    PubMed

    Bojan, Alicja J; Jönsson, Anders; Granhed, Hans; Ekholm, Carl; Kärrholm, Johan

    2018-03-01

    Cut-out complication remains a major unsolved problem in the treatment of trochanteric hip fractures. A better understanding of the three-dimensional fracture-implant motions is needed to enable further development of clinical strategies and countermeasures. The aim of this clinical study was to characterise and quantify three-dimensional motions between the implant and the bone and between the lag screw and nail of the Gamma nail. Radiostereometry Analysis (RSA) analysis was applied in 20 patients with trochanteric hip fractures treated with an intramedullary nail. The following three-dimensional motions were measured postoperatively, at 1 week, 3, 6 and 12 months: translations of the tip of the lag screw in the femoral head, motions of the lag screw in the nail, femoral head motions relative to the nail and nail movements in the femoral shaft. Cranial migration of the tip of the lag screw dominated over the other two translation components in the femoral head. In all fractures the lag screw slid laterally in the nail and the femoral head moved both laterally and inferiorly towards the nail. All femoral heads translated posteriorly relative to the nail, and rotations occurred in both directions with median values close to zero. The nail tended to retrovert in the femoral shaft. Adverse fracture-implant motions were detected in stable trochanteric hip fractures treated with intramedullary nails with high resolution. Therefore, RSA method can be used to evaluate new implant designs and clinical strategies, which aim to reduce cut-out complications. Future RSA studies should aim at more unstable fractures as these are more likely to fail with cut-out. Copyright © 2018 Elsevier Ltd. All rights reserved.

  13. Validation of gait analysis with dynamic radiostereometric analysis (RSA) in patients operated with total hip arthroplasty.

    PubMed

    Zügner, Roland; Tranberg, Roy; Lisovskaja, Vera; Shareghi, Bita; Kärrholm, Johan

    2017-07-01

    We simultaneously examined 14 patients with OTS and dynamic radiostereometric analysis (RSA) to evaluate the accuracy of both skin- and a cluster-marker models. The mean differences between the OTS and RSA system in hip flexion, abduction, and rotation varied up to 9.5° for the skin-marker and up to 11.3° for the cluster-marker models, respectively. Both models tended to underestimate the amount of flexion and abduction, but a significant systematic difference between the marker and RSA evaluations could only be established for recordings of hip abduction using cluster markers (p = 0.04). The intra-class correlation coefficient (ICC) was 0.7 or higher during flexion for both models and during abduction using skin markers, but decreased to 0.5-0.6 when abduction motion was studied with cluster markers. During active hip rotation, the two marker models tended to deviate from the RSA recordings in different ways with poor correlations at the end of the motion (ICC ≤0.4). During active hip motions soft tissue displacements occasionally induced considerable differences when compared to skeletal motions. The best correlation between RSA recordings and the skin- and cluster-marker model was found for studies of hip flexion and abduction with the skin-marker model. Studies of hip abduction with use of cluster markers were associated with a constant underestimation of the motion. Recordings of skeletal motions with use of skin or cluster markers during hip rotation were associated with high mean errors amounting up to about 10° at certain positions. © 2016 Orthopaedic Research Society. Published by Wiley Periodicals, Inc. J Orthop Res 35:1515-1522, 2017. © 2016 Orthopaedic Research Society. Published by Wiley Periodicals, Inc.

  14. Establishing a recovery orientation in mental health services: Evaluating the Recovery Self-Assessment (RSA) in a Swedish context.

    PubMed

    Rosenberg, David; Svedberg, Petra; Schön, Ulla-Karin

    2015-12-01

    Although there has been an emphasis on developing knowledge regarding recovery in Sweden, it is unclear to what extent this has been translated into a recovery orientation in the provision of mental health services. Instruments, which present the components of recovery as measurable dimensions of change, may provide a framework for program development. Involving users is an essential factor in the utilization of such tools. The purpose of this study was to evaluate the psychometric properties of the Recovery Self-Assessment (RSA) measure and its potential for being utilized in a Swedish context. The sample consisted of 78 participants from 6 community mental health services targeting people with serious mental illnesses in a municipality in Sweden. They completed the RSA at the study baseline and two weeks later. User panels participated in the translation and administration of the RSA and the reporting of results. The Swedish version of the RSA had good face and content validity, satisfactory internal consistency, and a moderate to good level of stability in test-retest reliability. The user panels contributed to establishing validity and as collaborators in the study. Establishing the RSA as a valid and reliable instrument with which to focus on the recovery orientation of services is a first step in beginning to study the types of interventions that may effect and contribute to recovery oriented practice in Sweden. (c) 2015 APA, all rights reserved).

  15. Number Theory and Public-Key Cryptography.

    ERIC Educational Resources Information Center

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  16. Open-Wedge High Tibial Osteotomy: RCT 2 Years RSA Follow-Up.

    PubMed

    Lind-Hansen, Thomas Bruno; Lind, Martin Carøe; Nielsen, Poul Torben; Laursen, Mogens Berg

    2016-11-01

    We investigated the influence of three different bone grafting materials on stability and clinical outcome of the healing open-wedge high tibial osteotomy (OW-HTO) with immediate partial weight bearing. A total of 45 (3 × 15) patients were randomized to injectable calcium phosphate cement (Calcibon; Biomet-Merck Biomaterials GmbH, Darmstadt, Germany), local bone autograft, or iliac crest autograft. Stability of the bony healing was evaluated with radiostereometric analysis (RSA) up to 24 months postoperatively. Clinical outcome was evaluated with the knee injury and osteoarthritis outcome score (KOOS). RSA revealed translations and rotations close to zero regardless of bone grafting material, with no statistically significant differences between the groups. Clinically, the Calcibon group had lower quality of life KOOS subscore at 2 years follow-up. We conclude that with a stable implant and 6 weeks of partial weight bearing, local autografting is sufficient to achieve solid bone consolidation following OW-HTO. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  17. Suppressor mutations identify amino acids in PAA-1/PR65 that facilitate regulatory RSA-1/B″ subunit targeting of PP2A to centrosomes in C. elegans

    PubMed Central

    Lange, Karen I.; Heinrichs, Jeffrey; Cheung, Karen; Srayko, Martin

    2013-01-01

    Summary Protein phosphorylation and dephosphorylation is a key mechanism for the spatial and temporal regulation of many essential developmental processes and is especially prominent during mitosis. The multi-subunit protein phosphatase 2A (PP2A) enzyme plays an important, yet poorly characterized role in dephosphorylating proteins during mitosis. PP2As are heterotrimeric complexes comprising a catalytic, structural, and regulatory subunit. Regulatory subunits are mutually exclusive and determine subcellular localization and substrate specificity of PP2A. At least 3 different classes of regulatory subunits exist (termed B, B′, B″) but there is no obvious similarity in primary sequence between these classes. Therefore, it is not known how these diverse regulatory subunits interact with the same holoenzyme to facilitate specific PP2A functions in vivo. The B″ family of regulatory subunits is the least understood because these proteins lack conserved structural domains. RSA-1 (regulator of spindle assembly) is a regulatory B″ subunit required for mitotic spindle assembly in Caenorhabditis elegans. In order to address how B″ subunits interact with the PP2A core enzyme, we focused on a conditional allele, rsa-1(or598ts), and determined that this mutation specifically disrupts the protein interaction between RSA-1 and the PP2A structural subunit, PAA-1. Through genetic screening, we identified a putative interface on the PAA-1 structural subunit that interacts with a defined region of RSA-1/B″. In the context of previously published results, these data propose a mechanism of how different PP2A B-regulatory subunit families can bind the same holoenzyme in a mutually exclusive manner, to perform specific tasks in vivo. PMID:23336080

  18. Suppressor mutations identify amino acids in PAA-1/PR65 that facilitate regulatory RSA-1/B″ subunit targeting of PP2A to centrosomes in C. elegans.

    PubMed

    Lange, Karen I; Heinrichs, Jeffrey; Cheung, Karen; Srayko, Martin

    2013-01-15

    Protein phosphorylation and dephosphorylation is a key mechanism for the spatial and temporal regulation of many essential developmental processes and is especially prominent during mitosis. The multi-subunit protein phosphatase 2A (PP2A) enzyme plays an important, yet poorly characterized role in dephosphorylating proteins during mitosis. PP2As are heterotrimeric complexes comprising a catalytic, structural, and regulatory subunit. Regulatory subunits are mutually exclusive and determine subcellular localization and substrate specificity of PP2A. At least 3 different classes of regulatory subunits exist (termed B, B', B″) but there is no obvious similarity in primary sequence between these classes. Therefore, it is not known how these diverse regulatory subunits interact with the same holoenzyme to facilitate specific PP2A functions in vivo. The B″ family of regulatory subunits is the least understood because these proteins lack conserved structural domains. RSA-1 (regulator of spindle assembly) is a regulatory B″ subunit required for mitotic spindle assembly in Caenorhabditis elegans. In order to address how B″ subunits interact with the PP2A core enzyme, we focused on a conditional allele, rsa-1(or598ts), and determined that this mutation specifically disrupts the protein interaction between RSA-1 and the PP2A structural subunit, PAA-1. Through genetic screening, we identified a putative interface on the PAA-1 structural subunit that interacts with a defined region of RSA-1/B″. In the context of previously published results, these data propose a mechanism of how different PP2A B-regulatory subunit families can bind the same holoenzyme in a mutually exclusive manner, to perform specific tasks in vivo.

  19. Evaluation of RSA set-up from a clinical biplane fluoroscopy system for 3D joint kinematic analysis.

    PubMed

    Bonanzinga, Tommaso; Signorelli, Cecilia; Bontempi, Marco; Russo, Alessandro; Zaffagnini, Stefano; Marcacci, Maurilio; Bragonzoni, Laura

    2016-01-01

    dinamic roentgen stereophotogrammetric analysis (RSA), a technique currently based only on customized radiographic equipment, has been shown to be a very accurate method for detecting three-dimensional (3D) joint motion. The aim of the present work was to evaluate the applicability of an innovative RSA set-up for in vivo knee kinematic analysis, using a biplane fluoroscopic image system. To this end, the Authors describe the set-up as well as a possible protocol for clinical knee joint evaluation. The accuracy of the kinematic measurements is assessed. the Authors evaluated the accuracy of 3D kinematic analysis of the knee in a new RSA set-up, based on a commercial biplane fluoroscopy system integrated into the clinical environment. The study was organized in three main phases: an in vitro test under static conditions, an in vitro test under dynamic conditions reproducing a flexion-extension range of motion (ROM), and an in vivo analysis of the flexion-extension ROM. For each test, the following were calculated, as an indication of the tracking accuracy: mean, minimum, maximum values and standard deviation of the error of rigid body fitting. in terms of rigid body fitting, in vivo test errors were found to be 0.10±0.05 mm. Phantom tests in static and kinematic conditions showed precision levels, for translations and rotations, of below 0.1 mm/0.2° and below 0.5 mm/0.3° respectively for all directions. the results of this study suggest that kinematic RSA can be successfully performed using a standard clinical biplane fluoroscopy system for the acquisition of slow movements of the lower limb. a kinematic RSA set-up using a clinical biplane fluoroscopy system is potentially applicable and provides a useful method for obtaining better characterization of joint biomechanics.

  20. The RSA survey of dwarf galaxies, 1: Optical photometry

    NASA Technical Reports Server (NTRS)

    Vader, J. Patricia; Chaboyer, Brian

    1994-01-01

    We present detailed surface photometry, based on broad B-band charge coupled device (CCD) images, of about 80 dwarf galaxies. Our sample represents approximately 10% of all dwarf galaxies identified in the vicinity of Revised Shapley-Ames (RSA) galaxies on high resolution blue photographic plates, referred to as the RSA survey of dwarf galaxies. We derive global properties and radial surface brightness profiles, and examine the morphologies. The radial surface brightness profiles of dwarf galaxies, whether early or late type, display the same varieties in shape and complexity as those of classical giant galaxies. Only a few are well described by a pure r(exp 1/4) law. Exponential profiles prevail. Features typical of giant disk galaxies, such as exponential profiles with a central depression, lenses, and even, in one case (IC 2041), a relatively prominent bulge are also found in dwarf galaxies. Our data suggest that the central region evolves from being bulge-like, with an r(exp 1/4) law profile, in bright galaxies to a lens-like structure in dwarf galaxies. We prove detailed surface photometry to be a helpful if not always sufficient tool in investigating the structure of dwarf galaxies. In many cases kinematic information is needed to complete the picture. We find the shapes of the surface brightness profiles to be loosely associated with morphological type. Our sample contains several new galaxies with properties intermediate between those of giant and dwarf ellipticals (but no M32-like objects). This shows that such intermediate galaxies exist so that at least a fraction of early-type dwarf ellipticals is structurally related to early-type giants instead of belonging to a totally unrelated, disjunct family. This supports an origin of early-type dwarf galaxies as originally more massive systems that acquired their current morphology as a result of substantial, presumable supernova-driven, mass loss. On the other hand, several early-type dwarfs in our sample are

  1. Implementation of Digital Signature Using Aes and Rsa Algorithms as a Security in Disposition System af Letter

    NASA Astrophysics Data System (ADS)

    Siregar, H.; Junaeti, E.; Hayatno, T.

    2017-03-01

    Activities correspondence is often used by agencies or companies, so that institutions or companies set up a special division to handle issues related to the letter management. Most of the distribution of letters using electronic media, then the letter should be kept confidential in order to avoid things that are not desirable. Techniques that can be done to meet the security aspect is by using cryptography or by giving a digital signature. The addition of asymmetric and symmetric algorithms, i.e. RSA and AES algorithms, on the digital signature had been done in this study to maintain data security. The RSA algorithm was used during the process of giving digital signature, while the AES algorithm was used during the process of encoding a message that will be sent to the receiver. Based on the research can be concluded that the additions of AES and RSA algorithms on the digital signature meet four objectives of cryptography: Secrecy, Data Integrity, Authentication and Non-repudiation.

  2. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  3. 75 FR 20364 - Public Buildings Service; Key Largo Beacon Annex Site; Key Largo, FL; Transfer of Property

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-19

    ... GENERAL SERVICES ADMINISTRATION [Wildlife Order 187; 4-D-FL-1218] Public Buildings Service; Key Largo Beacon Annex Site; Key Largo, FL; Transfer of Property Pursuant to section 2 of Public Law 537, 80th Congress, approved May 19, 1948 (16 U.S.C. 667c), notice is hereby given that: 1. The General...

  4. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-02-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem (Q P K C) based on the Bell states. By H o l e v o's theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack (C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  5. Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States

    NASA Astrophysics Data System (ADS)

    Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan

    2018-06-01

    Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem ( Q P K C) based on the Bell states. By H o l e v o' s theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack ( C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.

  6. Psychometric properties of the Resilience Scale for Adults (RSA) and its relationship with life-stress, anxiety and depression in a Hispanic Latin-American community sample.

    PubMed

    Morote, Roxanna; Hjemdal, Odin; Martinez Uribe, Patricia; Corveleyn, Jozef

    2017-01-01

    Resilience is a multi-dimensional construct associated with health and well-being. At present, we do not yet have a valid, scientific instrument that is designed to evaluate adult resilience in Spanish-speaking countries and that accounts for family, social and individual components. This study aimed at investigating the construct and cross-cultural validity of the Resilience Scale for Adults (RSA) by combining Confirmatory Factor Analysis (CFA), Multidimensional Scaling (MDS) and Hierarchical Regression models in a Hispanic Latin-American group. A community sample of 805 adults answered the RSA, Spanish Language Stressful Life-Events checklist (SL-SLE), and the Hopkins Symptom Checklist-25 (HSCL-25). First-order CFA verified the six factors structure for the RSA (RMSEA = .037, SRMR = .047, CFI = .91, TLI = .90). Five RSA scales and total score have good internal consistency (scales α > .70; total score α = .90). Two second-order CFA verified the intrapersonal and interpersonal dimensions of the protector factors of resilience, as well as their commonality and uniqueness with affective symptoms (anxiety and depression). An exploratory MDS reproduced the relations of RSA items and factors at first and second-order levels against random simulated data, thereby providing initial evidence of its cross-cultural validity in a Spanish-speaking group. The Four-steps hierarchical model showed that the RSA scales are the strongest predictors of anxiety and depression-greater than gender, age, education and stressful life-events. Three RSA scales are significant unique predictors of affective symptoms. In addition, similar to findings in diverse cultural settings, resilience is positively associated with age but not with education. Women report higher scores of Social Resources and Social Competence and lower scores of Perception of the Self. In conclusion, this study demonstrates the construct and criterion-related validity of the RSA in broad, diverse and Spanish speaking

  7. Psychometric properties of the Resilience Scale for Adults (RSA) and its relationship with life-stress, anxiety and depression in a Hispanic Latin-American community sample

    PubMed Central

    Martinez Uribe, Patricia; Corveleyn, Jozef

    2017-01-01

    Resilience is a multi-dimensional construct associated with health and well-being. At present, we do not yet have a valid, scientific instrument that is designed to evaluate adult resilience in Spanish-speaking countries and that accounts for family, social and individual components. This study aimed at investigating the construct and cross-cultural validity of the Resilience Scale for Adults (RSA) by combining Confirmatory Factor Analysis (CFA), Multidimensional Scaling (MDS) and Hierarchical Regression models in a Hispanic Latin-American group. A community sample of 805 adults answered the RSA, Spanish Language Stressful Life-Events checklist (SL-SLE), and the Hopkins Symptom Checklist-25 (HSCL-25). First-order CFA verified the six factors structure for the RSA (RMSEA = .037, SRMR = .047, CFI = .91, TLI = .90). Five RSA scales and total score have good internal consistency (scales α > .70; total score α = .90). Two second-order CFA verified the intrapersonal and interpersonal dimensions of the protector factors of resilience, as well as their commonality and uniqueness with affective symptoms (anxiety and depression). An exploratory MDS reproduced the relations of RSA items and factors at first and second-order levels against random simulated data, thereby providing initial evidence of its cross-cultural validity in a Spanish-speaking group. The Four-steps hierarchical model showed that the RSA scales are the strongest predictors of anxiety and depression–greater than gender, age, education and stressful life-events. Three RSA scales are significant unique predictors of affective symptoms. In addition, similar to findings in diverse cultural settings, resilience is positively associated with age but not with education. Women report higher scores of Social Resources and Social Competence and lower scores of Perception of the Self. In conclusion, this study demonstrates the construct and criterion-related validity of the RSA in broad, diverse and Spanish

  8. CYP2E1 Rsa I/Pst I polymorphism contributes to oral cancer susceptibility: a meta-analysis.

    PubMed

    Niu, Yuming; Hu, Yuanyuan; Wu, Mingyue; Jiang, Fei; Shen, Ming; Tang, Chunbo; Chen, Ning

    2012-01-01

    Previous data on association between CYP2E1 Rsa I/Pst I polymorphism and oral cancer risk were controversial. To investigate the association between CYP2E1 Rsa I/Pst I polymorphism and oral cancer risk. We performed a meta-analysis to assess the relationship between oral cancer and genotype with English language until June 2010. Twelve published case-control studies of 1259 patients with oral cancer and 2262 controls were acquired. Odds ratios (ORs) with 95% confidence intervals (CIs) were used to assess the strength of the association in codominant and dominant models. Overall, the pooled ORs indicated a significant association between CYP2E1 Rsa I/Pst I polymorphism and oral cancer risk (for c1/c2 vs. c1/c1: OR=1.30, 95% CI=1.04-1.62, Pheterogeneity=0.57; for (c1/c2+c2/c2) vs. c1/c1: OR=1.32, 95% CI=1.07-1.64, Pheterogeneity=0.57, respectively). In subgroup analysis by race, the same significant risks were found among Asian (for c1/c2 vs. c1/c1: OR=1.41, 95% CI=1.05-1.91, Pheterogeneity=0.92; for (c1/c2+c2/c2) vs. c1/c1: OR=1.43, 95% CI=1.08-1.88, Pheterogeneity=0.97, respectively). In conclusion, this meta-analysis demonstrates that CYP2E1 Rsa I/Pst I c2 allele may be a biomarker for oral cancer, especially among Asian populations.

  9. Stable fixation of an osseointegated implant system for above-the-knee amputees: titel RSA and radiographic evaluation of migration and bone remodeling in 55 cases.

    PubMed

    Nebergall, Audrey; Bragdon, Charles; Antonellis, Anne; Kärrholm, Johan; Brånemark, Rickard; Malchau, Henrik

    2012-04-01

    Rehabilitation of patients with transfemoral amputations is particularly difficult due to problems in using standard socket prostheses. We wanted to assess long-term fixation of the osseointegrated implant system (OPRA) using radiostereometric analysis (RSA) and periprosthetic bone remodeling. 51 patients with transfemoral amputations (55 implants) were enrolled in an RSA study. RSA and plain radiographs were scheduled at 6 months and at 1, 2, 5, 7, and 10 years after surgery. RSA films were analyzed using UmRSA software. Plain radiographs were graded for bone resorption, cancellization, cortical thinning, and trabecular streaming or buttressing in specifically defined zones around the implant. At 5 years, the median (SE) migration of the implant was -0.02 (0.06) mm distally. The rotational movement was 0.42 (0.32) degrees around the longitudinal axis. There was no statistically significant difference in median rotation or migration at any follow-up time. Cancellization of the cortex (plain radiographic grading) appeared in at least 1 zone in over half of the patients at 2 years. However, the prevalence of cancellization had decreased by the 5-year follow-up. The RSA analysis for the OPRA system indicated stable fixation of the implant. The periprosthetic bone remodeling showed similarities with changes seen around uncemented hip stems. The OPRA system is a new and promising approach for addressing the challenges faced by patients with transfemoral amputations.

  10. PEM public key certificate cache server

    NASA Astrophysics Data System (ADS)

    Cheung, T.

    1993-12-01

    Privacy Enhanced Mail (PEM) provides privacy enhancement services to users of Internet electronic mail. Confidentiality, authentication, message integrity, and non-repudiation of origin are provided by applying cryptographic measures to messages transferred between end systems by the Message Transfer System. PEM supports both symmetric and asymmetric key distribution. However, the prevalent implementation uses a public key certificate-based strategy, modeled after the X.509 directory authentication framework. This scheme provides an infrastructure compatible with X.509. According to RFC 1422, public key certificates can be stored in directory servers, transmitted via non-secure message exchanges, or distributed via other means. Directory services provide a specialized distributed database for OSI applications. The directory contains information about objects and then provides structured mechanisms for accessing that information. Since directory services are not widely available now, a good approach is to manage certificates in a centralized certificate server. This document describes the detailed design of a centralized certificate cache serve. This server manages a cache of certificates and a cache of Certificate Revocation Lists (CRL's) for PEM applications. PEMapplications contact the server to obtain/store certificates and CRL's. The server software is programmed in C and ELROS. To use this server, ISODE has to be configured and installed properly. The ISODE library 'libisode.a' has to be linked together with this library because ELROS uses the transport layer functions provided by 'libisode.a.' The X.500 DAP library that is included with the ELROS distribution has to be linked in also, since the server uses the DAP library functions to communicate with directory servers.

  11. Reverse saturable absorption (RSA) in fluorinated iridium derivatives

    NASA Astrophysics Data System (ADS)

    Ferry, Michael J.; O'Donnell, Ryan M.; Bambha, Neal; Ensley, Trenton R.; Shensky, William M.; Shi, Jianmin

    2017-08-01

    The photophysical properties of cyclometallated iridium compounds are beneficial for nonlinear optical (NLO) applications, such as the design of reverse saturable absorption (RSA) materials. We report on the NLO characterization of a family of compounds of the form [Ir(pbt)2(LX)], where pbt is 2-phenylbenzothiazole and LX is a beta-diketonate ligand. In particular, we investigate the effects of trifluoromethylation on compound solubility and photophysics compared to the parent acetylacetonate (acac) version. The NLO properties, such as the singlet and triplet excited-state cross sections, of these compounds were measured using the Z-scan technique. The excited-state lifetimes were determined from visible transient absorption spectroscopy.

  12. [Correlation of polymorphisms of adiponectin receptor 2 gene +33371Gln/Arg, cytochrome P4502E1 gene Rsa I and smoking with nonalcoholic fatty liver disease].

    PubMed

    Zhang, Chaoxian; Guo, Like

    2014-10-01

    To investigate the correlation of the polymorphisms of adiponectin receptor 2 (AdipoR2) gene +33371Gln/;Arg and cytochromes P4502E1 gene Rsa I (CYP2E1-Rsa I) as well as smoking with nonalcoholic fatty liver disease (NAFLD). The polymorphisms of AdipoR2 gene +33371Gln/Arg and CYP2E1-Rsa I were analyzed with PCR technique in peripheral blood leukocytes from 750 NAFLD cases and 750 healthy subjects. The frequencies of AdipoR2 gene +33371Gln/Arg (A/A) and CYP2E1-Rsa I (c2/c2 ) were 39.20% and 71.73% in NAFLD cases, respectively, significantly higher than those in healthy subjects (21.07% and 43.07%, respectively, P<0.01). The risk of NAFLD increased significantly in subjects carrying +33371Gln/Arg (A/A) (OR=2.4156, 95% CI=1.8164-4.0725) and CYP2E1-Rsa I (c2/c2) (OR=3.3547, 95% CI=1.9182-4.5057). Combined analysis of the polymorphisms showed that the percentage of +33371Gln/Arg (A/A)/CYP2E1-Rsa I (c2/c2) was 32. 67% in NAFLD cases, significantly higher than that in the healthy subjects (6.40%, P<0.01), and subjects carrying both +33371Gln/Arg (A/A) and CYP2E1-Rsa I (c2/c2) had a high risk of NAFLD (OR=9.9264, 95% CI=4.2928-12.4241). The smoking rate was significantly higher in the case group than in the control group (OR=2.5919, 95% CI=1.4194-4. 9527, P<0.01), and statistical analysis suggested an interaction between smoking and +33371Gln/Arg (A/A)/CYP2E1-Rsa I (c2/c2) to increase the risk of NAFLD (OR=34.6764, 95% CI=18.9076-61.5825). +33371Gln/Arg (A/A), CYP2E1-Rsa I (c2/c2 ) and smoking are risk factors for NAFLD and coordinately contribute to the occurrence of NAFLD.

  13. 10-year results of a new low-monomer cement: follow-up of a randomized RSA study.

    PubMed

    Söderlund, Per; Dahl, Jon; Röhrl, Stephan; Nivbrant, Bo; Nilsson, Kjell G

    2012-12-01

    The properties and performance of a new low-monomer cement were examined in this prospective randomized, controlled RSA study. 5-year data have already been published, showing no statistically significant differences compared to controls. In the present paper we present the 10-year results. 44 patients were originally randomized to receive total hip replacement with a Lubinus SPII titanium-aluminum-vanadium stem cemented either with the new Cemex Rx bone cement or with control bone cement, Palacos R. Patients were examined using RSA, Harris hip score, and conventional radiographs. At 10 years, 33 hips could be evaluated clinically and 30 hips could be evaluated with RSA (16 Cemex and 14 Palacos). 9 patients had died and 4 patients were too old or infirm to be investigated. Except for 1 hip that was revised for infection after less than 5 years, no further hips were revised before the 10-year follow-up. There were no statistically significant clinical differences between the groups. The Cemex cement had magnitudes of migration similar to or sometimes lower than those of Palacos cement. In both groups, most hips showed extensive radiolucent lines, probably due to the use of titanium alloy stems. At 10 years, the Cemex bone cement tested performed just as well as the control (Palacos bone cement).

  14. Fast Modular Exponentiation and Elliptic Curve Group Operation in Maple

    ERIC Educational Resources Information Center

    Yan, S. Y.; James, G.

    2006-01-01

    The modular exponentiation, y[equivalent to]x[superscript k](mod n) with x,y,k,n integers and n [greater than] 1; is the most fundamental operation in RSA and ElGamal public-key cryptographic systems. Thus the efficiency of RSA and ElGamal depends entirely on the efficiency of the modular exponentiation. The same situation arises also in elliptic…

  15. Fast parallel molecular algorithms for DNA-based computation: factoring integers.

    PubMed

    Chang, Weng-Long; Guo, Minyi; Ho, Michael Shan-Hui

    2005-06-01

    The RSA public-key cryptosystem is an algorithm that converts input data to an unrecognizable encryption and converts the unrecognizable data back into its original decryption form. The security of the RSA public-key cryptosystem is based on the difficulty of factoring the product of two large prime numbers. This paper demonstrates to factor the product of two large prime numbers, and is a breakthrough in basic biological operations using a molecular computer. In order to achieve this, we propose three DNA-based algorithms for parallel subtractor, parallel comparator, and parallel modular arithmetic that formally verify our designed molecular solutions for factoring the product of two large prime numbers. Furthermore, this work indicates that the cryptosystems using public-key are perhaps insecure and also presents clear evidence of the ability of molecular computing to perform complicated mathematical operations.

  16. Key Relation Extraction from Biomedical Publications.

    PubMed

    Huang, Lan; Wang, Ye; Gong, Leiguang; Kulikowski, Casimir; Bai, Tian

    2017-01-01

    Within the large body of biomedical knowledge, recent findings and discoveries are most often presented as research articles. Their number has been increasing sharply since the turn of the century, presenting ever-growing challenges for search and discovery of knowledge and information related to specific topics of interest, even with the help of advanced online search tools. This is especially true when the goal of a search is to find or discover key relations between important concepts or topic words. We have developed an innovative method for extracting key relations between concepts from abstracts of articles. The method focuses on relations between keywords or topic words in the articles. Early experiments with the method on PubMed publications have shown promising results in searching and discovering keywords and their relationships that are strongly related to the main topic of an article.

  17. The robustness and accuracy of in vivo linear wear measurements for knee prostheses based on model-based RSA.

    PubMed

    van Ijsseldijk, E A; Valstar, E R; Stoel, B C; Nelissen, R G H H; Reiber, J H C; Kaptein, B L

    2011-10-13

    Accurate in vivo measurements methods of wear in total knee arthroplasty are required for a timely detection of excessive wear and to assess new implant designs. Component separation measurements based on model-based Roentgen stereophotogrammetric analysis (RSA), in which 3-dimensional reconstruction methods are used, have shown promising results, yet the robustness of these measurements is unknown. In this study, the accuracy and robustness of this measurement for clinical usage was assessed. The validation experiments were conducted in an RSA setup with a phantom setup of a knee in a vertical orientation. 72 RSA images were created using different variables for knee orientations, two prosthesis types (fixed-bearing Duracon knee and fixed-bearing Triathlon knee) and accuracies of the reconstruction models. The measurement error was determined for absolute and relative measurements and the effect of knee positioning and true seperation distance was determined. The measurement method overestimated the separation distance with 0.1mm on average. The precision of the method was 0.10mm (2*SD) for the Duracon prosthesis and 0.20mm for the Triathlon prosthesis. A slight difference in error was found between the measurements with 0° and 10° anterior tilt. (difference=0.08mm, p=0.04). The accuracy of 0.1mm and precision of 0.2mm can be achieved for linear wear measurements based on model-based RSA, which is more than adequate for clinical applications. The measurement is robust in clinical settings. Although anterior tilt seems to influence the measurement, the size of this influence is low and clinically irrelevant. Copyright © 2011 Elsevier Ltd. All rights reserved.

  18. Dynamic RSA for the evaluation of inducible micromotion of Oxford UKA during step-up and step-down motion.

    PubMed

    Horsager, Kristian; Kaptein, Bart L; Rømer, Lone; Jørgensen, Peter B; Stilling, Maiken

    2017-06-01

    Background and purpose - Implant inducible micromotions have been suggested to reflect the quality of the fixation interface. We investigated the usability of dynamic RSA for evaluation of inducible micromotions of the Oxford Unicompartmental Knee Arthroplasty (UKA) tibial component, and evaluated factors that have been suggested to compromise the fixation, such as fixation method, component alignment, and radiolucent lines (RLLs). Patients and methods - 15 patients (12 men) with a mean age of 69 (55-86) years, with an Oxford UKA (7 cemented), were studied after a mean time in situ of 4.4 (3.6-5.1) years. 4 had tibial RLLs. Each patient was recorded with dynamic RSA (10 frames/second) during a step-up/step-down motion. Inducible micromotions were calculated for the tibial component with respect to the tibia bone. Postoperative component alignment was measured with model-based RSA and RLLs were measured on screened radiographs. Results - All tibial components showed inducible micromotions as a function of the step-cycle motion with a mean subsidence of up to -0.06 mm (95% CI: -0.10 to -0.03). Tibial component inducible micromotions were similar for cemented fixation and cementless fixation. Patients with tibial RLLs had 0.5° (95% CI: 0.18-0.81) greater inducible medio-lateral tilt of the tibial component. There was a correlation between postoperative posterior slope of the tibial plateau and inducible anterior-posterior tilt. Interpretation - All patients had inducible micromotions of the tibial component during step-cycle motion. RLLs and a high posterior slope increased the magnitude of inducible micromotions. This suggests that dynamic RSA is a valuable clinical tool for the evaluation of functional implant fixation.

  19. The methylenetetrahydrofolate reductase c.c.677 C>T and c.c.1298 A>C polymorphisms in reproductive failures: Experience from an RSA and RIF study on a Polish population.

    PubMed

    Nowak, Izabela; Bylińska, Aleksandra; Wilczyńska, Karolina; Wiśniewski, Andrzej; Malinowski, Andrzej; Wilczyński, Jacek R; Radwan, Paweł; Radwan, Michał; Barcz, Ewa; Płoski, Rafał; Motak-Pochrzęst, Hanna; Banasik, Małgorzata; Sobczyński, Maciej; Kuśnierczyk, Piotr

    2017-01-01

    Almost 1600 individuals from the Polish population were recruited to this study. Among them 319 were fertile couples, 289 were recurrent spontaneous abortion (RSA) couples, and 131 were in the group of recurrent implantation failure (RIF) following in vitro fertilization. The aim of this study was to evaluate the MTHFR c.c.677 C>T and c.c.1298 A>C polymorphisms' association with RSA and RIF. We used PCR-RFLP with HinfI (677 C>T) and MboII (1298 A>C) digestion. We observed a protective effect of the female AC genotype (OR = 0.64, p = 0.01) and the C allele (AC+CC genotypes; OR = 0.65, p = 0.009) against RSA. Moreover, 1298 AA/677 CT women were more frequent in RSA (31.14%) and RIF (25.20%) groups in comparison to fertile women (22.88%), although this difference was significant only in the case of RSA (p = 0.022, OR = 1.52). Male combined genotype analysis revealed no association with reproductive failure of their partners. Nevertheless, the female/male combination AA/AC of the 1298 polymorphism was more frequent in RSA couples (p = 0.049, OR = 1.49). However, the significant results became insignificant after Bonferroni correction. In addition, analysis of haplotypes showed significantly higher frequency of the C/C haplotype (1298 C/677 C) in the female control group than in the female RSA group (p = 0.03, OR = 0.77). Moreover, the association between elevated homocysteine (Hcy) level in plasma of RSA and RIF women and MTHFR polymorphisms was investigated but did not reveal significant differences. In conclusion, for clinical practice, it is better to check the homocysteine level in plasma and, if the Hcy level is increased, to recommend patients to take folic acid supplements rather than undergo screening of MTHFR for 1298 A>C and 677 C>T polymorphisms.

  20. The methylenetetrahydrofolate reductase c.c.677 C>T and c.c.1298 A>C polymorphisms in reproductive failures: Experience from an RSA and RIF study on a Polish population

    PubMed Central

    Bylińska, Aleksandra; Wilczyńska, Karolina; Wiśniewski, Andrzej; Malinowski, Andrzej; Wilczyński, Jacek R.; Radwan, Paweł; Radwan, Michał; Barcz, Ewa; Płoski, Rafał; Motak-Pochrzęst, Hanna; Banasik, Małgorzata; Sobczyński, Maciej; Kuśnierczyk, Piotr

    2017-01-01

    Almost 1600 individuals from the Polish population were recruited to this study. Among them 319 were fertile couples, 289 were recurrent spontaneous abortion (RSA) couples, and 131 were in the group of recurrent implantation failure (RIF) following in vitro fertilization. The aim of this study was to evaluate the MTHFR c.c.677 C>T and c.c.1298 A>C polymorphisms’ association with RSA and RIF. We used PCR-RFLP with HinfI (677 C>T) and MboII (1298 A>C) digestion. We observed a protective effect of the female AC genotype (OR = 0.64, p = 0.01) and the C allele (AC+CC genotypes; OR = 0.65, p = 0.009) against RSA. Moreover, 1298 AA/677 CT women were more frequent in RSA (31.14%) and RIF (25.20%) groups in comparison to fertile women (22.88%), although this difference was significant only in the case of RSA (p = 0.022, OR = 1.52). Male combined genotype analysis revealed no association with reproductive failure of their partners. Nevertheless, the female/male combination AA/AC of the 1298 polymorphism was more frequent in RSA couples (p = 0.049, OR = 1.49). However, the significant results became insignificant after Bonferroni correction. In addition, analysis of haplotypes showed significantly higher frequency of the C/C haplotype (1298 C/677 C) in the female control group than in the female RSA group (p = 0.03, OR = 0.77). Moreover, the association between elevated homocysteine (Hcy) level in plasma of RSA and RIF women and MTHFR polymorphisms was investigated but did not reveal significant differences. In conclusion, for clinical practice, it is better to check the homocysteine level in plasma and, if the Hcy level is increased, to recommend patients to take folic acid supplements rather than undergo screening of MTHFR for 1298 A>C and 677 C>T polymorphisms. PMID:29073227

  1. Error-correcting pairs for a public-key cryptosystem

    NASA Astrophysics Data System (ADS)

    Pellikaan, Ruud; Márquez-Corbella, Irene

    2017-06-01

    Code-based Cryptography (CBC) is a powerful and promising alternative for quantum resistant cryptography. Indeed, together with lattice-based cryptography, multivariate cryptography and hash-based cryptography are the principal available techniques for post-quantum cryptography. CBC was first introduced by McEliece where he designed one of the most efficient Public-Key encryption schemes with exceptionally strong security guarantees and other desirable properties that still resist to attacks based on Quantum Fourier Transform and Amplitude Amplification. The original proposal, which remains unbroken, was based on binary Goppa codes. Later, several families of codes have been proposed in order to reduce the key size. Some of these alternatives have already been broken. One of the main requirements of a code-based cryptosystem is having high performance t-bounded decoding algorithms which is achieved in the case the code has a t-error-correcting pair (ECP). Indeed, those McEliece schemes that use GRS codes, BCH, Goppa and algebraic geometry codes are in fact using an error-correcting pair as a secret key. That is, the security of these Public-Key Cryptosystems is not only based on the inherent intractability of bounded distance decoding but also on the assumption that it is difficult to retrieve efficiently an error-correcting pair. In this paper, the class of codes with a t-ECP is proposed for the McEliece cryptosystem. Moreover, we study the hardness of distinguishing arbitrary codes from those having a t-error correcting pair.

  2. Protecting Cryptographic Keys and Functions from Malware Attacks

    DTIC Science & Technology

    2010-12-01

    registers. modifies RSA private key signing in OpenSSL to use the technique. The resulting system has the following features: 1. No special hardware is...the above method based on OpenSSL , by exploiting the Streaming SIMD Extension (SSE) XMM registers of modern Intel and AMD x86-compatible CPU’s [22...one can store a 2048-bit exponent.1 Our prototype is based on OpenSSL 0.9.8e, the Ubuntu 6.06 Linux distribution with a 2.6.15 kernel, and SSE2 which

  3. Association between lower frequency of R381Q variant (rs11209026) in IL-23 receptor gene and increased risk of recurrent spontaneous abortion (RSA).

    PubMed

    Abdollahi, Elham; Tavasolian, Fataneh; Ghasemi, Nasrin; Mirghanizadeh, Seyed Ali; Azizi, Mohammdareza; Ghoryani, Mohsen; Samadi, Morteza

    2015-01-01

    Recurrent spontaneous abortion (RSA) is defined as three or more consecutive spontaneous abortions before the 20th week of gestation. The purpose of the present study was to investigate the association between a functional single nucleotide polymorphism (SNP) in the interleukin (IL)-23 receptor gene (IL-23R; rs11209026, 1142 G wild type → A reduced function, Arg381Gln, R381Q) and RSA. For the study, 200 RSA patients (confirmed using established diagnostic criteria) and 200 normal individuals in fertility and infertility centers in the cities of Yazd and Isfahan were recruited during a period from 2012-2013. Using PCR-RFLP, the R381Q variant was screened for in the IL-23R gene of the patients and controls. The results indicated there were significant differences in the frequency of this genetic variant in the patients versus the healthy controls, i.e. 2% and 7.5%, respectively (p value = 0.01; odds ratio = 0.25; CI = 95%). No significant difference was found for the G allelic frequency in patients with RSA and in the control group (p = 0.60). The A allelic frequency was significantly different between the two groups (p = 0.01). Based on these findings, it is concluded that the frequency of single nucleotide polymorphism in the IL-23 receptor (R381Q) in patients with recurrent spontaneous abortion (RSA) is less than that found in normal control women.

  4. Resting RSA Is Associated with Natural and Self-Regulated Responses to Negative Emotional Stimuli

    ERIC Educational Resources Information Center

    Demaree, Heath A.; Robinson, Jennifer L.; Everhart, D. Erik; Schmeichel, Brandon J.

    2004-01-01

    Resting respiratory sinus arrhythmia (RSA) was assessed among 111 adult participants. These individuals were then asked to watch a positive or negative affective film in either a natural manner or while exaggerating their facial response. Facial reactions to the film were video-recorded and subsequently rated in terms of facial affect.…

  5. Wear of a 5 megarad cross-linked polyethylene liner: a 6-year RSA study.

    PubMed

    Callary, Stuart A; Campbell, David G; Mercer, Graham; Nilsson, Kjell G; Field, John R

    2013-07-01

    One cross-linked polyethylene (XLPE) liner is manufactured using a lower dose of radiation, 5 Mrad, which may result in less cross-linking. The reported in vivo wear rate of this XLPE liner in patients undergoing THA has varied, and has included some patients in each reported cohort who had greater than 0.1 mm/year of wear, which is an historical threshold for osteolysis. Previous studies have measured wear on plain radiographs, an approach that has limited sensitivity. We therefore measured the amount and direction of wear at 6 years using Radiostereometric analysis (RSA) in patients who had THAs that included a cross-linked polyethylene liner manufactured using 5 Mrad radiation. We prospectively reviewed wear in 30 patients who underwent primary THAs with the same design of cross-linked acetabular liner and a 28-mm articulation. Tantalum markers were inserted during surgery and all patients had RSA radiographic examinations at 1 week, 6 months, 1, 2, and 6 years postoperatively. The mean proximal, two-dimensional (2-D) and three-dimensional (3-D) wear rates calculated between 1 year and 6 years were 0.014, 0.014, and 0.018 mm/per year, respectively. The direction of the head penetration recorded between 1 week and 6 years was in a proximal direction for all patients, proximolateral for 16 of 24 patients, and proximomedial for eight of 24 patients. The proximal, 2-D and 3-D wear of a XLPE liner produced using 5 Mrad of radiation was low but measurable by RSA after 6 years. No patients had proximal 2-D or 3-D wear rates exceeding 0.1 mm/year. Further followup is needed to evaluate the effect of XLPE wear particles on the development of long-term osteolysis.

  6. Predicting 3D pose in partially overlapped X-ray images of knee prostheses using model-based Roentgen stereophotogrammetric analysis (RSA).

    PubMed

    Hsu, Chi-Pin; Lin, Shang-Chih; Shih, Kao-Shang; Huang, Chang-Hung; Lee, Chian-Her

    2014-12-01

    After total knee replacement, the model-based Roentgen stereophotogrammetric analysis (RSA) technique has been used to monitor the status of prosthetic wear, misalignment, and even failure. However, the overlap of the prosthetic outlines inevitably increases errors in the estimation of prosthetic poses due to the limited amount of available outlines. In the literature, quite a few studies have investigated the problems induced by the overlapped outlines, and manual adjustment is still the mainstream. This study proposes two methods to automate the image processing of overlapped outlines prior to the pose registration of prosthetic models. The outline-separated method defines the intersected points and segments the overlapped outlines. The feature-recognized method uses the point and line features of the remaining outlines to initiate registration. Overlap percentage is defined as the ratio of overlapped to non-overlapped outlines. The simulated images with five overlapping percentages are used to evaluate the robustness and accuracy of the proposed methods. Compared with non-overlapped images, overlapped images reduce the number of outlines available for model-based RSA calculation. The maximum and root mean square errors for a prosthetic outline are 0.35 and 0.04 mm, respectively. The mean translation and rotation errors are 0.11 mm and 0.18°, respectively. The errors of the model-based RSA results are increased when the overlap percentage is beyond about 9%. In conclusion, both outline-separated and feature-recognized methods can be seamlessly integrated to automate the calculation of rough registration. This can significantly increase the clinical practicability of the model-based RSA technique.

  7. Public Expenditures on Children through 2008: Key Facts

    ERIC Educational Resources Information Center

    Macomber, Jennifer; Isaacs, Julia; Kent, Adam; Vericker, Tracy

    2010-01-01

    This report provides the key findings on the public spending on children through 2008. They are: (1) Spending on children increased under the American Recovery and Reinvestment Act (ARRA) and other stimulus spending, but not proportionately to other federal spending. As ARRA expires, we project that spending on children will decline, assuming no…

  8. Public-Key Cryptography: A Hardware Implementation and Novel Neural Network-Based Approach

    DTIC Science & Technology

    1992-09-01

    FUNDINGISPONSORING 8b. OFFICE SYMBOL 9. PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION (if applicable ) 8c. ADDRESS (City, State, and ZIP Code) 10...8217....... ......... 4. .. . . iii TABLE OF CONTENTS I. INTRODUCTION ............................. 1 II. MATHEMATICAL BASIS FOR THE DEVELOPMENT OF PUBLIC-KEY...in the spirit of this future that this thesis is presented. It is an in-depth study of the public-key cryptosystem. First, the mathematical basis

  9. Design and evaluation of learning strategies for a group of radiographers in radiostereometric analysis (RSA).

    PubMed

    Muharemovic, O; Troelsen, A; Thomsen, M G; Kallemose, T; Gosvig, K K

    2017-11-01

    The purpose of this study was to design and evaluate a radiostereometric analysis (RSA) program aimed at radiographers in order to increase their cognitive and practical skills, thereby increasing image quality and minimizing exposure repetition. Twenty radiographers were randomized into two identically sized study groups. Training consisted of a theoretical and practical workshop using a phantom. Tests were performed to compare the effect of training to nontraining, and the effect of time duration on the maintenance of RSA skills. The effect of training was measured by a written test and three defined parameters influencing image quality. Group A reduced significantly (p < 0.001) by 31.3 mm (21-31%) the distance between the centrum of the prosthesis (CP) and the centrum of the calibration field (CCF) and increased the number of beads (NB) visible by 3.6 (out of 18). A further significant reduction of 5.1 mm (p = 0.023), 1.0 bead more (p < 0.001) and a 2.1 (p = 0.022) point better rotation of the prosthesis (RP) was registered two months later. Group B was tested twice without training and no significant improvement was registered. One month after training group B had experienced overall significant improvement on a par with group A. It is realistic to implement an RSA X-ray training program where radiographers significantly improve their theoretical and practical skills in centering the CP closer to the CCF, NB and RP. A duration of up to two months after training does not influence the quality of participants' performance. Copyright © 2017 The College of Radiographers. Published by Elsevier Ltd. All rights reserved.

  10. Public perceptions of key performance indicators of healthcare in Alberta, Canada.

    PubMed

    Northcott, Herbert C; Harvey, Michael D

    2012-06-01

    To examine the relationship between public perceptions of key performance indicators assessing various aspects of the health-care system. Cross-sequential survey research. Annual telephone surveys of random samples of adult Albertans selected by random digit dialing and stratified according to age, sex and region (n = 4000 for each survey year). The survey questionnaires included single-item measures of key performance indicators to assess public perceptions of availability, accessibility, quality, outcome and satisfaction with healthcare. Cronbach's α and factor analysis were used to assess the relationship between key performance indicators focusing on the health-care system overall and on a recent interaction with the health-care system. The province of Alberta, Canada during the years 1996-2004. Four thousand adults randomly selected each survey year. Survey questions measuring public perceptions of healthcare availability, accessibility, quality, outcome and satisfaction with healthcare. Factor analysis identified two principal components with key performance indicators focusing on the health system overall loading most strongly on the first component and key performance indicators focusing on the most recent health-care encounter loading most strongly on the second component. Assessments of the quality of care most recently received, accessibility of that care and perceived outcome of care tended to be higher than the more general assessments of overall health system quality and accessibility. Assessments of specific health-care encounters and more general assessments of the overall health-care system, while related, nevertheless comprise separate dimensions for health-care evaluation.

  11. Internet Protocol Security (IPSEC): Testing and Implications on IPv4 and IPv6 Networks

    DTIC Science & Technology

    2008-08-27

    Message Authentication Code-Message Digest 5-96). Due to the processing power consumption and slowness of public key authentication methods, RSA ...MODP) group with a 768 -bit modulus 2. a MODP group with a 1024-bit modulus 3. an Elliptic Curve Group over GF[ 2n ] (EC2N) group with a 155-bit...nonces, digital signatures using the Digital Signature Algorithm, and the Rivest-Shamir- Adelman ( RSA ) algorithm. For more information about the

  12. Exercise to rest ratios in RSA training in women's soccer.

    PubMed

    Ruscello, Bruno; Esposito, Mario; Partipilo, Filippo; DI Cicco, Dalila; Filetti, Cristoforo; Pantanella, Laura; D'Ottavio, Stefano

    2017-10-27

    To investigate the applicability of three different exercise to rest ratios in RSA training in women's soccer players, applying those ones already adopted in male adult and young players, when performing three different sprinting modes (straight, shuttle and sprinting with changing of direction). 15 trained female soccer players (height: 1.65 ± 0.06 m; weight: 59.3 ± 9.0 kg; BMI 21.6 ± 2.7 kg·m-2; age: 23.3±5.9 years) participated to the study. In order to compare the different values of the time recorded, an Index of Fatigue was used. Recovery times among trials in the sets were administered according to the 1:5, 1:3; 1:2 exercise to rest ratio, respectively. Blood lactate concentrations at the end of each set (3') were analyzed. Significant differences among trials within each set (Repeated Measures Anova; p<0.05) were found, as evidence of fatigue over time, with an average decay of performance of about 5% but no significant differences were found in IF%, among the three different sprinting modalities when applying the investigated exercise to rest ratios (Factorial Anova; between; p>0.05). Significant differences were found in blood lactate concentrations (p<0.05). The results of this study confirm that the exercise to rest ratios considered in this study might be suitable to design effective testing protocols and training sessions aimed at the development of the RSA in women's soccer players, keeping the performances in the speed domain (IF% < ⊕7-8%) but inducing the fatigue processes sought with this kind of training method.

  13. The effect of tourniquet use on fixation quality in cemented total knee arthroplasty a prospective randomized clinical controlled RSA trial.

    PubMed

    Molt, Mats; Harsten, Andreas; Toksvig-Larsen, Sören

    2014-03-01

    A concern that arises with any change in technique is whether it affects the long-term implant stability. The objective of this study was to evaluate the early migration, measured by radiostereometric analysis (RSA), and the functional outcome of the Triathlon™ cemented knee prosthesis, operated on with or without a tourniquet. During the last decades RSA has emerged as a way to assess prosthetic fixation and long time prognosis. The method has been used extensively in both hip and knee arthroplasty. This was a single centre prospective study including 60 patients randomized into two groups operated on either with or without tourniquet. RSA investigation was done within 2-3 days postoperatively after full weight bearing, and then at 3 months, 1 year and 2 years postoperatively. There were no differences between the groups regarding the translation along or rotation around the three coordinal axes, or in maximum total point motion (MTPM). At 2 years the mean MTPM (SD) was 0.71 mm (0.64) for the tourniquet-group and 0.53 mm (0.21) for the non-tourniquet-group. The tibial tray of the Triathlon™ cemented knee prosthesis showed similar early stability whether operated on with or without tourniquet. Level I. Article focus: A safety study for total knee replacement operated on with or without perioperative tourniquet regarding the prosthetic fixation. Strengths and limitations: Strength of this study is that it is a randomized prospective trial using an objective measuring tool. The sample size of 25-30 patients is reportedly sufficient for the screening of implants using RSA (1-3). Clinical trials NCT01604382, Ethics Committee approval D-nr: 144/20085. © 2013.

  14. Three Year RSA Evaluation of Vitamin E Diffused Highly Cross-linked Polyethylene Liners and Cup Stability.

    PubMed

    Sillesen, Nanna H; Greene, Meridith E; Nebergall, Audrey K; Nielsen, Poul T; Laursen, Mogens B; Troelsen, Anders; Malchau, Henrik

    2015-07-01

    Vitamin E diffusion into highly cross-linked polyethylene (E-XLPE) is a method for enhancing oxidative stability of acetabular liners. The purpose of this study was to evaluate in vivo penetration of E-XLPE using radiostereometric analysis (RSA). Eighty-four hips were recruited into a prospective 10-year RSA. This is the first evaluation of the multicenter cohort after 3-years. All patients received E-XLPE liners (E1, Biomet) and porous-titanium coated cups (Regenerex, Biomet). There was no difference (P=0.450) in median femoral head penetration into the E-XLPE liners at 3-years comparing cobalt-chrome heads (-0.028mm; inter-quartile range (IQR) - 0.065 to 0.047) with ceramic heads (-0.043mm, IQR - 0.143to0.042). The 3-year follow-up indicates minimal E-XLPE liner penetration regardless of head material and minimal early cup movement. Copyright © 2015 Elsevier Inc. All rights reserved.

  15. The putative RNA helicase Dbp6p functionally interacts with Rpl3p, Nop8p and the novel trans-acting Factor Rsa3p during biogenesis of 60S ribosomal subunits in Saccharomyces cerevisiae.

    PubMed Central

    de la Cruz, Jesús; Lacombe, Thierry; Deloche, Olivier; Linder, Patrick; Kressler, Dieter

    2004-01-01

    Ribosome biogenesis requires at least 18 putative ATP-dependent RNA helicases in Saccharomyces cerevisiae. To explore the functional environment of one of these putative RNA helicases, Dbp6p, we have performed a synthetic lethal screen with dbp6 alleles. We have previously characterized the nonessential Rsa1p, whose null allele is synthetically lethal with dbp6 alleles. Here, we report on the characterization of the four remaining synthetic lethal mutants, which reveals that Dbp6p also functionally interacts with Rpl3p, Nop8p, and the so-far-uncharacterized Rsa3p (ribosome assembly 3). The nonessential Rsa3p is a predominantly nucleolar protein required for optimal biogenesis of 60S ribosomal subunits. Both Dbp6p and Rsa3p are associated with complexes that most likely correspond to early pre-60S ribosomal particles. Moreover, Rsa3p is co-immunoprecipitated with protA-tagged Dbp6p under low salt conditions. In addition, we have established a synthetic interaction network among factors involved in different aspects of 60S-ribosomal-subunit biogenesis. This extensive genetic analysis reveals that the rsa3 null mutant displays some specificity by being synthetically lethal with dbp6 alleles and by showing some synthetic enhancement with the nop8-101 and the rsa1 null allele. PMID:15126390

  16. Resilience or hope? Incremental and convergent validity of the resilience scale for adults (RSA) and the Herth hope scale (HHS) in the prediction of anxiety and depression.

    PubMed

    Morote, Roxanna; Hjemdal, Odin; Krysinska, Karolina; Martinez Uribe, Patricia; Corveleyn, Jozef

    2017-10-27

    Hope and resilience protect against inner vulnerabilities or harsh life circumstances; they explain individual differences in physical or mental health outcomes under high stress. They have been studied in complementary or competing theoretical frameworks; therefore, the study of measures of hope and resilience should be undertaken prior to explore if they are truly value-added for research. This study investigates the convergent and incremental validity of the Resilience Scale for Adults (RSA) and the Herth Hope Scale (HHS), in the prediction of anxiety and depression (HSCL-25). Participants in this community-based sample are 762 adults from 18 to 74 years old. They answered the RSA, HHS, Spanish Language Stressful Life-Events Checklist (SL-SLE), and the Hopkins Symptom Checklist-25 (HSCL-25). Incremental validity analyses combined hierarchical regression and structural equation models (SEM). First, hierarchical regression models were compared based on three criteria (R 2 Diff., ΔF, and semi-partial r), then the direct effect of resilience on affective symptoms was compared with the mediated effect of resilience on affective symptoms through hope. The hierarchical models showed that (1) hope and resilience account significantly for the variance of affective symptoms above age, sex, and life-stress; (2) Resilience Total score has greater incremental validity than positive scales of HHS Hope; and (3) RSA Total score, HHS Optimism/Spiritual support, Stressful life-events and sex are unique predictors of affective symptoms. The SEM analyses verified a stronger direct effect of resilience in the prediction of affective symptoms above the significant partial mediated effect of resilience through hope. Additionally, results show that age and better educational opportunities were associated with protection (i.e. resilience and hope) and emotional well-being (i.e. affective symptoms and hopelessness). Women showed higher scores in social competences and resources (RSA

  17. Privacy-preserving photo sharing based on a public key infrastructure

    NASA Astrophysics Data System (ADS)

    Yuan, Lin; McNally, David; Küpçü, Alptekin; Ebrahimi, Touradj

    2015-09-01

    A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services offer a range of access control mechanisms to protect users privacy. As it is not in the best interest of many such services if their users restrict access to their shared pictures, most services keep users' photos unprotected which makes them available to all insiders. This paper presents an architecture for a privacy-preserving photo sharing based on an image scrambling scheme and a public key infrastructure. A secure JPEG scrambling is applied to protect regional visual information in photos. Protected images are still compatible with JPEG coding and therefore can be viewed by any one on any device. However, only those who are granted secret keys will be able to descramble the photos and view their original versions. The proposed architecture applies an attribute-based encryption along with conventional public key cryptography, to achieve secure transmission of secret keys and a fine-grained control over who may view shared photos. In addition, we demonstrate the practical feasibility of the proposed photo sharing architecture with a prototype mobile application, ProShare, which is built based on iOS platform.

  18. Communicating Herschel Key Programs in Solar System Studies to the Public

    NASA Astrophysics Data System (ADS)

    Rengel, M.; Hartogh, P.; Müller, T.

    2011-10-01

    The Herschel Space Observatory, one of the cornerstone missions of the European Space Agency (ESA) with participation from NASA, is delivering a wealth of far-infrared and sub-millimeter observations of the cold Universe. A considerable part of the observing time for the nominal three year mission lifetime has been awarded in the form of Key Programs. Between the 42 key programs (guaranteed and open times), only two key programs are dedicated to study the Solar System: "Water and Related Chemistry in the Solar System", also known as Herschel Solar System Observations (HssO) project [1], and "TNOs are Cool: A Survey of the Transneptunian Region" [2]. In the framework of these Programs, a serie of public outreach activities and efforts of its results are being carried out. We present some of the outreach strategies developed (e.g. press releases, web pages, logos, public lectures, exhibitions, interviews, reports, etc.) and some plans in this direction. Our activities introduce people to knowledge and beauty of solar system research and wider the opportunities for the public to become more involved in topics like solar system studies, specially in the times of frequent exo-planet discoveries.

  19. Key Performance Indicators of Public Universities Based on Quality Assessment Criteria in Thailand

    ERIC Educational Resources Information Center

    Sukboonyasatit, Kritsana; Thanapaisarn, Chaiwit; Manmar, Lampang

    2011-01-01

    The research objective was to develop public universities' key performance indicators. Qualitative research and interviews were employed with each public university's senior executive and quality assessors. The sample group was selected by the office of the public sector development commission and Thailand's public universities can be separated…

  20. A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol

    NASA Astrophysics Data System (ADS)

    Jeng, Albert; Chang, Li-Chung; Chen, Sheng-Hui

    There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e. g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e. g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.

  1. Measuring polyethylene wear in total knee arthroplasty by RSA: differences between weight-bearing and non-weight-bearing positioning.

    PubMed

    van Ijsseldijk, Emiel A; Valstar, Edward R; Stoel, Berend C; de Ridder, Ruud; Nelissen, Rob G H H; Kaptein, Bart L

    2014-04-01

    Measuring the minimum-joint-space-width (mJSW) in total knee arthroplasty (TKA) in Roentgen stereophotogrammetric analysis (RSA) provides valuable information on polyethylene wear, a leading cause for TKA failure. Most existing studies use non-weight-bearing (NWB) patient positioning. The latter may compromise mJSW measurements due to knee laxity with subsequent non-contact between the TKA components. We investigated the difference in mJSW between weight-bearing (WB) and NWB images and the association with mediolateral (ML) knee stability. At one-year follow-up, 23 TKAs were included from an ongoing RSA study, and ML stability was evaluated. For each examination, the mJSW and femoral-tibial contact locations were measured. A linear regression model was used to analyze the association between the mJSW difference (NWB-WB) with the ML stability and contact locations. The mean mJSW difference was 0.28 mm medially and 0.20 mm laterally. Four TKAs had medium (5-9°) and 19 TKAs had high (<5°) ML stability. A higher mJSW difference was found for TKAs with medium stability (0.36 mm, P = 0.01). In conclusion, mJSW measurements in existing (NWB) RSA studies are influenced by knee laxity, but may still provide information on wear progression based on TKA with high ML stability. A direct comparison of mJSW measurements from WB and NWB data is not possible. © 2014 Orthopaedic Research Society. Published by Wiley Periodicals, Inc.

  2. Effect of ADA1 mother-fetus and wife-husband phenotypic differences on the ratio birth weight/placental weight in fertile women and on reproductive success in couples with RSA.

    PubMed

    Gloria-Bottini, Fulvia; Nicotra, Maria; Amante, Ada; Ambrosi, Sara; Cozzoli, Eliana; Saccucci, Patrizia; Bottini, Egidio; Magrini, Andrea

    2012-01-01

    To study the effect Adenosine Deaminase locus 1 (ADA(1)) mother-fetus and wife-husband phenotypic differences on the ratio Birth Weight/Placental Weight (BW/PW) in fertile women and on reproductive success in couples with repeated spontaneous abortion (RSA). 209 couples with primary RSA and a consecutive series of 379 healthy puerperae with their newborn infants from the White Caucasian population of central Italy were studied. In primary RSA women reproductive success was indicated by the presence of at least one live-born infant within 5 years of follow up. Two way contingency tables were analyzed by chi-square. The proportion of primary RSA couples with at least a live-born infant shows the highest value in couples mother ADA(1)1/father carrier of ADA(1)*2 allele (55.2%) and the lowest value in reciprocal couples mother carrier of ADA(1)*2 allele /father ADA(1)1 (18.7%) (O.R. = 5.33; P = 0.023). The highest ratio BW/PW is observed in the class mother ADA(1)1/newborn carrier of ADA(1)*2 allele while the lowest ratio is observed in the reciprocal class mother carrier of ADA(1)*2 allele/ newborn ADA(1)1. Differences between mother and fetus in ADA(1) phenotype may influence the ratio BW/PW in healthy women and reproductive success in RSA women. Copyright © 2012 Wiley Periodicals, Inc.

  3. Key-phrase based classification of public health web pages.

    PubMed

    Dolamic, Ljiljana; Boyer, Célia

    2013-01-01

    This paper describes and evaluates the public health web pages classification model based on key phrase extraction and matching. Easily extendible both in terms of new classes as well as the new language this method proves to be a good solution for text classification faced with the total lack of training data. To evaluate the proposed solution we have used a small collection of public health related web pages created by a double blind manual classification. Our experiments have shown that by choosing the adequate threshold value the desired value for either precision or recall can be achieved.

  4. Data publication and dissemination of interactive keys under the open access model

    USDA-ARS?s Scientific Manuscript database

    The concepts of publication, citation and dissemination of interactive keys and other online keys are discussed and illustrated by a sample paper published in the present issue (doi: 10.3897/zookeys.21.271). The present model is based on previous experience with several existing examples of publishi...

  5. An application of different dioids in public key cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Durcheva, Mariana I., E-mail: mdurcheva66@gmail.com

    2014-11-18

    Dioids provide a natural framework for analyzing a broad class of discrete event dynamical systems such as the design and analysis of bus and railway timetables, scheduling of high-throughput industrial processes, solution of combinatorial optimization problems, the analysis and improvement of flow systems in communication networks. They have appeared in several branches of mathematics such as functional analysis, optimization, stochastic systems and dynamic programming, tropical geometry, fuzzy logic. In this paper we show how to involve dioids in public key cryptography. The main goal is to create key – exchange protocols based on dioids. Additionally the digital signature scheme ismore » presented.« less

  6. Secure data sharing in public cloud

    NASA Astrophysics Data System (ADS)

    Venkataramana, Kanaparti; Naveen Kumar, R.; Tatekalva, Sandhya; Padmavathamma, M.

    2012-04-01

    Secure multi-party protocols have been proposed for entities (organizations or individuals) that don't fully trust each other to share sensitive information. Many types of entities need to collect, analyze, and disseminate data rapidly and accurately, without exposing sensitive information to unauthorized or untrusted parties. Solutions based on secure multiparty computation guarantee privacy and correctness, at an extra communication (too costly in communication to be practical) and computation cost. The high overhead motivates us to extend this SMC to cloud environment which provides large computation and communication capacity which makes SMC to be used between multiple clouds (i.e., it may between private or public or hybrid clouds).Cloud may encompass many high capacity servers which acts as a hosts which participate in computation (IaaS and PaaS) for final result, which is controlled by Cloud Trusted Authority (CTA) for secret sharing within the cloud. The communication between two clouds is controlled by High Level Trusted Authority (HLTA) which is one of the hosts in a cloud which provides MgaaS (Management as a Service). Due to high risk for security in clouds, HLTA generates and distributes public keys and private keys by using Carmichael-R-Prime- RSA algorithm for exchange of private data in SMC between itself and clouds. In cloud, CTA creates Group key for Secure communication between the hosts in cloud based on keys sent by HLTA for exchange of Intermediate values and shares for computation of final result. Since this scheme is extended to be used in clouds( due to high availability and scalability to increase computation power) it is possible to implement SMC practically for privacy preserving in data mining at low cost for the clients.

  7. Absence of a Tourniquet Does Not Affect Fixation of Cemented TKA: A Randomized RSA Study of 70 Patients.

    PubMed

    Ejaz, Ashir; Laursen, Anders C; Jakobsen, Thomas; Rasmussen, Sten; Nielsen, Poul Torben; Laursen, Mogens B

    2015-12-01

    We aimed to determine whether not using a tourniquet in cemented TKA would affect migration of the tibial component measured by radiosterometric analysis (RSA). Seventy patients were randomized into a tourniquet group and a non-tourniquet group and using model-based RSA, the migration of the tibial component was analyzed. Primary and secondary outcome measures were maximum total point motion (MTPM) and translations and rotations. Follow-up period was 2 years. The tibial component was well fixated in both groups and no significant difference in migration between the two groups was detected (P=0.632). Mean MTPM (SD) was 0.47 mm (0.16) in the tourniquet group and 0.45 mm (0.21) in the non-tourniquet group. Absence of tourniquet indicates that stable fixation of the tibial component can be achieved in cemented TKA. Copyright © 2015 Elsevier Inc. All rights reserved.

  8. 78 FR 44539 - Mid-Atlantic Fishery Management Council (MAFMC); Public Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-24

    ... its Ecosystems and Ocean Planning Committee will hold public meetings. DATES: The meetings will be... Committee will meet. 3 p.m. until 5 p.m.--The Ecosystems and Ocean Planning Committee with Advisors will... policy for future RSA research prioritization and Request for Proposal development. The Ecosystems and...

  9. Whole-Genome Sequence of Coxiella burnetii Nine Mile RSA439 (Phase II, Clone 4), a Laboratory Workhorse Strain

    PubMed Central

    Beare, Paul A.; Moses, Abraham S.; Martens, Craig A.; Heinzen, Robert A.

    2017-01-01

    ABSTRACT Here, we report the whole-genome sequence of Coxiella burnetii Nine Mile RSA439 (phase II, clone 4), a laboratory strain used extensively to investigate the biology of this intracellular bacterial pathogen. The genome consists of a 1.97-Mb chromosome and a 37.32-kb plasmid. PMID:28596399

  10. Dialable Cryptography for Wireless Networks

    DTIC Science & Technology

    2008-03-01

    size increased the file size differences for RSA and ELG-E. For example, Elg-E with key size 768 had a smaller file size difference than Elg-E with...not tested at key size 768 ). Figure 11 shows the file size differences for RSA and ElGamal for the different key sizes (all file size differences...times for key sizes 1024 and 1280 (key size 768 was only tested with ElGamal. Once the key size increased above 1280, RSA rose slower than ElGamal

  11. Whole-Genome Sequence of Coxiella burnetii Nine Mile RSA439 (Phase II, Clone 4), a Laboratory Workhorse Strain.

    PubMed

    Millar, Jess A; Beare, Paul A; Moses, Abraham S; Martens, Craig A; Heinzen, Robert A; Raghavan, Rahul

    2017-06-08

    Here, we report the whole-genome sequence of Coxiella burnetii Nine Mile RSA439 (phase II, clone 4), a laboratory strain used extensively to investigate the biology of this intracellular bacterial pathogen. The genome consists of a 1.97-Mb chromosome and a 37.32-kb plasmid. Copyright © 2017 Millar et al.

  12. Public Health Preparedness Funding: Key Programs and Trends From 2001 to 2017.

    PubMed

    Watson, Crystal R; Watson, Matthew; Sell, Tara Kirk

    2017-09-01

    To evaluate trends in funding over the past 16 years for key federal public health preparedness and response programs at the US Department of Health and Human Services, to improve understanding of federal funding history in this area, and to provide context for future resource allocation decisions for public health preparedness. In this 2017 analysis, we examined the funding history of key federal programs critical to public health preparedness by reviewing program budget data collected for our annual examination of federal funding for biodefense and health security programs since fiscal year (FY) 2001. State and local preparedness at the Centers for Disease Control and Prevention initially received $940 million in FY2002 and resulted in significant preparedness gains, but funding levels have since decreased by 31%. Similarly, the Hospital Preparedness Program within the Office of the Assistant Secretary for Preparedness and Response was funded at a high of $515 million in FY2003, but funding was reduced by 50%. Investments in medical countermeasure development and stockpiling remained relatively stable. The United States has made significant progress in preparing for disasters and advancing public health infrastructure. To enable continued advancement, federal funding commitments must be sustained.

  13. Security Management of Electronic Data Interchange

    DTIC Science & Technology

    1993-06-01

    48 6. Signatures by Tamper-Resistent Electronic seal .................................. 49 7. Resolution of Disputes...Trademark by RSA). Secure communication is not possible without any pi eu uous relationship between parties. Electronic mail may be sealed in a...public key certification. [Ref. 321 6. Signatures by Tamper-Resistent Electronic seal There is a separation between encryption and decryption in a public

  14. Improvement in the clinical practicability of roentgen stereophotogrammetric analysis (RSA): free from the use of the dual X-ray equipment.

    PubMed

    Shih, Kao-Shang; Lee, Chian-Her; Syu, Ci-Bin; Lai, Jiing-Yih; Chen, Kuo-Jen; Lin, Shang-Chih

    2012-10-01

    After total knee replacement, the monitoring of the prosthetic performance is often done by roentgenographic examination. However, the two-dimensional (2D) roentgen images only provide information about the projection onto the anteroposterior (AP) and mediolateral (ML) planes. Historically, the model-based roentgen stereophotogrammetric analysis (RSA) technique has been developed to predict the spatial relationship between prostheses by iteratively comparing the projective data for the prosthetic models and the roentgen images. During examination, the prosthetic poses should be stationary. This should be ensured, either by the use of dual synchronized X-ray equipment or by the use of a specific posture. In practice, these methods are uncommon or technically inconvenient during follow-up examination. This study aims to develop a rotation platform to improve the clinical applicability of the model-based RSA technique. The rotation platform allows the patient to assume a weight-bearing posture, while being steadily rotated so that both AP and ML knee images can be obtained. This study uses X-ray equipment with a single source and flat panel detectors (FPDs). Four tests are conducted to evaluate the quality of the FPD images, steadiness of the rotation platform, and accuracy of the RSA results. The results show that the distortion-induced error of the FPD image is quite minor, and the prosthetic size can be cautiously calibrated by means of the scale ball(s). The rotation platform should be placed closer to the FPD and orthogonal to the projection axis of the X-ray source. Image overlap of the prostheses can be avoided by adjusting both X-ray source and knee posture. The device-induced problems associated with the rotation platform include the steadiness of the platform operation and the balance of the rotated subject. Sawbone tests demonstrate that the outline error, due to the platform, is of the order of the image resolution (= 0.145 mm). In conclusion, the rotation

  15. Angled BIO-RSA (bony-increased offset-reverse shoulder arthroplasty): a solution for the management of glenoid bone loss and erosion.

    PubMed

    Boileau, Pascal; Morin-Salvo, Nicolas; Gauci, Marc-Olivier; Seeto, Brian L; Chalmers, Peter N; Holzer, Nicolas; Walch, Gilles

    2017-12-01

    Glenoid deficiency and erosion (excessive retroversion/inclination) must be corrected in reverse shoulder arthroplasty (RSA) to avoid prosthetic notching or instability and to maximize function, range of motion, and prosthesis longevity. This study reports the results of RSA with an angled, autologous glenoid graft harvested from the humerus (angled BIO-RSA). A trapezoidal bone graft, harvested from the humeral head and fixed with a long-post baseplate and screws, was used to compensate for residual glenoid bone loss/erosion. For simple to moderate (<25°) glenoid defects, standardized instrumentation combined with some eccentric reaming (<15°) was used to reconstruct the glenoid and obtain neutral implant alignment. For severe (>25°) and complex (multiplanar) glenoid bone defects, patient-specific grafts and guides were used after 3-dimensional planning. Patients were reviewed with minimum 2 years of follow-up. Mean follow-up was 36 months (range, 24-81 months). Preoperative and postoperative measurements of inclination and version were performed in the plane of the scapula on computed tomography images. The study included 54 patients (41 women, 13 men; mean 73 years old). Fifteen patients had combined vertical and horizontal glenoid bone deficiency. Among E2/E3 glenoids, inclination improved from 37° (range, 14° to 84°) to 10.2° (range -28° to 36°, P < .001). Among B2/C glenoids, retroversion improved from -21° (range, -49° to 0°) to -10.6° (-32° to 4°, P = .06). Complete radiographic incorporation of the graft occurred in 94% (51 of 54). Complications included infection in 1 and clinical aseptic baseplate loosening in 2. Mild notching occurred in 25% (13 of 51) of patients. Constant-Murley and Subjective Shoulder Value assessments increased from 31 to 68 and from 30% to 83%, respectively (P < .001). Angled BIO-RSA predictably corrects glenoid deficiency, including severe (>25°) multiplanar deformity. Graft incorporation is predictable

  16. Fixed versus mixed RSA: Explaining visual representations by fixed and mixed feature sets from shallow and deep computational models.

    PubMed

    Khaligh-Razavi, Seyed-Mahdi; Henriksson, Linda; Kay, Kendrick; Kriegeskorte, Nikolaus

    2017-02-01

    Studies of the primate visual system have begun to test a wide range of complex computational object-vision models. Realistic models have many parameters, which in practice cannot be fitted using the limited amounts of brain-activity data typically available. Task performance optimization (e.g. using backpropagation to train neural networks) provides major constraints for fitting parameters and discovering nonlinear representational features appropriate for the task (e.g. object classification). Model representations can be compared to brain representations in terms of the representational dissimilarities they predict for an image set. This method, called representational similarity analysis (RSA), enables us to test the representational feature space as is (fixed RSA) or to fit a linear transformation that mixes the nonlinear model features so as to best explain a cortical area's representational space (mixed RSA). Like voxel/population-receptive-field modelling, mixed RSA uses a training set (different stimuli) to fit one weight per model feature and response channel (voxels here), so as to best predict the response profile across images for each response channel. We analysed response patterns elicited by natural images, which were measured with functional magnetic resonance imaging (fMRI). We found that early visual areas were best accounted for by shallow models, such as a Gabor wavelet pyramid (GWP). The GWP model performed similarly with and without mixing, suggesting that the original features already approximated the representational space, obviating the need for mixing. However, a higher ventral-stream visual representation (lateral occipital region) was best explained by the higher layers of a deep convolutional network and mixing of its feature set was essential for this model to explain the representation. We suspect that mixing was essential because the convolutional network had been trained to discriminate a set of 1000 categories, whose frequencies

  17. A Training Framework for the Department of Defense Public Key Infrastructure

    DTIC Science & Technology

    2001-09-01

    and the growth of electronic commerce within the Department of Defense (DoD) has led to the development and implementation of the DoD Public Key...also grown within the Department of Defense. Electronic commerce and business to business transactions have become more commonplace and have

  18. Public Key-Based Need-to-Know Authorization Engine Final Report CRADA No. TSB-1553-98

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mark, R.; Williams, R.

    The goals of this project were to develop a public key-based authentication service plug-in based on LLNL's requirements, integrate the public key-based authentication with the Intra Verse authorization service adn the LLNL NTK server by developing a full-featured version of the prototyped Intra Verse need-to-know plug in; and to test the authorization and need-to-know plug-in in a secured extranet prototype among selected national Labs.

  19. Public Health Preparedness Funding: Key Programs and Trends From 2001 to 2017

    PubMed Central

    Sell, Tara Kirk

    2017-01-01

    Objectives. To evaluate trends in funding over the past 16 years for key federal public health preparedness and response programs at the US Department of Health and Human Services, to improve understanding of federal funding history in this area, and to provide context for future resource allocation decisions for public health preparedness. Methods. In this 2017 analysis, we examined the funding history of key federal programs critical to public health preparedness by reviewing program budget data collected for our annual examination of federal funding for biodefense and health security programs since fiscal year (FY) 2001. Results. State and local preparedness at the Centers for Disease Control and Prevention initially received $940 million in FY2002 and resulted in significant preparedness gains, but funding levels have since decreased by 31%. Similarly, the Hospital Preparedness Program within the Office of the Assistant Secretary for Preparedness and Response was funded at a high of $515 million in FY2003, but funding was reduced by 50%. Investments in medical countermeasure development and stockpiling remained relatively stable. Conclusions. The United States has made significant progress in preparing for disasters and advancing public health infrastructure. To enable continued advancement, federal funding commitments must be sustained. PMID:28892451

  20. Multivariate Cryptography Based on Clipped Hopfield Neural Network.

    PubMed

    Wang, Jia; Cheng, Lee-Ming; Su, Tong

    2018-02-01

    Designing secure and efficient multivariate public key cryptosystems [multivariate cryptography (MVC)] to strengthen the security of RSA and ECC in conventional and quantum computational environment continues to be a challenging research in recent years. In this paper, we will describe multivariate public key cryptosystems based on extended Clipped Hopfield Neural Network (CHNN) and implement it using the MVC (CHNN-MVC) framework operated in space. The Diffie-Hellman key exchange algorithm is extended into the matrix field, which illustrates the feasibility of its new applications in both classic and postquantum cryptography. The efficiency and security of our proposed new public key cryptosystem CHNN-MVC are simulated and found to be NP-hard. The proposed algorithm will strengthen multivariate public key cryptosystems and allows hardware realization practicality.

  1. Understanding Price Elasticities to Inform Public Health Research and Intervention Studies: Key Issues

    PubMed Central

    Nghiem, Nhung; Genç, Murat; Blakely, Tony

    2013-01-01

    Pricing policies such as taxes and subsidies are important tools in preventing and controlling a range of threats to public health. This is particularly so in tobacco and alcohol control efforts and efforts to change dietary patterns and physical activity levels as a means of addressing increases in noncommunicable diseases. To understand the potential impact of pricing policies, it is critical to understand the nature of price elasticities for consumer products. For example, price elasticities are key parameters in models of any food tax or subsidy that aims to quantify health impacts and cost-effectiveness. We detail relevant terms and discuss key issues surrounding price elasticities to inform public health research and intervention studies. PMID:24028228

  2. Analysis of the Skills Used in Public Broadcasting's Key Jobs with Recommended Uses by Public Broadcasting Organizations.

    ERIC Educational Resources Information Center

    Olian, Judy; Schneier, Craig E.

    Designed to provide a listing of knowledge, skills, and abilities (collectively known as KSAs) that could be used by public broadcasting stations for recruitment, selection, promotion, evaluation, training, and staff career development, this document addresses three key broadcasting personnel areas. These areas are programming/production,…

  3. Key Generation for Fast Inversion of the Paillier Encryption Function

    NASA Astrophysics Data System (ADS)

    Hirano, Takato; Tanaka, Keisuke

    We study fast inversion of the Paillier encryption function. Especially, we focus only on key generation, and do not modify the Paillier encryption function. We propose three key generation algorithms based on the speeding-up techniques for the RSA encryption function. By using our algorithms, the size of the private CRT exponent is half of that of Paillier-CRT. The first algorithm employs the extended Euclidean algorithm. The second algorithm employs factoring algorithms, and can construct the private CRT exponent with low Hamming weight. The third algorithm is a variant of the second one, and has some advantage such as compression of the private CRT exponent and no requirement for factoring algorithms. We also propose the settings of the parameters for these algorithms and analyze the security of the Paillier encryption function by these algorithms against known attacks. Finally, we give experimental results of our algorithms.

  4. A High-Speed Design of Montgomery Multiplier

    NASA Astrophysics Data System (ADS)

    Fan, Yibo; Ikenaga, Takeshi; Goto, Satoshi

    With the increase of key length used in public cryptographic algorithms such as RSA and ECC, the speed of Montgomery multiplication becomes a bottleneck. This paper proposes a high speed design of Montgomery multiplier. Firstly, a modified scalable high-radix Montgomery algorithm is proposed to reduce critical path. Secondly, a high-radix clock-saving dataflow is proposed to support high-radix operation and one clock cycle delay in dataflow. Finally, a hardware-reused architecture is proposed to reduce the hardware cost and a parallel radix-16 design of data path is proposed to accelerate the speed. By using HHNEC 0.25μm standard cell library, the implementation results show that the total cost of Montgomery multiplier is 130 KGates, the clock frequency is 180MHz and the throughput of 1024-bit RSA encryption is 352kbps. This design is suitable to be used in high speed RSA or ECC encryption/decryption. As a scalable design, it supports any key-length encryption/decryption up to the size of on-chip memory.

  5. CYP2E1 Rsa Ι/Pst Ι polymorphism and lung cancer susceptibility: a meta-analysis involving 10,947 subjects.

    PubMed

    Shen, Ze-Tian; Wu, Xin-Hu; Li, Bing; Shen, Jun-shu; Wang, Zhen; Li, Jing; Zhu, Xi-Xu

    2015-09-01

    Many studies have examined the association between the CYP2E1 Rsa Ι/Pst Ι (rs3813867) polymorphism gene polymorphisms and lung cancer risk in various populations, but their results have been inconsistent. The PubMed and CNKI database was searched for case-control studies published up to October 2013. Data were extracted and pooled odds ratios (OR) with 95% confidence intervals (CI) were calculated. In this meta-analysis, we assessed 23 published studies involving comprising 4727 lung cancer cases and 6220 controls of the association between CYP2E1 Rsa Ι/Pst Ι polymorphism and lung cancer risk. For the homozygote c2/c2 and c2 allele carriers (c1/c2 + c2/c2), the pooled ORs for all studies were 0.73(95% CI = 0.62-0.84; P = 0.005 for heterogeneity) and 0.84 (95% CI = 0.77-0.92; P = 0.001 for heterogeneity) when compared with the homozygous wild-type genotype (c1/c1). In the stratified analysis by ethnicity, the same significantly risks were found among Asians and mixed population for both the c2 allele carriers and homozygote c2/c2. However, no significant associations were found in Caucasian population all genetic models. This updated meta-analysis suggests that CYP2E1 Rsa Ι/Pst Ι c2 allele is a decreased risk factor for the developing lung cancer among Asians and mixed population. © 2015 The Authors. Journal of Cellular and Molecular Medicine published by John Wiley & Sons Ltd and Foundation for Cellular and Molecular Medicine.

  6. Fibrinogen adsorption mechanisms at the gold substrate revealed by QCM-D measurements and RSA modeling.

    PubMed

    Kubiak, Katarzyna; Adamczyk, Zbigniew; Cieśla, Michał

    2016-03-01

    Adsorption kinetics of fibrinogen at a gold substrate at various pHs was thoroughly studied using the QCM-D method. The experimental were interpreted in terms of theoretical calculations performed according to the random sequential adsorption model (RSA). In this way, the hydration functions and water factors of fibrinogen monolayers were quantitatively evaluated at various pHs. It was revealed that for the lower range of fibrinogen coverage the hydration function were considerably lower than previously obtained for the silica sensor [33]. The lower hydration of fibrinogen monolayers on the gold sensor was attributed to its higher roughness. However, for higher fibrinogen coverage the hydration functions for both sensors became identical exhibiting an universal behavior. By using the hydration functions, the fibrinogen adsorption/desorption runs derived from QCM-D measurements were converted to the Γd vs. the time relationships. This allowed to precisely determine the maximum coverage that varied between 1.6mgm(-2) at pH 3.5 and 4.5mgm(-2) at pH 7.4 (for ionic strength of 0.15M). These results agree with theoretical eRSA modeling and previous experimental data derived by using ellipsometry, OWLS and TIRF. Various fibrinogen adsorption mechanisms were revealed by exploiting the maximum coverage data. These results allow one to develop a method for preparing fibrinogen monolayers of well-controlled coverage and molecule orientation. Copyright © 2015 Elsevier B.V. All rights reserved.

  7. File Cryptography with AES and RSA for Mobile Based on Android

    NASA Astrophysics Data System (ADS)

    laia, Yonata; Nababan, Marlince; Sihombing, Oloan; Aisyah, Siti; Sitanggang, Delima; Parsaoran, Saut; Zendato, Niskarto

    2018-04-01

    The users of mobile based on android were increasing currently even now mobile was almost the same computer one of which could be used to be done by every users mobile was save the individual important data.Saving the data on mobile was very risk because become hackers’ target. That was the reason of researchers want to add cryptography which the combination between Advance Encryption System (AES) dan Ron Rivest, Adi Shamir dan Len Adleman (RSA). The result of the second method above could do cryptography data on mobile. With different encryption time where the file size; 25.44 KB, encryption time 4 second, 200 KB, 5 second, 600 KB 7 second, 2.29 MB, 10 second. Where decryption 25.44 KB, encryption 2 second, 200 KB, 1.5 second, 600 KB 2.5 second, 2.29 MB, 2.7 second.

  8. 76 FR 58782 - Mid-Atlantic Fishery Management Council (MAFMC); Public Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-22

    .... SUMMARY: The Mid-Atlantic Fishery Management Council (Council), its Research Set-Aside (RSA) Committee... INFORMATION: On Tuesday, October 11, the RSA Committee will meet from 8:30 a.m. until 10:30 a.m. The SMB..., the Council will convene at 8:30 a.m. The RSA Program Review Report will be heard from 8:30 a.m. until...

  9. Dynamic Polymorphic Reconfiguration to Effectively Cloak a Circuit’s Function

    DTIC Science & Technology

    2011-03-24

    86 B . RSA Traces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 2.1...56 22 SEMA of Separate Square and Multiply Trace with key (E B5) - RSA Version B ...56 23 Separate Square and Multiply Trace after signal processing - RSA Version B

  10. Combination of Rivest-Shamir-Adleman Algorithm and End of File Method for Data Security

    NASA Astrophysics Data System (ADS)

    Rachmawati, Dian; Amalia, Amalia; Elviwani

    2018-03-01

    Data security is one of the crucial issues in the delivery of information. One of the ways which used to secure the data is by encoding it into something else that is not comprehensible by human beings by using some crypto graphical techniques. The Rivest-Shamir-Adleman (RSA) cryptographic algorithm has been proven robust to secure messages. Since this algorithm uses two different keys (i.e., public key and private key) at the time of encryption and decryption, it is classified as asymmetric cryptography algorithm. Steganography is a method that is used to secure a message by inserting the bits of the message into a larger media such as an image. One of the known steganography methods is End of File (EoF). In this research, the cipher text resulted from the RSA algorithm is compiled into an array form and appended to the end of the image. The result of the EoF is the image which has a line with black gradations under it. This line contains the secret message. This combination of cryptography and steganography in securing the message is expected to increase the security of the message, since the message encryption technique (RSA) is mixed with the data hiding technique (EoF).

  11. Small and similar amounts of micromotion in an anatomical stem and a customized cementless femoral stem in regular-shaped femurs. A 5-year follow-up randomized RSA study.

    PubMed

    Nysted, Mona; Foss, Olav A; Klaksvik, Jomar; Benum, Pål; Haugan, Kristin; Husby, Otto Schnell; Aamodt, Arild

    2014-04-01

    High primary stability is important for long-term survival of uncemented femoral stems. Different stem designs are currently in use. The ABG-I is a well-documented anatomical stem with a press-fit design. The Unique stem is designed for a tight customized fit to the cortical bone of the upper femur. This implant was initially developed for patients with abnormal anatomy, but the concept can also be used in patients with normal femoral anatomy. We present 5-year radiostereometric analysis (RSA) results from a randomized study comparing the ABG-I anatomical stem with the Unique femoral stem. 100 hips with regular upper femur anatomy were randomized to either the ABG-I stem or the Unique femoral stem. RSA measurements were performed postoperatively and after 3, 6, 12, 24, and 60 months. RSA measurements from 80 hips were available for analysis at the 5-year follow-up. Small amounts of movement were observed for both stems, with no statistically significant differences between the 2 types. No improvement in long-term stability was found from using a customized stem design. However, no patients with abnormal geometry of the upper femur were included in this study.

  12. Equally good fixation of cemented and uncemented cups in total trapeziometacarpal joint prostheses. A randomized clinical RSA study with 2-year follow-up.

    PubMed

    Hansen, Torben Baek; Stilling, Maiken

    2013-02-01

    Cup failure is a recognized problem in total trapeziometacarpal (TM) joint prostheses; it may be related to poor fixation, which can be revealed by radiostereometric analysis (RSA). We compared the early implant migration of cemented trapezium cups to that of uncemented screw cups. In a prospective, parallel-group, randomized patient-blinded clinical trial, we included 32 hands in 28 patients (5 males) with a mean age of 58 (40-77) years and with Eaton stage-2 or -3 osteoarthritis of the trapeziometacarpal joint. Patients were randomized to surgery with a cemented DLC all-polyethylene cup (C) (n = 16) or an uncemented hydroxyapatite-coated chrome-cobalt Elektra screw cup (UC) (n = 16). Uncemented cups were inserted without threading of the bone. Stereoradiographs for evaluation of cup migration (primary effect size) and DASH and pain scores were obtained during 2 years of follow-up. The 2-year total translation (TT) was similar (p = 0.2): 0.24 mm (SD 0.10) for the C (n = 11) and 0.19 mm (SD 0.16) for the UC (n = 11). Variances were similar (p = 0.4). Judged by RSA, 2 UC cups and 1 C cup became loose (TT > 1 mm). Both UC cups were found to be loose at revision. Grip strength, pain, and DASH scores were similar between groups at all measurement points. Early implant fixation and clinical outcome were equally good with both cup designs. This is the first clinical RSA study on trapezium cups, and the method appears to be clinically useful for detection of loose implants.

  13. Trust Threshold Based Public Key Management in Mobile Ad Hoc Networks

    DTIC Science & Technology

    2016-03-05

    should operate in a self-organized way. Capkun t al. [15] proposed a certificate-based self-organized pub- c key management for MANETs by removing...period allo node started with ignorance interact with other nodes, th not reach T th Table 2 Attack behavior for operations . Operation Attack...section, we discuss the core operations o CTPKM as illustrated by Fig. 1 . Each mobile entity is able t communicate with other entities using public

  14. 75 FR 14428 - Mid-Atlantic Fishery Management Council (MAFMC); Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-25

    ... Dogfish, Research Set- Aside (RSA), and Executive Committees will hold public meetings. DATES: Tuesday.... until 4 p.m.. From 4 p.m. until 5:30 p.m., the Research Set-Aside (RSA) will meet. On Wednesday, April... Amendment 3). The RSA Committee will discuss possible ways to improve the RSA program and consider...

  15. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.

    PubMed

    Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru

    2016-10-01

    Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security

  16. Vital Collaboratives, Alliances, and Partnerships: A Search for Key Elements of an Effective Public-Private Partnership

    ERIC Educational Resources Information Center

    Young, Charles Keith

    2010-01-01

    Owing to the significant structural changes that have occurred in the global marketplace over the past 2 decades, a corresponding increase of public-private partnerships have been established among the business sector, local governments, and public community colleges. This qualitative project sought to identify and substantiate key elements that…

  17. A Factor Analytic Investigation of the Person-in-Recovery and Provider Versions of the Revised Recovery Self-Assessment (RSA-R).

    PubMed

    Konkolÿ Thege, Barna; Ham, Elke; Ball, Laura C

    2017-12-01

    Recovery is understood as living a life with hope, purpose, autonomy, productivity, and community engagement despite a mental illness. The aim of this study was to provide further information on the psychometric properties of the Person-in-Recovery and Provider versions of the Revised Recovery Self-Assessment (RSA-R), a widely used measure of recovery orientation. Data from 654 individuals were analyzed, 519 of whom were treatment providers (63.6% female), while 135 were inpatients (10.4% female) of a Canadian tertiary-level psychiatric hospital. Confirmatory and exploratory techniques were used to investigate the factor structure of both versions of the instrument. Results of the confirmatory factor analyses showed that none of the four theoretically plausible models fit the data well. Principal component analyses could not replicate the structure obtained by the scale developers either and instead resulted in a five-component solution for the Provider and a four-component solution for the Person-in-Recovery version. When considering the results of a parallel analysis, the number of components to retain dropped to two for the Provider version and one for the Person-in-Recovery version. We can conclude that the RSA-R requires further revision to become a psychometrically sound instrument for assessing recovery-oriented practices in an inpatient mental health-care setting.

  18. Key Data Gaps Regarding the Public Health Issues Associated with Opioid Analgesics

    PubMed Central

    Schmidt, Teresa D.; Haddox, J. David; Nielsen, Alexandra E.; Wakeland, Wayne; Fitzgerald, John

    2014-01-01

    Most pharmaceutical opioids are used to treat pain and they have been demonstrated to be effective medications for many. Their abuse and misuse pose significant public health concerns in the United States. Research has provided much insight into the prevalence, scope, and drivers of opioid abuse, but a holistic understanding is limited by a lack of available data regarding key aspects of this public health problem. Twelve data gaps were revealed during the creation of a systems-level computer model of medical use, diversion, nonmedical use, and the adverse outcomes associated with opioid analgesics in the United States. Data specific to these gaps would enhance the validity and real-world applications of systems-level models of this public health problem, and would increase understanding of the complex system in which use and abuse occur. This paper provides an overview of these gaps, argues for the importance of closing them, and provides specific recommendations for future data collection efforts. PMID:24554390

  19. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal - a case study from health science.

    PubMed

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication.  The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI), incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of UIDs may become

  20. Compact FPGA hardware architecture for public key encryption in embedded devices.

    PubMed

    Rodríguez-Flores, Luis; Morales-Sandoval, Miguel; Cumplido, René; Feregrino-Uribe, Claudia; Algredo-Badillo, Ignacio

    2018-01-01

    Security is a crucial requirement in the envisioned applications of the Internet of Things (IoT), where most of the underlying computing platforms are embedded systems with reduced computing capabilities and energy constraints. In this paper we present the design and evaluation of a scalable low-area FPGA hardware architecture that serves as a building block to accelerate the costly operations of exponentiation and multiplication in [Formula: see text], commonly required in security protocols relying on public key encryption, such as in key agreement, authentication and digital signature. The proposed design can process operands of different size using the same datapath, which exhibits a significant reduction in area without loss of efficiency if compared to representative state of the art designs. For example, our design uses 96% less standard logic than a similar design optimized for performance, and 46% less resources than other design optimized for area. Even using fewer area resources, our design still performs better than its embedded software counterparts (190x and 697x).

  1. Aluminum alloy AA-6061 and RSA-6061 heat treatment for large mirror applications

    NASA Astrophysics Data System (ADS)

    Newswander, T.; Crowther, B.; Gubbels, G.; Senden, R.

    2013-09-01

    Aluminum mirrors and telescopes can be built to perform well if the material is processed correctly and can be relatively low cost and short schedule. However, the difficulty of making high quality aluminum telescopes increases as the size increases, starting with uniform heat treatment through the thickness of large mirror substrates. A risk reduction effort was started to build and test a ½ meter diameter super polished aluminum mirror. Material selection, the heat treatment process and stabilization are the first critical steps to building a successful mirror. In this study, large aluminum blanks of both conventional AA-6061 per AMS-A-22771 and RSA AA-6061 were built, heat treated and stress relieved. Both blanks were destructively tested with a cut through the thickness. Hardness measurements and tensile tests were completed. We present our results in this paper and make suggestions for modification of procedures and future work.

  2. Design modifications of the uncemented Furlong hip stem result in minor early subsidence but do not affect further stability: a randomized controlled RSA study with 5-year follow-up.

    PubMed

    Weber, Erik; Sundberg, Martin; Flivik, Gunnar

    2014-12-01

    Even small design modifications of uncemented hip stems may alter the postoperative 3-D migration pattern. The Furlong Active is an uncemented femoral stem which, in terms of design, is based on its precursor-the well-proven Furlong HAC-but has undergone several design changes. The collar has been removed on the Active stem along with the lateral fin; it is shorter and has more rounded edges in the proximal part. We compared the migration patterns of the uncemented Furlong HAC stem and the modified Furlong Active stem in a randomized, controlled trial over 5 years using radiostereometry (RSA). 50 patients with primary osteoarthritis were randomized to receive either the HAC stem or the Active stem. The patients underwent repeated RSA examinations (postoperatively, at 3 months, and after 1, 2, and 5 years) and conventional radiography, and they also filled out hip-specific questionnaires. During the first 3 months, the collarless Active stem subsided to a greater extent than the collar-fitted HAC stem (0.99 mm vs. 0.31 mm, p=0.05). There were, however, no other differences in movement measured by RSA or in clinical outcome between the 2 stems. After 3 months, both stem types had stabilized and almost no further migration was seen. The Active stem showed no signs of unfavorable migration. Our results suggest that the osseointegration is not compromised by the new design features.

  3. Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

    PubMed Central

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C.-W.

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions. PMID:25207333

  4. Efficient and provable secure pairing-free security-mediated identity-based identification schemes.

    PubMed

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  5. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal – a case study from health science

    PubMed Central

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication.  The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI), incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of UIDs may become

  6. 76 FR 9330 - Notice of Proposed Information Collection Requests

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-17

    ... Number: 1820-0528. Agency Form Number(s): Form RSA-227. Frequency of Responses: Annually. Affected Public... Estimated Number of Annual Burden Hours: 896. Abstract: Form RSA-227 is used to meet specific data.... In addition, Form RSA-227 will be used to analyze and evaluate the effectiveness of individual Client...

  7. Key stakeholder perceptions regarding acute care psychiatry in distressed publicly funded mental health care markets.

    PubMed

    Frueh, B Christopher; Grubaugh, Anouk L; Lo Sasso, Anthony T; Jones, Walter J; Oldham, John M; Lindrooth, Richard C

    2012-01-01

    The role of acute care inpatient psychiatry, public and private, has changed dramatically since the 1960s, especially as recent market forces affecting the private sector have had ripple effects on publicly funded mental health care. Key stakeholders' experiences, perceptions, and opinions regarding the role of acute care psychiatry in distressed markets of publicly funded mental health care were examined. A qualitative research study was conducted using semi-structured thematic interviews with 52 senior mental health system administrators, clinical directors and managers, and nonclinical policy specialists. Participants were selected from markets in six regions of the United States that experienced recent significant closures of acute care psychiatric beds. Qualitative data analyses yielded findings that clustered around three sets of higher order themes: structure of care, service delivery barriers, and outcomes. Structure of care suggests that acute care psychiatry is seen as part of a continuum of services; service delivery barriers inhibit effective delivery of services and are perceived to include economic, regulatory, and political factors; outcomes include fragmentation of mental health care services across the continuum, the shift of mental health care to the criminal justice system, and market-specific issues affecting mental health care. Findings delineate key stakeholders' perceptions regarding the role acute care psychiatry plays in the continuum of care for publicly funded mental health and suggest that public mental health care is inefficacious. Results carry implications for policy makers regarding strategies/policies to improve optimal utilization of scarce resources for mental health care, including greater focus on psychotherapy.

  8. Key stakeholder perceptions regarding acute care psychiatry in distressed publicly funded mental health care markets

    PubMed Central

    Frueh, B. Christopher; Grubaugh, Anouk L.; Lo Sasso, Anthony T.; Jones, Walter J.; Oldham, John M.; Lindrooth, Richard C.

    2017-01-01

    The role of acute care inpatient psychiatry, public and private, has changed dramatically since the 1960s, especially as recent market forces affecting the private sector have had ripple effects on publicly funded mental health care. Key stakeholders’ experiences, perceptions, and opinions regarding the role of acute care psychiatry in distressed markets of publicly funded mental health care were examined. A qualitative research study was conducted using semi-structured thematic interviews with 52 senior mental health system administrators, clinical directors and managers, and nonclinical policy specialists. Participants were selected from markets in six regions of the United States that experienced recent significant closures of acute care psychiatric beds. Qualitative data analyses yielded findings that clustered around three sets of higher order themes: structure of care, service delivery barriers, and outcomes. Structure of care suggests that acute care psychiatry is seen as part of a continuum of services; service delivery barriers inhibit effective delivery of services and are perceived to include economic, regulatory, and political factors; outcomes include fragmentation of mental health care services across the continuum, the shift of mental health care to the criminal justice system, and market-specific issues affecting mental health care. Findings delineate key stakeholders’ perceptions regarding the role acute care psychiatry plays in the continuum of care for publicly funded mental health and suggest that public mental health care is inefficacious. Results carry implications for policy makers regarding strategies/policies to improve optimal utilization of scarce resources for mental health care, including greater focus on psychotherapy. PMID:22409204

  9. Does hydroxyapatite coating enhance ingrowth and improve longevity of a Zweymuller type stem? A double-blinded randomised RSA trial.

    PubMed

    Hoornenborg, Daniel; Sierevelt, Inger N; Spuijbroek, Joost A; Cheung, John; van der Vis, Harm M; Beimers, Lijkele; Haverkamp, Daniel

    2017-09-11

    An ongoing discussion is whether using a hydroxyapatite coating enhances the ingrowth and longevity of a femoral stem in total hip arthroplasty. The best way to predict speed of ingrowth and long-term outcome is by evaluating micromotion by radiostereometric analysis. To study the effect of hydroxyapatite (HA) coating on the migration of the SL-PLUS hip stem, we performed a prospective double blind randomised controlled trial comparing the early migration of the hydroxyapatite (HA)-coated SL-PLUS stem compared to the Standard (non-coated) SL-PLUS stem. 51 patients were randomly assigned to receive either an uncoated or a HA-coated femoral component during total hip replacement. RSA images were obtained direct postoperatively and at 6 weeks, 12 weeks, 6 months, 12 months and 24 months. HOOS scores were obtained preoperative and at final follow-up. RSA evaluation demonstrated significant migration up to 3 months postoperatively in both groups. After initial setting no significant migration was observed. There was no significant difference in migration between the HA-coated group and the uncoated group.Both Harris Hip Score (HHS) and HOOS domain scores (pain and ADL) significantly improved compared to baseline at 24 months after surgery in both treatment groups (p<0.001 for all comparisons). Improvement did not differ significantly between the 2 groups. At 2 years follow-up, the HA-coated and uncoated Zweymuller type, distal fitting stem do not show different migration patterns.

  10. Application of homomorphism to secure image sharing

    NASA Astrophysics Data System (ADS)

    Islam, Naveed; Puech, William; Hayat, Khizar; Brouzet, Robert

    2011-09-01

    In this paper, we present a new approach for sharing images between l players by exploiting the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, i.e. RSA and Paillier. Contrary to the traditional schemes, the proposed approach employs secret sharing in a way that limits the influence of the dealer over the protocol and allows each player to participate with the help of his key-image. With the proposed approach, during the encryption step, each player encrypts his own key-image using the dealer's public key. The dealer encrypts the secret-to-be-shared image with the same public key and then, the l encrypted key-images plus the encrypted to-be shared image are multiplied homomorphically to get another encrypted image. After this step, the dealer can safely get a scrambled image which corresponds to the addition or multiplication of the l + 1 original images ( l key-images plus the secret image) because of the additive homomorphic property of the Paillier algorithm or multiplicative homomorphic property of the RSA algorithm. When the l players want to extract the secret image, they do not need to use keys and the dealer has no role. Indeed, with our approach, to extract the secret image, the l players need only to subtract their own key-image with no specific order from the scrambled image. Thus, the proposed approach provides an opportunity to use operators like multiplication on encrypted images for the development of a secure privacy preserving protocol in the image domain. We show that it is still possible to extract a visible version of the secret image with only l-1 key-images (when one key-image is missing) or when the l key-images used for the extraction are different from the l original key-images due to a lossy compression for example. Experimental results and security analysis verify and prove that the proposed approach is secure from cryptographic viewpoint.

  11. Compact FPGA hardware architecture for public key encryption in embedded devices

    PubMed Central

    Morales-Sandoval, Miguel; Cumplido, René; Feregrino-Uribe, Claudia; Algredo-Badillo, Ignacio

    2018-01-01

    Security is a crucial requirement in the envisioned applications of the Internet of Things (IoT), where most of the underlying computing platforms are embedded systems with reduced computing capabilities and energy constraints. In this paper we present the design and evaluation of a scalable low-area FPGA hardware architecture that serves as a building block to accelerate the costly operations of exponentiation and multiplication in GF(p), commonly required in security protocols relying on public key encryption, such as in key agreement, authentication and digital signature. The proposed design can process operands of different size using the same datapath, which exhibits a significant reduction in area without loss of efficiency if compared to representative state of the art designs. For example, our design uses 96% less standard logic than a similar design optimized for performance, and 46% less resources than other design optimized for area. Even using fewer area resources, our design still performs better than its embedded software counterparts (190x and 697x). PMID:29360824

  12. A systematic literature review of the key challenges for developing the structure of public health economic models.

    PubMed

    Squires, Hazel; Chilcott, James; Akehurst, Ronald; Burr, Jennifer; Kelly, Michael P

    2016-04-01

    To identify the key methodological challenges for public health economic modelling and set an agenda for future research. An iterative literature search identified papers describing methodological challenges for developing the structure of public health economic models. Additional multidisciplinary literature searches helped expand upon important ideas raised within the review. Fifteen articles were identified within the formal literature search, highlighting three key challenges: inclusion of non-healthcare costs and outcomes; inclusion of equity; and modelling complex systems and multi-component interventions. Based upon these and multidisciplinary searches about dynamic complexity, the social determinants of health, and models of human behaviour, six areas for future research were specified. Future research should focus on: the use of systems approaches within health economic modelling; approaches to assist the systematic consideration of the social determinants of health; methods for incorporating models of behaviour and social interactions; consideration of equity; and methodology to help modellers develop valid, credible and transparent public health economic model structures.

  13. Authentication and Encryption Using Modified Elliptic Curve Cryptography with Particle Swarm Optimization and Cuckoo Search Algorithm

    NASA Astrophysics Data System (ADS)

    Kota, Sujatha; Padmanabhuni, Venkata Nageswara Rao; Budda, Kishor; K, Sruthi

    2018-05-01

    Elliptic Curve Cryptography (ECC) uses two keys private key and public key and is considered as a public key cryptographic algorithm that is used for both authentication of a person and confidentiality of data. Either one of the keys is used in encryption and other in decryption depending on usage. Private key is used in encryption by the user and public key is used to identify user in the case of authentication. Similarly, the sender encrypts with the private key and the public key is used to decrypt the message in case of confidentiality. Choosing the private key is always an issue in all public key Cryptographic Algorithms such as RSA, ECC. If tiny values are chosen in random the security of the complete algorithm becomes an issue. Since the Public key is computed based on the Private Key, if they are not chosen optimally they generate infinity values. The proposed Modified Elliptic Curve Cryptography uses selection in either of the choices; the first option is by using Particle Swarm Optimization and the second option is by using Cuckoo Search Algorithm for randomly choosing the values. The proposed algorithms are developed and tested using sample database and both are found to be secured and reliable. The test results prove that the private key is chosen optimally not repetitive or tiny and the computations in public key will not reach infinity.

  14. Use of single-representative reverse-engineered surface-models for RSA does not affect measurement accuracy and precision.

    PubMed

    Seehaus, Frank; Schwarze, Michael; Flörkemeier, Thilo; von Lewinski, Gabriela; Kaptein, Bart L; Jakubowitz, Eike; Hurschler, Christof

    2016-05-01

    Implant migration can be accurately quantified by model-based Roentgen stereophotogrammetric analysis (RSA), using an implant surface model to locate the implant relative to the bone. In a clinical situation, a single reverse engineering (RE) model for each implant type and size is used. It is unclear to what extent the accuracy and precision of migration measurement is affected by implant manufacturing variability unaccounted for by a single representative model. Individual RE models were generated for five short-stem hip implants of the same type and size. Two phantom analyses and one clinical analysis were performed: "Accuracy-matched models": one stem was assessed, and the results from the original RE model were compared with randomly selected models. "Accuracy-random model": each of the five stems was assessed and analyzed using one randomly selected RE model. "Precision-clinical setting": implant migration was calculated for eight patients, and all five available RE models were applied to each case. For the two phantom experiments, the 95%CI of the bias ranged from -0.28 mm to 0.30 mm for translation and -2.3° to 2.5° for rotation. In the clinical setting, precision is less than 0.5 mm and 1.2° for translation and rotation, respectively, except for rotations about the proximodistal axis (<4.1°). High accuracy and precision of model-based RSA can be achieved and are not biased by using a single representative RE model. At least for implants similar in shape to the investigated short-stem, individual models are not necessary. © 2015 Orthopaedic Research Society. Published by Wiley Periodicals, Inc. J Orthop Res 34:903-910, 2016. © 2015 Orthopaedic Research Society. Published by Wiley Periodicals, Inc.

  15. Novel Authentication of Monitoring Data Through the use of Secret and Public Cryptographic Keys

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Benz, Jacob M.; Tolk, Keith; Tanner, Jennifer E.

    The Office of Nuclear Verification (ONV) is supporting the development of a piece of equipment to provide data authentication and protection for a suite of monitoring sensors as part of a larger effort to create an arms control technology toolkit. This device, currently called the Red Box, leverages the strengths of both secret and public cryptographic keys to authenticate, digitally sign, and pass along monitoring data to allow for host review, and redaction if necessary, without the loss of confidence in the authenticity of the data by the monitoring party. The design of the Red Box will allow for themore » addition and removal of monitoring equipment and can also verify that the data was collected by authentic monitoring equipment prior to signing the data and sending it to the host and for review. The host will then forward the data to the monitor for review and inspection. This paper will highlight the progress to date of the Red Box development, and will explain the novel method of leveraging both symmetric and asymmetric (secret and public key) cryptography to authenticate data within a warhead monitoring regime.« less

  16. Common Criteria for Information Technology Security Evaluation: Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness)

    DTIC Science & Technology

    2002-03-22

    may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

  17. 2-year follow-up report on micromotion of a short tibia stem. A prospective, randomized RSA study of 59 patients.

    PubMed

    Molt, Mats; Toksvig-Larsen, Sören

    2015-01-01

    A shortened tibial stem could influence the early prosthetic fixation. We therefore compared the short stem to the standard-length stem using radiostereometric analysis (RSA) as primary outcome measure. 60 patients were randomized to receive a cemented Triathlon total knee arthroplasty (TKA) with a tibial tray of either standard or short stem length. The patients were blinded regarding treatment allocation. The micromotion of the tibial component was measured by RSA postoperatively, at 3 months, and after 1 and 2 years; clinical outcome was measured with the American Knee Society score (AKSS) and the knee osteoarthritis and injury outcome score (KOOS). The maximum total point motion (MTPM) for the standard stem was 0.36 (SD 0.16) mm at 3 months, 0.51 (SD 0.27) mm at 1 year, and 0.54 (SD 0.28) mm at 2 years. For the short stem, it was 0.42 (0.24) mm, 0.59 (0.43) mm, and 0.61 (0.39) mm. 4 short-stemmed components and 2 standard-stemmed components had more than 0.2 mm of migration between the first- and second-year follow-up, and were classified as continuously migrating. The short-stemmed cemented tibial prosthesis showed an early prosthetic migratory pattern similar to that of the standard-stemmed cemented Triathlon knee prosthesis. The number of continuously migrating tibial plates in each group is predictive of a lower revision rate than 5% at 10 years.

  18. Evaluating public housing residents for knowledge, attitudes, and practices following dengue prevention outreach in Key West, Florida.

    PubMed

    Matthias, James; Zielinski-Gutierrez, Emily C; Tisch, Daniel J; Stanek, Danielle; Blanton, Ronald E; Doyle, Michael S; Eadie, Robert B; Gazdick, Elizabeth J; Leal, Andrea L; Pattison, Kimberly J; Perez-Guerra, Carmen L; Tittel, Christopher J; Vyas, Jooi; Wagner, Todd; Blackmore, Carina G M

    2014-11-01

    In 2009-2010, 93 cases of dengue were identified in Key West, Florida. This was the first outbreak of autochthonous transmission of dengue in Florida since 1934. In response to this outbreak, a multifaceted public education outreach campaign was launched. The aim of this study is to compare dengue prevention knowledge, attitudes, perceptions, and prevention practices among residents of subsidized public housing to the general population in Key West and to assess whether there were barriers preventing effective outreach from reaching specific vulnerable populations. A randomized population-based evaluation of knowledge, attitudes, and behaviors toward dengue prevention consisting of 521 separate household interviews was undertaken in July of 2011. A subset analysis was performed on interviews collected from 28 public housing units within four subsidized public housing complexes. Analysis was performed to determine whether knowledge, attitudes, and behaviors exhibited by public housing residents differed from the non-public housing study population. Public housing residents recalled fewer outreach materials (p=0.01) and were 3.4 times (95% confidence interval [CI] 1.4-8.3) more likely not to recall any outreach materials. Public housing residents were less likely to correctly identify how dengue transmission occurs (61% vs. 89%), where mosquitoes lay their eggs (54% vs. 85%), or to identify any signs or symptoms related to dengue (36% vs. 64%). Public housing residents were less likely to perform dengue prevention practices such as removing standing water or always using air conditioning. Examination of public housing residents identified an at-risk population that recalled less exposure to outreach materials and had less knowledge about dengue infection and prevention than the randomized study population. This provides public health systems the opportunity to target or modify future health messages and interventions to this group. Differences identified in the

  19. On Robust Key Agreement Based on Public Key Authentication

    NASA Astrophysics Data System (ADS)

    Hao, Feng

    We describe two new attacks on the HMQV protocol. The first attack raises a serious question on the basic definition of "authentication" in HMQV, while the second attack is generally applicable to many other protocols. In addition, we present a new authenticated key agreement protocol called YAK. Our approach is to depend on well-established techniques such as Schnorr's signature. Among all the related protocols, YAK appears to be the simplest so far. We believe simplicity is an important engineering principle.

  20. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  1. Parasympathetic nervous system activity predicts mood repair use and its effectiveness among adolescents with and without histories of major depression

    PubMed Central

    Yaroslavsky, Ilya; Rottenberg, Jonathan; Bylsma, Lauren M.; Jennings, J. Richard; George, Charles; Baji, Ildikó; Benák, István; Dochnal, Roberta; Halas, Kitti; Kapornai, Krisztina; Kiss, Enikő; Makai, Attila; Varga, Hedvig; Vetró, Ágnes; Kovacs, Maria

    2016-01-01

    Depressive disorders that onset in the juvenile years have been linked to far reaching adverse consequences, making it imperative to elucidate key mechanisms and contributory factors. Excessive use of regulatory responses that exacerbate sadness (maladaptive mood repair) or insufficient use of regulatory responses that reduce it (adaptive mood repair) may reflect behavioral mechanisms of depression risk. Cardiac vagal control, indexed by patterns of respiratory sinus arrhythmia (RSA), has received attention as a putative physiological risk factor for depression. Although mood repair and RSA are related, the nature of this relationship is not well characterized in the context of depression risk. Therefore, we tested alternative models of the relationships between RSA patterns (at rest and in response to a sad film), trait mood repair, and the effectiveness of a mood repair response in the laboratory (state mood repair) among adolescents with depression histories (n=210) and emotionally healthy peers (n=161). In our data, a mediation model best explained the association between the key constructs: Adolescents with normative RSA patterns exhibited lower levels of depression and trait maladaptive mood repair, and benefited more from instructed (state) mood repair in the laboratory. By contrast, adolescents with atypical RSA patterns exhibited higher levels of depression and dispositional maladaptive mood repair, which, in turn, mediated the relations of RSA patterns and depression symptoms. Atypical RSA patterns also predicted reduced benefits from laboratory mood repair. PMID:26950752

  2. Algorithms for Lightweight Key Exchange.

    PubMed

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  3. Robust Selection Algorithm (RSA) for Multi-Omic Biomarker Discovery; Integration with Functional Network Analysis to Identify miRNA Regulated Pathways in Multiple Cancers.

    PubMed

    Sehgal, Vasudha; Seviour, Elena G; Moss, Tyler J; Mills, Gordon B; Azencott, Robert; Ram, Prahlad T

    2015-01-01

    MicroRNAs (miRNAs) play a crucial role in the maintenance of cellular homeostasis by regulating the expression of their target genes. As such, the dysregulation of miRNA expression has been frequently linked to cancer. With rapidly accumulating molecular data linked to patient outcome, the need for identification of robust multi-omic molecular markers is critical in order to provide clinical impact. While previous bioinformatic tools have been developed to identify potential biomarkers in cancer, these methods do not allow for rapid classification of oncogenes versus tumor suppressors taking into account robust differential expression, cutoffs, p-values and non-normality of the data. Here, we propose a methodology, Robust Selection Algorithm (RSA) that addresses these important problems in big data omics analysis. The robustness of the survival analysis is ensured by identification of optimal cutoff values of omics expression, strengthened by p-value computed through intensive random resampling taking into account any non-normality in the data and integration into multi-omic functional networks. Here we have analyzed pan-cancer miRNA patient data to identify functional pathways involved in cancer progression that are associated with selected miRNA identified by RSA. Our approach demonstrates the way in which existing survival analysis techniques can be integrated with a functional network analysis framework to efficiently identify promising biomarkers and novel therapeutic candidates across diseases.

  4. Chromosomal DNA Deletions Explain Phenotypic Characteristics of Two Antigenic Variants, Phase II and RSA 514 (Crazy), of the Coxiella burnetii Nine Mile Strain†

    PubMed Central

    Hoover, T. A.; Culp, D. W.; Vodkin, M. H.; Williams, J. C.; Thompson, H. A.

    2002-01-01

    After repeated passages through embyronated eggs, the Nine Mile strain of Coxiella burnetii exhibits antigenic variation, a loss of virulence characteristics, and transition to a truncated lipopolysaccharide (LPS) structure. In two independently derived strains, Nine Mile phase II and RSA 514, these phenotypic changes were accompanied by a large chromosomal deletion (M. H. Vodkin and J. C. Williams, J. Gen. Microbiol. 132:2587-2594, 1986). In the work reported here, additional screening of a cosmid bank prepared from the wild-type strain was used to map the deletion termini of both mutant strains and to accumulate all the segments of DNA that comprise the two deletions. The corresponding DNAs were then sequenced and annotated. The Nine Mile phase II deletion was completely nested within the deletion of the RSA 514 strain. Basic alignment and homology studies indicated that a large group of LPS biosynthetic genes, arranged in an apparent O-antigen cluster, was deleted in both variants. Database homologies identified, in particular, mannose pathway genes and genes encoding sugar methylases and nucleotide sugar epimerase-dehydratase proteins. Candidate genes for addition of sugar units to the core oligosaccharide for synthesis of the rare sugar 6-deoxy-3-C-methylgulose (virenose) were identified in the deleted region. Repeats, redundancies, paralogous genes, and two regions with reduced G+C contents were found within the deletions. PMID:12438347

  5. Enhanced diffie-hellman algorithm for reliable key exchange

    NASA Astrophysics Data System (ADS)

    Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj

    2017-11-01

    The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.

  6. Using Conjoint Analysis to Estimate Employers Preferences for Key Competencies of Master Level Dutch Graduates Entering the Public Health Field

    ERIC Educational Resources Information Center

    Biesma, R. G.; Pavlova, M.; van Merode, G. G.; Groot, W.

    2007-01-01

    This paper uses an experimental design to estimate preferences of employers for key competencies during the transition from initial education to the labor market. The study is restricted to employers of entry-level academic graduates entering public health organizations in the Netherlands. Given the changing and complex demands in public health,…

  7. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    PubMed

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  8. Proceedings from the 9th Annual Meeting of International Society for Medical Publication Professionals Roundtable Session: key insights.

    PubMed

    Simcoe, Donna; Juneja, Renu; Scott, Gayle Nicholas; Sridharan, Kanaka; Williams-Hughes, Celeste

    2014-03-01

    During the 9th Annual Meeting of the International Society for Medical Publication Professionals (ISMPP, April 29-May 1, 2013 in Baltimore, MD), ∼650 participants attended two of 13 available roundtable sessions. Participants included medical publication professionals from industry, communication agencies, and journals. DISCUSSION TOPICS: Roundtable participants discussed how to best interpret and implement various guidances, such as Good Publication Practices 2 (GPP2), the International Committee of Medical Journal Editors (ICMJE) guidelines, and the Physician Payment Sunshine Act. The impact of and compliance with Corporate Integrity agreements (CIAs) on medical publication planning practices was debated. Roundtable participants also discussed ways of advancing both advocacy for the medical publication professional field and internal and external collaborations. The development of review manuscripts, publications from regions newly emerging in publication planning, medical devices publications, and real-world experience publications were discussed. Participants also considered the benefits and uncertainties of new technologies in medical publications such as multimedia and social media. This is the first ever article to be published following the well-attended ISMPP roundtable sessions. The objective of this manuscript is to summarize key learnings that will aid continued discussions about challenges and opportunities facing medical publication professionals.

  9. Algorithms for Lightweight Key Exchange †

    PubMed Central

    Santonja, Juan; Zamora, Antonio

    2017-01-01

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks. PMID:28654006

  10. Attachment Status and Mother-Preschooler Parasympathetic Response to the Strange Situation Procedure

    PubMed Central

    Smith, Justin D.; Woodhouse, Susan S.; Clark, Caron A. C.; Skowron, Elizabeth A.

    2016-01-01

    Background Early attachment relationships are important for children’s development of behavioral and physiological regulation strategies. Parasympathetic nervous system activity, indexed by respiratory sinus arrhythmia (RSA), is a key indicator of self-regulation, with links to numerous developmental outcomes. Attachment-related changes in and associations between mother and child RSA during the Strange Situation procedure (SSP) can elucidate individual differences in physiological response to stress that are important for understanding the development of and intervention for psychopathology. Methods A sample of 142 at-risk mothers and preschool-age children participated in the SSP and provided time-synchronized RSA data during the 7 episodes, which included 2 separations and 2 reunions. Attachment classifications were obtained using the Cassidy and Marvin (1992) coding system. Linear mixed-effects models were constructed to examine attachment-related change in RSA during the SSP and the concordance between mother and child RSA over time. Results Findings demonstrated attachment-related differences in children’s RSA. Secure children’s RSA was relatively stable over time, whereas insecure–avoidant children showed RSA increases during the first separation and insecure–resistant children’s RSA declined across the SSP. Mothers showed RSA withdrawal during separation regardless of child’s attachment classification. Mother–child RSA showed a positive concordance that was strongest in the insecure–resistant group, compared with the other groups. Conclusions Results support attachment theories concerning parasympathetic response to stress and the role of the mother–child relationship in physiological regulation. Our findings advance previous research by focusing on at-risk mother–preschooler dyads within diverse attachment classifications. PMID:26738633

  11. Resource Public Key Infrastructure Extension

    DTIC Science & Technology

    2012-01-01

    tests for checking compliance with the RFC 3779 extensions that are used in the RPKI. These tests also were used to identify an error in the OPENSSL ...rsync, OpenSSL , Cryptlib, and MySQL/ODBC. We assume that the adversaries can exploit any publicly known vulnerability in this software. • Server...NULL, set FLAG_NOCHAIN in Ctemp, defer verification. T = P Use OpenSSL to verify certificate chain S using trust anchor T, checking signature and

  12. Early subsidence of shape-closed hip arthroplasty stems is associated with late revision. A systematic review and meta-analysis of 24 RSA studies and 56 survival studies.

    PubMed

    van der Voort, Paul; Pijls, Bart G; Nieuwenhuijse, Marc J; Jasper, Jorrit; Fiocco, Marta; Plevier, Josepha W M; Middeldorp, Saskia; Valstar, Edward R; Nelissen, Rob G H H

    2015-01-01

    Few studies have addressed the association between early migration of femoral stems and late aseptic revision in total hip arthroplasty. We performed a meta-regression analysis on 2 parallel systematic reviews and meta-analyses to determine the association between early migration and late aseptic revision of femoral stems. Of the 2 reviews, one covered early migration data obtained from radiostereometric analysis (RSA) studies and the other covered long-term aseptic revision rates obtained from survival studies with endpoint revision for aseptic loosening. Stems were stratified according to the design concept: cemented shape-closed, cemented force-closed, and uncemented. A weighted regression model was used to assess the association between early migration and late aseptic revision, and to correct for confounders. Thresholds for acceptable and unacceptable migration were determined in accordance with the national joint registries (≤ 5% revision at 10 years) and the NICE criteria (≤ 10% revision at 10 years). 24 studies (731 stems) were included in the RSA review and 56 studies (20,599 stems) were included in the survival analysis review. Combining both reviews for the 3 design concepts showed that for every 0.1-mm increase in 2-year subsidence, as measured with RSA, there was a 4% increase in revision rate for the shape-closed stem designs. This association remained after correction for age, sex, diagnosis, hospital type, continent, and study quality. The threshold for acceptable migration of shape-closed designs was defined at 0.15 mm; stems subsiding less than 0.15 mm in 2 years had revision rates of less than 5% at 10 years, while stems exceeding 0.15 mm subsidence had revision rates of more than 5%. There was a clinically relevant association between early subsidence of shape-closed femoral stems and late revision for aseptic loosening. This association can be used to assess the safety of shape-closed stem designs. The published research is not sufficient

  13. Public health economics: a systematic review of guidance for the economic evaluation of public health interventions and discussion of key methodological issues.

    PubMed

    Edwards, Rhiannon Tudor; Charles, Joanna Mary; Lloyd-Williams, Huw

    2013-10-24

    If Public Health is the science and art of how society collectively aims to improve health, and reduce inequalities in health, then Public Health Economics is the science and art of supporting decision making as to how society can use its available resources to best meet these objectives and minimise opportunity cost. A systematic review of published guidance for the economic evaluation of public health interventions within this broad public policy paradigm was conducted. Electronic databases and organisation websites were searched using a 22 year time horizon (1990-2012). References of papers were hand searched for additional papers for inclusion. Government reports or peer-reviewed published papers were included if they; referred to the methods of economic evaluation of public health interventions, identified key challenges of conducting economic evaluations of public health interventions or made recommendations for conducting economic evaluations of public health interventions. Guidance was divided into three categories UK guidance, international guidance and observations or guidance provided by individual commentators in the field of public health economics. An assessment of the theoretical frameworks underpinning the guidance was made and served as a rationale for categorising the papers. We identified 5 international guidance documents, 7 UK guidance documents and 4 documents by individual commentators. The papers reviewed identify the main methodological challenges that face analysts when conducting such evaluations. There is a consensus within the guidance that wider social and environmental costs and benefits should be looked at due to the complex nature of public health. This was reflected in the theoretical underpinning as the majority of guidance was categorised as extra-welfarist. In this novel review we argue that health economics may have come full circle from its roots in broad public policy economics. We may find it useful to think in this broader

  14. Global trade, public health, and health services: stakeholders' constructions of the key issues.

    PubMed

    Waitzkin, Howard; Jasso-Aguilar, Rebeca; Landwehr, Angela; Mountain, Carolyn

    2005-09-01

    Focusing mainly on the United States and Latin America, we aimed to identify the constructions of social reality held by the major stakeholders participating in policy debates about global trade, public health, and health services. In a multi-method, qualitative design, we used three sources of data: research and archival literature, 1980-2004; interviews with key informants who represented major organizations participating in these debates, 2002-2004; and organizational reports, 1980-2004. We targeted several types of organizations: government agencies, international financial institutions (IFIs) and trade organizations, international health organizations, multinational corporations, and advocacy groups. Many governments in Latin America define health as a right and health services as a public good. Thus, the government bears responsibility for that right. In contrast, the US government's philosophy of free trade and promoting a market economy assumes that by expanding the private sector, improved economic conditions will improve overall health with a minimum government provision of health care. US government agencies also view promotion of global health as a means to serve US interests. IFIs have emphasized reforms that include reduction and privatization of public sector services. International health organizations have tended to adopt the policy perspectives of IFIs and trade organizations. Advocacy groups have emphasized the deleterious effects of international trade agreements on public health and health services. Organizational stakeholders hold widely divergent constructions of reality regarding trade, public health, and health services. Social constructions concerning trade and health reflect broad ideologies concerning the impacts of market processes. Such constructions manifest features of "creed," regarding the role of the market in advancing human purposes and meeting human needs. Differences in constructions of trade and health constrain policies to

  15. On the security of a simple three-party key exchange protocol without server's public keys.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  16. On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723

  17. The polymorphism of CYP2E1 Rsa I/Pst I gene and susceptibility to respiratory system cancer: a systematic review and meta-analysis of 34 studies.

    PubMed

    Xu, Li; Yang, Mingyuan; Zhao, Tiejun; Jin, Hai; Xu, Zhiyun; Li, Ming; Chen, Hezhong

    2014-12-01

    The purpose of this articles is to determine whether the cytochrome P450 2E1 (CYP2E1) Rsa I/Pst I gene polymorphism is correlated with respiratory system cancers. Respiratory system cancers included lung cancer, laryngeal cancer, nasopharyngeal cancer, and cancers of other respiratory organs, which are the most common malignant tumors worldwide; the significant relationship between CYP2E1 Rsa I/Pst I gene polymorphism and some respiratory system cancer have been reported, but results of some other studies are controversial. The pooled odds ratio (OR) with 95% confidence interval (CI) was calculated to assess the association. PubMed, EMBASE, Cochrane Library Databases, China National Knowledge Infrastructure, and Wanfang Database (up to July 20, 2014) were searched for all case-control studies those mainly studied the relationship between CYP2E1 Rsa I/Pst I gene polymorphism and the susceptibility of respiratory system cancer. A total of 332 articles were collected, among which 34 studies that involved 7028 cases and 9822 controls fulfilled the inclusion criteria after being assessed by 2 reviewers. When stratified by cancer site, the C2/C2 polymorphism could increase the risk of nasopharyngeal cancer under the homozygote model (C2C2 vs C1C1: OR = 1.85, 95% CI = 1.20-2.85, P = 0.005) and recessive model (C2C2 vs C1C2/C1C1: OR = 1.89, 95% CI = 1.23-2.89, P = 0.003). Protection effect was found in lung cancer in heterozygote model (C1C2 vs C1C1: OR = 0.82, 95% CI = 0.74-0.91, P < 0.001), dominant model (C1C2/C2C2 vs C1C1: OR = 0.83, 95% CI = 0.76-0.90, P < 0.001), and allele contrast model (C2 vs C1: OR = 0.85, 95% CI = 0.73-1.00, P = 0.045). With regard to ethnicity subgroup analysis, there was significant association in Asian population in heterozygote model (C1C2 vs C1C1: OR = 0.85, 95% CI = 0.78-0.94, P = 0.001), dominant model (C1C2/C2C2 vs C1C1: OR = 0.88, 95% CI = 0.81-0.95, P = 0.001), and recessive model (C2C2 vs C1C2/C1C1: OR = 1.25, 95% CI = 1.01-1.53, P

  18. Understanding key influencers' attitudes and beliefs about healthy public policy change for obesity prevention.

    PubMed

    Raine, Kim D; Nykiforuk, Candace I J; Vu-Nguyen, Karen; Nieuwendyk, Laura M; VanSpronsen, Eric; Reed, Shandy; Wild, T Cameron

    2014-11-01

    As overweight and obesity is a risk factor for chronic diseases, the development of environmental and healthy public policy interventions across multiple sectors has been identified as a key strategy to address this issue. In 2009, a survey was developed to assess the attitudes and beliefs regarding health promotion principles, and the priority and acceptability of policy actions to prevent obesity and chronic diseases, among key policy influencers in Alberta and Manitoba, Canada. Surveys were mailed to 1,765 key influencers from five settings: provincial government, municipal government, school boards, print media companies, and workplaces with greater than 500 employees. A total of 236 surveys were completed with a response rate of 15.0%. Findings indicate nearly unanimous influencer support for individual-focused policy approaches and high support for some environmental policies. Restrictive environmental and economic policies received weakest support. Obesity was comparable to smoking with respect to perceptions as a societal responsibility versus a personal responsibility, boding well for the potential of environmental policy interventions for obesity prevention. This level of influencer support provides a platform for more evidence to be brokered to policy influencers about the effectiveness of environmental policy approaches to obesity prevention. © 2014 The Obesity Society.

  19. Public/private partners. Key factors in creating a strategic alliance for community health.

    PubMed

    Nelson, J C; Rashid, H; Galvin, V G; Essien, J D; Levine, L M

    1999-04-01

    The rapidly evolving American health system creates economic and societal incentives for public and private health organizations to collaborate. Despite the apparent benefits of collaboration, there is a paucity of information available to help local agencies develop partnerships. This study, itself a collaboration between a school of public health (SPH) and a Georgia health district, was undertaken to identify critical factors necessary to successfully initiate and sustain a public/private community health collaboration. Professional staff at the SPH conducted 26 standardized interviews involving participants from Cobb and Douglas counties Boards of Health; Promina Northwest (now known as Wellstar), a not-for-profit health system; and community stakeholders. Content analysis of each interview question was performed and comparisons were made both within each group and across groups. Trends were identified in the following key areas: vision of health care for Cobb and Douglas counties, forces driving collaboration, strengths of each organization, critical negotiating issues, and potential community gain resulting from the partnership. A shared vision between potential collaborators facilitates communication regarding strategies to achieve common goals. A previous history of working together in limited capacities allowed the partners to develop trust and respect for one another prior to entering negotiations. These factors, when taken in conjunction with each organization's strong leadership and knowledge of the community, build a strong foundation for a successful partnership.

  20. Quantum key management

    DOEpatents

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  1. Universal Keyword Classifier on Public Key Based Encrypted Multikeyword Fuzzy Search in Public Cloud.

    PubMed

    Munisamy, Shyamala Devi; Chokkalingam, Arun

    2015-01-01

    Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider's premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opportunity to use cloud services on pay-per-use basis provides comfort for private data owners in managing costs and data. With the pervasive usage of internet, the focus has now shifted towards effective data utilization on the cloud without compromising security concerns. In the pursuit of increasing data utilization on public cloud storage, the key is to make effective data access through several fuzzy searching techniques. In this paper, we have discussed the existing fuzzy searching techniques and focused on reducing the searching time on the cloud storage server for effective data utilization. Our proposed Asymmetric Classifier Multikeyword Fuzzy Search method provides classifier search server that creates universal keyword classifier for the multiple keyword request which greatly reduces the searching time by learning the search path pattern for all the keywords in the fuzzy keyword set. The objective of using BTree fuzzy searchable index is to resolve typos and representation inconsistencies and also to facilitate effective data utilization.

  2. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae)1

    PubMed Central

    Attigala, Lakshmi; De Silva, Nuwan I.; Clark, Lynn G.

    2016-01-01

    Premise of the study: Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. Methods and Results: A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). Conclusions: WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus. PMID:27144109

  3. Public health economics: a systematic review of guidance for the economic evaluation of public health interventions and discussion of key methodological issues

    PubMed Central

    2013-01-01

    Background If Public Health is the science and art of how society collectively aims to improve health, and reduce inequalities in health, then Public Health Economics is the science and art of supporting decision making as to how society can use its available resources to best meet these objectives and minimise opportunity cost. A systematic review of published guidance for the economic evaluation of public health interventions within this broad public policy paradigm was conducted. Methods Electronic databases and organisation websites were searched using a 22 year time horizon (1990–2012). References of papers were hand searched for additional papers for inclusion. Government reports or peer-reviewed published papers were included if they; referred to the methods of economic evaluation of public health interventions, identified key challenges of conducting economic evaluations of public health interventions or made recommendations for conducting economic evaluations of public health interventions. Guidance was divided into three categories UK guidance, international guidance and observations or guidance provided by individual commentators in the field of public health economics. An assessment of the theoretical frameworks underpinning the guidance was made and served as a rationale for categorising the papers. Results We identified 5 international guidance documents, 7 UK guidance documents and 4 documents by individual commentators. The papers reviewed identify the main methodological challenges that face analysts when conducting such evaluations. There is a consensus within the guidance that wider social and environmental costs and benefits should be looked at due to the complex nature of public health. This was reflected in the theoretical underpinning as the majority of guidance was categorised as extra-welfarist. Conclusions In this novel review we argue that health economics may have come full circle from its roots in broad public policy economics. We may

  4. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2014-10-01 2014-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  5. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2012-10-01 2012-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  6. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2010-10-01 2010-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  7. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2011-10-01 2011-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  8. 46 CFR 7.100 - Florida Reefs and Keys from Miami, FL to Marquesas Keys, FL.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... latitude 24°27.7′ N. longitude 81°48.1′ W. (Key West Entrance Lighted Whistle Buoy); thence to Cosgrove... 46 Shipping 1 2013-10-01 2013-10-01 false Florida Reefs and Keys from Miami, FL to Marquesas Keys... TO THE PUBLIC BOUNDARY LINES Atlantic Coast § 7.100 Florida Reefs and Keys from Miami, FL to...

  9. Respiratory sinus arrhythmia as a predictor of eating disorder symptoms in college students: Moderation by responses to stress and parent psychological control.

    PubMed

    Abaied, Jamie L; Wagner, Caitlin; Breslend, Nicole Lafko; Flynn, Megan

    2016-04-01

    This longitudinal study examined the prospective contribution of respiratory sinus arrhythmia (RSA), a key physiological indicator of self-regulation, to eating disorder symptoms in college students, and whether this link was moderated by maladaptive responses to stress and parent psychological control. At Wave 1, college students' RSA was measured at rest. At Waves 1 and 2 (six-month follow-up), students reported on their eating disorder symptoms, coping and involuntary responses to stress, and perceptions of their parents' use of psychological control. Significant three-way interactions indicated that the link between RSA and subsequent eating disorder symptoms was contingent on responses to stress and parent psychological control. In the context of maladaptive responses to stress and high psychological control, RSA predicted increased eating disorder symptoms over time. In the absence of parent psychological control, high RSA was beneficial in most cases, even when individuals reported maladaptive responses to stress. This study presents novel evidence that high RSA contributes to risk for or resilience to eating disorder symptoms over time. RSA can be protective against eating disorder symptoms, but in some contexts, the self-regulation resources that high RSA provides may be inappropriately applied to eating cognitions and behaviors. This research highlights the importance of examining physiological functioning conjointly with other risk factors as precursors to eating disorder symptoms over time. Copyright © 2016. Published by Elsevier Ltd.

  10. Faster Double-Size Bipartite Multiplication out of Montgomery Multipliers

    NASA Astrophysics Data System (ADS)

    Yoshino, Masayuki; Okeya, Katsuyuki; Vuillaume, Camille

    This paper proposes novel algorithms for computing double-size modular multiplications with few modulus-dependent precomputations. Low-end devices such as smartcards are usually equipped with hardware Montgomery multipliers. However, due to progresses of mathematical attacks, security institutions such as NIST have steadily demanded longer bit-lengths for public-key cryptography, making the multipliers quickly obsolete. In an attempt to extend the lifespan of such multipliers, double-size techniques compute modular multiplications with twice the bit-length of the multipliers. Techniques are known for extending the bit-length of classical Euclidean multipliers, of Montgomery multipliers and the combination thereof, namely bipartite multipliers. However, unlike classical and bipartite multiplications, Montgomery multiplications involve modulus-dependent precomputations, which amount to a large part of an RSA encryption or signature verification. The proposed double-size technique simulates double-size multiplications based on single-size Montgomery multipliers, and yet precomputations are essentially free: in an 2048-bit RSA encryption or signature verification with public exponent e=216+1, the proposal with a 1024-bit Montgomery multiplier is at least 1.5 times faster than previous double-size Montgomery multiplications.

  11. Universal Keyword Classifier on Public Key Based Encrypted Multikeyword Fuzzy Search in Public Cloud

    PubMed Central

    Munisamy, Shyamala Devi; Chokkalingam, Arun

    2015-01-01

    Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider's premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opportunity to use cloud services on pay-per-use basis provides comfort for private data owners in managing costs and data. With the pervasive usage of internet, the focus has now shifted towards effective data utilization on the cloud without compromising security concerns. In the pursuit of increasing data utilization on public cloud storage, the key is to make effective data access through several fuzzy searching techniques. In this paper, we have discussed the existing fuzzy searching techniques and focused on reducing the searching time on the cloud storage server for effective data utilization. Our proposed Asymmetric Classifier Multikeyword Fuzzy Search method provides classifier search server that creates universal keyword classifier for the multiple keyword request which greatly reduces the searching time by learning the search path pattern for all the keywords in the fuzzy keyword set. The objective of using BTree fuzzy searchable index is to resolve typos and representation inconsistencies and also to facilitate effective data utilization. PMID:26380364

  12. Shor's factoring algorithm and modern cryptography. An illustration of the capabilities inherent in quantum computers

    NASA Astrophysics Data System (ADS)

    Gerjuoy, Edward

    2005-06-01

    The security of messages encoded via the widely used RSA public key encryption system rests on the enormous computational effort required to find the prime factors of a large number N using classical (conventional) computers. In 1994 Peter Shor showed that for sufficiently large N, a quantum computer could perform the factoring with much less computational effort. This paper endeavors to explain, in a fashion comprehensible to the nonexpert, the RSA encryption protocol; the various quantum computer manipulations constituting the Shor algorithm; how the Shor algorithm performs the factoring; and the precise sense in which a quantum computer employing Shor's algorithm can be said to accomplish the factoring of very large numbers with less computational effort than a classical computer. It is made apparent that factoring N generally requires many successive runs of the algorithm. Our analysis reveals that the probability of achieving a successful factorization on a single run is about twice as large as commonly quoted in the literature.

  13. Performance analysis of AES-Blowfish hybrid algorithm for security of patient medical record data

    NASA Astrophysics Data System (ADS)

    Mahmud H, Amir; Angga W, Bayu; Tommy; Marwan E, Andi; Siregar, Rosyidah

    2018-04-01

    A file security is one method to protect data confidentiality, integrity and information security. Cryptography is one of techniques used to secure and guarantee data confidentiality by doing conversion to the plaintext (original message) to cipher text (hidden message) with two important processes, they are encrypt and decrypt. Some researchers proposed a hybrid method to improve data security. In this research we proposed hybrid method of AES-blowfish (BF) to secure the patient’s medical report data into the form PDF file that sources from database. Generation method of private and public key uses two ways of approach, those are RSA method f RSA and ECC. We will analyze impact of these two ways of approach for hybrid method at AES-blowfish based on time and Throughput. Based on testing results, BF method is faster than AES and AES-BF hybrid, however AES-BF hybrid is better for throughput compared with AES and BF is higher.

  14. Key handling in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Li, Y.; Newe, T.

    2007-07-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  15. [A MULTIDISCIPLINARY BIOPSYCHOSOCIAL INTEGRATED APPROACH IN ORGANIZATION OF REHABILITATIVE ACTIVITY IN NURSING HOMES (RSA)].

    PubMed

    Panella, Lorenzo; Piccioni, Davide; Borcescu, Lidia; Isella, Celeste; Callegari, Camilla

    2015-01-01

    Objectives, social role and organization of Italian nursing homes (RSA) are characterized by a pronounced regional differentiation that causes situations which are difficult to compare about expected outcomes. The definition of a functional outcome is particularly difficult in institutionalized patients and this is due to the failure of a conclusive moment of the rehabilitative treatment. Furthermore we often take care of patients who have already been admitted to intensive and/or extensive rehabilitation units time after time, without further functional profit margin. The inconstant presence of professional figures of rehabilitation in nursing homes' staff makes difficult the drafting of an adequate rehabilitative project, especially for the multiple needs of frail old people. Starting with these assumptions, authors hypothesize and adopt a model of sanitary organization to consent a correct allocation of available resources, according to the patient's needs. They stratified all nursing home patients, using the Multidimensional Prognostic Index (MPI) and "Scheda di osservazione intermedia assistenza" (SOSIA), and measured the residual function. They concluded that a multidimensional evaluation of patients allows to identify wellness (of the sick person and of caregivers) as the main objective; nursing home organization could be think as a "complex supportive prosthesis for old people", made by the interaction among structure, operators and activities.

  16. Efficient Implementation of the Pairing on Mobilephones Using BREW

    NASA Astrophysics Data System (ADS)

    Yoshitomi, Motoi; Takagi, Tsuyoshi; Kiyomoto, Shinsaku; Tanaka, Toshiaki

    Pairing based cryptosystems can accomplish novel security applications such as ID-based cryptosystems, which have not been constructed efficiently without the pairing. The processing speed of the pairing based cryptosystems is relatively slow compared with the other conventional public key cryptosystems. However, several efficient algorithms for computing the pairing have been proposed, namely Duursma-Lee algorithm and its variant ηT pairing. In this paper, we present an efficient implementation of the pairing over some mobilephones. Moreover, we compare the processing speed of the pairing with that of the other standard public key cryptosystems, i. e. RSA cryptosystem and elliptic curve cryptosystem. Indeed the processing speed of our implementation in ARM9 processors on BREW achieves under 100 milliseconds using the supersingular curve over F397. In addition, the pairing is more efficient than the other public key cryptosystems, and the pairing can be achieved enough also on BREW mobilephones. It has become efficient enough to implement security applications, such as short signature, ID-based cryptosystems or broadcast encryption, using the pairing on BREW mobilephones.

  17. Teaching Public Administration: Key Themes 1996-2016

    ERIC Educational Resources Information Center

    Fenwick, John

    2018-01-01

    In this article, the aim is to explore some of the key themes to emerge in the journal during the past two decades. Each selected theme will be reviewed in the light of issues raised in particular papers. The aim of this approach is, first, to facilitate reflection upon the contribution of the journal as its subject matter has moved from a concern…

  18. 78 FR 32375 - Magnuson-Stevens Act Provisions; General Provisions for Domestic Fisheries; Application for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-30

    ... 02543-1026, or online at: www.nefsc.noaa.gov/nefsc/publications/ . The revised EFP would exempt vessels.... Category F vessels would be charged monkfish RSA DAS at a higher pro- rated rate of 2.909:1 RSA DAS for... tail-to-whole-weight conversion factor from 3.32 to 2.91, which essentially reduced the whole weight...

  19. [The key role of public health medical resident education for future public health challenges].

    PubMed

    Costantino, Claudio; Cinquetti, Sandro; Garavelli, Elena; Marcantoni, Claudio; Murru, Claudia; Pieroni, Giovanni; Privitera, Gaetano; Ricciardi, Walter; Soncini, Francesco; Tedesco, Dario; Triassi, Maria; Vitale, Francesco; Campanella, Francesca

    2014-01-01

    The Italian Committee of medical residents in Hygiene, Preventive Medicine and Public Health is a member of the Italian Society of Hygiene, Preventive Medicine and Public Health with the aim of developing a network among Italian resident in public health and promoting the educational path improvement through comparisons and debates between postgraduate medical schools. In this perspective, during last years account has been taken of some essential topics concerning education of public health medical residents, which represent future health-care and public health experts. Cross-sectional researches were conducted among Italian public health medical residents (PHMRs) through self-administered and web-based questionnaires. Each questionnaire was previously validated by pilot studies conducted during the 46th National Conference of the Italian Society of Hygiene, Preventive Medicine and Public Health. Seventy percent of Italian PHMRs considered the actual length of Public Health postgraduate medical school excessively long, with regard to predetermined educational goals. Confirming this statement, 90% of respondents were inclined to a reduction from 5 to 4 years of postgraduate medical school length, established by Law Decree 104/2013. Seventy seven percent of surveyed PHMRs stand up for a rearrangement on a national setting of the access contest to postgraduate medical schools. Moreover 1/3 of Italian schools performed less than 75%of learning and qualifying activities specified in Ministerial Decree of August 2005. In particular, data analysis showed considerable differences among Italian postgraduate schools. Finally, in 2015 only four Italian Universities (Napoli Federico II, Palermo, Pavia, Roma Tor Vergata) provide for the Second Level Master qualify for the functions of occupational doctor. This offer makes available 60 positions against a request of over 200 future Public Health medical doctors who have shown interest in the Master. In Italy, after the

  20. Tn-seq of Caulobacter crescentus under uranium stress reveals genes essential for detoxification and stress tolerance

    DOE PAGES

    Yung, Mimi C.; Park, Dan M.; Overton, K. Wesley; ...

    2015-07-20

    Ubiquitous aquatic bacterium Caulobacter crescentus is highly resistant to uranium (U) and facilitates U biomineralization and thus holds promise as an agent of U bioremediation. In order to gain an understanding of how C. crescentus tolerates U, we employed transposon (Tn) mutagenesis paired with deep sequencing (Tn-seq) in a global screen for genomic elements required for U resistance. Of the 3,879 annotated genes in the C. crescentus genome, 37 were found to be specifically associated with fitness under U stress, 15 of which were subsequently tested through mutational analysis. Systematic deletion analysis revealed that mutants lacking outer membrane transporters (rsaFamore » and rsaFb), a stress-responsive transcription factor (cztR), or a ppGpp synthetase/hydrolase (spoT) exhibited a significantly lower survival rate under U stress. RsaFa and RsaFb, which are homologues of TolC in Escherichia coli, have previously been shown to mediate S-layer export. Transcriptional analysis revealed upregulation of rsaF a and rsaF b by 4- and 10-fold, respectively, in the presence of U. We additionally show that rsaFa mutants accumulated higher levels of U than the wild type, with no significant increase in oxidative stress levels. These results suggest a function for RsaF a and RsaF b in U efflux and/or maintenance of membrane integrity during U stress. In addition, we present data implicating CztR and SpoT in resistance to U stress. Together, our findings reveal novel gene targets that are key to understanding the molecular mechanisms of U resistance in C. crescentus.« less

  1. Security for decentralized health information systems.

    PubMed

    Bleumer, G

    1994-02-01

    Health care information systems must reflect at least two basic characteristics of the health care community: the increasing mobility of patients and the personal liability of everyone giving medical treatment. Open distributed information systems bear the potential to reflect these requirements. But the market for open information systems and operating systems hardly provides secure products today. This 'missing link' is approached by the prototype SECURE Talk that provides secure transmission and archiving of files on top of an existing operating system. Its services may be utilized by existing medical applications. SECURE Talk demonstrates secure communication utilizing only standard hardware. Its message is that cryptography (and in particular asymmetric cryptography) is practical for many medical applications even if implemented in software. All mechanisms are software implemented in order to be executable on standard-hardware. One can investigate more or less decentralized forms of public key management and the performance of many different cryptographic mechanisms. That of, e.g. hybrid encryption and decryption (RSA+DES-PCBC) is about 300 kbit/s. That of signing and verifying is approximately the same using RSA with a DES hash function. The internal speed, without disk accesses etc., is about 1.1 Mbit/s. (Apple Quadra 950 (MC 68040, 33 MHz, RAM: 20 MB, 80 ns. Length of RSA modulus is 512 bit).

  2. Public engagement with CCS: barriers, key issues and ways forward

    NASA Astrophysics Data System (ADS)

    Xenias, Dimitrios

    2017-04-01

    Although Carbon Capture and Storage (CCS) is recognised as a crucial transition technology to a low-carbon world, it has not been popular with the public or some governments (e.g. the UK). Also, despite its use in industrial processes for decades, CCS remains and unfamiliar technology for most publics. It is therefore important to foster top-down and bottom-up acceptance of large scale CCS. In an exploratory round of interviews we canvassed the views of British, Dutch, German and Norwegian experts (N=13) with previous experience in public engagement with CCS. They identified barriers and drivers for CCS deployment and public engagement with CCS. Thematic analysis revealed a small number of recurrent issues, including: (a) lack of political leadership on CCS; (b) lack of public knowledge on relevant technologies and (c) difficulty communicating why CCS is necessary. Emphasis on these barriers varied with the level of experts' engagement with the public. More interestingly, although most experts agreed on the importance of public engagement, their views divided between 'why' engage and 'how' best to do this. In a subsequent expert survey (N=99) interview findings were reinforced: public support was seen as important for CCS roll-out (72%), though lower than political support and funding. The survey also showed that local public was expected to experience most risks, while global public will experience most benefits; whereas local business is seen to benefit more than global. Experts were overwhelmingly positive about CCS - risks outweigh benefits, and are confident that CCS will play a major role in climate change mitigation (along with reduced energy demand and renewables). These findings will be expanded on and triangulated in a follow-up public survey which will benefit those involved with public engagement with CCS.

  3. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications

    PubMed Central

    Castedo, Luis

    2017-01-01

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up

  4. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.

    PubMed

    Suárez-Albela, Manuel; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Castedo, Luis

    2017-08-29

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to

  5. Free-ranging domestic cats (Felis catus) on public lands: estimating density, activity, and diet in the Florida Keys

    USGS Publications Warehouse

    Cove, Michael V.; Gardner, Beth; Simons, Theodore R.; Kays, Roland; O'Connell, Allan F.

    2017-01-01

    Feral and free-ranging domestic cats (Felis catus) can have strong negative effects on small mammals and birds, particularly in island ecosystems. We deployed camera traps to study free-ranging cats in national wildlife refuges and state parks on Big Pine Key and Key Largo in the Florida Keys, USA, and used spatial capture–recapture models to estimate cat abundance, movement, and activities. We also used stable isotope analyses to examine the diet of cats captured on public lands. Top population models separated cats based on differences in movement and detection with three and two latent groups on Big Pine Key and Key Largo, respectively. We hypothesize that these latent groups represent feral, semi-feral, and indoor/outdoor house cats based on the estimated movement parameters of each group. Estimated cat densities and activity varied between the two islands, with relatively high densities (~4 cats/km2) exhibiting crepuscular diel patterns on Big Pine Key and lower densities (~1 cat/km2) exhibiting nocturnal diel patterns on Key Largo. These differences are most likely related to the higher proportion of house cats on Big Pine relative to Key Largo. Carbon and nitrogen isotope ratios from hair samples of free-ranging cats (n = 43) provided estimates of the proportion of wild and anthropogenic foods in cat diets. At the population level, cats on both islands consumed mostly anthropogenic foods (>80% of the diet), but eight individuals were effective predators of wildlife (>50% of the diet). We provide evidence that cat groups within a population move different distances, exhibit different activity patterns, and that individuals consume wildlife at different rates, which all have implications for managing this invasive predator.

  6. The influence of a suction device on fixation of a cemented cup using RSA.

    PubMed

    Timperley, A John; Whitehouse, Sarah L; Hourigan, Patrick G

    2009-03-01

    The quality of technique used at the time of socket cementation is crucial in ensuring a durable long-term result of the implant. We asked whether a new instrument, an aspirator retractor introduced into the wing of the ilium before socket preparation and cementation, would enhance cement fixation as defined by RSA and radiographic examination. We randomized 38 patients into two groups. The surgical technique was identical between the groups with the exception of the use of the aspirator retractor. Patients were followed clinically and with radiostereometry at a minimum of 2 years. We compared gross radiographic appearances, including the depth of penetration of cement and the incidence of postoperative and 2-year radiolucent lines. There was no difference in proximal migration between the two groups. No improvement of fixation was proven from the measured translations and rotations of the socket in the suction group. We found no difference in the number or extent of radiolucent lines or the depth of cement penetration when the iliac suction device was used in conjunction with contemporary cementing techniques. Although the data suggest no short-term advantage in this small study, we will continue to follow these patients presuming there will be improved outcomes in the longer term and since the device provides an easier method of obtaining adequate fixation, especially if technical difficulties are encountered during the pressurization procedure.

  7. The construction of a public key infrastructure for healthcare information networks in Japan.

    PubMed

    Sakamoto, N

    2001-01-01

    The digital signature is a key technology in the forthcoming Internet society for electronic healthcare as well as for electronic commerce. Efficient exchanges of authorized information with a digital signature in healthcare information networks require a construction of a public key infrastructure (PKI). In order to introduce a PKI to healthcare information networks in Japan, we proposed a development of a user authentication system based on a PKI for user management, user authentication and privilege management of healthcare information systems. In this paper, we describe the design of the user authentication system and its implementation. The user authentication system provides a certification authority service and a privilege management service while it is comprised of a user authentication client and user authentication serves. It is designed on a basis of an X.509 PKI and is implemented with using OpenSSL and OpenLDAP. It was incorporated into the financial information management system for the national university hospitals and has been successfully working for about one year. The hospitals plan to use it as a user authentication method for their whole healthcare information systems. One implementation of the system is free to the national university hospitals with permission of the Japanese Ministry of Education, Culture, Sports, Science and Technology. Another implementation is open to the other healthcare institutes by support of the Medical Information System Development Center (MEDIS-DC). We are moving forward to a nation-wide construction of a PKI for healthcare information networks based on it.

  8. [Reversal of aging and lifespan elongation. Current biomedical key publications and the implications for geriatrics].

    PubMed

    Bollheimer, L C; Volkert, D; Bertsch, T; Sieber, C C; Büttner, R

    2013-08-01

    Biological aging means a time-dependent accumulation of changes to which a living organism is being exposed during its lifetime. Biological aging normally concurs with chronological aging the time frame of which is set by an upper limit, the lifespan (in humans approximately 120 years). New findings in experimental biogerontology are challenging both the dogma of irreversibility of biological aging and the preset species-specific limitations of life. The present overview first explains the general principle of rejuvenation and reversal of biological aging with paradigms from stem cell research. Secondly, recent key publications on artificial telomerase elongation and (alleged) lifespan enhancement by sirtuins and resveratrol will be discussed with an emphasis on the implications for (future) geriatric medicine.

  9. Efficient Fair Exchange from Identity-Based Signature

    NASA Astrophysics Data System (ADS)

    Yum, Dae Hyun; Lee, Pil Joong

    A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services without allowing either party to gain advantages by quitting prematurely or otherwise misbehaving. To this end, modern cryptographic solutions use a semi-trusted arbitrator who involves only in cases where one party attempts to cheat or simply crashes. We call such a fair exchange scheme optimistic. When no registration is required between the signer and the arbitrator, we say that the fair exchange scheme is setup free. To date, the setup-free optimist fair exchange scheme under the standard RSA assumption was only possible from the generic construction of [12], which uses ring signatures. In this paper, we introduce a new setup-free optimistic fair exchange scheme under the standard RSA assumption. Our scheme uses the GQ identity-based signature and is more efficient than [12]. The construction can also be generalized by using various identity-based signature schemes. Our main technique is to allow each user to choose his (or her) own “random” public key in the identitybased signature scheme.

  10. A 2-year RSA study of the Vanguard CR total knee system: A randomized controlled trial comparing patient-specific positioning guides with conventional technique.

    PubMed

    Øhrn, Frank-David; Van Leeuwen, Justin; Tsukanaka, Masako; Röhrl, Stephan M

    2018-05-09

    Background and purpose - There is some concern regarding the revision rate of the Vanguard CR TKA in 1 registry, and the literature is ambiguous about the efficacy of patient-specific positioning guides (PSPGs). The objective of this study was to investigate the stability of the cemented Vanguard CR Total Knee using 2 different surgical techniques. Our hypothesis was that there is no difference in migration when implanting the Vanguard CR with either PSPGs or conventional technique. We hereby present a randomized controlled trial of 2-year follow-up with radiostereometric analysis (RSA). Patients and methods - 40 TKAs were performed between 2011 and 2013 with either PSPGs or the conventional technique and 22 of these were investigated with RSA. Results - The PSPG (8 knees) and the conventional (14 knees) groups had a mean maximum total point motion (MTPM) (95% CI) of 0.83 (0.48-1.18) vs. 0.70 (0.43-0.97) mm, 1.03 (0.60-1.43) vs. 0.86 (0.53-1.19), and 1.46 (1.07-1.85) vs. 0.80 (0.52-1.43) at 3, 12, and 24 months respectively (p = 0.1). 5 implants had either an MTPM >1.6 mm at 12 months and/or a migration of more than 0.2 mm between 1- and 2-year follow-ups. 2 of these also had a peripheral subsidence of more than 0.6 mm at 2 years. Interpretation - 5 implants (3 in the PSPG group) were found to be at risk of later aseptic loosening. The PSPG group continuously migrated between 12 and 24 months. The conventional group had an initial high migration between postoperative and 3 months, but seemed more stable after 1 year. Although the difference was not statistically significant, we think the migration in the PSPG group is of some concern.

  11. Improving Managers' Psychophysical Well-Being: Effectiveness of Respiratory Sinus Arrhythmia Biofeedback.

    PubMed

    Munafò, Marianna; Patron, Elisabetta; Palomba, Daniela

    2016-06-01

    High work stress has been consistently associated with disturbed autonomic balance, specifically, lowered vagal cardiac control and increased sympathetic activity, which may lead to increased cardiovascular risk. Stress management procedures have been proposed to reduce autonomic dysfunctions related to work stress in different categories of workers exposed to heightened work demands, while a limited number of studies addressed this issue in managers. The present study was aimed at evaluating the effectiveness of a respiratory sinus arrhythmia (RSA) biofeedback (BF) intervention on psychological and physiological outcomes, in managers with high-level work responsibilities. Thirty-one managers leading outstanding private or public companies were randomly assigned to either a RSA-BF training (RSA-BF; N = 16) or a control group (N = 15). The RSA-BF training consisted of five weekly 45 min sessions, designed to increase RSA, whereas controls had to provide a daily stress diary once a week. After the training, managers in both groups reported reduced heart rate at rest, lower anxiety levels and improvement in health-related quality of life. More importantly, managers in the RSA-BF group showed increased vagal control (as indexed by increased RSA), decreased sympathetic arousal (as indexed by reduced skin conductance and systolic blood pressure) and lower emotional interferences, compared to managers in the control group. Results from this study showed that RSA-BF training was effective in improving cardiac autonomic balance at rest. Moreover, findings from this study underline the effectiveness of biofeedback in reducing psychophysiological negative outcomes associated with stress in managers.

  12. Small Private Key PKS on an Embedded Microprocessor

    PubMed Central

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  13. Small private key MQPKS on an embedded microprocessor.

    PubMed

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  14. KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer on Smartphones

    DTIC Science & Technology

    2011-05-01

    format data to exchange because contact information can be exported to V- Cards using existing APIs. For these reasons it was chosen as the medium to... Card format allows customization of this field. The service provider field serves to identify the app the key is for and the username field stores the...public key data. A sample V- Card field looks like Listing 1 below. IMPP;TextSecure

  15. In science communication, why does the idea of the public deficit always return? Exploring key influences.

    PubMed

    Suldovsky, Brianne

    2016-05-01

    Despite mounting criticism, the deficit model remains an integral part of science communication research and practice. In this article, I advance three key factors that contribute to the idea of the public deficit in science communication, including the purpose of science communication, how communication processes and outcomes are conceptualized, and how science and scientific knowledge are defined. Affording science absolute epistemic privilege, I argue, is the most compelling factor contributing to the continued use of the deficit model. In addition, I contend that the deficit model plays a necessary, though not sufficient, role in science communication research and practice. Areas for future research are discussed. © The Author(s) 2016.

  16. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.

    PubMed

    Guo, Lifeng; Yau, Wei-Chuen

    2015-02-01

    Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.

  17. Key Ingredients-Target Groups, Methods and Messages, and Evaluation-of Local-Level, Public Interventions to Counter Stigma and Discrimination: A Lived Experience Informed Selective Narrative Literature Review.

    PubMed

    Ashton, Laura J; Gordon, Sarah E; Reeves, Racheal A

    2018-04-01

    A proliferation of recent literature provides substantial direction as to the key ingredients-target groups, messages and methods, and evaluation-of local-level, public interventions to counter stigma and discrimination. This paper provides a selective narrative review of that literature from the perspective or standpoint of anti-stigma experts with lived experience of mental distress, the key findings of which have been synthesised and presented in diagrammatic overviews (infographics). These are intended to guide providers in planning, delivering and evaluating lived experience-directed local-level, public interventions to counter stigma and discrimination in accord with current best practice.

  18. Association between contact hip stress and RSA-measured wear rates in total hip arthroplasties of 31 patients.

    PubMed

    The, Bertram; Hosman, Anton; Kootstra, Johan; Kralj-Iglic, Veronika; Flivik, Gunnar; Verdonschot, Nico; Diercks, Ron

    2008-01-01

    The main concern in the long run of total hip replacements is aseptic loosening of the prosthesis. Optimization of the biomechanics of the hip joint is necessary for optimization of long-term success. A widely implementable tool to predict biomechanical consequences of preoperatively planned reconstructions still has to be developed. A potentially useful model to this purpose has been developed previously. The aim of this study is to quantify the association between the estimated hip joint contact force by this biomechanical model and RSA-measured wear rates in a clinical setting. Thirty-one patients with a total hip replacement were measured with RSA, the gold standard for clinical wear measurements. The reference examination was done within 1 week of the operation and the follow-up examinations were done at 1, 2 and 5 years. Conventional pelvic X-rays were taken on the same day. The contact stress distribution in the hip joint was determined by the computer program HIPSTRESS. The procedure for the determination of the hip joint contact stress distribution is based on the mathematical model of the resultant hip force in the one-legged stance and the mathematical model of the contact stress distribution. The model for the force requires as input data, several geometrical parameters of the hip and the body weight, while the model for stress requires as input data, the magnitude and direction of the resultant hip force. The stress distribution is presented by the peak stress-the maximal value of stress on the weight-bearing area (p(max)) and also by the peak stress calculated with respect to the body weight (p(max)/W(B)) which gives the effect of hip geometry. Visualization of the relations between predicted values by the model and the wear at different points in the follow-up was done using scatterplots. Correlations were expressed as Pearson r values. The predicted p(max) and wear were clearly correlated in the first year post-operatively (r = 0.58, p = 0

  19. Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters

    PubMed Central

    Wang, Baosheng; Tao, Jing

    2018-01-01

    Revocation functionality and hierarchy key delegation are two necessary and crucial requirements to identity-based cryptosystems. Revocable hierarchical identity-based encryption (RHIBE) has attracted a lot of attention in recent years, many RHIBE schemes have been proposed but shown to be either insecure or bounded where they have to fix the maximum hierarchical depth of RHIBE at setup. In this paper, we propose a new unbounded RHIBE scheme with decryption key exposure resilience and with short public system parameters, and prove our RHIBE scheme to be adaptively secure. Our system model is scalable inherently to accommodate more levels of user adaptively with no adding workload or restarting the system. By carefully designing the hybrid games, we overcome the subtle obstacle in applying the dual system encryption methodology for the unbounded and revocable HIBE. To the best of our knowledge, this is the first construction of adaptively secure unbounded RHIBE scheme. PMID:29649326

  20. Calculation of key reduction for B92 QKD protocol

    NASA Astrophysics Data System (ADS)

    Mehic, Miralem; Partila, Pavol; Tovarek, Jaromir; Voznak, Miroslav

    2015-05-01

    It is well known that Quantum Key Distribution (QKD) can be used with the highest level of security for distribution of the secret key, which is further used for symmetrical encryption. B92 is one of the oldest QKD protocols. It uses only two non-orthogonal states, each one coding for one bit-value. It is much faster and simpler when compared to its predecessors, but with the idealized maximum efficiencies of 25% over the quantum channel. B92 consists of several phases in which initial key is significantly reduced: secret key exchange, extraction of the raw key (sifting), error rate estimation, key reconciliation and privacy amplification. QKD communication is performed over two channels: the quantum channel and the classical public channel. In order to prevent a man-in-the-middle attack and modification of messages on the public channel, authentication of exchanged values must be performed. We used Wegman-Carter authentication because it describes an upper bound for needed symmetric authentication key. We explained the reduction of the initial key in each of QKD phases.

  1. Positive effect of removal of subchondral bone plate for cemented acetabular component fixation in total hip arthroplasty: a randomised RSA study with ten-year follow-up.

    PubMed

    Flivik, G; Kristiansson, I; Ryd, L

    2015-01-01

    We hypothesised that the removal of the subchondral bone plate (SCBP) for cemented acetabular component fixation in total hip arthroplasty (THA) offers advantages over retention by improving the cement-bone interface, without jeopardising implant stability. We have previously published two-year follow-up data of a randomised controlled trial (RCT), in which 50 patients with primary osteoarthritis were randomised to either retention or removal of the SCBP. The mean age of the retention group (n = 25, 13 males) was 70.0 years (sd 6.8). The mean age in the removal group (n = 25, 16 males) was 70.3 years (sd 7.9). Now we have followed up the patients at six (retention group, n = 21; removal group, n = 20) and ten years (retention group: n = 17, removal group: n = 18), administering clinical outcome questionnaires and radiostereometric analysis (RSA), and determining the presence of radiolucent lines (RLLs) on conventional radiographs. RSA demonstrated similar translation and rotation patterns up to six years. Between six and ten years, proximal acetabular component migration and changes of inclination were larger in the retention group, although the mean differences did not reach statistical significance. Differences in migration were driven by two patients in the SCBP retention group with extensive migration versus none in the SCBP removal group. The significant difference (p < 0.001) in the development of radiolucent lines in the retention group, previously observed at two years, increased even further during the course of follow-up (p < 0.001). While recognising SCBP removal is a more demanding technique, we conclude that, wherever possible, the SCBP should be removed to improve the cement-bone interface in order to maximise acetabular component stability and longevity. ©2015 The British Editorial Society of Bone & Joint Surgery.

  2. Association of FOXD1 variants with adverse pregnancy outcomes in mice and humans

    PubMed Central

    Laissue, Paul; Lakhal, Besma; Vatin, Magalie; Batista, Frank; Burgio, Gaëtan; Mercier, Eric; Santos, Esther Dos; Buffat, Christophe; Sierra-Diaz, Diana Carolina; Renault, Gilles; Montagutelli, Xavier; Salmon, Jane; Monget, Philippe; Veitia, Reiner A.; Méhats, Céline; Fellous, Marc; Gris, Jean-Christophe; Cocquet, Julie

    2016-01-01

    Recurrent spontaneous abortion (RSA) is a common cause of infertility, but previous attempts at identifying RSA causative genes have been relatively unsuccessful. Such failure to describe RSA aetiological genes might be explained by the fact that reproductive phenotypes should be considered as quantitative traits resulting from the intricate interaction of numerous genetic, epigenetic and environmental factors. Here, we studied an interspecific recombinant congenic strain (IRCS) of Mus musculus from the C57BL6/J strain of mice harbouring an approximate 5 Mb DNA fragment from chromosome 13 from Mus spretus mice (66H-MMU13 strain), with a high rate of embryonic resorption (ER). Transcriptome analyses of endometrial and placental tissues from these mice showed a deregulation of many genes associated with the coagulation and inflammatory response pathways. Bioinformatics approaches led us to select Foxd1 as a candidate gene potentially related to ER and RSA. Sequencing analysis of Foxd1 in the 66H-MMU13 strain, and in 556 women affected by RSA and 271 controls revealed non-synonymous sequence variants. In vitro assays revealed that some led to perturbations in FOXD1 transactivation properties on promoters of genes having key roles during implantation/placentation, suggesting a role of this gene in mammalian implantation processes. PMID:27805902

  3. Public health ethics. Public justification and public trust.

    PubMed

    Childress, J F; Bernheim, R Gaare

    2008-02-01

    Viewing public health as a political and social undertaking as well as a goal of this activity, the authors develop some key elements in a framework for public health ethics, with particular attention to the formation of public health policies and to decisions by public health officials that are not fully determined by established public policies. They concentrate on ways to approach ethical conflicts about public health interventions. These conflicts arise because, in addition to the value of public health, societies have a wide range of other values that sometimes constrain the selection of means to achieve public health goals. The authors analyze three approaches for resolving these conflicts (absolutist, contextualist, and presumptivist), argue for the superiority of the presumptivist approach, and briefly explicate five conditions for rebutting presumptions in a process of public justification. In a liberal, pluralistic, democratic society, a presumptivist approach that engages the public in the context of a variety of relationships can provide a foundation for public trust, which is essential to public health as a political and social practice as well as to achieving public health goals.

  4. Email authentication using symmetric and asymmetric key algorithm encryption

    NASA Astrophysics Data System (ADS)

    Halim, Mohamad Azhar Abdul; Wen, Chuah Chai; Rahmi, Isredza; Abdullah, Nurul Azma; Rahman, Nurul Hidayah Ab.

    2017-10-01

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using asymmetric and symmetric key algorithms. The asymmetric algorithm is RSA and symmetric algorithm is Advance Encryption Standard. With the combination for both algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.

  5. Healthcare public key infrastructure (HPKI) and non-profit organization (NPO): essentials for healthcare data exchange.

    PubMed

    Takeda, Hiroshi; Matsumura, Yasushi; Nakagawa, Katsuhiko; Teratani, Tadamasa; Qiyan, Zhang; Kusuoka, Hideo; Matsuoka, Masami

    2004-01-01

    To share healthcare information and to promote cooperation among healthcare providers and customers (patients) under computerized network environment, a non-profit organization (NPO), named as OCHIS, was established at Osaka, Japan in 2003. Since security and confidentiality issues on the Internet have been major concerns in the OCHIS, the system has been based on healthcare public key infrastructure (HPKI), and found that there remained problems to be solved technically and operationally. An experimental study was conducted to elucidate the central and the local function in terms of a registration authority and a time stamp authority by contracting with the Ministry of Economics and Trading Industries in 2003. This paper describes the experimental design with NPO and the results of the study concerning message security and HPKI. The developed system has been operated practically in Osaka urban area.

  6. [Brazilian bibliographical output on public oral health in public health and dentistry journals].

    PubMed

    Celeste, Roger Keller; Warmling, Cristine Maria

    2014-06-01

    The scope of this paper is to describe characteristics of the scientific output in the area of public oral health in journals on public health and dentistry nationwide. The Scopus database of abstracts and quotations was used and eight journals in public health, as well as ten in dentistry, dating from 1947 to 2011 were selected. A research strategy using key words regarding oral health in public health and key words about public health in dentistry was used to locate articles. The themes selected were based on the frequency of key words. Of the total number of articles, 4.7% (n = 642) were found in oral health journals and 6.8% (n = 245) in public health journals. Among the authors who published most, only 12% published in both fields. There was a percentile growth of public oral health publications in dentistry journals, though not in public health journals. In dentistry, only studies indexed as being on the topic of epidemiology showed an increase. In the area of public health, planning was predominant in all the phases studied. Research to evaluate the impact of research and postgraduate policies in scientific production is required.

  7. Video encryption using chaotic masks in joint transform correlator

    NASA Astrophysics Data System (ADS)

    Saini, Nirmala; Sinha, Aloka

    2015-03-01

    A real-time optical video encryption technique using a chaotic map has been reported. In the proposed technique, each frame of video is encrypted using two different chaotic random phase masks in the joint transform correlator architecture. The different chaotic random phase masks can be obtained either by using different iteration levels or by using different seed values of the chaotic map. The use of different chaotic random phase masks makes the decryption process very complex for an unauthorized person. Optical, as well as digital, methods can be used for video encryption but the decryption is possible only digitally. To further enhance the security of the system, the key parameters of the chaotic map are encoded using RSA (Rivest-Shamir-Adleman) public key encryption. Numerical simulations are carried out to validate the proposed technique.

  8. Dental Public Health In Action: Putting Oral Health on the Local Public Health Agenda.

    PubMed

    Walker, I F; Eapen-Simon, S; Gibson, S

    2018-04-18

    Oral health is a key public health issue across England. In Wakefield in the north of England, local data suggested the oral health of local children was significantly worse than the national average. This paper describes the work undertaken by Wakefield Council to strategically address this issue. A structured process was adopted. Key lessons include; having senior ownership from the Director of Public Health, partnership working across all key stakeholders, utilising dental public health expertise from Public Health England and the use of extensive engagement with stakeholders. Through this work, oral health is now identified with greater importance in Wakefield as a public health issue. Actions are now strategically co-ordinated across stakeholders to improve oral health in local children. Copyright© 2018 Dennis Barber Ltd.

  9. Oregon Public School Drug Use Survey, 1996: Key Findings Report.

    ERIC Educational Resources Information Center

    Finigan, Michael

    Alcohol, tobacco, and other drug use among public school students continues to be a major concern in Oregon as it is across the nation. This report, the sixth of the biannual public school drug use surveys conducted in Oregon since 1986, discusses major findings. These findings are (1) marijuana use is up for both the eighth and eleventh grades;…

  10. Encryption and decryption using FPGA

    NASA Astrophysics Data System (ADS)

    Nayak, Nikhilesh; Chandak, Akshay; Shah, Nisarg; Karthikeyan, B.

    2017-11-01

    In this paper, we are performing multiple cryptography methods on a set of data and comparing their outputs. Here AES algorithm and RSA algorithm are used. Using AES Algorithm an 8 bit input (plain text) gets encrypted using a cipher key and the result is displayed on tera term (serially). For simulation a 128 bit input is used and operated with a 128 bit cipher key to generate encrypted text. The reverse operations are then performed to get decrypted text. In RSA Algorithm file handling is used to input plain text. This text is then operated on to get the encrypted and decrypted data, which are then stored in a file. Finally the results of both the algorithms are compared.

  11. Argumentation Key to Communicating Climate Change to the Public

    NASA Astrophysics Data System (ADS)

    Bleicher, R. E.; Lambert, J. L.

    2012-12-01

    Argumentation plays an important role in how we communicate climate change science to the public and is a key component integrated throughout the Next Generation Science Standards. A scientific argument can be described as a disagreement between explanations with data being used to justify each position. Argumentation is social process where two or more individuals construct and critique arguments (Kuhn & Udell, 2003; Nussbaum, 1997). Sampson, Grooms, and Walker's (2011) developed a framework for understanding the components of a scientific argument. The three components start with a claim (a conjecture, conclusion, explanation, or an answer to a research question). This claim must fit the evidence (observations that show trends over time, relationships between variables or difference between groups). The evidence must be justified with reasoning (explains how the evidence supports the explanation and whey it should count as support). In a scientific argument, or debate, the controversy focuses on how data were collected, what data can or should be included, and what inferences can be made based on a set of evidence. Toulmin's model (1969) also includes rebutting or presenting an alternative explanation supported by counter evidence and reasoning of why the alternative is not the appropriate explanation for the question of the problem. The process of scientific argumentation should involve the construction and critique of scientific arguments, one that involves the consideration of alternative hypotheses (Lawson, 2003). Scientific literacy depends as much on the ability to refute and recognize poor scientific arguments as much as it does on the ability to present an effective argument based on good scientific data (Osborne, 2010). Argument is, therefore, a core feature of science. When students learn to construct a sound scientific argument, they demonstrate critical thinking and a mastery of the science being taught. To present a convincing argument in support of

  12. Analyzing the Effectiveness of the Self-organized Public-Key Management System on MANETs under the Lack of Cooperation and the Impersonation Attacks

    NASA Astrophysics Data System (ADS)

    da Silva, Eduardo; Dos Santos, Aldri Luiz; Lima, Michele N.; Albini, Luiz Carlos Pessoa

    Among the key management schemes for MANETs, the Self-Organized Public-Key Management System (PGP-Like) is the main chaining-based key management scheme. It is fully self-organized and does not require any certificate authority. Two kinds of misbehavior attacks are considered to be great threats to PGP-Like: lack of cooperation and impersonation attacks. This work quantifies the impact of such attacks on the PGP-Like. Simulation results show that PGP-Like was able to maintain its effectiveness when submitted to the lack of cooperation attack, contradicting previously theoretical results. It correctly works even in the presence of more than 60% of misbehaving nodes, although the convergence time is affected with only 20% of misbehaving nodes. On the other hand, PGP-Like is completely vulnerable to the impersonation attack. Its functionality is affected with just 5% of misbehaving nodes, confirming previously theoretical results.

  13. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks

    PubMed Central

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-01

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719

  14. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    PubMed

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  15. Development and validation of a composite scoring system for robot-assisted surgical training--the Robotic Skills Assessment Score.

    PubMed

    Chowriappa, Ashirwad J; Shi, Yi; Raza, Syed Johar; Ahmed, Kamran; Stegemann, Andrew; Wilding, Gregory; Kaouk, Jihad; Peabody, James O; Menon, Mani; Hassett, James M; Kesavadas, Thenkurussi; Guru, Khurshid A

    2013-12-01

    A standardized scoring system does not exist in virtual reality-based assessment metrics to describe safe and crucial surgical skills in robot-assisted surgery. This study aims to develop an assessment score along with its construct validation. All subjects performed key tasks on previously validated Fundamental Skills of Robotic Surgery curriculum, which were recorded, and metrics were stored. After an expert consensus for the purpose of content validation (Delphi), critical safety determining procedural steps were identified from the Fundamental Skills of Robotic Surgery curriculum and a hierarchical task decomposition of multiple parameters using a variety of metrics was used to develop Robotic Skills Assessment Score (RSA-Score). Robotic Skills Assessment mainly focuses on safety in operative field, critical error, economy, bimanual dexterity, and time. Following, the RSA-Score was further evaluated for construct validation and feasibility. Spearman correlation tests performed between tasks using the RSA-Scores indicate no cross correlation. Wilcoxon rank sum tests were performed between the two groups. The proposed RSA-Score was evaluated on non-robotic surgeons (n = 15) and on expert-robotic surgeons (n = 12). The expert group demonstrated significantly better performance on all four tasks in comparison to the novice group. Validation of the RSA-Score in this study was carried out on the Robotic Surgical Simulator. The RSA-Score is a valid scoring system that could be incorporated in any virtual reality-based surgical simulator to achieve standardized assessment of fundamental surgical tents during robot-assisted surgery. Copyright © 2013 Elsevier Inc. All rights reserved.

  16. Short Durations of Static Stretching when Combined with Dynamic Stretching do not Impair Repeated Sprints and Agility

    PubMed Central

    Wong, Del P.; Chaouachi, Anis; Lau, Patrick W.C.; Behm, David G.

    2011-01-01

    This study aimed to compare the effect of different static stretching durations followed by dynamic stretching on repeated sprint ability (RSA) and change of direction (COD). Twenty-five participants performed the RSA and COD tests in a randomized order. After a 5 min aerobic warm up, participants performed one of the three static stretching protocols of 30 s, 60 s or 90 s total duration (3 stretches x 10 s, 20 s or 30 s). Three dynamic stretching exercises of 30 s duration were then performed (90 s total). Sit-and-reach flexibility tests were conducted before the aerobic warm up, after the combined static and dynamic stretching, and post- RSA/COD test. The duration of static stretching had a positive effect on flexibility with 36.3% and 85.6% greater sit-and-reach scores with the 60 s and 90 s static stretching conditions respectively than with the 30 s condition (p ≤ 0.001). However there were no significant differences in RSA and COD performance between the 3 stretching conditions. The lack of change in RSA and COD might be attributed to a counterbalancing of static and dynamic stretching effects. Furthermore, the short duration (≤ 90 s) static stretching may not have provided sufficient stimulus to elicit performance impairments. Key points The duration of combined static and dynamic stretching had a positive effect on flexibility with 36.3% and 85.6% greater sit and reach scores with the 60 s and 90 s static stretching conditions respectively than with the 30 s condition (p ≤ 0.001). No significant differences in RSA and COD between the 3 stretching conditions. The lack of change in RSA and COD might be attributed to a counterbalancing of static and dynamic stretching effects. The short duration (≤ 90 s) static stretching may not have provided sufficient stimulus to elicit performance impairments. PMID:24149890

  17. Short Durations of Static Stretching when Combined with Dynamic Stretching do not Impair Repeated Sprints and Agility.

    PubMed

    Wong, Del P; Chaouachi, Anis; Lau, Patrick W C; Behm, David G

    2011-01-01

    This study aimed to compare the effect of different static stretching durations followed by dynamic stretching on repeated sprint ability (RSA) and change of direction (COD). Twenty-five participants performed the RSA and COD tests in a randomized order. After a 5 min aerobic warm up, participants performed one of the three static stretching protocols of 30 s, 60 s or 90 s total duration (3 stretches x 10 s, 20 s or 30 s). Three dynamic stretching exercises of 30 s duration were then performed (90 s total). Sit-and-reach flexibility tests were conducted before the aerobic warm up, after the combined static and dynamic stretching, and post- RSA/COD test. The duration of static stretching had a positive effect on flexibility with 36.3% and 85.6% greater sit-and-reach scores with the 60 s and 90 s static stretching conditions respectively than with the 30 s condition (p ≤ 0.001). However there were no significant differences in RSA and COD performance between the 3 stretching conditions. The lack of change in RSA and COD might be attributed to a counterbalancing of static and dynamic stretching effects. Furthermore, the short duration (≤ 90 s) static stretching may not have provided sufficient stimulus to elicit performance impairments. Key pointsThe duration of combined static and dynamic stretching had a positive effect on flexibility with 36.3% and 85.6% greater sit and reach scores with the 60 s and 90 s static stretching conditions respectively than with the 30 s condition (p ≤ 0.001).No significant differences in RSA and COD between the 3 stretching conditions.The lack of change in RSA and COD might be attributed to a counterbalancing of static and dynamic stretching effects.The short duration (≤ 90 s) static stretching may not have provided sufficient stimulus to elicit performance impairments.

  18. Keys to soil taxonomy by soil survey staff (sixth edition)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1994-12-31

    This publication, Keys to Soil Taxonomy, serves two purposes. It provides the taxonomic keys necessary for the classification of soils according to Soil Taxonomy in a form that can be used easily in the field, and it also acquaints users of Soil Taxonomy with recent changes in the classification system. This volume includes all revisions of the keys that have so far been approved, replacing the original keys in Soil Taxonomy: A Basic System of Soil Classification for Making and Interpreting Soil Surveys (1975), the work on which this abridged version, first published in 1983, is based. This publication incorporatesmore » all amendments approved to date and published in National Soil Taxonomy Handbook (NSTH) Issues 1-17.« less

  19. Public relations effectiveness in public health institutions.

    PubMed

    Springston, Jeffrey K; Weaver Lariscy, Ruth Ann

    2005-01-01

    This article explores public relations effectiveness in public health institutions. First, the two major elements that comprise public relations effectiveness are discussed: reputation management and stakeholder relations. The factors that define effective reputation management are examined, as are the roles of issues and crisis management in building and maintaining reputation. The article also examines the major facets of stakeholder relations, including an inventory of stakeholder linkages and key audiences, such as the media. Finally, methods of evaluating public relations effectiveness at both the program level and the institutional level are explored.

  20. Challenging Assumptions of International Public Relations: When Government Is the Most Important Public.

    ERIC Educational Resources Information Center

    Taylor, Maureen; Kent, Michael L.

    1999-01-01

    Explores assumptions underlying Malaysia's and the United States' public-relations practice. Finds many assumptions guiding Western theories and practices are not applicable to other countries. Examines the assumption that the practice of public relations targets a variety of key organizational publics. Advances international public-relations…

  1. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    DTIC Science & Technology

    2016-03-10

    Contractor Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: Seaworthy Quantum Key Distribution Design and Validation (SEAKEY...Technologies Kathryn Carson Program Manager Quantum Information Processing 2 | P a g e Approved for public release; distribution is...we have continued work calculating the key rates achievable parametrically with receiver performance. In addition, we describe the initial designs

  2. Information Theoretic Secret Key Generation: Structured Codes and Tree Packing

    ERIC Educational Resources Information Center

    Nitinawarat, Sirin

    2010-01-01

    This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…

  3. Bidirectional private key exchange using delay-coupled semiconductor lasers.

    PubMed

    Porte, Xavier; Soriano, Miguel C; Brunner, Daniel; Fischer, Ingo

    2016-06-15

    We experimentally demonstrate a key exchange cryptosystem based on the phenomenon of identical chaos synchronization. In our protocol, the private key is symmetrically generated by the two communicating partners. It is built up from the synchronized bits occurring between two current-modulated bidirectionally coupled semiconductor lasers with additional self-feedback. We analyze the security of the exchanged key and discuss the amplification of its privacy. We demonstrate private key generation rates up to 11  Mbit/s over a public channel.

  4. [Sociodemographic and environmental factors associated with sports physical activity in the urban population of Peru].

    PubMed

    Seclén-Palacín, Juan A; Jacoby, Enrique R

    2003-10-01

    . However, other variables associated indirectly with the socioeconomic level - such as having more formal education, being employed, and having access to the Internet or cable television - and consumption of sports information were significantly and directly associated with RSA. The most frequent barriers to practicing sports were the lack of time, the lack of nearby sports infrastructure (playing fields or courts, etc.), and people's lack of interest. RSA on the part of the members of a household was significantly associated with RSA performed by the head of the household (male or female). RSA is limited in the urban areas of Peru. This is most true for persons who are less than 30 years old, for women, and for residents of the Lima metropolitan area. This low RSA level is a challenge for public health, and it confirms the need for promoting active lifestyles. More study is needed on the observed positive influence when the head of the household performs RSA and on the fact that RSA is more common in urban areas outside metropolitan Lima. These two findings should also be taken into consideration in designing specific interventions.

  5. Simple group password-based authenticated key agreements for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  6. Coordination between veterinary services and other relevant authorities: a key component of good public governance.

    PubMed

    Bellemain, V

    2012-08-01

    Coordination between Veterinary Services and other relevant authorities is a key component of good public governance, especially for effective action and optimal management of available resources. The importance of good coordination is reflected in the World Organisation for Animal Health'Tool forthe Evaluation of Performance of Veterinary Services', which includes a critical competency on coordination. Many partners from technical, administrative and legal fields are involved. The degree of formalisation of coordination tends to depend on a country's level of organisation and development. Contingency plans against avian influenza led to breakthroughs in many countries in the mid-2000s. While interpersonal relationships remain vital, not everything should hinge on them. Organisation and management are critical to operational efficiency. The distribution of responsibilities needs to be defined clearly, avoiding duplication and areas of conflict. Lead authorities should be designated according to subject (Veterinary Services in animal health areas) and endowed with the necessary legitimacy. Lead authorities will be responsible for coordinating the drafting and updating of the relevant documents: agreements between authorities, contingency plans, standard operating procedures, etc.

  7. Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)

    DTIC Science & Technology

    2015-05-27

    Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: Seaworthy Quantum Key Distribution Design and Validation (SEAKEY...Technologies Kathryn Carson Program Manager Quantum Information Processing Report Documentation Page Form ApprovedOMB No. 0704-0188 Public...2016 4. TITLE AND SUBTITLE Seaworthy Quantum Key Distribution Design and Validation (SEAKEY) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM

  8. Similar early migration when comparing CR and PS in Triathlon™ TKA: A prospective randomised RSA trial.

    PubMed

    Molt, Mats; Toksvig-Larsen, Sören

    2014-10-01

    The objective of this study was to compare the early migration of the cruciate retaining and posterior stabilising versions of the recently introduced Triathlon™ total knee system, with a view to predicting long term fixation performance. Sixty patients were prospectively randomised to receive either Triathlon™ posterior stabilised cemented knee prosthesis or Triathlon™ cruciate retaining cemented knee prosthesis. Tibial component migration was measured by radiostereometric analysis postoperatively and at three months, one year and two years. Clinical outcome was measured by the American Knee Society Score and Knee Osteoarthritis and Injury Outcome Score. There were no differences in rotation around the three coordinal axes or in the maximum total point motion (MTPM) during the two year follow-up. The posterior stabilised prosthesis had more posterior-anterior translation at three months and one year and more caudal-cranial translation at one year and two years. There were no differences in functional outcome between the groups. The tibial tray of the Triathlon™ cemented knee prosthesis showed similar early stability. Level I. Article focus: This was a prospective randomised trial aiming to compare the single radius posterior stabilised (PS) Triathlon™ total knee arthroplasty (TKA) to the cruciate retaining Triathlon™ TKA system with regard to fixation. Strengths and limitations of this study: Strength of this study was that it is a randomised prospective trial using an objective measuring tool. The sample size of 25-30 patients was reportedly sufficient for the screening of implants using RSA [1]. ClinicalTrials.gov Identifier: NCT00436982. Copyright © 2014 Elsevier B.V. All rights reserved.

  9. Evaluation of the adenosine deaminase (ADA) G22A gene polymorphism with recurrent spontaneous abortion among Egyptian patients.

    PubMed

    Farhan, Hanan Mohamed; Abu-Gabal, Khadiga; Katta, Maha; Ibrahim, Raghda

    2017-01-01

    Adenosine and deoxyadenosine metabolism is influenced by adenosine deaminase (ADA) enzyme. ADA increases in different diseases and is considered as one of the markers for cell-mediated immunity. Pregnancy is associated with depressed cell-mediated immunity. The level of ADA expression, which seems to play a key role in maintaining pregnancy, is influenced by adenosine deaminase G22A gene polymorphism. We aimed in our study to evaluate the association of ADA G22A gene polymorphism with recurrent spontaneous abortion (RSA) in Egyptian women. Adenosine deaminase G22A gene polymorphism was genotyped in 40 patients (age range 22-39 years) with a history of RSA, selected from those attending the Gynaecology and Obstetrics Clinic of Beni-Suef University Hospital, and 20 age-matched healthy women as a control group, using polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP) analysis. In our study, no statistically significant difference was found between RSA patients and control group as regards ADA G22A genotypes (p = 0.653) and alleles (p = 0.697). A comparison of the frequencies of ADA alleles in RSA patients as regards the below-35-years-old age group revealed that ADA 2(A) allele was associated with a low risk for RSA in patients aged 35 years old or younger (p = 0.008). In conclusion, our study revealed an age-dependent protective value of ADA 2(A) allele in recurrent spontaneous abortions among the Egyptian population.

  10. Parameter Estimation with Almost No Public Communication for Continuous-Variable Quantum Key Distribution

    NASA Astrophysics Data System (ADS)

    Lupo, Cosmo; Ottaviani, Carlo; Papanastasiou, Panagiotis; Pirandola, Stefano

    2018-06-01

    One crucial step in any quantum key distribution (QKD) scheme is parameter estimation. In a typical QKD protocol the users have to sacrifice part of their raw data to estimate the parameters of the communication channel as, for example, the error rate. This introduces a trade-off between the secret key rate and the accuracy of parameter estimation in the finite-size regime. Here we show that continuous-variable QKD is not subject to this constraint as the whole raw keys can be used for both parameter estimation and secret key generation, without compromising the security. First, we show that this property holds for measurement-device-independent (MDI) protocols, as a consequence of the fact that in a MDI protocol the correlations between Alice and Bob are postselected by the measurement performed by an untrusted relay. This result is then extended beyond the MDI framework by exploiting the fact that MDI protocols can simulate device-dependent one-way QKD with arbitrarily high precision.

  11. Increased migration of uncemented acetabular cups in female total hip arthroplasty patients with low systemic bone mineral density. A 2-year RSA and 8-year radiographic follow-up study of 34 patients.

    PubMed

    Finnilä, Sami; Moritz, Niko; SvedströM, Erkki; Alm, Jessica J; Aro, Hannu T

    2016-02-01

    Low bone mineral density (BMD) may jeopardize the initial component stability and delay osseointegration of uncemented acetabular cups in total hip arthroplasty (THA). We measured the migration of uncemented cups in women with low or normal BMD. We used radiostereometric analysis (RSA) to measure the migration of hydroxyapatite-coated titanium alloy cups with alumina-on-alumina bearings in THA of 34 female patients with a median age of 64 (41-78) years. 10 patients had normal BMD and 24 patients had low systemic BMD (T-score ≤ -1) based on dual-energy X-ray absorptiometry (DXA). Cup migration was followed with RSA for 2 years. Radiographic follow-up was done at a median of 8 (2-10) years. Patients with normal BMD did not show a statistically significant cup migration after the settling period of 3 months, while patients with low BMD had a continuous proximal migration between 3 and 12 months (p = 0.03). These differences in cup migration persisted at 24 months. Based on the perceived risk of cup revision, 14 of the 24 cases were "at risk" (proximal translation of 0.2 to 1.0 mm) in the low-BMD group and 2 of the 10 cases were "at risk" in the normal-BMD group (odds ratio (OR) = 8.0, 95% CI: 1.3-48). The radiographic follow-up showed no radiolucent lines or osteolysis. 2 cups have been revised for fractures of the ceramic bearings, but none for loosening. Low BMD contributed to cup migration beyond the settling period of 3 months, but the migrating cups appeared to osseointegrate eventually.

  12. Security Standards and Best Practice Considerations for Quantum Key Distribution (QKD)

    DTIC Science & Technology

    2012-03-01

    SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD) THESIS...protection in the United States. AFIT/GSE/ENV/12-M05 SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD...FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT/GSE/ENV/12-M05 SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY

  13. Latch Key: Developing Child Care Programs Through Community Education.

    ERIC Educational Resources Information Center

    Cramer, James P.; And Others

    This guide to the Latch Key program for after-school day care explores rationale and methods for developing Latch Key programs in the public schools to provide low cost after-school care for children (grades 1-6) of working or student parents. (Some programs have been provided for kindergarten children and some have been expanded to full time…

  14. Keys to Transition: The California Model.

    ERIC Educational Resources Information Center

    Kearly, Patt

    This publication addresses basic issues related to the concept of transition as it is applied to students with disabilities in California. Following a pretest (and its answer key), the document uses a question and answer format to discuss common concerns about transition, normalization, the school role, the "Bridges" model developed by…

  15. Evaluation of HLA-G 14-bp ins/del and +3142G>C polymorphisms with susceptibility to recurrent spontaneous abortion.

    PubMed

    Hashemi, Mohammad; Mokhtari, Mojgan; Khazaeian, Safura; Bahari, Gholamreza; Rezaei, Maryam; Nakhaee, Alireza; Taheri, Mohsen

    2017-06-01

    HLA-G is critically important for successful implantation during pregnancy. Increasing evidence supposed that HLA-G plays a key role in tolerance of the semi-allogeneic graft in pregnancy by inhibiting the cytotoxic functions of T and NK cells. The present study aimed to evaluate the impact of HLA-G rs1063320 (+3142G>C) and 14-bp insertion (ins)/deletion (del) polymorphisms on recurrent spontaneous abortion (RSA). Genomic DNA from 93 RSA patients and 93 normal fertile women was isolated using the salting out method. Genotyping of HLA-G +3142G>C and 14-bp ins/del variants was done by polymerase chain reaction restriction fragment length polymorphism (PCR-RFP) and PCR method, respectively. The HLA-G +3142G>C polymorphism increased the risk of RSA in codominant (OR = 2.39, 95%CI = 1.27-4.49, p = 0.010, GC vs GG; OR = 3.28, 95%CI = 1.16-9.72, p = 0.040, CC vs GG) and dominant (OR = 2.52, 95%CI = 1.37-4.64, p = 0.004, GC + CC vs GG) tested inheritance models. HLA-G rs1063320 C allele was associated with increased risk of RSA (OR = 1.84, 95%CI = 1.20-2.83, p = 0.007). The del/del genotype as well as del allele of 14-bp ins/del variant increased that risk of RSA (OR = 3.02, 95%CI = 1.23-7.41, p = 0.025 and OR = 1.65, 95%CI = 1.09-2.50, p = 0.022, respectively). In summary, our results showed that HLA-G gene polymorphisms significantly increased the risk of RSA in a sample of the Iranian population. Copyright © 2017. Published by Elsevier B.V.

  16. On the common modulus attack into the LUC4,6 cryptosystem

    NASA Astrophysics Data System (ADS)

    Wong, Tze Jin; Said, Mohd Rushdan Md; Othman, Mohamed; Koo, Lee Feng

    2015-05-01

    The LUC4,6 cryptosystem is a system analogy with RSA cryptosystem and extended from LUC and LUC3 cryptosystems. The process of encryption and decryption are derived from the fourth order linear recurrence sequence and based on Lucas function. This paper reports an investigation into the common modulus attack on the LUC4,6 cryptosystem. In general, the common modulus attack will be succeeded if the sender sends the plaintext to two users used same RSA-modulus and both of encryption keys of them are relatively prime to each other. However, based on the characteristics of high order Lucas sequence, the LUC4,6 cryptosystem is unattackable

  17. Listening to the Public: The Key to a Constructive Debate about Higher Education.

    ERIC Educational Resources Information Center

    Wadsworth, Deborah

    Using recent research on public attitudes about higher education some principles of public opinion formation may help higher education respond to its current challenges. That research shows parallel public attitudes to higher education and health care reform. On both issues people want change. They are not sure what is wrong, but they are scared…

  18. Willingness to Pay for Mosquito Control in Key West, Florida and Tucson, Arizona.

    PubMed

    Dickinson, Katherine L; Hayden, Mary H; Haenchen, Steven; Monaghan, Andrew J; Walker, Kathleen R; Ernst, Kacey C

    2016-04-01

    Mosquito-borne illnesses like West Nile virus (WNV) and dengue are growing threats to the United States. Proactive mosquito control is one strategy to reduce the risk of disease transmission. In 2012, we measured the public's willingness to pay (WTP) for increased mosquito control in two cities: Key West, FL, where there have been recent dengue outbreaks, and Tucson, AZ, where dengue vectors are established and WNV has been circulating for over a decade. Nearly three quarters of respondents in both cities (74% in Tucson and 73% in Key West) would be willing to pay $25 or more annually toward an increase in publicly funded mosquito control efforts. WTP was positively associated with income (both cities), education (Key West), and perceived mosquito abundance (Tucson). Concerns about environmental impacts of mosquito control were associated with lower WTP in Key West. Expanded mosquito control efforts should incorporate public opinion as they respond to evolving disease risks. © The American Society of Tropical Medicine and Hygiene.

  19. Compressed Secret Key Agreement:Maximizing Multivariate Mutual Information per Bit

    NASA Astrophysics Data System (ADS)

    Chan, Chung

    2017-10-01

    The multiterminal secret key agreement problem by public discussion is formulated with an additional source compression step where, prior to the public discussion phase, users independently compress their private sources to filter out strongly correlated components for generating a common secret key. The objective is to maximize the achievable key rate as a function of the joint entropy of the compressed sources. Since the maximum achievable key rate captures the total amount of information mutual to the compressed sources, an optimal compression scheme essentially maximizes the multivariate mutual information per bit of randomness of the private sources, and can therefore be viewed more generally as a dimension reduction technique. Single-letter lower and upper bounds on the maximum achievable key rate are derived for the general source model, and an explicit polynomial-time computable formula is obtained for the pairwise independent network model. In particular, the converse results and the upper bounds are obtained from those of the related secret key agreement problem with rate-limited discussion. A precise duality is shown for the two-user case with one-way discussion, and such duality is extended to obtain the desired converse results in the multi-user case. In addition to posing new challenges in information processing and dimension reduction, the compressed secret key agreement problem helps shed new light on resolving the difficult problem of secret key agreement with rate-limited discussion, by offering a more structured achieving scheme and some simpler conjectures to prove.

  20. Evaluation of the adenosine deaminase (ADA) G22A gene polymorphism with recurrent spontaneous abortion among Egyptian patients

    PubMed Central

    Abu-Gabal, Khadiga; Katta, Maha; Ibrahim, Raghda

    2017-01-01

    Introduction Adenosine and deoxyadenosine metabolism is influenced by adenosine deaminase (ADA) enzyme. ADA increases in different diseases and is considered as one of the markers for cell-mediated immunity. Pregnancy is associated with depressed cell-mediated immunity. The level of ADA expression, which seems to play a key role in maintaining pregnancy, is influenced by adenosine deaminase G22A gene polymorphism. We aimed in our study to evaluate the association of ADA G22A gene polymorphism with recurrent spontaneous abortion (RSA) in Egyptian women. Material and methods Adenosine deaminase G22A gene polymorphism was genotyped in 40 patients (age range 22-39 years) with a history of RSA, selected from those attending the Gynaecology and Obstetrics Clinic of Beni-Suef University Hospital, and 20 age-matched healthy women as a control group, using polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP) analysis. Results In our study, no statistically significant difference was found between RSA patients and control group as regards ADA G22A genotypes (p = 0.653) and alleles (p = 0.697). A comparison of the frequencies of ADA alleles in RSA patients as regards the below-35-years-old age group revealed that ADA 2(A) allele was associated with a low risk for RSA in patients aged 35 years old or younger (p = 0.008). Conclusions In conclusion, our study revealed an age-dependent protective value of ADA 2(A) allele in recurrent spontaneous abortions among the Egyptian population. PMID:29204093

  1. Reverse shoulder arthroplasty for massive irreparable rotator cuff tears and cuff tear arthropathy: a systematic review.

    PubMed

    Petrillo, S; Longo, U G; Papalia, R; Denaro, V

    2017-08-01

    To report the outcomes and complications of reverse shoulder arthroplasty (RSA) in massive irreparable rotator cuff tears (MIRCT) and cuff tear arthropathy (CTA). A systematic review of the literature contained in Medline, Cochrane, EMBASE, Google Scholar and Ovid databases was conducted on May 1, 2016, according to PRISMA guidelines. The key words "reverse total shoulder arthroplasty" or "reverse total shoulder prostheses" with "rotator cuff tears"; "failed rotator cuff surgery"; "massive rotator cuff tears"; "irreparable rotator cuff tears"; "cuff tear arthropathy"; "outcomes"; "complications" were matched. All articles reporting outcomes and complications of RSA for the management of MIRCT or CTA were included. The comparison between preoperative and postoperative clinical scores, as well as range of motion (ROM), was performed using the Wilcoxon-Mann-Whitney test. P values lower than 0.05 were considered statistically significant. Seven articles were included in our qualitative synthesis. A statistically significant improvement in all clinical scores and ROM was found comparing the preoperative value with the postoperative value. The degrees of retroversion of the humeral stem of the RSA do not influence the functional outcomes in a statistically significant fashion. There were 17.4% of complications. The most frequent was heterotopic ossification, occurring in 6.6% of patients. Revision surgery was necessary in 7.3% of patients. RSA restores pain-free ROM and improves function of the shoulder in patients with MIRCT or CTA. However, complications occur in a high percentage of patients. The lack of level I studies limits the real understanding of the potentials and limitations of RSA for the management of MIRCT and CTA.

  2. Geology and hydrogeology of the Florida Keys

    USGS Publications Warehouse

    Halley, Robert B.; Vacher, H. L.; Shinn,

    1997-01-01

    This chapter discusses the geology and hydrogeology of the Florida Keys, and focuses on the islands formed of Pleistocene limestone. These islands, which are crossed when driving from Miami to Key West, are typically regarded as "the Florida Keys." The outstanding and fragile character of ecosystems on and around the Florida Keys has prompted State and Federal efforts to protect and preserve the remaining public portions of the region. The Florida Keys were largely ignored during the sixteenth, seventeenth, and eighteenth centuries, although the waters just offshore provided a major shipping thoroughfare to and from the New World. The Florida Keys are now recognized as one of the great recreational and environmental resources of the United States. The islands are outposts of a laid-back, tropical resort culture that has as its foundation warmth and clear water. A significant part of the attraction is fishing, diving, and boating around the area's coral reefs, which the islands protect. But the reefs were not always so highly valued. The Florida Keys that have protected the reefs for millennia, may now be the source of the agents that may accomplish what Agassiz thought was beyond man's power a century ago.

  3. 76 FR 1059 - Publicly Available Mass Market Encryption Software and Other Specified Publicly Available...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-07

    .... 100108014-0121-01] RIN 0694-AE82 Publicly Available Mass Market Encryption Software and Other Specified Publicly Available Encryption Software in Object Code AGENCY: Bureau of Industry and Security, Commerce... encryption object code software with a symmetric key length greater than 64-bits, and ``publicly available...

  4. 76 FR 48807 - Public Key Infrastructure (PKI) Certificate Action Form

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-09

    ...) Certificate Action Form ACTION: Proposed collection; comment request. SUMMARY: The United States Patent and... Certificate Action Form (PTO-2042), which is used by the public to request a new digital certificate, the... applicant. The Certificate Action Form has an accompanying subscriber agreement to ensure that customers...

  5. Tag-KEM from Set Partial Domain One-Way Permutations

    NASA Astrophysics Data System (ADS)

    Abe, Masayuki; Cui, Yang; Imai, Hideki; Kurosawa, Kaoru

    Recently a framework called Tag-KEM/DEM was introduced to construct efficient hybrid encryption schemes. Although it is known that generic encode-then-encrypt construction of chosen ciphertext secure public-key encryption also applies to secure Tag-KEM construction and some known encoding method like OAEP can be used for this purpose, it is worth pursuing more efficient encoding method dedicated for Tag-KEM construction. This paper proposes an encoding method that yields efficient Tag-KEM schemes when combined with set partial one-way permutations such as RSA and Rabin's encryption scheme. To our knowledge, this leads to the most practical hybrid encryption scheme of this type. We also present an efficient Tag-KEM which is CCA-secure under general factoring assumption rather than Blum factoring assumption.

  6. Public by Day, Private by Night: Examining the Private Lives of Kenya's Public Universities

    ERIC Educational Resources Information Center

    Wangenge-Ouma, Gerald

    2012-01-01

    This article examines the emergence of the public university in Kenya as a key provider of private higher education, characterised mainly by the phenomenon of the "private public university student." It probes the broader socio-economic reforms circumscribing the privatisation of Kenya's public universities and the local and global…

  7. Relationships between Organizations and Publics: Development of a Multi-Dimensional Organization-Public Relationship Scale.

    ERIC Educational Resources Information Center

    Bruning, Stephen D.; Ledingham, John A.

    1999-01-01

    Attempts to design a multiple-item, multiple-dimension organization/public relationship scale. Finds that organizations and key publics have three types of relationships: professional, personal, and community. Provides an instrument that can be used to measure the influence that perceptions of the organization/public relationship have on consumer…

  8. Implications of Key Performance Indicator Issues in Ontario Universities Explored

    ERIC Educational Resources Information Center

    Chan, Vivian

    2015-01-01

    Since 1998, the Ministry of Training, Colleges and Universities in Ontario, Canada, has required that data on specific key performance indicators (KPIs) be made public by its publicly funded universities. The information is intended to be used by universities to demonstrate their achievements, to improve their programmes and services, and to…

  9. Key Concepts in Microbial Oceanography

    NASA Astrophysics Data System (ADS)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  10. Public assessment of key performance indicators of healthcare in a Canadian province: the effect of age and chronic health problems.

    PubMed

    Nurullah, Abu Sadat; Northcott, Herbert C; Harvey, Michael D

    2014-01-15

    This study explores the effect of age and chronic conditions on public perceptions of the health system, as measured by the Key Performance Indicators (KPIs) of healthcare, in the province of Alberta in Canada. Drawing from data collected by Government of Alberta's Department of Health and Wellness, this research examines two key questions: (1) Do people in the 65+ age group rate the KPIs of healthcare (i.e., availability, accessibility, quality, outcome, and satisfaction) more favorably compared to people in younger age groups in Alberta? (2) Does the rating of KPIs of healthcare in Alberta vary with different chronic conditions (i.e., no chronic problem, chronic illnesses without pain, and chronic pain)? The findings indicate that people in the older age group tend to rate the KPIs of healthcare more favorably compared to younger age groups in Alberta, net of socio-demographic factors, self-reported health status, and knowledge and utilization of health services. However, people experiencing chronic pain are less likely to rate the KPIs of healthcare favorably compared to people with no chronic health problem in Alberta. Discussion includes implications of the findings for the healthcare system in the province.

  11. Development and validation of an automated and marker-free CT-based spatial analysis method (CTSA) for assessment of femoral hip implant migration: In vitro accuracy and precision comparable to that of radiostereometric analysis (RSA).

    PubMed

    Scheerlinck, Thierry; Polfliet, Mathias; Deklerck, Rudi; Van Gompel, Gert; Buls, Nico; Vandemeulebroucke, Jef

    2016-01-01

    We developed a marker-free automated CT-based spatial analysis (CTSA) method to detect stem-bone migration in consecutive CT datasets and assessed the accuracy and precision in vitro. Our aim was to demonstrate that in vitro accuracy and precision of CTSA is comparable to that of radiostereometric analysis (RSA). Stem and bone were segmented in 2 CT datasets and both were registered pairwise. The resulting rigid transformations were compared and transferred to an anatomically sound coordinate system, taking the stem as reference. This resulted in 3 translation parameters and 3 rotation parameters describing the relative amount of stem-bone displacement, and it allowed calculation of the point of maximal stem migration. Accuracy was evaluated in 39 comparisons by imposing known stem migration on a stem-bone model. Precision was estimated in 20 comparisons based on a zero-migration model, and in 5 patients without stem loosening. Limits of the 95% tolerance intervals (TIs) for accuracy did not exceed 0.28 mm for translations and 0.20° for rotations (largest standard deviation of the signed error (SD(SE)): 0.081 mm and 0.057°). In vitro, limits of the 95% TI for precision in a clinically relevant setting (8 comparisons) were below 0.09 mm and 0.14° (largest SD(SE): 0.012 mm and 0.020°). In patients, the precision was lower, but acceptable, and dependent on CT scan resolution. CTSA allows detection of stem-bone migration with an accuracy and precision comparable to that of RSA. It could be valuable for evaluation of subtle stem loosening in clinical practice.

  12. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    NASA Astrophysics Data System (ADS)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  13. Association between p53 polymorphism at codon 72 and recurrent spontaneous abortion.

    PubMed

    Zhang, Ying; Wu, Yuan-Yuan; Qiao, Fu-Yuan; Zeng, Wan-Jiang

    2016-06-01

    p53 gene plays an important role in apoptosis, which is necessary for successful invasion of trophoblast cells. The change from an arginine (Arg) to a proline (Pro) at codon 72 can influence the biological activity of p53, which predisposes to an increased risk of recurrent spontaneous abortion (RSA). In order to investigate the association between p53 polymorphism at codon 72 and RSA, we conducted this meta-analysis. Pubmed, Embase and Web of science were used to identify the eligible studies. Odds ratio (OR) with 95% confidence interval (CI) was used to evaluate the strength of the association. Six studies containing 937 cases of RSA and 830 controls were included, and there was one study deviated from Hardy-Weinberg equilibrium (HWE). There was a significant association between p53 polymorphism at codon 72 and RSA in recessive model (Pro/Pro vs. Pro/Arg+Arg/Arg; OR=1.60, 95% CI: 1.14-2.24) and co-dominant model (Pro/Pro vs. Arg/Arg; OR=1.47, 95% CI: 1.02-2.12) whether the study that was deviated from HWE was eliminated or not. A significant association was observed in allelic model (Pro vs. Arg; OR=1.28, 95% CI: 1.04-1.57) after exclusion of the study that was deviated from HWE. No association was noted in recessive model (Pro/Pro+Pro/Arg vs. Arg/Arg; OR=1.05, 95% CI: 0.86-1.30) and co-dominant model (Pro/Arg vs. Arg/Arg; OR=0.96, 95% CI: 0.77-1.19). Subgroup analysis by ethnicity also indicated a significant association between p53 polymorphism at codon 72 and RSA in Caucasian group. No heterogeneity and publication bias were found. Our meta-analysis implied that p53 polymorphism at codon 72 carries high maternal risk of RSA.

  14. Public open space, physical activity, urban design and public health: Concepts, methods and research agenda.

    PubMed

    Koohsari, Mohammad Javad; Mavoa, Suzanne; Villanueva, Karen; Sugiyama, Takemi; Badland, Hannah; Kaczynski, Andrew T; Owen, Neville; Giles-Corti, Billie

    2015-05-01

    Public open spaces such as parks and green spaces are key built environment elements within neighbourhoods for encouraging a variety of physical activity behaviours. Over the past decade, there has been a burgeoning number of active living research studies examining the influence of public open space on physical activity. However, the evidence shows mixed associations between different aspects of public open space (e.g., proximity, size, quality) and physical activity. These inconsistencies hinder the development of specific evidence-based guidelines for urban designers and policy-makers for (re)designing public open space to encourage physical activity. This paper aims to move this research agenda forward, by identifying key conceptual and methodological issues that may contribute to inconsistencies in research examining relations between public open space and physical activity. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Social media in public health.

    PubMed

    Kass-Hout, Taha A; Alhinnawi, Hend

    2013-01-01

    While social media interactions are currently not fully understood, as individual health behaviors and outcomes are shared online, social media offers an increasingly clear picture of the dynamics of these processes. Social media is becoming an increasingly common platform among clinicians and public health officials to share information with the public, track or predict diseases. Social media can be used for engaging the public and communicating key public health interventions, while providing an important tool for public health surveillance. Social media has advantages over traditional public health surveillance, as well as limitations, such as poor specificity, that warrant additional study. Social media can provide timely, relevant and transparent information of public health importance; such as tracking or predicting the spread or severity of influenza, west nile virus or meningitis as they propagate in the community, and, in identifying disease outbreaks or clusters of chronic illnesses. Further work is needed on social media as a valid data source for detecting or predicting diseases or conditions. Also, whether or not it is an effective tool for communicating key public health messages and engaging both, the general public and policy-makers.

  16. Respiratory Sinus Arrhythmia as an Index of Vagal Activity during Stress in Infants: Respiratory Influences and Their Control

    PubMed Central

    Ritz, Thomas; Bosquet Enlow, Michelle; Schulz, Stefan M.; Kitts, Robert; Staudenmayer, John; Wright, Rosalind J.

    2012-01-01

    Respiratory sinus arrhythmia (RSA) is related to cardiac vagal outflow and the respiratory pattern. Prior infant studies have not systematically examined respiration rate and tidal volume influences on infant RSA or the extent to which infants' breathing is too fast to extract a valid RSA. We therefore monitored cardiac activity, respiration, and physical activity in 23 six-month old infants during a standardized laboratory stressor protocol. On average, 12.6% (range 0–58.2%) of analyzed breaths were too short for RSA extraction. Higher respiration rate was associated with lower RSA amplitude in most infants, and lower tidal volume was associated with lower RSA amplitude in some infants. RSA amplitude corrected for respiration rate and tidal volume influences showed theoretically expected strong reductions during stress, whereas performance of uncorrected RSA was less consistent. We conclude that stress-induced changes of peak-valley RSA and effects of variations in breathing patterns on RSA can be determined for a representative percentage of infant breaths. As expected, breathing substantially affects infant RSA and needs to be considered in studies of infant psychophysiology. PMID:23300753

  17. Respiratory sinus arrhythmia during worry forecasts stress-related increases in psychological distress.

    PubMed

    Gouin, Jean-Philippe; Deschênes, Sonya S; Dugas, Michel J

    2014-09-01

    Respiratory sinus arrhythmia (RSA) has been conceptualized as an index of emotion regulation abilities. Although resting RSA has been associated with both concurrent and prospective affective responses to stress, the impact of RSA reactivity on emotional responses to stress is inconsistent across studies. The type of emotional stimuli used to elicit these phasic RSA responses may influence the adaptive value of RSA reactivity. We propose that RSA reactivity to a personally relevant worry-based stressor might forecast future affective responses to stress. To evaluate whether resting RSA and RSA reactivity to worry inductions predict stress-related increases in psychological distress, an academic stress model was used to prospectively examine changes in psychological distress from the well-defined low- and high-stress periods. During the low-stress period, 76 participants completed self-report mood measures and had their RSA assessed during a resting baseline, free worry period and worry catastrophizing interview. Participants completed another mood assessment during the high-stress period. Results indicated that baseline psychological distress predicted larger decreases in RSA during the worry inductions. Lower resting RSA and greater RSA suppression to the worry inductions at baseline prospectively predicted larger increases in psychological distress from the low- to high-stress period, even after accounting for the impact of baseline distress on RSA. These results provide further evidence that RSA may represent a unique index of emotion regulation abilities in times of stress.

  18. Building Interdisciplinary Research Capacity: a Key Challenge for Ecological Approaches in Public Health.

    PubMed

    Galway, Lindsay P; Parkes, Margot W; Allen, Diana; Takaro, Tim K

    2016-01-01

    The shortcomings of public health research informed by reductionist and fragmented biomedical approaches and the emergence of wicked problems are fueling a renewed interest in ecological approaches in public health. Despite the central role of interdisciplinarity in the context of ecological approaches in public health research, inadequate attention has been given to the specific challenge of doing interdisciplinary research in practice. As a result, important knowledge gaps exist with regards to the practice of interdisciplinary research. We argue that explicit attention towards the challenge of doing interdisciplinary research is critical in order to effectively apply ecological approaches to public health issues. This paper draws on our experiences developing and conducting an interdisciplinary research project exploring the links among climate change, water, and health to highlight five specific insights which we see as relevant to building capacity for interdisciplinary research specifically, and which have particular relevance to addressing the integrative challenges demanded by ecological approaches to address public health issues. These lessons include: (i) the need for frameworks that facilitate integration; (ii) emphasize learning-by-doing; (iii) the benefits of examining issues at multiple scales; (iv) make the implicit, explicit; and (v) the need for reflective practice. By synthesizing and sharing experiences gained by engaging in interdisciplinary inquiries using an ecological approach, this paper responds to a growing need to build interdisciplinary research capacity as a means for advancing the ecological public health agenda more broadly.

  19. Building Interdisciplinary Research Capacity: a Key Challenge for Ecological Approaches in Public Health

    PubMed Central

    Galway, Lindsay P.; Parkes, Margot W.; Allen, Diana; Takaro, Tim K.

    2016-01-01

    The shortcomings of public health research informed by reductionist and fragmented biomedical approaches and the emergence of wicked problems are fueling a renewed interest in ecological approaches in public health. Despite the central role of interdisciplinarity in the context of ecological approaches in public health research, inadequate attention has been given to the specific challenge of doing interdisciplinary research in practice. As a result, important knowledge gaps exist with regards to the practice of interdisciplinary research. We argue that explicit attention towards the challenge of doing interdisciplinary research is critical in order to effectively apply ecological approaches to public health issues. This paper draws on our experiences developing and conducting an interdisciplinary research project exploring the links among climate change, water, and health to highlight five specific insights which we see as relevant to building capacity for interdisciplinary research specifically, and which have particular relevance to addressing the integrative challenges demanded by ecological approaches to address public health issues. These lessons include: (i) the need for frameworks that facilitate integration; (ii) emphasize learning-by-doing; (iii) the benefits of examining issues at multiple scales; (iv) make the implicit, explicit; and (v) the need for reflective practice. By synthesizing and sharing experiences gained by engaging in interdisciplinary inquiries using an ecological approach, this paper responds to a growing need to build interdisciplinary research capacity as a means for advancing the ecological public health agenda more broadly. PMID:29546171

  20. 23 CFR 450.210 - Interested parties, public involvement, and consultation.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... opportunities for public review and comment at key decision points. (1) The State's public involvement process... agencies, representatives of public transportation employees, freight shippers, private providers of... comment at key decision points, including but not limited to a reasonable opportunity to comment on the...

  1. 23 CFR 450.210 - Interested parties, public involvement, and consultation.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... opportunities for public review and comment at key decision points. (1) The State's public involvement process... agencies, representatives of public transportation employees, freight shippers, private providers of... comment at key decision points, including but not limited to a reasonable opportunity to comment on the...

  2. 23 CFR 450.210 - Interested parties, public involvement, and consultation.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... opportunities for public review and comment at key decision points. (1) The State's public involvement process... agencies, representatives of public transportation employees, freight shippers, private providers of... comment at key decision points, including but not limited to a reasonable opportunity to comment on the...

  3. Key Data on Education in Europe 2012

    ERIC Educational Resources Information Center

    Ranguelov, Stanislav; De Coster, Isabelle; Norani, Sogol; Paolini, Giulia

    2012-01-01

    Key Data on Education in Europe 2012 is a Eurydice flagship publication tracing the main developments of European education systems over the last decade. The report combines statistical data with qualitative information to describe the organisation, management and functioning of 37 European education systems from pre-primary to higher education.…

  4. Root architecture simulation improves the inference from seedling root phenotyping towards mature root systems.

    PubMed

    Zhao, Jiangsan; Bodner, Gernot; Rewald, Boris; Leitner, Daniel; Nagel, Kerstin A; Nakhforoosh, Alireza

    2017-02-01

    Root phenotyping provides trait information for plant breeding. A shortcoming of high-throughput root phenotyping is the limitation to seedling plants and failure to make inferences on mature root systems. We suggest root system architecture (RSA) models to predict mature root traits and overcome the inference problem. Sixteen pea genotypes were phenotyped in (i) seedling (Petri dishes) and (ii) mature (sand-filled columns) root phenotyping platforms. The RSA model RootBox was parameterized with seedling traits to simulate the fully developed root systems. Measured and modelled root length, first-order lateral number, and root distribution were compared to determine key traits for model-based prediction. No direct relationship in root traits (tap, lateral length, interbranch distance) was evident between phenotyping systems. RootBox significantly improved the inference over phenotyping platforms. Seedling plant tap and lateral root elongation rates and interbranch distance were sufficient model parameters to predict genotype ranking in total root length with an RSpearman of 0.83. Parameterization including uneven lateral spacing via a scaling function substantially improved the prediction of architectures underlying the differently sized root systems. We conclude that RSA models can solve the inference problem of seedling root phenotyping. RSA models should be included in the phenotyping pipeline to provide reliable information on mature root systems to breeding research. © The Author 2017. Published by Oxford University Press on behalf of the Society for Experimental Biology.

  5. Root architecture simulation improves the inference from seedling root phenotyping towards mature root systems

    PubMed Central

    Zhao, Jiangsan; Rewald, Boris; Leitner, Daniel; Nagel, Kerstin A.; Nakhforoosh, Alireza

    2017-01-01

    Abstract Root phenotyping provides trait information for plant breeding. A shortcoming of high-throughput root phenotyping is the limitation to seedling plants and failure to make inferences on mature root systems. We suggest root system architecture (RSA) models to predict mature root traits and overcome the inference problem. Sixteen pea genotypes were phenotyped in (i) seedling (Petri dishes) and (ii) mature (sand-filled columns) root phenotyping platforms. The RSA model RootBox was parameterized with seedling traits to simulate the fully developed root systems. Measured and modelled root length, first-order lateral number, and root distribution were compared to determine key traits for model-based prediction. No direct relationship in root traits (tap, lateral length, interbranch distance) was evident between phenotyping systems. RootBox significantly improved the inference over phenotyping platforms. Seedling plant tap and lateral root elongation rates and interbranch distance were sufficient model parameters to predict genotype ranking in total root length with an RSpearman of 0.83. Parameterization including uneven lateral spacing via a scaling function substantially improved the prediction of architectures underlying the differently sized root systems. We conclude that RSA models can solve the inference problem of seedling root phenotyping. RSA models should be included in the phenotyping pipeline to provide reliable information on mature root systems to breeding research. PMID:28168270

  6. KEY COMPARISON: Final report on CCQM-K69 key comparison: Testosterone glucuronide in human urine

    NASA Astrophysics Data System (ADS)

    Liu, Fong-Ha; Mackay, Lindsey; Murby, John

    2010-01-01

    The CCQM-K69 key comparison of testosterone glucuronide in human urine was organized under the auspices of the CCQM Organic Analysis Working Group (OAWG). The National Measurement Institute Australia (NMIA) acted as the coordinating laboratory for the comparison. The samples distributed for the key comparison were prepared at NMIA with funding from the World Anti-Doping Agency (WADA). WADA granted the approval for this material to be used for the intercomparison provided the distribution and handling of the material were strictly controlled. Three national metrology institutes (NMIs)/designated institutes (DIs) developed reference methods and submitted data for the key comparison along with two other laboratories who participated in the parallel pilot study. A good selection of analytical methods and sample workup procedures was displayed in the results submitted considering the complexities of the matrix involved. The comparability of measurement results was successfully demonstrated by the participating NMIs. Only the key comparison data were used to estimate the key comparison reference value (KCRV), using the arithmetic mean approach. The reported expanded uncertainties for results ranged from 3.7% to 6.7% at the 95% level of confidence and all results agreed within the expanded uncertainty of the KCRV. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  7. GuiaTreeKey, a multi-access electronic key to identify tree genera in French Guiana.

    PubMed

    Engel, Julien; Brousseau, Louise; Baraloto, Christopher

    2016-01-01

    The tropical rainforest of Amazonia is one of the most species-rich ecosystems on earth, with an estimated 16000 tree species. Due to this high diversity, botanical identification of trees in the Amazon is difficult, even to genus, often requiring the assistance of parataxonomists or taxonomic specialists. Advances in informatics tools offer a promising opportunity to develop user-friendly electronic keys to improve Amazonian tree identification. Here, we introduce an original multi-access electronic key for the identification of 389 tree genera occurring in French Guiana terra-firme forests, based on a set of 79 morphological characters related to vegetative, floral and fruit characters. Its purpose is to help Amazonian tree identification and to support the dissemination of botanical knowledge to non-specialists, including forest workers, students and researchers from other scientific disciplines. The electronic key is accessible with the free access software Xper ², and the database is publicly available on figshare: https://figshare.com/s/75d890b7d707e0ffc9bf (doi: 10.6084/m9.figshare.2682550).

  8. Superior accuracy of model-based radiostereometric analysis for measurement of polyethylene wear

    PubMed Central

    Stilling, M.; Kold, S.; de Raedt, S.; Andersen, N. T.; Rahbek, O.; Søballe, K.

    2012-01-01

    Objectives The accuracy and precision of two new methods of model-based radiostereometric analysis (RSA) were hypothesised to be superior to a plain radiograph method in the assessment of polyethylene (PE) wear. Methods A phantom device was constructed to simulate three-dimensional (3D) PE wear. Images were obtained consecutively for each simulated wear position for each modality. Three commercially available packages were evaluated: model-based RSA using laser-scanned cup models (MB-RSA), model-based RSA using computer-generated elementary geometrical shape models (EGS-RSA), and PolyWare. Precision (95% repeatability limits) and accuracy (Root Mean Square Errors) for two-dimensional (2D) and 3D wear measurements were assessed. Results The precision for 2D wear measures was 0.078 mm, 0.102 mm, and 0.076 mm for EGS-RSA, MB-RSA, and PolyWare, respectively. For the 3D wear measures the precision was 0.185 mm, 0.189 mm, and 0.244 mm for EGS-RSA, MB-RSA, and PolyWare respectively. Repeatability was similar for all methods within the same dimension, when compared between 2D and 3D (all p > 0.28). For the 2D RSA methods, accuracy was below 0.055 mm and at least 0.335 mm for PolyWare. For 3D measurements, accuracy was 0.1 mm, 0.2 mm, and 0.3 mm for EGS-RSA, MB-RSA and PolyWare respectively. PolyWare was less accurate compared with RSA methods (p = 0.036). No difference was observed between the RSA methods (p = 0.10). Conclusions For all methods, precision and accuracy were better in 2D, with RSA methods being superior in accuracy. Although less accurate and precise, 3D RSA defines the clinically relevant wear pattern (multidirectional). PolyWare is a good and low-cost alternative to RSA, despite being less accurate and requiring a larger sample size. PMID:23610688

  9. Codevelopment of externalizing and internalizing symptoms in middle to late childhood: Sex, baseline respiratory sinus arrhythmia, and respiratory sinus arrhythmia reactivity as predictors

    PubMed Central

    Hinnant, J. Benjamin; EL-Sheikh, Mona

    2013-01-01

    We investigated the roles of sex and respiratory sinus arrhythmia (RSA), an index of autonomic parasympathetic nervous system activity, as predictors of codeveloping externalizing and internalizing symptoms in middle childhood. We expected that sex, baseline RSA (RSA-B), and RSA reactivity (RSA-R) to two types of tasks would interact to differentiate co-occurring trajectories of symptoms. We tested these hypotheses by combining longitudinal data from two independent samples (n = 390; 210 girls, 180 boys) with repeated measures at ages 8, 9, 10, and 11. RSA-R was measured in response to a socially stressful and frustrating stressor. Indicators of growth in externalizing and internalizing symptoms were derived from multiple domain growth models and used in person-centered growth mixture analyses. Three groups of externalizing and internalizing trajectories were found. Profile membership was predicted by several two-way interactions among sex, RSA-B, or RSA-R but was not predicted by three-way interactions. Children with low RSA-B and strong RSA withdrawal, girls with low RSA-B, and girls with strong RSA withdrawal were more likely to be on a developmental trajectory of low externalizing symptoms and moderately elevated internalizing symptoms. Membership in the high externalizing and high internalizing trajectory was predicted by weak RSA withdrawal for boys and strong RSA withdrawal for girls. The type of stressor task also played a role in predicting probability of profile membership. Results are discussed in the context of developmental psychobiology and implications for the codevelopment of psychopathology symptoms in childhood. PMID:23627954

  10. KEY COMPARISON: CCQM-K21 Key Comparison Determination of pp’-DDT in fish oil

    NASA Astrophysics Data System (ADS)

    Webb, K. S.; Carter, D.; Wolff Briche, C. S. J.

    2003-01-01

    A key comparison on the determination of (pp'-dichlorodiphenyl) trichloroethane (pp'-DDT) in a fish oil matrix has been successfully completed. Nine NMIs participated in this key comparison and used the technique of isotope dilution gas-chromatography mass spectrometry (ID/GC/MS) for the determinations. Two samples (A and B) of fish oil were distributed to participants, each gravimetrically spiked with pp'-DDT. The KCRV for Sample A is 0.0743 +/- 0.0020 µg g-1 and that of Sample B is 0.1655 +/- 0.0014 µg g-1 of pp'-DDT in fish oil. The results for Sample A showed a RSD of 3.5%, the RSD for Sample B was within 1%. These results were an improvement over those of the corresponding pilot study (CCQM-P21), where at a mass fraction of pp'-DDT in fish oil of 0.311 µg g-1 the RSD was 2.6%. The compound pp'-DDT is a typical organochlorine pesticide and this key comparison has shown that NMIs have the ability to measure such compounds at levels typically found in the environment. The compound (pp'-dichlorodiphenyl) dichloroethylene (pp'-DDE), a metabolite of pp'-DDT, was the subject of a previous key comparison (CCQM-K5). The compound pp'-DDT is technically more challenging than that of pp'-DDE since it can decompose during the measurement procedure. Consequently the success of this key comparison, combined with that of CCQM-K5 demonstrates a broad measurement capability by NMIs for organochlorine compounds in the environment. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the Mutual Recognition Arrangement (MRA).

  11. Respiratory Sinus Arrhythmia Moderates the Relation between Parent-Adolescent Relationship Quality and Adolescents' Social Adjustment.

    PubMed

    Van der Graaff, Jolien; Meeus, Wim; de Wied, Minet; van Boxtel, Anton; van Lier, Pol; Branje, Susan

    2016-02-01

    This 2-wave longitudinal study aimed (1) to investigate whether high resting RSA predicted adolescents' lower externalizing behavior and higher empathic concern, and (2) to address the potential moderating role of resting RSA in the association between parent-adolescent relationship quality and adolescents' externalizing behavior and empathic concern. In a sample of 379 adolescents (212 boys, 167 girls), resting RSA was assessed during a laboratory session, and adolescents reported on parental support, negative interaction with parents, empathic concern and externalizing behavior during a home visit. We found no support for high resting RSA predicting low externalizing behavior or high empathic concern. However, in line with our hypotheses, we did find several instances of RSA functioning as a moderator, although the interaction patterns varied. First, negative interaction with parents was a negative predictor of externalizing behavior for girls low in resting RSA, whereas the association was non-significant for girls with high RSA. Second, higher negative interaction with parents predicted lower empathic concern for boys high in resting RSA, whereas the association was reversed for boys with low resting RSA. Third, parental support was a positive predictor of empathic concern for girls high in resting RSA, whereas the association was non-significant for girls low in resting RSA. The findings suggest that adolescents with different levels of resting RSA respond differentially to relationship quality with parents.

  12. Assessment of ventilatory thresholds during graded and maximal exercise test using time varying analysis of respiratory sinus arrhythmia.

    PubMed

    Blain, G; Meste, O; Bouchard, T; Bermon, S

    2005-07-01

    To test whether ventilatory thresholds, measured during an exercise test, could be assessed using time varying analysis of respiratory sinus arrhythmia frequency (f(RSA)). Fourteen sedentary subjects and 12 endurance athletes performed a graded and maximal exercise test on a cycle ergometer: initial load 75 W (sedentary subjects) and 150 W (athletes), increments 37.5 W/2 min. f(RSA) was extracted from heart period series using an evolutive model. First (T(V1)) and second (T(V2)) ventilatory thresholds were determined from the time course curves of ventilation and ventilatory equivalents for O(2) and CO(2). f(RSA) was accurately extracted from all recordings and positively correlated to respiratory frequency (r = 0.96 (0.03), p<0.01). In 21 of the 26 subjects, two successive non-linear increases were determined in f(RSA), defining the first (T(RSA1)) and second (T(RSA2)) f(RSA) thresholds. When expressed as a function of power, T(RSA1) and T(RSA2) were not significantly different from and closely linked to T(V1) (r = 0.99, p<0.001) and T(V2) (r = 0.99, p<0.001), respectively. In the five remaining subjects, only one non-linear increase was observed close to T(V2). Significant differences (p<0.04) were found between athlete and sedentary groups when T(RSA1) and T(RSA2) were expressed in terms of absolute and relative power and percentage of maximal aerobic power. In the sedentary group, T(RSA1) and T(RSA2) were 150.3 (18.7) W and 198.3 (28.8) W, respectively, whereas in the athlete group T(RSA1) and T(RSA2) were 247.3 (32.8) W and 316.0 (28.8) W, respectively. Dynamic analysis of f(RSA) provides a useful tool for identifying ventilatory thresholds during graded and maximal exercise test in sedentary subjects and athletes.

  13. Sex Differences in the Contribution of Respiratory Sinus Arrhythmia and Trauma to Children's Psychopathology.

    PubMed

    Gray, Sarah A O; Theall, Katherine; Lipschutz, Rebecca; Drury, Stacy

    2017-03-01

    Respiratory sinus arrhythmia (RSA), a marker of parasympathetic activity, has been shown to moderate the relation between adversity and child behavioral outcomes; however, this work has been conducted in primarily Caucasian samples and limited in focus to family-level adversity. The current analysis extends the previous literature to examine the co-contribution of exposure to potentially traumatic events (PTEs), baseline RSA, and RSA withdrawal to internalizing and externalizing behavior in a sample of primarily African American youth ( n = 92) recruited using neighborhood mapping techniques from communities high in epidemiological indicators of adversity. Exposure to PTEs was associated with lower baseline RSA. Complex interactions were observed between sex of the child, baseline RSA and RSA withdrawal, and PTE exposure predicting to internalizing behaviors. Among girls with high (4+) levels of PTEs, high baseline RSA and RSA withdrawal predicted higher internalizing; for RSA withdrawal only, the inverse was observed for girls with low PTE exposure, for whom high RSA withdrawal predicted lower internalizing. No associations were observed from RSA to externalizing, or among boys to internalizing. Findings are consistent with distinct patterns among primarily African American samples and suggest the need for sex-specific conceptualizations of the link between environmental adversity, physiological reactivity, and internalizing behaviors.

  14. Sex Differences in the Contribution of Respiratory Sinus Arrhythmia and Trauma to Children’s Psychopathology

    PubMed Central

    Gray, Sarah A. O.; Theall, Katherine; Lipschutz, Rebecca; Drury, Stacy

    2016-01-01

    Respiratory sinus arrhythmia (RSA), a marker of parasympathetic activity, has been shown to moderate the relation between adversity and child behavioral outcomes; however, this work has been conducted in primarily Caucasian samples and limited in focus to family-level adversity. The current analysis extends the previous literature to examine the co-contribution of exposure to potentially traumatic events (PTEs), baseline RSA, and RSA withdrawal to internalizing and externalizing behavior in a sample of primarily African American youth (n = 92) recruited using neighborhood mapping techniques from communities high in epidemiological indicators of adversity. Exposure to PTEs was associated with lower baseline RSA. Complex interactions were observed between sex of the child, baseline RSA and RSA withdrawal, and PTE exposure predicting to internalizing behaviors. Among girls with high (4+) levels of PTEs, high baseline RSA and RSA withdrawal predicted higher internalizing; for RSA withdrawal only, the inverse was observed for girls with low PTE exposure, for whom high RSA withdrawal predicted lower internalizing. No associations were observed from RSA to externalizing, or among boys to internalizing. Findings are consistent with distinct patterns among primarily African American samples and suggest the need for sex-specific conceptualizations of the link between environmental adversity, physiological reactivity, and internalizing behaviors. PMID:28479668

  15. The Future of Government Funding for Persons with Disabilities: Some Key Factors.

    ERIC Educational Resources Information Center

    Ross, E. Clarke

    1980-01-01

    The paper identifies and discusses key factors associated with government funding for disabled individuals. An introductory section traces the growth of public expenditures in recent years. Five key factors affecting government funding are examined (sample subtopics in parentheses): state government tax and spending limits (Proposition 13 and the…

  16. Continuous distal migration and internal rotation of the C-stem prosthesis without any adverse clinical effects: an RSA study of 33 primary total hip arthroplasties followed for up to ten years.

    PubMed

    von Schewelov, T; Carlsson, A; Sanzén, L; Besjakov, J

    2014-05-01

    In 2005, we demonstrated that the polished triple-tapered C-stem at two years had migrated distally and rotated internally. From that series, 33 patients have now been followed radiologically, clinically and by radiostereometric analysis (RSA) for up to ten years. The distal migration within the cement mantle had continued and reached a mean of 2 mm (0.5 to 4.0) at ten years. Internal rotation, also within the cement mantle, was a mean 3.8° (external 1.6° to internal 6.6°) The cement mantle did not show any sign of migration or loosening in relation to the femoral bone. There were no clinical or radiological signs indicating that the migration or rotation within the cement mantle had had any adverse effects for the patients.

  17. Key features of an EU health information system: a concept mapping study.

    PubMed

    Rosenkötter, Nicole; Achterberg, Peter W; van Bon-Martens, Marja J H; Michelsen, Kai; van Oers, Hans A M; Brand, Helmut

    2016-02-01

    Despite the acknowledged value of an EU health information system (EU-HISys) and the many achievements in this field, the landscape is still heavily fragmented and incomplete. Through a systematic analysis of the opinions and valuations of public health stakeholders, this study aims to conceptualize key features of an EU-HISys. Public health professionals and policymakers were invited to participate in a concept mapping procedure. First, participants (N = 34) formulated statements that reflected their vision of an EU-HISys. Second, participants (N = 28) rated the relative importance of each statement and grouped conceptually similar ones. Principal Component and cluster analyses were used to condense these results to EU-HISys key features in a concept map. The number of key features and the labelling of the concept map were determined by expert consensus. The concept map contains 10 key features that summarize 93 statements. The map consists of a horizontal axis that represents the relevance of an 'organizational strategy', which deals with the 'efforts' to design and develop an EU-HISys and the 'achievements' gained by a functioning EU-HISys. The vertical axis represents the 'professional orientation' of the EU-HISys, ranging from the 'scientific' through to the 'policy' perspective. The top ranking statement expressed the need to establish a system that is permanent and sustainable. The top ranking key feature focuses on data and information quality. This study provides insights into key features of an EU-HISys. The results can be used to guide future planning and to support the development of a health information system for Europe. © The Author 2015. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.

  18. Public lands - from concept to practice

    Treesearch

    John J. Vrablec

    1977-01-01

    Intensive timber management can and is practiced on National Forest lands in the Northeast. There are, however many constraints and limitations which are placed upon the public lands manager. The key issue here is that the National Forests are PUBLIC lands which must be managed for the public.

  19. KEY COMPARISON: Final report, on-going key comparison BIPM.QM-K1: Ozone at ambient level, comparison with ISCIII, 2007

    NASA Astrophysics Data System (ADS)

    Viallon, Joële; Moussay, Philippe; Wielgosz, Robert; Morillo Gomez, Pilar; Sánchez Blaya, Carmen

    2009-01-01

    As part of the on-going key comparison BIPM.QM-K1, a comparison has been performed between the ozone national standard of the Instituto de Salud Carlos III (ISCIII) and the common reference standard of the key comparison, maintained by the Bureau International des Poids et Mesures (BIPM). The instruments have been compared over a nominal ozone mole fraction range of 0 nmol/mol to 500 nmol/mol. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  20. Automated respiratory sinus arrhythmia measurement: Demonstration using executive function assessment.

    PubMed

    Hegarty-Craver, Meghan; Gilchrist, Kristin H; Propper, Cathi B; Lewis, Gregory F; DeFilipp, Samuel J; Coffman, Jennifer L; Willoughby, Michael T

    2017-08-08

    Respiratory sinus arrhythmia (RSA) is a quantitative metric that reflects autonomic nervous system regulation and provides a physiological marker of attentional engagement that supports cognitive and affective regulatory processes. RSA can be added to executive function (EF) assessments with minimal participant burden because of the commercial availability of lightweight, wearable electrocardiogram (ECG) sensors. However, the inclusion of RSA data in large data collection efforts has been hindered by the time-intensive processing of RSA. In this study we evaluated the performance of an automated RSA-scoring method in the context of an EF study in preschool-aged children. The absolute differences in RSA across both scoring methods were small (mean RSA differences = -0.02-0.10), with little to no evidence of bias for the automated relative to the hand-scoring approach. Moreover, the relative rank-ordering of RSA across both scoring methods was strong (rs = .96-.99). Reliable changes in RSA from baseline to the EF task were highly similar across both scoring methods (96%-100% absolute agreement; Kappa = .83-1.0). On the basis of these findings, the automated RSA algorithm appears to be a suitable substitute for hand-scoring in the context of EF assessment.

  1. ATIP Report: Cyber Security Research in China

    DTIC Science & Technology

    2015-06-05

    vulnerabilities. ATIP Document ID: 150605AR CYBER SECURITY RESEARCH IN CHINA 17 Le GUAN et al. at SKLOIS of IIE, CAS proposed a solution named “ Mimosa ...that protects RSA private keys against the above software-based and physical memory attacks. When the Mimosa service is in idle, private keys are...encrypted and reside in memory as ciphertext. During the cryptographic computing, Mimosa uses hardware transactional memory (HTM) to ensure that (a

  2. Post-processing procedure for industrial quantum key distribution systems

    NASA Astrophysics Data System (ADS)

    Kiktenko, Evgeny; Trushechkin, Anton; Kurochkin, Yury; Fedorov, Aleksey

    2016-08-01

    We present algorithmic solutions aimed on post-processing procedure for industrial quantum key distribution systems with hardware sifting. The main steps of the procedure are error correction, parameter estimation, and privacy amplification. Authentication of classical public communication channel is also considered.

  3. Public Relation and Public Information Inservice Training for Occupational Specialists and Other School Personnel.

    ERIC Educational Resources Information Center

    Kershaw, James T., Ed.

    One of several products developed for a comprehensive program of career development (kindergarten through university) for vocational education in Florida, this manual, consisting of two parts, contains a public relations program to introduce occupation specialists to key publics. Part 1 delineates the procedure for making contacts with the key…

  4. A Market Analysis of Publications, Trade Conferences, and Key Events for Fleet Readiness Center Southwest

    DTIC Science & Technology

    2007-12-01

    Win and Keep Big Customers. Austin: Bard Press, 2005. Kotler , Philip and Kevin Lane Keller. Marketing Management. Upper Saddle River, NJ...stimulate awareness and demand with little or no cost. Kotler and Keller describe public relations and publicity as “a variety of programs designed to...broadcast media to promote something.”13 Kotler and Keller also argue that there is an appeal to the use of public relations and publicity that is based

  5. Cardiac vagal control and children’s adaptive functioning: A meta-analysis

    PubMed Central

    Graziano, Paulo; Derefinko, Karen

    2014-01-01

    Polyvagal theory has influenced research on the role of cardiac vagal control, indexed by respiratory sinus arrhythmia withdrawal (RSA-W) during challenging states, in children’s self-regulation. However, it remains unclear how well RSA-W predicts adaptive functioning (AF) outcomes and whether certain caveats of measuring RSA (e.g., respiration) significantly impact these associations. A meta-analysis of 44 studies (n = 4,996 children) revealed small effect sizes such that greater levels of RSA-W were related to fewer externalizing, internalizing, and cognitive/academic problems. In contrast, RSA-W was differentially related to children’s social problems according to sample type (community vs. clinical/at-risk). The relations between RSA-W and children’s AF outcomes were stronger among studies that co-varied baseline RSA and in Caucasian children (no effect was found for respiration). Children from clinical/at-risk samples displayed lower levels of baseline RSA and RSA-W compared to children from community samples. Theoretical/practical implications for the study of cardiac vagal control are discussed. PMID:23648264

  6. The Role of Prenatal Substance Exposure and Early Adversity on Parasympathetic Functioning from 3 to 6 Years of Age

    PubMed Central

    Abar, Beau; Sheinkopf, Stephen; Lester, Barry; Lagasse, Linda; Seifer, Ronald; Shankaran, Seetha; Bada-Ellzey, Henrietta; Bauer, Charles; Whitaker, Toni; Hinckley, Matt; Hammond, Jane; Higgins, Rosemary

    2014-01-01

    We employed latent growth curve analysis to examine trajectories of respiratory sinus arrhythmia (RSA) from 3 to 6 years among children with varying levels of prenatal substance exposure and early adversity. Data were drawn from a prospective longitudinal study of prenatal substance exposure that included 1,121 participants. Baseline RSA and RSA reactivity to an attention-demanding task were assessed at 3, 4, 5, and 6 years. Overall, there were significant individual differences in the trajectories of RSA reactivity, but not baseline RSA, across development. Greater levels of prenatal substance exposure, and less exposure to early adversity, were associated with increased RSA reactivity at 3 years, but by 6 years, both were associated with greater RSA reactivity. Prenatal substance exposure had an indirect influence through early adversity on growth in RSA reactivity. Results are in support of and contribute to the framework of allostatic load. PMID:24002807

  7. Marital Conflict, Allostatic Load, and the Development of Children's Fluid Cognitive Performance

    PubMed Central

    Hinnant, J. Benjamin; El-Sheikh, Mona; Keiley, Margaret; Buckhalt, Joseph A.

    2013-01-01

    Relations between marital conflict, children’s respiratory sinus arrhythmia (RSA), and fluid cognitive performance were examined over three years to assess allostatic processes. Participants were 251 children reporting on marital conflict, baseline RSA and RSA reactivity to a lab challenge were recorded, and fluid cognitive performance was measured using the Woodcock-Johnson III. A cross-lagged model showed that higher levels of marital conflict at age 8 predicted weaker RSA-R at age 9 for children with lower baseline RSA. A growth model showed that lower baseline RSA in conjunction with weaker RSA-R predicted the slowest development of fluid cognitive performance. Findings suggest that stress may affect development of physiological systems regulating attention, which are tied to the development of fluid cognitive performance. PMID:23534537

  8. Coregulation of Respiratory Sinus Arrhythmia between Parents and Preschoolers: Differences by Children’s Externalizing Problems

    PubMed Central

    Lunkenheimer, Erika; Tiberio, Stacey S.; Buss, Kristin A.; Lucas-Thompson, Rachel G.; Boker, Steven M.; Timpe, Zachary C.

    2015-01-01

    The coordination of physiological processes between parents and infants is thought to support behaviors critical for infant adaptation, but we know little about parent-child physiological coregulation during the preschool years. The present study examined whether time-varying changes in parent and child respiratory sinus arrhythmia (RSA) exhibited coregulation (across-person dynamics) accounting for individual differences in parent and child RSA, and whether there were differences in these parasympathetic processes by children’s externalizing problems. Mother-child dyads (N=47; Child age M=3½ years) engaged in three laboratory tasks (free play, clean up, puzzle task) for 18 min, during which RSA data were collected. Multilevel coupled autoregressive models revealed that mothers and preschoolers showed positive coregulation of RSA such that changes in mother RSA predicted changes in the same direction in child RSA and vice versa, controlling for the stability of within-person RSA over time and individual differences in overall mean RSA. However, when children’s externalizing behaviors were higher, coregulation was negative such that changes in real-time mother and child RSA showed divergence rather than positive concordance. Results suggest that mothers and preschoolers do coregulate RSA during real-time interactions, but that children’s higher externalizing behavior problems are related to disruptions in these processes. PMID:25976070

  9. Dynamic changes in parent affect and adolescent cardiac vagal regulation: a real-time analysis.

    PubMed

    Cui, Lixian; Morris, Amanda Sheffield; Harrist, Amanda W; Larzelere, Robert E; Criss, Michael M

    2015-04-01

    The current study explored the role of parents' negative and positive affect in adolescent respiratory sinus arrhythmia (RSA) reactivity during a parent-adolescent conflict discussion task and the moderating effects of adolescent sex and age. Questionnaire data were collected from 206 adolescents (10-18 years of age; M = 13.37 years) and their primary caregivers (83.3% biological mothers). Electrocardiogram and respiration data were collected from adolescents, and RSA variables were computed. Parent affect was coded during the conflict discussion task. Multilevel modeling was used to distinguish the between- and within-individual effects of parent affect on adolescent RSA. Results indicated that observed within-parent-teen dyad anger was negatively associated with adolescent RSA, controlling for previous-minute RSA level, particularly among adolescents 13 years and older. In addition, observed between-dyad positive affect was positively linked to RSA for both boys and girls when previous-minute RSA level was controlled. Within-dyad positive affect was positively related to girl's RSA only. These findings suggest that expressions of positive affect may be related to better vagal regulation (RSA increases), whereas expressions of anger may be related to poor vagal regulation (RSA decreases) during social engagement. (c) 2015 APA, all rights reserved).

  10. Coregulation of respiratory sinus arrhythmia between parents and preschoolers: differences by children's externalizing problems.

    PubMed

    Lunkenheimer, Erika; Tiberio, Stacey S; Buss, Kristin A; Lucas-Thompson, Rachel G; Boker, Steven M; Timpe, Zachary C

    2015-12-01

    The coordination of physiological processes between parents and infants is thought to support behaviors critical for infant adaptation, but we know little about parent-child physiological coregulation during the preschool years. The present study examined whether time-varying changes in parent and child respiratory sinus arrhythmia (RSA) exhibited coregulation (across-person dynamics) accounting for individual differences in parent and child RSA, and whether there were differences in these parasympathetic processes by children's externalizing problems. Mother-child dyads (N = 47; Child age M = 3½ years) engaged in three laboratory tasks (free play, clean up, puzzle task) for 18 min, during which RSA data were collected. Multilevel coupled autoregressive models revealed that mothers and preschoolers showed positive coregulation of RSA such that changes in mother RSA predicted changes in the same direction in child RSA and vice versa, controlling for the stability of within-person RSA over time and individual differences in overall mean RSA. However, when children's externalizing behaviors were higher, coregulation was negative such that changes in real-time mother and child RSA showed divergence rather than positive concordance. Results suggest that mothers and preschoolers do coregulate RSA during real-time interactions, but that children's higher externalizing behavior problems are related to disruptions in these processes. © 2015 Wiley Periodicals, Inc.

  11. Performance and Metabolic Demand of a New Repeated-Sprint Ability Test in Basketball Players: Does the Number of Changes of Direction Matter?

    PubMed

    Zagatto, Alessandro M; Ardigò, Luca P; Barbieri, Fabio A; Milioni, Fabio; Dello Iacono, Antonio; Camargo, Bruno H F; Padulo, Johnny

    2017-09-01

    Zagatto, AM, Ardigò, LP, Barbieri, FA, Milioni, F, Dello Iacono, A, Camargo, BHF, and Padulo, J. Performance and metabolic demand of a new repeated-sprint ability test in basketball players: does the number of changes of direction matter? J Strength Cond Res 31(9): 2438-2446, 2017-This study compared 2 repeated-sprint ability (RSA) tests in basketball players. Both tests included 10 × 30-m sprints, with the difference that the previously validated test (RSA2COD) featured 2 changes of direction (COD) per sprint, whereas the experimental test (RSA5COD) featured 5 CODs per sprint. Test performances and metabolic demands were specifically assessed in 20 basketball players. First, RSA5COD test-retest reliability was investigated. Then, RSA2COD, RSA5COD sprint times, peak speeds, oxygen uptake (V[Combining Dot Above]O2) and posttest blood lactate concentration [La] were measured. The RSA5COD results showed to be reliable. RSA2COD performance resulted better than the RSA5COD version (p < 0.01), with shorter sprint times and higher peak speeds. Over sprints, the tests did not differ from each other in terms of V[Combining Dot Above]O2 (p > 0.05). Over whole bout, the RSA2COD was more demanding than the RSA5COD, considering overall metabolic power requirement (i.e., VO2-driven + [La]-driven components). Given that RSA5COD (a) mimics real game-play as sprint distance and action change frequency/direction and (b) has the same metabolic expenditure per task completion as metabolic cost, RSA5COD is a valuable option for players and coaches for training basketball-specific agility and assessing bioenergetic demands.

  12. Quantum cryptography using coherent states: Randomized encryption and key generation

    NASA Astrophysics Data System (ADS)

    Corndorf, Eric

    With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic

  13. 25 CFR 292.2 - How are key terms defined in this part?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true How are key terms defined in this part? 292.2 Section 292... LANDS ACQUIRED AFTER OCTOBER 17, 1988 General Provisions § 292.2 How are key terms defined in this part... property interest claimed by an individual or entity (private, public, or governmental); and (3) Either...

  14. 25 CFR 292.2 - How are key terms defined in this part?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false How are key terms defined in this part? 292.2 Section 292... LANDS ACQUIRED AFTER OCTOBER 17, 1988 General Provisions § 292.2 How are key terms defined in this part... property interest claimed by an individual or entity (private, public, or governmental); and (3) Either...

  15. 25 CFR 292.2 - How are key terms defined in this part?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false How are key terms defined in this part? 292.2 Section 292... LANDS ACQUIRED AFTER OCTOBER 17, 1988 General Provisions § 292.2 How are key terms defined in this part... property interest claimed by an individual or entity (private, public, or governmental); and (3) Either...

  16. Respiratory Sinus Arrhythmia: A Transdiagnostic Biomarker of Emotion Dysregulation and Psychopathology

    PubMed Central

    Beauchaine, Theodore P.

    2015-01-01

    In the past two decades, respiratory sinus arrhythmia (RSA)—an index of parasympathetic nervous system (PNS)-mediated cardiac control—has emerged as a reliable peripheral biomarker of emotion regulation (ER). Reduced RSA and excessive RSA reactivity (i.e., withdrawal) to emotional challenge are observed consistently among individuals with poor ER capabilities, including those with various forms of internalizing and externalizing psychopathology, and those with specific psychopathological syndromes, including anxiety, phobias, attention problems, autism, callousness, conduct disorder, depression, non-suicidal self-injury, panic disorder, and trait hostility. Emerging evidence suggests that low RSA and excessive RSA reactivity index poor ER because they are downstream peripheral markers of prefrontal cortex (PFC) dysfunction. Poorly modulated inhibitory efferent pathways from the medial PFC to the PNS result in reduced RSA and excessive RSA reactivity. According to this perspective, RSA is a non-invasive proxy for poor executive control over behavior, which characterizes most forms of psychopathology. PMID:25866835

  17. X-Ray Computed Tomography Reveals the Response of Root System Architecture to Soil Texture1[OPEN

    PubMed Central

    Rogers, Eric D.; Monaenkova, Daria; Mijar, Medhavinee; Goldman, Daniel I.

    2016-01-01

    Root system architecture (RSA) impacts plant fitness and crop yield by facilitating efficient nutrient and water uptake from the soil. A better understanding of the effects of soil on RSA could improve crop productivity by matching roots to their soil environment. We used x-ray computed tomography to perform a detailed three-dimensional quantification of changes in rice (Oryza sativa) RSA in response to the physical properties of a granular substrate. We characterized the RSA of eight rice cultivars in five different growth substrates and determined that RSA is the result of interactions between genotype and growth environment. We identified cultivar-specific changes in RSA in response to changing growth substrate texture. The cultivar Azucena exhibited low RSA plasticity in all growth substrates, whereas cultivar Bala root depth was a function of soil hardness. Our imaging techniques provide a framework to study RSA in different growth environments, the results of which can be used to improve root traits with agronomic potential. PMID:27208237

  18. Images Encryption Method using Steganographic LSB Method, AES and RSA algorithm

    NASA Astrophysics Data System (ADS)

    Moumen, Abdelkader; Sissaoui, Hocine

    2017-03-01

    Vulnerability of communication of digital images is an extremely important issue nowadays, particularly when the images are communicated through insecure channels. To improve communication security, many cryptosystems have been presented in the image encryption literature. This paper proposes a novel image encryption technique based on an algorithm that is faster than current methods. The proposed algorithm eliminates the step in which the secrete key is shared during the encryption process. It is formulated based on the symmetric encryption, asymmetric encryption and steganography theories. The image is encrypted using a symmetric algorithm, then, the secret key is encrypted by means of an asymmetrical algorithm and it is hidden in the ciphered image using a least significant bits steganographic scheme. The analysis results show that while enjoying the faster computation, our method performs close to optimal in terms of accuracy.

  19. Continuing professional development for medical, nursing, and midwifery cadres in Malawi, Tanzania and South Africa: A qualitative evaluation

    PubMed Central

    Pintye, Jillian; Jacob, Sheena; Chung, Michael H.; Middleton, Lyn; Iliffe, Jill; Kim, H. Nina

    2017-01-01

    Background As innovations in the prevention and treatment of HIV and TB advance, continuing professional development (CPD) of health care workers (HCWs) remains a high priority, particularly in sub-Saharan Africa where dual TB/HIV epidemics are compounded by severe HCW shortages. There is further need to examine CPD programs to identify challenges and effective solutions to strengthen HIV/TB-related CPD. Methods Qualitative evaluations in Malawi, Tanzania and South Africa (RSA) were conducted using key informant interviews (KIIs) and focus group discussions (FGDs) in each country to identify barriers and enablers of effective HIV/TB-related CPD. Key stakeholders represented CPD implementers, regulators, and developers. HCWs were purposively sampled from high disease burden districts; each HCW completed brief, semi-structured questionnaires and participated in a FGD. KII and FGD results were combined into key themes spanning across countries using a grounded theory approach. Results Fifty-two KIIs were conducted: 17 in Malawi, 19 in Tanzania and 16 in RSA. Eighty-nine HCWs (24 from Malawi, 38 from Tanzania and 27 from RSA) completed questionnaires and participated in FGDs. Primarily, lack of sustainable financial resources and limitations in coordination of CPD result in poor accountability for CPD oversight and reduce CPD quality assurance. Healthcare worker shortages limit CPD opportunities, creating disparities in CPD access. CPD irrelevance and imbalance between HCW-identified CPD needs and current programs reduce enthusiasm for CPD. Facility-level constraints, including poor infrastructure and weak supply chains, restrict implementation of CPD skills and knowledge. Challenges are more severe in rural settings. Conclusion To address identified gaps, sustainable funding, strong leadership and collaboration at every level are needed to strengthen CPD regulation and accreditation systems; increase CPD accessibility in the workplace; and create enabling environments

  20. Continuing professional development for medical, nursing, and midwifery cadres in Malawi, Tanzania and South Africa: A qualitative evaluation.

    PubMed

    Feldacker, Caryl; Pintye, Jillian; Jacob, Sheena; Chung, Michael H; Middleton, Lyn; Iliffe, Jill; Kim, H Nina

    2017-01-01

    As innovations in the prevention and treatment of HIV and TB advance, continuing professional development (CPD) of health care workers (HCWs) remains a high priority, particularly in sub-Saharan Africa where dual TB/HIV epidemics are compounded by severe HCW shortages. There is further need to examine CPD programs to identify challenges and effective solutions to strengthen HIV/TB-related CPD. Qualitative evaluations in Malawi, Tanzania and South Africa (RSA) were conducted using key informant interviews (KIIs) and focus group discussions (FGDs) in each country to identify barriers and enablers of effective HIV/TB-related CPD. Key stakeholders represented CPD implementers, regulators, and developers. HCWs were purposively sampled from high disease burden districts; each HCW completed brief, semi-structured questionnaires and participated in a FGD. KII and FGD results were combined into key themes spanning across countries using a grounded theory approach. Fifty-two KIIs were conducted: 17 in Malawi, 19 in Tanzania and 16 in RSA. Eighty-nine HCWs (24 from Malawi, 38 from Tanzania and 27 from RSA) completed questionnaires and participated in FGDs. Primarily, lack of sustainable financial resources and limitations in coordination of CPD result in poor accountability for CPD oversight and reduce CPD quality assurance. Healthcare worker shortages limit CPD opportunities, creating disparities in CPD access. CPD irrelevance and imbalance between HCW-identified CPD needs and current programs reduce enthusiasm for CPD. Facility-level constraints, including poor infrastructure and weak supply chains, restrict implementation of CPD skills and knowledge. Challenges are more severe in rural settings. To address identified gaps, sustainable funding, strong leadership and collaboration at every level are needed to strengthen CPD regulation and accreditation systems; increase CPD accessibility in the workplace; and create enabling environments for CPD implementation. Together

  1. Patient-Centred Care in Canada: Key Components and the Path Forward.

    PubMed

    Montague, Terrence; Gogovor, Amédé; Aylen, John; Ashley, Lisa; Ahmed, Sara; Martin, Lesli; Cochrane, Bonnie; Adams, Owen; Nemis-White, Joanna

    2017-01-01

    Canadians' health and its care continue to evolve. Chronic diseases affect more than 50% of our aging population, but the majority of public and professional stakeholders retain a sense of care quality. An emergent issue, however, is generating an increasingly wide debate. It is the concept of patient-centred care, including its definition of key components, and efficacy. To advance the evidence base, the 2013-2014 and 2016 Health Care in Canada (HCIC) surveys measured pan-stakeholder levels of support and implementation priorities for frequently proposed components of patient centricity in healthcare. The public's highest rated component was timely access to care, followed by perceived respect and caring in its delivery, with decisions made in partnership among patients and professional providers, and within a basic belief that care should be based on patients' needs versus their ability to pay. Health professionals' levels of support for key components largely overlapped the public's levels of support for key components, with an additional accent on care influenced by an evidence base and expert opinion. In terms of priority to actually implement enhanced patient-centred care options, timely access was universally dominant among all stakeholders. Caring, respectful care, also retained high implementation priority among both the public and professionals, as did care decisions made in partnership, and, among professionals, care driven by research and expert opinion. Low priorities, for both the public and professionals, were the actual measurements of patient-centred care delivery and its impact on outcomes. In summary, there is remarkable concordance among all stakeholders in terms of favoured interventions to enhance patient-centred care, namely, timely access, caring, partnering and communicative delivery of evidence-based care. Unfortunately, the lack of contemporary imperative around the value of measuring and reporting actual use and outcomes of favoured

  2. 41 CFR Appendix A to Subpart A of... - 3-Key Points and Principles

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false 3-Key Points and Principles A Appendix A to Subpart A of Part 102 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION GENERAL 3-FEDERAL ADVISORY COMMITTEE...

  3. Authenticity and privacy of a team of mini-UAVs by means of nonlinear recursive shuffling

    NASA Astrophysics Data System (ADS)

    Szu, Harold; Hsu, Ming-Kai; Baier, Patrick; Lee, Ting N.; Buss, James R.; Madan, Rabinder N.

    2006-04-01

    -tolerant Neural Network Associative Memory for the error-resilientconcealment mosaic image chip re-sent. However, the RSA public and private keys, chaos typing and initial value are given on set or sent to each m-UAV so that each platform knows only its private key. AC among 5 team members are possible using a reverse RSA protocol. A hashed image chip is coded by the sender's private key and nobody else knows in order to send to it to neighbors and the receiver can check the content by using the senders public key and compared the decrypted result with on-board image chips. We discover a fundamental problem of digital chaos approach in a finite state machine, of which a fallacy test of a discrete version is needed for a finite number of bits, as James Yorke advocated early. Thus, our proposed chaotic NIS for bits stream protection becomes desirable to further mixing the digital CNN outputs. The fault tolerance and the parallelism of Artificial Neural Network Associative Memory are necessary attributes for the neighborhood smoothness image restoration. The associated computational cost of O(N2) deems to be worthy, because the Chaotic version CNN of N-D can further provide the privacy only for the lost image chip (N=8x8) re-sent requested by its neighbors and the result is better performed than a simple 1-D logistic map. We gave a preliminary design of low end of FPGA firmware that to compute all on board seemed to be possible.

  4. The 39th Annual Phi Delta Kappa/Gallup Poll of the Public's Attitudes toward the Public Schools

    ERIC Educational Resources Information Center

    Rose, Lowell C.; Gallup, Alec M.

    2007-01-01

    In this article, the authors report the results of the 39th Annual Phi Delta Kappa/Gallup Poll of the public's attitudes toward the public schools. This year's report examined the public's assessment of the No Child Left Behind (NCLB) and its principal strategy, standardized testing. The authors include a summary of key findings and tables showing…

  5. 41 CFR Appendix A to Subpart C of... - 3-Key Points and Principles

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Principles A Appendix A to Subpart C of Part 102 Public Contracts and Property Management Federal Property... 102-3—Key Points and Principles This appendix provides additional guidance in the form of answers to frequently asked questions and identifies key points and principles that may be applied to situations not...

  6. Longitudinal Patterns of Autonomic Nervous System Responding to Emotion Evocation among Children with Conduct Problems and/or Depression

    PubMed Central

    Pang, Karen C.; Beauchaine, Theodore P.

    2012-01-01

    Conduct disorder (CD) and depression co-occur at far greater levels than chance, despite largely separate diagnostic criteria. One potential shared mechanism of this comorbidity is emotion dysregulation, which characterizes both internalizing and externalizing disorders. Previous research demonstrates that respiratory sinus arrhythmia (RSA)—a peripheral biomarker of emotion regulation—is attenuated among children with CD, and among children with depression. However, few studies have examined biomarkers of emotion regulation as a function of heterotypic comorbidity. We evaluated longitudinal patterns of RSA and RSA reactivity to emotion evocation across three annual assessments among 207 children diagnosed at ages 8–12 years with CD (n=30), depression (n=28), comorbid CD and depression (n=80), or no psychiatric condition (n=69). Using continuous symptom counts as predictors, Depression × CD interactions were observed for both Time 1 resting RSA and Time 1 RSA reactivity. Conduct disorder, depression, and their interaction were all associated with low resting RSA at Time 1. In addition, concurrently elevated CD and depression scores predicted the greatest RSA reactivity to emotion evocation. Psychopathology scores were unrelated to developmental changes in RSA and RSA reactivity over time. PMID:22826111

  7. Facts about Public Universities: Looking to the Future.

    ERIC Educational Resources Information Center

    National Association of State Universities and Land Grant Colleges, Washington, DC.

    This publication describes key characteristics and statistics on the nation's public universities as they look to the coming century including their role, meeting student needs, maintaining access, obtaining government support, and service the public through outreach and an expanded concept of public service. A section on meeting student needs…

  8. Key-Generation Algorithms for Linear Piece In Hand Matrix Method

    NASA Astrophysics Data System (ADS)

    Tadaki, Kohtaro; Tsujii, Shigeo

    The linear Piece In Hand (PH, for short) matrix method with random variables was proposed in our former work. It is a general prescription which can be applicable to any type of multivariate public-key cryptosystems for the purpose of enhancing their security. Actually, we showed, in an experimental manner, that the linear PH matrix method with random variables can certainly enhance the security of HFE against the Gröbner basis attack, where HFE is one of the major variants of multivariate public-key cryptosystems. In 1998 Patarin, Goubin, and Courtois introduced the plus method as a general prescription which aims to enhance the security of any given MPKC, just like the linear PH matrix method with random variables. In this paper we prove the equivalence between the plus method and the primitive linear PH matrix method, which is introduced by our previous work to explain the notion of the PH matrix method in general in an illustrative manner and not for a practical use to enhance the security of any given MPKC. Based on this equivalence, we show that the linear PH matrix method with random variables has the substantial advantage over the plus method with respect to the security enhancement. In the linear PH matrix method with random variables, the three matrices, including the PH matrix, play a central role in the secret-key and public-key. In this paper, we clarify how to generate these matrices and thus present two probabilistic polynomial-time algorithms to generate these matrices. In particular, the second one has a concise form, and is obtained as a byproduct of the proof of the equivalence between the plus method and the primitive linear PH matrix method.

  9. Marital Conflict, Allostatic Load, and the Development of Children's Fluid Cognitive Performance

    ERIC Educational Resources Information Center

    Hinnant, J. Benjamin; El-Sheikh, Mona; Keiley, Margaret; Buckhalt, Joseph A.

    2013-01-01

    Relations between marital conflict, children's respiratory sinus arrhythmia (RSA), and fluid cognitive performance were examined over 3 years to assess allostatic processes. Participants were 251 children reporting on marital conflict, baseline RSA, and RSA reactivity (RSA-R) to a lab challenge were recorded, and fluid cognitive performance…

  10. A secure transmission scheme of streaming media based on the encrypted control message

    NASA Astrophysics Data System (ADS)

    Li, Bing; Jin, Zhigang; Shu, Yantai; Yu, Li

    2007-09-01

    As the use of streaming media applications increased dramatically in recent years, streaming media security becomes an important presumption, protecting the privacy. This paper proposes a new encryption scheme in view of characteristics of streaming media and the disadvantage of the living method: encrypt the control message in the streaming media with the high security lever and permute and confuse the data which is non control message according to the corresponding control message. Here the so-called control message refers to the key data of the streaming media, including the streaming media header and the header of the video frame, and the seed key. We encrypt the control message using the public key encryption algorithm which can provide high security lever, such as RSA. At the same time we make use of the seed key to generate key stream, from which the permutation list P responding to GOP (group of picture) is derived. The plain text of the non-control message XORs the key stream and gets the middle cipher text. And then obtained one is permutated according to P. In contrast the decryption process is the inverse process of the above. We have set up a testbed for the above scheme and found our scheme is six to eight times faster than the conventional method. It can be applied not only between PCs but also between handheld devices.

  11. What Cultural Values Influence American Public Relations Practitioners?

    ERIC Educational Resources Information Center

    Vasquez, Gabriel M.; Taylor, Maureen

    1999-01-01

    Examines the role of culture as a key variable in public relations research and practice. Finds (1) American practitioners continue to practice one-way models of public relations; and (2) public relations practitioners who have collectivistic values tend to practice two-way models of public relations. Discusses implications for theory and…

  12. Best practices for interacting with the public about wildland fire: Key findings from interviews

    Treesearch

    Daniel Berkman

    2012-01-01

    Interviews were conducted with public information and line officers about wildland fire communications with the public. The goal of these interviews was to determine the best practices and most useful content and format for an annotated bibliography about external wildland fire communications, i.e., does the current literature reviewed address the issues of greatest...

  13. 41 CFR Appendix A to Subpart D of... - 3-Key Points and Principles

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Principles A Appendix A to Subpart D of Part 102 Public Contracts and Property Management Federal Property... Subpart D of Part 102-3—Key Points and Principles This appendix provides additional guidance in the form of answers to frequently asked questions and identifies key points and principles that may be applied...

  14. Transitions in state public health law: comparative analysis of state public health law reform following the Turning Point Model State Public Health Act.

    PubMed

    Meier, Benjamin Mason; Hodge, James G; Gebbie, Kristine M

    2009-03-01

    Given the public health importance of law modernization, we undertook a comparative analysis of policy efforts in 4 states (Alaska, South Carolina, Wisconsin, and Nebraska) that have considered public health law reform based on the Turning Point Model State Public Health Act. Through national legislative tracking and state case studies, we investigated how the Turning Point Act's model legal language has been considered for incorporation into state law and analyzed key facilitating and inhibiting factors for public health law reform. Our findings provide the practice community with a research base to facilitate further law reform and inform future scholarship on the role of law as a determinant of the public's health.

  15. Keys to Success in Raising Funds: An Exchange Classic.

    ERIC Educational Resources Information Center

    Neugebauer, Roger

    2001-01-01

    Details survey of over 100 child care centers about successful and unsuccessful fundraising projects. Highlights ten key factors contributing to success: defining the purpose for fundraising, setting a goal, knowing the audience, making it fun, building on strengths, looking for repeated fundraisers, being cost effective, publicizing aggressively,…

  16. 76 FR 10342 - Notice of Proposed Information Collection Requests

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-24

    ... Protection and Advocacy of Individual Rights (PAIR) Program Performance Report (Form RSA-509) will be used to... protect their legal and human rights. The Rehabilitation Services Administration (RSA) uses the form to... annually using the form, which is due on or before December 30 each year. Form RSA-509 has enabled RSA to...

  17. Key populations and human rights in the context of HIV services rendition in Ghana.

    PubMed

    Laar, Amos; DeBruin, Debra

    2017-08-02

    In line with its half century old penal code, Ghana currently criminalizes and penalizes behaviors of some key populations - populations deemed to be at higher risk of acquiring or transmitting Human Immunodeficiency Virus (HIV). Men who have sex with men (MSM), and sex workers (SWs) fit into this categorization. This paper provides an analysis of how enactment and implementation of rights-limiting laws not only limit rights, but also amplify risk and vulnerability to HIV in key and general populations. The paper derives from a project that assessed the ethics sensitivity of key documents guiding Ghana's response to its HIV epidemic. Assessment was guided by leading frameworks from public health ethics, and relevant articles from the international bill of rights. Ghana's response to her HIV epidemic does not adequately address the rights and needs of key populations. Even though the national response has achieved some public health successes, palpable efforts to address rights issues remain nascent. Ghana's guiding documents for HIV response include no advocacy for decriminalization, depenalization or harm reduction approaches for these key populations. The impact of rights-restricting codes on the nation's HIV epidemic is real: criminalization impedes key populations' access to HIV prevention and treatment services. Given that they are bridging populations, whatever affects the Ghanaian key populations directly, affects the general population indirectly. The right to the highest attainable standard of health, without qualification, is generally acknowledged as a fundamental human right. Unfortunately, this right currently eludes the Ghanaian SW and MSM. The paper endorses decriminalization as a means of promoting this right. In the face of opposition to decriminalization, the paper proposes specific harm reduction strategies as approaches to promote health and uplift the diminished rights of key populations. Thus the authors call on Ghana to remove impediments to

  18. 41 CFR Appendix A to Subpart B of... - 3-Key Points and Principles

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Principles A Appendix A to Subpart B of Part 102 Public Contracts and Property Management Federal Property.... B, App. A Appendix A to Subpart B of Part 102-3—Key Points and Principles This appendix provides... principles that may be applied to situations not covered elsewhere in this subpart. The guidance follows: Key...

  19. Parasympathetic reactivity and disruptive behavior problems in young children during interactions with their mothers and other adults: A preliminary investigation

    PubMed Central

    Cooper-Vince, Christine E.; DeSerisy, Mariah; Cornacchio, Danielle; Sanchez, Amanda; McLaughlin, Katie A.; Comer, Jonathan S.

    2017-01-01

    Parasympathetic nervous system influences on cardiac functions—commonly indexed via respiratory sinus arrhythmia (RSA)—are central to self-regulation. RSA suppression during challenging emotional and cognitive tasks is often associated with better emotional and behavioral functioning in preschoolers. However, the links between RSA suppression and child behavior across various challenging interpersonal contexts remains unclear. The present study experimentally evaluated the relationship between child RSA reactivity to adult (mother vs. study staff) direction and disruptive behavior problems in children ages 3–8 with varying levels of disruptive behavior problems (N=43). Reduced RSA suppression in the context of mothers’ play-based direction was associated with more severe child behavior problems. In contrast, RSA suppression in the context of staff play-based direction was not associated with behavior problems. Findings suggest that the association between RSA suppression and child behavior problems may vary by social context (i.e., mother vs. other adult direction-givers). Findings are discussed in regard to RSA as an indicator of autonomic self-regulation that has relevance to child disruptive behavior problems. PMID:28261792

  20. X-Ray Computed Tomography Reveals the Response of Root System Architecture to Soil Texture.

    PubMed

    Rogers, Eric D; Monaenkova, Daria; Mijar, Medhavinee; Nori, Apoorva; Goldman, Daniel I; Benfey, Philip N

    2016-07-01

    Root system architecture (RSA) impacts plant fitness and crop yield by facilitating efficient nutrient and water uptake from the soil. A better understanding of the effects of soil on RSA could improve crop productivity by matching roots to their soil environment. We used x-ray computed tomography to perform a detailed three-dimensional quantification of changes in rice (Oryza sativa) RSA in response to the physical properties of a granular substrate. We characterized the RSA of eight rice cultivars in five different growth substrates and determined that RSA is the result of interactions between genotype and growth environment. We identified cultivar-specific changes in RSA in response to changing growth substrate texture. The cultivar Azucena exhibited low RSA plasticity in all growth substrates, whereas cultivar Bala root depth was a function of soil hardness. Our imaging techniques provide a framework to study RSA in different growth environments, the results of which can be used to improve root traits with agronomic potential. © 2016 American Society of Plant Biologists. All Rights Reserved.

  1. Public Health 3.0: A Call to Action for Public Health to Meet the Challenges of the 21st Century

    PubMed Central

    Wang, Y. Claire; Harris, Andrea; Auerbach, John; Koo, Denise; O’Carroll, Patrick

    2017-01-01

    Public health is what we do together as a society to ensure the conditions in which everyone can be healthy. Although many sectors play key roles, governmental public health is an essential component. Recent stressors on public health are driving many local governments to pioneer a new Public Health 3.0 model in which leaders serve as Chief Health Strategists, partnering across multiple sectors and leveraging data and resources to address social, environmental, and economic conditions that affect health and health equity. In 2016, the US Department of Health and Human Services launched the Public Health 3.0 initiative and hosted listening sessions across the country. Local leaders and community members shared successes and provided insight on actions that would ensure a more supportive policy and resource environment to spread and scale this model. This article summarizes the key findings from those listening sessions and recommendations to achieve Public Health 3.0. PMID:28880837

  2. Public Health 3.0: A Call to Action for Public Health to Meet the Challenges of the 21st Century.

    PubMed

    DeSalvo, Karen B; Wang, Y Claire; Harris, Andrea; Auerbach, John; Koo, Denise; O'Carroll, Patrick

    2017-09-07

    Public health is what we do together as a society to ensure the conditions in which everyone can be healthy. Although many sectors play key roles, governmental public health is an essential component. Recent stressors on public health are driving many local governments to pioneer a new Public Health 3.0 model in which leaders serve as Chief Health Strategists, partnering across multiple sectors and leveraging data and resources to address social, environmental, and economic conditions that affect health and health equity. In 2016, the US Department of Health and Human Services launched the Public Health 3.0 initiative and hosted listening sessions across the country. Local leaders and community members shared successes and provided insight on actions that would ensure a more supportive policy and resource environment to spread and scale this model. This article summarizes the key findings from those listening sessions and recommendations to achieve Public Health 3.0.

  3. New Public Management and Education

    ERIC Educational Resources Information Center

    Tolofari, Sowaribi

    2005-01-01

    Public administration has always been under constant review. Such reviews were mostly parochial, incremental, initiated or driven by low-key staff and often ended as fads. From the end of the 1970s to the 1990s, however, governments around the world were engaged in widespread and sustained reforms of their public administration. These reforms were…

  4. Variation in Relations with Environmental Publics.

    ERIC Educational Resources Information Center

    Grunig, Larissa A.

    1987-01-01

    Examines how successful public relations practitioners are in dealing with pressure groups and the government. Compares their relationship with key publics and the relationship they enjoy with other, perhaps less threatening entities such as suppliers, the media, and stockholders. Compares relationships across types of organizations. (NKA)

  5. Fundamental rate-loss tradeoff for optical quantum key distribution.

    PubMed

    Takeoka, Masahiro; Guha, Saikat; Wilde, Mark M

    2014-10-24

    Since 1984, various optical quantum key distribution (QKD) protocols have been proposed and examined. In all of them, the rate of secret key generation decays exponentially with distance. A natural and fundamental question is then whether there are yet-to-be discovered optical QKD protocols (without quantum repeaters) that could circumvent this rate-distance tradeoff. This paper provides a major step towards answering this question. Here we show that the secret key agreement capacity of a lossy and noisy optical channel assisted by unlimited two-way public classical communication is limited by an upper bound that is solely a function of the channel loss, regardless of how much optical power the protocol may use. Our result has major implications for understanding the secret key agreement capacity of optical channels-a long-standing open problem in optical quantum information theory-and strongly suggests a real need for quantum repeaters to perform QKD at high rates over long distances.

  6. Key enablers to facilitate healthy behavior change: workshop summary.

    PubMed

    Teyhen, Deydre S; Aldag, Matt; Centola, Damon; Edinborough, Elton; Ghannadian, Jason D; Haught, Andrea; Jackson, Theresa; Kinn, Julie; Kunkler, Kevin J; Levine, Betty; Martindale, Valerie E; Neal, David; Snyder, Leslie B; Styn, Mindi A; Thorndike, Frances; Trabosh, Valerie; Parramore, David J

    2014-05-01

    The increases in preventable chronic diseases and the rising costs of health care are unsustainable. The US Army Surgeon General's vision to transition from a health care system to a system of health requires the identification of key health enablers to facilitate the adoption of healthy behaviors. In support of this vision, the US Army Telemedicine and Advanced Technology Research Center hosted a workshop in April 2013 titled "Incentives to Create and Sustain Change for Health." Members of government and academia participated to identify key health enablers that could ultimately be leveraged by technology. The key health enablers discussed included (1) public health messaging, (2) changing health habits and the environmental influence on health, (3) goal setting and tracking, (4) the role of incentives in behavior-change intervention, and (5) the role of peer and social networks on change. This report summarizes leading evidence and the group consensus on evidence-based practices with respect to the key enablers in creating healthy behavior change.

  7. Biofeedback assisted control of respiratory sinus arrhythmia as a biobehavioral intervention for depressive symptoms in patients after cardiac surgery: a preliminary study.

    PubMed

    Patron, Elisabetta; Messerotti Benvenuti, Simone; Favretto, Giuseppe; Valfrè, Carlo; Bonfà, Carlotta; Gasparotto, Renata; Palomba, Daniela

    2013-03-01

    The current study investigated whether biofeedback training aimed at increasing respiratory sinus arrhythmia (RSA), a measure of cardiac vagal modulation, can reduce depressive symptoms in patients after cardiac surgery. This randomized controlled study enrolled 26 patients after first-time cardiac surgery. The patients were randomly assigned to an RSA-biofeedback group (N = 13) or to a treatment as usual group (N = 13). The biofeedback training consisted of five 45 min sessions designed to increase RSA. The outcome was assessed as changes in RSA and in the Centre for Epidemiologic Studies of Depression (CES-D) values from pre- to post-training. Both groups were comparable for demographic and biomedical characteristics. RSA increased significantly in patients who underwent RSA-biofeedback compared to controls. Moreover, the CES-D scores were reduced significantly from pre- to post-training in the RSA-biofeedback group compared to the controls. Changes in RSA were inversely related to changes in CES-D scores from pre- to post-training. These findings extend the effectiveness of RSA-biofeedback for increasing vagal modulation as well as for reducing depressive symptoms in post-surgical patients. Overall, the current study also suggests that this biobehavioral intervention may add to the efficacy of postoperative risk reduction programs and rehabilitation protocols in cardiac surgery patients.

  8. Florida's Opinion on K-12 Public Education Spending

    ERIC Educational Resources Information Center

    Forster, Greg

    2006-01-01

    This scientifically representative poll of 1,200 Floridians finds that public opinion about K-12 public education spending is seriously misinformed. Floridians think public schools need more money, but the main reason is that they are badly mistaken about how much money the public schools actually get. Key findings of the study include: (1) Half…

  9. Distributed Data Networks That Support Public Health Information Needs.

    PubMed

    Tabano, David C; Cole, Elizabeth; Holve, Erin; Davidson, Arthur J

    Data networks, consisting of pooled electronic health data assets from health care providers serving different patient populations, promote data sharing, population and disease monitoring, and methods to assess interventions. Better understanding of data networks, and their capacity to support public health objectives, will help foster partnerships, expand resources, and grow learning health systems. We conducted semistructured interviews with 16 key informants across the United States, identified as network stakeholders based on their respective experience in advancing health information technology and network functionality. Key informants were asked about their experience with and infrastructure used to develop data networks, including each network's utility to identify and characterize populations, usage, and sustainability. Among 11 identified data networks representing hundreds of thousands of patients, key informants described aggregated health care clinical data contributing to population health measures. Key informant interview responses were thematically grouped to illustrate how networks support public health, including (1) infrastructure and information sharing; (2) population health measures; and (3) network sustainability. Collaboration between clinical data networks and public health entities presents an opportunity to leverage infrastructure investments to support public health. Data networks can provide resources to enhance population health information and infrastructure.

  10. Accountability in district nursing practice: key concepts.

    PubMed

    Griffith, Richard

    2015-03-01

    Public trust and confidence in district nurses is essential to the nurse-patient relationship that underpins effective care and treatment. That trust and confidence has even greater focus for district nurses who care for patients in their own homes. Those patients need to be able to count on the professionalism and probity of their district nurses. The professionalism and probity of district nurses is based on their accountability, which protects the public by imposing standards on district nurses and holds them answerable for their acts and omissions. This is the first of a series of articles on accountability in district nursing practice to mark the introduction of the revised Nursing and Midwifery Code on the 31 March 2015. This month's article considers the key concepts of accountability.

  11. Key-value store with internal key-value storage interface

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or moremore » batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.« less

  12. The contributions of early adverse experiences and trajectories of respiratory sinus arrhythmia on the development of neurobehavioral disinhibition among children with prenatal substance exposure

    PubMed Central

    Conradt, Elisabeth; Degarmo, David; Fisher, Phil; Abar, Beau; Lester, Barry M.; Lagasse, Linda L.; Shankaran, Seetha; Bada, Henrietta; Bauer, Charles R.; Whitaker, Toni M.; Hammond, Jane A.

    2015-01-01

    Neurobehavioral disinhibition (ND) is a complex condition reflecting a wide range of problems involving difficulties with emotion regulation and behavior control. Respiratory sinus arrhythmia (RSA) is a physiological correlate of emotion regulation that has been studied in a variety of at-risk populations; however, there are no studies of RSA in children with ND. Data were drawn from a prospective longitudinal study of prenatal substance exposure that included 1,073 participants. Baseline RSA and RSA reactivity to an attention-demanding task were assessed at 3, 4, 5, and 6 years. ND was assessed at ages 8/9, 11, and 13/14 years via behavioral dysregulation and executive dysfunction composite measures. Greater exposure to early adversity was related to less RSA reactivity at 3 years, increases in RSA reactivity from ages 3 to 6 years, and increased behavioral dysregulation from ages 8/9 to 13/14. RSA reactivity was examined as a moderator of the association between early adversity and changes in ND. A significant Early Adversity × RSA Reactivity quadratic interaction revealed that children with decelerations in RSA reactivity exhibited increases in behavioral dysregulation, regardless of their exposure to early adversity. However, greater exposure to early adversity was related to greater increases in behavioral dysregulation, but only if children exhibited accelerations in RSA reactivity from ages 3 to 6 years. The results contribute to our understanding of how interactions across multiple levels of analysis contribute to the development of ND. PMID:24909973

  13. Public-private relationships in biobanking: a still underestimated key component of open innovation.

    PubMed

    Hofman, Paul; Bréchot, Christian; Zatloukal, Kurt; Dagher, Georges; Clément, Bruno

    2014-01-01

    Access to human bioresources is essential to the understanding of human diseases and to the discovery of new biomarkers aimed at improving the diagnosis, prognosis, and the predictive response of patients to treatments. The use of biospecimens is strictly controlled by ethical assessment, which complies with the laws of the country. These laws regulate the partnerships between the biobanks and industrial actors. However, private-public partnerships (PPP) can be limiting for several reasons, which can hamper the discovery of new biological tests and new active molecules targeted to human diseases. The bottlenecks and roadblocks in establishing these partnerships include: poor organization of the biobank in setting up PPP, evaluation of the cost of human samples, the absence of experience on the public side in setting up contracts with industry, and the fact that public and private partners may not share the same objectives. However, it is critical, in particular for academic biobanks, to establish strong PPP to accelerate translational research for the benefits of patients, and to allow the sustainability of the biobank. The purpose of this review is to discuss the main bottlenecks and roadblocks that can hamper the establishment of PPP based on solid and trusting relationships.

  14. The Effects of Distraction and Reappraisal On Children's Parasympathetic Regulation of Sadness and Fear

    PubMed Central

    Davis, Elizabeth L.; Quiñones-Camacho, Laura; Buss, Kristin A.

    2015-01-01

    Children commonly experience negative emotions like sadness and fear, and much recent empirical attention has been devoted to understanding the factors supporting and predicting effective emotion regulation. Respiratory sinus arrhythmia (RSA), a cardiac index of parasympathetic function, has emerged as a key physiological correlate of children's self-regulation. But, little is known about how children's use of specific cognitive emotion regulation strategies corresponds to concurrent parasympathetic regulation (i.e., RSA reactivity while watching an emotion-eliciting video). The current study describes an experimental paradigm in which 101 5- to 6-year-olds were randomly assigned to one of three different emotion regulation conditions (Control, Distraction, Reappraisal). All children watched a sad and a scary film (order counterbalanced), and children in the Distraction and Reappraisal conditions received instructions to deploy the target strategy to manage sadness/fear while they watched. Consistent with predictions, children assigned to use either emotion regulation strategy showed greater RSA augmentation from baseline than children in the Control condition (all children showed an overall increase in RSA levels from baseline), suggesting enhanced parasympathetic calming when children used Distraction or Reappraisal to regulate sadness and fear. But, this pattern was found only among children who viewed the sad film before the scary film. Among children who viewed the scary film first, Reappraisal promoted marginally better parasympathetic regulation of fear (no condition differences emerged for parasympathetic regulation of sadness when the sad film was viewed second). Results are discussed in terms of their implications for our understanding of children's emotion regulation and affective physiology. PMID:26601786

  15. Decreased heart rate and enhanced sinus arrhythmia during interictal sleep demonstrate autonomic imbalance in generalized epilepsy

    PubMed Central

    Sivakumar, Siddharth S.; Namath, Amalia G.; Tuxhorn, Ingrid E.; Lewis, Stephen J.

    2016-01-01

    We hypothesized that epilepsy affects the activity of the autonomic nervous system even in the absence of seizures, which should manifest as differences in heart rate variability (HRV) and cardiac cycle. To test this hypothesis, we investigated ECG traces of 91 children and adolescents with generalized epilepsy and 25 neurologically normal controls during 30 min of stage 2 sleep with interictal or normal EEG. Mean heart rate (HR) and high-frequency HRV corresponding to respiratory sinus arrhythmia (RSA) were quantified and compared. Blood pressure (BP) measurements from physical exams of all subjects were also collected and analyzed. RSA was on average significantly stronger in patients with epilepsy, whereas their mean HR was significantly lower after adjusting for age, body mass index, and sex, consistent with increased parasympathetic tone in these patients. In contrast, diastolic (and systolic) BP at rest was not significantly different, indicating that the sympathetic tone is similar. Remarkably, five additional subjects, initially diagnosed as neurologically normal but with enhanced RSA and lower HR, eventually developed epilepsy, suggesting that increased parasympathetic tone precedes the onset of epilepsy in children. ECG waveforms in epilepsy also displayed significantly longer TP intervals (ventricular diastole) relative to the RR interval. The relative TP interval correlated positively with RSA and negatively with HR, suggesting that these parameters are linked through a common mechanism, which we discuss. Altogether, our results provide evidence for imbalanced autonomic function in generalized epilepsy, which may be a key contributing factor to sudden unexpected death in epilepsy. PMID:26888110

  16. Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment

    NASA Astrophysics Data System (ADS)

    Hassan, Waleed K.; Al-Assam, Hisham

    2017-05-01

    The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.

  17. Respiratory Sinus Arrhythmia Activity Predicts Internalizing and Externalizing Behaviors in Non-referred Boys

    PubMed Central

    Zhang, Wei; Fagan, Shawn E.; Gao, Yu

    2017-01-01

    Atypical respiratory sinus arrhythmia (RSA), a biomarker of emotion dysregulation, is associated with both externalizing and internalizing behaviors. In addition, social adversity and gender may moderate this association. In this study, we investigated if RSA (both resting RSA and RSA reactivity in an emotion regulation task) predicts externalizing and/or internalizing behaviors and the extent to which social adversity moderates this relationship. Two hundred and fifty-three children (at Time 1, mean age = 9.05, SD = 0.60, 48% boys) and their caregivers from the community participated in this study. Resting RSA and RSA reactivity were assessed, and caregivers reported children’s externalizing and internalizing behaviors at both Time 1 and Time 2 (1 year later). We found that lower resting RSA (but not RSA reactivity) at Time 1 was associated with increased externalizing and internalizing behaviors at Time 2 in boys, even after controlling for the effects of Time 1 behavioral problems and Time 2 age. Moreover, there was a significant interaction effect between Time 1 resting RSA and social adversity such that lower resting RSA predicted higher externalizing and internalizing behaviors in boys only under conditions of high social adversity. Follow-up analyses revealed that these predictive effects were stronger for externalizing behavior than for internalizing behavior. No significant effects were found for girls. Our findings provide further evidence that low resting RSA may be a transdiagnostic biomarker of emotion dysregulation and a predisposing risk factor for both types of behavior problems, in particular for boys who grow up in adverse environments. We conclude that biosocial interaction effects and gender differences should be considered when examining the etiological mechanisms of child psychopathology. PMID:28955262

  18. Sustaining Arts Programs in Public Education

    ERIC Educational Resources Information Center

    Dunstan, David

    2016-01-01

    The purpose of this qualitative research case study was to investigate leadership and funding decisions that determine key factors responsible for sustaining arts programs in public schools. While the educational climate, financial constraints, and standardized testing continue to impact arts programs in public education, Eastland High School, the…

  19. Private vs. Public Higher Education Budgeting

    ERIC Educational Resources Information Center

    Beamer, Sarah A.

    2011-01-01

    Private higher education institutions are those entities owned and operated by the private sector, while public institutions are those established, supported, and controlled by a governmental agency, most often a state. Key differences exist between private and public institutions that affect budgeting in critical ways. Such differences include…

  20. Transitions in State Public Health Law: Comparative Analysis of State Public Health Law Reform Following the Turning Point Model State Public Health Act

    PubMed Central

    Meier, Benjamin Mason; Gebbie, Kristine M.

    2009-01-01

    Given the public health importance of law modernization, we undertook a comparative analysis of policy efforts in 4 states (Alaska, South Carolina, Wisconsin, and Nebraska) that have considered public health law reform based on the Turning Point Model State Public Health Act. Through national legislative tracking and state case studies, we investigated how the Turning Point Act's model legal language has been considered for incorporation into state law and analyzed key facilitating and inhibiting factors for public health law reform. Our findings provide the practice community with a research base to facilitate further law reform and inform future scholarship on the role of law as a determinant of the public's health. PMID:19150900

  1. Optimizing root system architecture in biofuel crops for sustainable energy production and soil carbon sequestration.

    PubMed

    To, Jennifer Pc; Zhu, Jinming; Benfey, Philip N; Elich, Tedd

    2010-09-08

    Root system architecture (RSA) describes the dynamic spatial configuration of different types and ages of roots in a plant, which allows adaptation to different environments. Modifications in RSA enhance agronomic traits in crops and have been implicated in soil organic carbon content. Together, these fundamental properties of RSA contribute to the net carbon balance and overall sustainability of biofuels. In this article, we will review recent data supporting carbon sequestration by biofuel crops, highlight current progress in studying RSA, and discuss future opportunities for optimizing RSA for biofuel production and soil carbon sequestration.

  2. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD aremore » extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.« less

  3. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  4. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2015-01-06

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  5. Wikipedia: a key tool for global public health promotion.

    PubMed

    Heilman, James M; Kemmann, Eckhard; Bonert, Michael; Chatterjee, Anwesh; Ragar, Brent; Beards, Graham M; Iberri, David J; Harvey, Matthew; Thomas, Brendan; Stomp, Wouter; Martone, Michael F; Lodge, Daniel J; Vondracek, Andrea; de Wolff, Jacob F; Liber, Casimir; Grover, Samir C; Vickers, Tim J; Meskó, Bertalan; Laurent, Michaël R

    2011-01-31

    The Internet has become an important health information resource for patients and the general public. Wikipedia, a collaboratively written Web-based encyclopedia, has become the dominant online reference work. It is usually among the top results of search engine queries, including when medical information is sought. Since April 2004, editors have formed a group called WikiProject Medicine to coordinate and discuss the English-language Wikipedia's medical content. This paper, written by members of the WikiProject Medicine, discusses the intricacies, strengths, and weaknesses of Wikipedia as a source of health information and compares it with other medical wikis. Medical professionals, their societies, patient groups, and institutions can help improve Wikipedia's health-related entries. Several examples of partnerships already show that there is enthusiasm to strengthen Wikipedia's biomedical content. Given its unique global reach, we believe its possibilities for use as a tool for worldwide health promotion are underestimated. We invite the medical community to join in editing Wikipedia, with the goal of providing people with free access to reliable, understandable, and up-to-date health information.

  6. Wikipedia: A Key Tool for Global Public Health Promotion

    PubMed Central

    Heilman, James M; Kemmann, Eckhard; Bonert, Michael; Chatterjee, Anwesh; Ragar, Brent; Beards, Graham M; Iberri, David J; Harvey, Matthew; Thomas, Brendan; Stomp, Wouter; Martone, Michael F; Lodge, Daniel J; Vondracek, Andrea; de Wolff, Jacob F; Liber, Casimir; Grover, Samir C; Vickers, Tim J; Meskó, Bertalan

    2011-01-01

    The Internet has become an important health information resource for patients and the general public. Wikipedia, a collaboratively written Web-based encyclopedia, has become the dominant online reference work. It is usually among the top results of search engine queries, including when medical information is sought. Since April 2004, editors have formed a group called WikiProject Medicine to coordinate and discuss the English-language Wikipedia’s medical content. This paper, written by members of the WikiProject Medicine, discusses the intricacies, strengths, and weaknesses of Wikipedia as a source of health information and compares it with other medical wikis. Medical professionals, their societies, patient groups, and institutions can help improve Wikipedia’s health-related entries. Several examples of partnerships already show that there is enthusiasm to strengthen Wikipedia’s biomedical content. Given its unique global reach, we believe its possibilities for use as a tool for worldwide health promotion are underestimated. We invite the medical community to join in editing Wikipedia, with the goal of providing people with free access to reliable, understandable, and up-to-date health information. PMID:21282098

  7. Training Public Health Advisors.

    PubMed

    Meyer, Pamela A; Brusuelas, Kristin M; Baden, Daniel J; Duncan, Heather L

    2015-01-01

    Federal public health advisors provide guidance and assistance to health departments to improve public health program work. The Centers for Disease Control and Prevention (CDC) prepares them with specialized training in administering public health programs. This article describes the evolving training and is based on internal CDC documents and interviews. The first federal public health advisors worked in health departments to assist with controlling syphilis after World War II. Over time, more CDC prevention programs hired them. To meet emerging needs, 3 major changes occurred: the Public Health Prevention Service, a fellowship program, in 1999; the Public Health Associate Program in 2007; and integration of those programs. Key components of the updated training are competency-based training, field experience, supervision, recruitment and retention, and stakeholder support. The enduring strength of the training has been the experience in a public health agency developing practical skills for program implementation and management.

  8. Interviewing Key Informants: Strategic Planning for a Global Public Health Management Program

    ERIC Educational Resources Information Center

    Kun, Karen E.; Kassim, Anisa; Howze, Elizabeth; MacDonald, Goldie

    2013-01-01

    The Centers for Disease Control and Prevention's Sustainable Management Development Program (SMDP) partners with low- and middle-resource countries to develop management capacity so that effective global public health programs can be implemented and better health outcomes can be achieved. The program's impact however, was variable. Hence, there…

  9. Building Public Health Ontario: experience in developing a new public health agency.

    PubMed

    Goel, Vivek

    2012-06-05

    The history and development of Ontario's new public health agency, Public Health Ontario, is explored. The governance model and organizational structure are identified along with an overview of the relationship with the Ontario Ministry of Health and Long-Term Care. The strategic mission and vision are described as are the key functions. The building of the organization through new investments and divestments is explained. The paper concludes with an overview of the challenges encountered and the opportunities ahead.

  10. Florida Keys

    NASA Image and Video Library

    2002-12-13

    The Florida Keys are a chain of islands, islets and reefs extending from Virginia Key to the Dry Tortugas for about 309 kilometers (192 miles). The keys are chiefly limestone and coral formations. The larger islands of the group are Key West (with its airport), Key Largo, Sugarloaf Key, and Boca Chica Key. A causeway extends from the mainland to Key West. This image was acquired on October 28, 2001, by the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) on NASA's Terra satellite. With its 14 spectral bands from the visible to the thermal infrared wavelength region, and its high spatial resolution of 15 to 90 meters (about 50 to 300 feet), ASTER images Earth to map and monitor the changing surface of our planet. http://photojournal.jpl.nasa.gov/catalog/PIA03890

  11. Examining the relation between respiratory sinus arrhythmia and depressive symptoms in emerging adults: A longitudinal study.

    PubMed

    Yaptangco, Mona; Crowell, Sheila E; Baucom, Brian R; Bride, Daniel L; Hansen, Erik J

    2015-09-01

    Major depressive disorder (MDD) is a debilitating and prevalent disorder associated with lower quality of life and substantial economic burden. Recently, there has been strong interest in respiratory sinus arrhythmia (RSA) as a biological predictor of later depression. Theoretical work suggests that higher resting RSA indexes physiological flexibility and better emotion regulation whereas lower RSA may mark vulnerability for psychopathology. However, empirical findings have varied. This study examined whether lower resting RSA predicted later depressive symptoms in a sample of healthy young adults across one year (n=185). Results indicate that year one (Y1) resting RSA predicted Y2 depressive symptoms. This finding remained significant when accounting for the stability of RSA and depressive symptoms across both time points and when including trait anxiety, body mass index, and medication use in statistical models. Findings provide further support for RSA as a promising biological marker for understanding and predicting depressive symptoms. Copyright © 2015 Elsevier B.V. All rights reserved.

  12. Associations between narcissism and emotion regulation difficulties: Respiratory sinus arrhythmia reactivity as a moderator.

    PubMed

    Zhang, Hui; Wang, Zhenhong; You, Xuqun; Lü, Wei; Luo, Yun

    2015-09-01

    The aim of the current study was to examine the direct and interactive effects of two types of narcissism (overt and covert) and respiratory sinus arrhythmia (RSA) reactivity on emotion regulation difficulties in 227 undergraduate students. Overt and covert narcissism and emotion regulation difficulties were assessed with self-report measures (narcissistic personality inventory (NPI)-16, hypersensitive narcissism scale (HSNS), and difficulties in emotion regulation scale (DERS)), and physiological data were measured during the baseline, stress (a public-speaking task), and recovery periods in the laboratory. Results indicated that overt narcissism was negatively related to a lack of emotional awareness and emotional clarity, whereas covert narcissism was positively related to overall emotion regulation difficulties, nonacceptance of emotional responses, impulse control difficulties, limited access to emotion regulation strategies, and a lack of emotional clarity. RSA reactivity in response to a mock job interview moderated the associations between covert narcissism (as a predictor) and overall emotion regulation difficulties and impulse control difficulties (as outcomes). This finding showed that a greater stress-induced RSA decrease may serve as a protective factor and ameliorate the effect of covert narcissism on individuals' emotion regulation difficulties. Copyright © 2015 Elsevier B.V. All rights reserved.

  13. Women with recurrent spontaneous abortion have decreased 25(OH) vitamin D and VDR at the fetal-maternal interface.

    PubMed

    Li, N; Wu, H M; Hang, F; Zhang, Y S; Li, M J

    2017-09-12

    Immunological mechanisms have been proposed to underlie the pathogenesis of recurrent spontaneous abortion (RSA). Vitamin D has a potent immunomodulatory effect, which may affect pregnancy outcome. The objective of this study was to investigate 25-hydroxyvitamin D [25(OH) D] concentration and vitamin D receptor (VDR) expression in the decidual tissues of RSA patients. Thirty women with RSA (RSA group) and thirty women undergoing elective abortion (control group) were recruited during 2016 from gynecology outpatient clinics. We measured 25(OH) D, interleukin (IL)-17, IL-23, transforming growth factor β (TGF-β), VDR and 1-α-hydroxylase (CYP27B1) in decidual tissues collected during the abortion procedure. In the RSA group, 25(OH) D and TGF-β were significantly decreased while IL-17 and IL-23 were significantly increased compared with the control group. VDR expression was significantly decreased in the RSA group compared with the control group. Logistic regression analysis showed a significant negative correlation between 25(OH) D in decidual tissues and RSA. These results indicated that vitamin D concentrations in the decidua are associated with inflammatory cytokine production, suggesting that vitamin D and VDR may play a role in the etiology of RSA.

  14. Behavior Problems among Cocaine Exposed Children: Role of Physiological Regulation and Parenting

    PubMed Central

    Finger, Brent; Schuetze, Pamela; Eiden, Rina D.

    2014-01-01

    This study examined interrelations between prenatal cocaine exposure, child autonomic regulation, parenting behavior and child sex on parent-reported behavior problems at 36 months of age. We hypothesized that respiratory sinus arrhythmia (RSA)1 at 13 months of age would mediate the relation between cocaine exposure and behavior problems. We also hypothesized that child sex, maternal negative affect, and maternal sensitivity observed at 13 months of age would moderate the relation between RSA and behavior problems. Results revealed that cocaine exposure predicted low baseline RSA and low RSA withdrawal during a negative affect task. Low baseline RSA, in turn, predicted fewer behavior problems offering support for an indirect association between cocaine exposure and behavior problems. The association between baseline RSA and behavior problems was further moderated by maternal negative affect such that high baseline RSA was more strongly related to behavior problems under conditions of high compared to low maternal negative affect. Results also revealed a near significant trend for baseline RSA to be more strongly related to behavior problems among boys than girls. These findings highlight several possible pathways toward behavior problems among cocaine exposed children. PMID:24480789

  15. Defining the public, defining sociology: hybrid science-public relations and boundary-work in early American sociology.

    PubMed

    Evans, Michael S

    2009-01-01

    In this paper, I examine how scientific disciplines define their boundaries by defining the publics with whom they engage. The case study is an episode in the development of early American sociology. In response to the dual challenge of credibility set up by the conflict between religious Baconian science and secular positivist science, key actors engaged in specific strategies of boundary-work to create their desired "sociological public"--a hybrid form of science-public relations that appealed to hostile university scientists while excluding a supportive religious audience from participation in the production of scientific knowledge. Using this case, I offer two specific insights. First I illustrate how, in the pursuit of scientific credibility, actors engage in boundary-work to differentiate audiences, not just practitioners. Such defining of publics is constitutive of scientific disciplines in their formative stage. Second, I demonstrate how audience boundaries can be redefined through the capture of existing boundary objects. Specifically, the removal of informational content in key boundary objects creates durable boundaries that are difficult to overcome.

  16. Two-party quantum key agreement with five-particle entangled states

    NASA Astrophysics Data System (ADS)

    He, Ye-Feng; Ma, Wen-Ping

    A two-party quantum key agreement protocol is proposed with five-particle entangled states and the delayed measurement technique. According to the measurement correlation property of five-particle entangled states, two participants can deduce the measurement results of each other’s initial quantum states. As a result, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Thus, a shared key is fairly established. Since each particle is transmitted only once in quantum channel, the protocol is congenitally free from the Trojan horse attacks. It is shown that the protocol not only is secure against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.

  17. Differential Susceptibility and the Early Development of Aggression: Interactive Effects of Respiratory Sinus Arrhythmia and Environmental Quality

    PubMed Central

    Eisenberg, Nancy; Sulik, Michael J.; Spinrad, Tracy L.; Edwards, Alison; Eggum, Natalie D.; Liew, Jeffrey; Sallquist, Julie; Popp, Tierney K.; Smith, Cynthia L.; Hart, Daniel

    2012-01-01

    The purpose of the current study was to predict the development of aggressive behavior from young children’s respiratory sinus arrhythmia (RSA) and environmental quality. In a longitudinal sample of 213 children, baseline RSA, RSA suppression in response to a film of crying babies, and a composite measure of environmental quality (incorporating socioeconomic status and marital adjustment) were measured, and parent-reported aggression was assessed from 18 to 54 months of age. Predictions based on biological sensitivity-to-context/differential susceptibility and diathesis-stress models, as well as potential moderation by child sex, were examined. The interaction of baseline RSA with environmental quality predicted the development (slope) and 54-month intercept of mothers’ reports of aggression. For girls only, the interaction between baseline RSA and environmental quality predicted the 18-month intercept of fathers’ reports. In general, significant negative relations between RSA and aggression were found primarily at high levels of environmental quality. In addition, we found a significant Sex × RSA interaction predicting the slope and 54-month intercept of fathers’ reports of aggression, such that RSA was negatively related to aggression for boys but not for girls. Contrary to predictions, no significant main effects or interactions were found for RSA suppression. The results provide mixed but not full support for differential susceptibility theory and provide little support for the diathesis-stress model. PMID:22182294

  18. HIV epidemic among key populations in west Africa.

    PubMed

    Djomand, Gaston; Quaye, Silas; Sullivan, Patrick S

    2014-09-01

    Globally, HIV infection remains a significant issue for key populations such as men who have sex with men (MSM) and female sex workers. A review of recent articles was conducted for west African countries to assess the burden of disease among female sex workers and MSM, access to services and identify barriers to implementation of services for key populations. In west Africa, key populations engage in high-risk practices for the acquisition of HIV and other sexually transmitted infections. Available HIV prevalence data fluctuate across and within countries for both MSM and female sex workers and may be five to ten times as high as that of the general population. HIV prevalence varied from 15.9% in The Gambia to 68% in Benin among female sex workers, whereas it ranged from 9.8% in The Gambia to 34.9% in Nigeria for MSM. Yet, important data gaps exist, including key populations size estimations in several countries as well as HIV prevalence, incidence and other biomarkers of HIV risk. Because of sociocultural, legal, political and economic challenges, exacerbated by a poor health system infrastructure, the HIV response is not strategically directed toward programs for key populations in countries with concentrated epidemics. Noteworthy is the low coverage of prevention care and treatment interventions offered to key populations. Sufficient planning and political will with legal and structural frameworks that reconcile public health and human rights are needed to prioritize HIV prevention, care and treatment programming for key populations programs in west Africa.

  19. Modeling coding-sequence evolution within the context of residue solvent accessibility.

    PubMed

    Scherrer, Michael P; Meyer, Austin G; Wilke, Claus O

    2012-09-12

    Protein structure mediates site-specific patterns of sequence divergence. In particular, residues in the core of a protein (solvent-inaccessible residues) tend to be more evolutionarily conserved than residues on the surface (solvent-accessible residues). Here, we present a model of sequence evolution that explicitly accounts for the relative solvent accessibility of each residue in a protein. Our model is a variant of the Goldman-Yang 1994 (GY94) model in which all model parameters can be functions of the relative solvent accessibility (RSA) of a residue. We apply this model to a data set comprised of nearly 600 yeast genes, and find that an evolutionary-rate ratio ω that varies linearly with RSA provides a better model fit than an RSA-independent ω or an ω that is estimated separately in individual RSA bins. We further show that the branch length t and the transition-transverion ratio κ also vary with RSA. The RSA-dependent GY94 model performs better than an RSA-dependent Muse-Gaut 1994 (MG94) model in which the synonymous and non-synonymous rates individually are linear functions of RSA. Finally, protein core size affects the slope of the linear relationship between ω and RSA, and gene expression level affects both the intercept and the slope. Structure-aware models of sequence evolution provide a significantly better fit than traditional models that neglect structure. The linear relationship between ω and RSA implies that genes are better characterized by their ω slope and intercept than by just their mean ω.

  20. 76 FR 55656 - Notice of Submission for OMB Review

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-08

    ... Administration (RSA) approval a program improvement plan (PIP) using the on-line form located on the RSA...(c), RSA reviews an agency's progress toward achieving the goals established in the PIP. For this...

  1. Social marketing in public health.

    PubMed

    Grier, Sonya; Bryant, Carol A

    2005-01-01

    Social marketing, the use of marketing to design and implement programs to promote socially beneficial behavior change, has grown in popularity and usage within the public health community. Despite this growth, many public health professionals have an incomplete understanding of the field. To advance current knowledge, we provide a practical definition and discuss the conceptual underpinnings of social marketing. We then describe several case studies to illustrate social marketing's application in public health and discuss challenges that inhibit the effective and efficient use of social marketing in public health. Finally, we reflect on future developments in the field. Our aim is practical: to enhance public health professionals' knowledge of the key elements of social marketing and how social marketing may be used to plan public health interventions.

  2. Denver Public Schools: Resegregation, Latino Style

    ERIC Educational Resources Information Center

    Lee, Chungmei

    2006-01-01

    The Denver Public Schools (DPS) provide a unique opportunity to study the dynamics of school segregation within the context of rapid demographic changes and key policy changes. This paper, the first of two reports, focuses on the dynamics of segregation, demographic changes, and implications for graduation rates in the Denver Public Schools. It…

  3. Speed of recovery after shoulder arthroplasty: a comparison of reverse and anatomic total shoulder arthroplasty.

    PubMed

    Levy, Jonathan C; Everding, Nathan G; Gil, Carlos C; Stephens, Scott; Giveans, M Russell

    2014-12-01

    Whereas patient expectations after anatomic total shoulder arthroplasty (TSA) and reverse shoulder arthroplasty (RSA) relate to sustained improvements in pain, function, and motion, the time necessary to reach these goals is unclear. Our purpose was to investigate the speed of recovery and to compare the effectiveness of primary TSA and RSA. We analyzed (preoperative, 3 month, 6 month, 1-year, and 2-year scores) pain scores, functional scores, and motion for 122 patients treated with primary RSA and 166 patients treated with primary TSA with a minimum of 1 year of follow-up. Comparisons were made to determine the effectiveness of treatment, time required to reach a plateau in improvement, and percentage of overall improvement at 3 and 6 months. Significant improvements were observed for both TSA and RSA at all intervals (P < .001), except with internal rotation for RSA. Pain relief was rapid after both TSA and RSA. TSA patients reached a consistent plateau for pain and function by 6 months and for shoulder elevation by 1 year. RSA patients demonstrated variability with multiple false plateau points. By 6 months, TSA patients had achieved 90% to 100% of functional improvement, whereas RSA patients reached 72% to 91%. The effectiveness of TSA was greater than that of RSA for all measures with the exception of elevation and abduction. Whereas patients treated with primary TSA and RSA can expect rapid improvements in pain, those treated with TSA can anticipate a more consistent and effective recovery of pain, function, and shoulder rotation. Patients receiving RSA can expect a variable length of recovery with greater improvements in forward elevation and abduction. Copyright © 2014 Journal of Shoulder and Elbow Surgery Board of Trustees. Published by Elsevier Inc. All rights reserved.

  4. Higher Education Public Relations at the Year 2000: Assessing the Status of Public Relations at Colleges and Universities.

    ERIC Educational Resources Information Center

    Peyronel, Anthony C.

    2000-01-01

    Discusses the importance of higher education public relations professionals playing a key role in institutional decision making and not being limited to the role of communication technician or information processor. Reviews studies on relationships between higher education and the media and between public relations professionals and…

  5. The accuracy and precision of radiostereometric analysis in upper limb arthroplasty.

    PubMed

    Ten Brinke, Bart; Beumer, Annechien; Koenraadt, Koen L M; Eygendaal, Denise; Kraan, Gerald A; Mathijssen, Nina M C

    2017-06-01

    Background and purpose - Radiostereometric analysis (RSA) is an accurate method for measurement of early migration of implants. Since a relation has been shown between early migration and future loosening of total knee and hip prostheses, RSA plays an important role in the development and evaluation of prostheses. However, there have been few RSA studies of the upper limb, and the value of RSA of the upper limb is not yet clear. We therefore performed a systematic review to investigate the accuracy and precision of RSA of the upper limb. Patients and methods - PRISMA guidelines were followed and the protocol for this review was published online at PROSPERO under registration number CRD42016042014. A systematic search of the literature was performed in the databases Embase, Medline, Cochrane, Web of Science, Scopus, Cinahl, and Google Scholar on April 25, 2015 based on the keywords radiostereometric analysis, shoulder prosthesis, elbow prosthesis, wrist prosthesis, trapeziometacarpal joint prosthesis, humerus, ulna, radius, carpus. Articles concerning RSA for the analysis of early migration of prostheses of the upper limb were included. Quality assessment was performed using the MINORS score, Downs and Black checklist, and the ISO RSA Results - 23 studies were included. Precision values were in the 0.06-0.88 mm and 0.05-10.7° range for the shoulder, the 0.05-0.34 mm and 0.16-0.76° range for the elbow, and the 0.16-1.83 mm and 11-124° range for the TMC joint. Accuracy data from marker- and model-based RSA were not reported in the studies included. Interpretation - RSA is a highly precise method for measurement of early migration of orthopedic implants in the upper limb. However, the precision of rotation measurement is poor in some components. Challenges with RSA in the upper limb include the symmetrical shape of prostheses and the limited size of surrounding bone, leading to over-projection of the markers by the prosthesis. We recommend higher adherence to

  6. Multi-bit wavelength coding phase-shift-keying optical steganography based on amplified spontaneous emission noise

    NASA Astrophysics Data System (ADS)

    Wang, Cheng; Wang, Hongxiang; Ji, Yuefeng

    2018-01-01

    In this paper, a multi-bit wavelength coding phase-shift-keying (PSK) optical steganography method is proposed based on amplified spontaneous emission noise and wavelength selection switch. In this scheme, the assignment codes and the delay length differences provide a large two-dimensional key space. A 2-bit wavelength coding PSK system is simulated to show the efficiency of our proposed method. The simulated results demonstrate that the stealth signal after encoded and modulated is well-hidden in both time and spectral domains, under the public channel and noise existing in the system. Besides, even the principle of this scheme and the existence of stealth channel are known to the eavesdropper, the probability of recovering the stealth data is less than 0.02 if the key is unknown. Thus it can protect the security of stealth channel more effectively. Furthermore, the stealth channel will results in 0.48 dB power penalty to the public channel at 1 × 10-9 bit error rate, and the public channel will have no influence on the receiving of the stealth channel.

  7. Science, the public, and social elites: how the general public, scientists, top politicians and managers perceive science.

    PubMed

    Prpić, Katarina

    2011-11-01

    This paper finds that the Croatian public's and the social elites' perceptions of science are a mixture of scientific and technological optimism, of the tendency to absolve science of social responsibility, of skepticism about the social effects of science, and of cognitive optimism and skepticism. However, perceptions differ significantly according to the different social roles and the wider value system of the observed groups. The survey data show some key similarities, as well as certain specificities in the configuration of the types of views of the four groups--the public, scientists, politicians and managers. The results suggest that the well-known typology of the four cultures reveals some of the ideologies of the key actors of scientific and technological policy. The greatest social, primarily educational and socio-spatial, differentiation of the perceptions of science was found in the general public.

  8. Public health preparedness: evolution or revolution?

    PubMed

    Lurie, Nicole; Wasserman, Jeffrey; Nelson, Christopher D

    2006-01-01

    The recent emphasis on preparedness has created heightened expectations and has raised questions about the extent to which U.S. public health systems have evolved in recent years. This paper describes how public health preparedness is transforming public health agencies. Key signs of change include new partnerships, changes in the workforce, new technologies, and evolving organizational structures. Each of these elements has had some positive impact on public health; however, integration of preparedness with other public health functions remains challenging. The preparedness mission has also raised challenges in the areas of leadership, governance, quality, and accountability.

  9. What affects public acceptance of recycled and desalinated water?

    PubMed Central

    Dolnicar, Sara; Hurlimann, Anna; Grün, Bettina

    2011-01-01

    This paper identifies factors that are associated with higher levels of public acceptance for recycled and desalinated water. For the first time, a wide range of hypothesized factors, both of socio-demographic and psychographic nature, are included simultaneously. The key results, based on a survey study of about 3000 respondents are that: (1) drivers of the stated likelihood of using desalinated water differ somewhat from drivers of the stated likelihood of using recycled water; (2) positive perceptions of, and knowledge about, the respective water source are key drivers for the stated likelihood of usage; and (3) awareness of water scarcity, as well as prior experience with using water from alternative sources, increases the stated likelihood of use. Practical recommendations for public policy makers, such as key messages to be communicated to the public, are derived. PMID:20950834

  10. High proximal migration in cemented acetabular revisions operated with bone impaction grafting; 47 revision cups followed with RSA for 17 years.

    PubMed

    Mohaddes, Maziar; Herberts, Peter; Malchau, Henrik; Johanson, Per-Erik; Kärrholm, Johan

    2017-05-12

    Bone impaction grafting is a biologically and mechanically appealing option in acetabular revision surgery, allowing restitution of the bone stock and restoration of the biomechanics. We analysed differences in proximal migration of the revision acetabular components when bone impaction grafting is used together with a cemented or an uncemented cup. 43 patients (47 hips), revised due to acetabular loosening and judged to have less than 50% host bone-implant contact were included. The hips were randomised to either an uncemented (n = 20) or a cemented (n = 27) revision cup. Radiostereometry and radiography was performed postoperatively, at 3 and 6 months, 1, 2, 3, 5, 7, 10 and 13 and 17 years postoperatively. Clinical follow-up was performed at 1, 2 and 5 years postoperatively and thereafter at the same interval as in the radiographic follow-up. There were no differences in the base line demographic data between the 2 groups. At the last follow-up (17 years) 14 hips (10 cemented, 4 uncemented) had been re-revised due to loosening. 3 additional cups (1 uncemented and 2 cemented) were radiographically loose. There was a higher early proximal migration in the cemented cups. Cups operated on with cement showed a higher early migration measured with RSA and also a higher number of late revisions. The reason for this is not known, but factors such as inclusion of cases with severe bone defects, use of smaller bone chips and issues related to the impaction technique might have had various degrees of influence.

  11. Function key and shortcut key use in airway facilities.

    DOT National Transportation Integrated Search

    2003-02-01

    This document provides information on the function keys and shortcut keys used by systems in the Federal Aviation Administration : Airway Facilities (AF) work environment. It includes a catalog of the function keys and shortcut keys used by each syst...

  12. Genetic diversity of root system architecture in response to drought stress in grain legumes.

    PubMed

    Ye, Heng; Roorkiwal, Manish; Valliyodan, Babu; Zhou, Lijuan; Chen, Pengyin; Varshney, Rajeev K; Nguyen, Henry T

    2018-06-06

    Climate change has increased the occurrence of extreme weather patterns globally, causing significant reductions in crop production, and hence threatening food security. In order to meet the food demand of the growing world population, a faster rate of genetic gains leading to productivity enhancement for major crops is required. Grain legumes are an essential commodity in optimal human diets and animal feed because of their unique nutritional composition. Currently, limited water is a major constraint in grain legume production. Root system architecture (RSA) is an important developmental and agronomic trait, which plays vital roles in plant adaptation and productivity under water-limited environments. A deep and proliferative root system helps extract sufficient water and nutrients under these stress conditions. The integrated genetics and genomics approach to dissect molecular processes from genome to phenome is key to achieve increased water capture and use efficiency through developing better root systems. Success in crop improvement under drought depends on discovery and utilization of genetic variations existing in the germplasm. In this review, we summarize current progress in the genetic diversity in major legume crops, quantitative trait loci (QTLs) associated with RSA, and the importance and applications of recent discoveries associated with the beneficial root traits towards better RSA for enhanced drought tolerance and yield.

  13. Young Children's Physiological Reactivity during Memory Recall: Associations with Posttraumatic Stress and Parent Physiological Synchrony.

    PubMed

    Gray, Sarah A O; Lipschutz, Rebecca S; Scheeringa, Mike S

    2018-05-01

    Autonomic reactivity is implicated in stress response and social engagement - both key components of posttraumatic stress disorder (PTSD) - but few studies have examined autonomic reactivity in pediatric samples, and no known studies have examined physiological synchrony among children with PTSD and caregivers. In a sample of 247 young children (94 girls, 153 boys), most (85%) of whom had exposure to trauma and 40% who met criteria for PTSD, we examined children's patterns of respiratory sinus arrhythmia (RSA) at baseline and in response to a memory recall task, as well as correspondence between parents' and children's RSA. Children with PTSD demonstrated significantly higher reactivity than other groups during their recollection of a traumatic memory, but not during other memory tasks. Regarding synchrony, caregivers' and children's RSA were more significantly and positively correlated during the trauma recall task among children who had had exposure to a potentially traumatic event but did not meet PTSD criteria, suggesting physiological synchrony may be protective in contexts of trauma. Overall, findings demonstrate physiological reactivity differences among young children with PTSD. While more work is needed to understand the meaning of parent-child physiological synchrony, these data suggest that children's psychopathology is associated with physiological synchrony processes among young children with exposure to trauma.

  14. 33 CFR 117.261 - Atlantic Intracoastal Waterway from St. Marys River to Key Largo.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... from St. Marys River to Key Largo. 117.261 Section 117.261 Navigation and Navigable Waters COAST GUARD....261 Atlantic Intracoastal Waterway from St. Marys River to Key Largo. (a) General. Public vessels of..., mile 777.9 at St. Augustine. The draw shall open on signal; except that, from 7 a.m. to 6 p.m. the draw...

  15. 76 FR 38645 - Notice of Proposed Information Collection Requests

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... (RSA) approval a Program Improvement Plan (PIP) using the on-line form located on the RSA management... strategies for the achievement of the goals. In accordance with regulations at 34 CFR 361.89 (c), RSA reviews...

  16. The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks

    NASA Astrophysics Data System (ADS)

    Ristenpart, Thomas; Yilek, Scott

    Multiparty signature protocols need protection against rogue-key attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, provable security has only been established under the knowledge of secret key (KOSK) assumption where the adversary is required to reveal the secret keys it utilizes. In practice, certifying authorities rarely require the strong proofs of knowledge of secret keys required to substantiate the KOSK assumption. Instead, proofs of possession (POPs) are required and can be as simple as just a signature over the certificate request message. We propose a general registered key model, within which we can model both the KOSK assumption and in-use POP protocols. We show that simple POP protocols yield provable security of Boldyreva's multisignature scheme [11], the LOSSW multisignature scheme [28], and a 2-user ring signature scheme due to Bender, Katz, and Morselli [10]. Our results are the first to provide formal evidence that POPs can stop rogue-key attacks.

  17. Improvement of "Novel Multiparty Quantum Key Agreement Protocol with GHZ States"

    NASA Astrophysics Data System (ADS)

    Gu, Jun; Hwang, Tzonelih

    2017-10-01

    Quantum key agreement (QKA) protocol is a method for negotiating a fair and secure key among mutually untrusted participants. Recently, Xu et al. (Quantum Inf. Process. 13:2587-2594, 2014) proposed a multi-party QKA protocol based on Greenberger-Horne-Zeilinger (GHZ) states. However, this study points out that Xu et al.'s protocol cannot provide the fairness property. That is, the last involved participant in the protocol can manipulate the final shared secret key without being detected by the other participants. Moreover, according to Yu et al.'s research (2015), Xu et al.'s protocol cannot avoid the public discussion attack too. To avoid these weaknesses, an improved QKA protocol is proposed.

  18. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups

    NASA Astrophysics Data System (ADS)

    Desmedt, Yvo; Lange, Tanja; Burmester, Mike

    Task-specific groups are often formed in an ad-hoc manner within large corporate structures, such as companies. Take the following typical scenario: A director decides to set up a task force group for some specific project. An order is passed down the hierarchy where it finally reaches a manager who selects some employees to form the group. The members should communicate in a secure way and for efficiency, a symmetric encryption system is chosen. To establish a joint secret key for the group, a group key exchange (GKE) protocol is used. We show how to use an existing Public Key Infrastructure (PKI) to achieve authenticated GKE by modifying the protocol and particularly by including signatures.

  19. Thinking Across Generations: Unique Contributions of Maternal Early Life and Prenatal Stress to Infant Physiology.

    PubMed

    Gray, Sarah A O; Jones, Christopher W; Theall, Katherine P; Glackin, Erin; Drury, Stacy S

    2017-11-01

    Respiratory sinus arrhythmia (RSA) is a parasympathetic-mediated biomarker of self-regulation linked to lifespan mental and physical health outcomes. Intergenerational impacts of mothers' exposure to prenatal stress have been demonstrated, but evidence for biological embedding of maternal preconception stress, including adverse childhood experiences (ACEs), on infant RSA is lacking. We examine the independent effects of maternal ACEs and prenatal stress on infant RSA, seeking to broaden the understanding of the earliest origins of mental and physical health risk. Mothers reported on ACEs and prenatal stress. RSA was recorded in a sample of 167 4-month-old infants (49% female and 51% male) during a dyadic stressor, the Still Face Paradigm. Independent contributions of maternal ACEs and prenatal stress to infant RSA were observed. High maternal ACEs were associated with lower RSA, whereas prenatal stress was associated with failure to recover following the stressor. Sex but not race differences were observed. Prenatal stress was associated with higher RSA among boys but lower RSA among girls. Infants' RSA is affected by mothers' life course experiences of stress, with ACEs predicting a lower set point and prenatal stress dampening recovery from stress. For prenatal stress but not ACEs, patterns vary across sex. Findings underscore that stress-reducing interventions for pregnant women or those considering pregnancy may lead to decreased physical and mental health risk across generations. Copyright © 2017 American Academy of Child and Adolescent Psychiatry. Published by Elsevier Inc. All rights reserved.

  20. Associations between respiratory sinus arrhythmia reactivity and internalizing and externalizing symptoms are emotion specific

    PubMed Central

    Fortunato, Christine K.; Gatzke-Kopp, Lisa M.; Ram, Nilam

    2015-01-01

    Internalizing and externalizing disorders are often, though inconsistently in studies of young children, associated with low baseline levels of respiratory sinus arrhythmia (RSA). RSA is thus considered to reflect the capacity for flexible and regulated affective reactivity and a general propensity for psychopathology. However, studies assessing RSA reactivity to emotional challenges tend to report more consistent associations with internalizing than with externalizing disorders, although it is unclear whether this is a function of the type of emotion challenges used. In the present study, we examined whether baseline RSA was associated with internalizing and/or externalizing severity in a sample of 273 young children (ages 5–6) with elevated symptoms of psychopathology. Following motivation-based models of emotion, we also tested whether RSA reactivity during withdrawal-based (fear, sadness) and approach-based (happiness, anger) emotion inductions was differentially associated with internalizing and externalizing symptoms, respectively. Baseline RSA was not associated with externalizing or internalizing symptom severity. However, RSA reactivity to specific emotional challenges was associated differentially with each symptom domain. As expected, internalizing symptom severity was associated with greater RSA withdrawal (increased arousal) during fearful and sad film segments. Conversely, externalizing symptom severity was related to blunted RSA withdrawal during a happy film segment. The use of theoretically derived stimuli may be important in characterizing the nature of the deficits in emotion processing that differentiate the internalizing and externalizing domains of psychopathology. PMID:23233122

  1. Education & Public Policy in Bogotá: Guarding the Public Interest

    ERIC Educational Resources Information Center

    Parra, Juan David

    2009-01-01

    High school education appears to be a key variable for the economic prosperity of Bogotá. However, the lack of consideration of quality as a necessary standard for education in the city threatens its potential to positively affect social welfare. One of the main problems emerges from an imprecise conception of education as a public good, which is…

  2. Key comparison of liquid density standards

    NASA Astrophysics Data System (ADS)

    Buchner, Christian; Zelenka, Zoltan; Kajastie, Heikki; Madec, Tanguy; Wolf, Henning; Vámossy, Csilla; Lorefice, Salvatore; Garberg, Torgunn; Lenard, Elżbieta; Spohr, Isabel; Mares, Gabriela; Spurný, Robert; Lumbreras, Angel; Medina, Nieves; Y Akçadağ, Ümit; Perkin, Michael

    2015-01-01

    Hydrostatic density determination for liquids is mainly performed by laboratories to provide means for calibrating liquid density measuring instruments such as oscillation-type density meters. From 2002 to 2005 the CIPM key comparison CCM.D-K2 'comparison of liquid density standards' was carried out piloted by the PTB. The aim was to compare the results of the density determination by the participating laboratories to support entries to the CMC tables in this sub-field. To provide further laboratories the possibility to support their entries to the CMC tables at the meeting of the EUROMET Working Group on Density in 2007 this comparison was agreed on. BEV (Austria) organized the comparison supported by the PTB (Germany). For the comparison samples of pentadecane, water, tetrachloroethylene and of an oil of high viscosity were measured in the temperature range from 5 °C to 60 °C at atmospheric pressure by hydrostatic weighing. The measurements were completed in 2008. The reference values of the first reports based on the draft of the CCM.D-K2. After the official publication of the CCM.D-K2 the reference values were recalculated and the report was finalised in 2015. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  3. Executive Functions Impact the Relation Between Respiratory Sinus Arrhythmia and Frequency of Stuttering in Young Children Who Do and Do Not Stutter

    PubMed Central

    Walden, Tedra A.; Conture, Edward G.; Erdemir, Aysu; Lambert, Warren E.; Porges, Stephen W.

    2017-01-01

    Purpose This study sought to determine whether respiratory sinus arrhythmia (RSA) and executive functions are associated with stuttered speech disfluencies of young children who do (CWS) and do not stutter (CWNS). Method Thirty-six young CWS and 36 CWNS were exposed to neutral, negative, and positive emotion-inducing video clips, followed by their participation in speaking tasks. During the neutral video, we measured baseline RSA, a physiological index of emotion regulation, and during video viewing and speaking, we measured RSA change from baseline, a physiological index of regulatory responses during challenge. Participants' caregivers completed the Children's Behavior Questionnaire from which a composite score of the inhibitory control and attentional focusing subscales served to index executive functioning. Results For both CWS and CWNS, greater decrease of RSA during both video viewing and speaking was associated with more stuttering. During speaking, CWS with lower executive functioning exhibited a negative association between RSA change and stuttering; conversely, CWNS with higher executive functioning exhibited a negative association between RSA change and stuttering. Conclusion Findings suggest that decreased RSA during video viewing and speaking is associated with increased stuttering and young CWS differ from CWNS in terms of how their executive functions moderate the relation between RSA change and stuttered disfluencies. PMID:28763803

  4. Women with recurrent spontaneous abortion have decreased 25(OH) vitamin D and VDR at the fetal-maternal interface

    PubMed Central

    Li, N.; Wu, H.M.; Hang, F.; Zhang, Y.S.; Li, M.J.

    2017-01-01

    Immunological mechanisms have been proposed to underlie the pathogenesis of recurrent spontaneous abortion (RSA). Vitamin D has a potent immunomodulatory effect, which may affect pregnancy outcome. The objective of this study was to investigate 25-hydroxyvitamin D [25(OH) D] concentration and vitamin D receptor (VDR) expression in the decidual tissues of RSA patients. Thirty women with RSA (RSA group) and thirty women undergoing elective abortion (control group) were recruited during 2016 from gynecology outpatient clinics. We measured 25(OH) D, interleukin (IL)-17, IL-23, transforming growth factor β (TGF-β), VDR and 1-α-hydroxylase (CYP27B1) in decidual tissues collected during the abortion procedure. In the RSA group, 25(OH) D and TGF-β were significantly decreased while IL-17 and IL-23 were significantly increased compared with the control group. VDR expression was significantly decreased in the RSA group compared with the control group. Logistic regression analysis showed a significant negative correlation between 25(OH) D in decidual tissues and RSA. These results indicated that vitamin D concentrations in the decidua are associated with inflammatory cytokine production, suggesting that vitamin D and VDR may play a role in the etiology of RSA. PMID:28902929

  5. Repeated Sprint Ability in Young Basketball Players: Multi-direction vs. One-Change of Direction (Part 1)

    PubMed Central

    Padulo, Johnny; Bragazzi, Nicola L.; Nikolaidis, Pantelis T.; Dello Iacono, Antonio; Attene, Giuseppe; Pizzolato, Fabio; Dal Pupo, Juliano; Zagatto, Alessandro M.; Oggianu, Marcello; Migliaccio, Gian M.

    2016-01-01

    The aim of the present study was to examine the reliability of a novel multi-direction repeated sprint ability (RSA) test [RSM; 10 × (6 × 5-m)] compared with a RSA with one change of direction [10 × (2 × 15-m)], and the relationship of the RSM and RSA with Yo-Yo intermittent recovery test level 1 (Yo-Yo IR1) and jump performances [squat jump (SJ) and counter-movement-jump (CMJ)]. Thirty-six (male, n = 14, female n = 22) young basketball players (age 16.0 ± 0.9 yrs) performed the RSM, RSA, Yo-Yo IR1, SJ, and CMJ, and were re-tested only for RSM and RSA after 1 week. The absolute error of reliability (standard error of the measurement) was lower than 0.212 and 0.617-s for the time variables of the RSA and RSM test, respectively. Performance in the RSA and RSM test significantly correlated with CMJ and SJ. The best time, worst time, and total time of the RSA and RSM test were negatively correlated with Yo-Yo IR1 distance. Based on these findings, consistent with previously published studies, it was concluded that the novel RSM test was valid and reliable. PMID:27148072

  6. Executive Functions Impact the Relation Between Respiratory Sinus Arrhythmia and Frequency of Stuttering in Young Children Who Do and Do Not Stutter.

    PubMed

    Jones, Robin M; Walden, Tedra A; Conture, Edward G; Erdemir, Aysu; Lambert, Warren E; Porges, Stephen W

    2017-08-16

    This study sought to determine whether respiratory sinus arrhythmia (RSA) and executive functions are associated with stuttered speech disfluencies of young children who do (CWS) and do not stutter (CWNS). Thirty-six young CWS and 36 CWNS were exposed to neutral, negative, and positive emotion-inducing video clips, followed by their participation in speaking tasks. During the neutral video, we measured baseline RSA, a physiological index of emotion regulation, and during video viewing and speaking, we measured RSA change from baseline, a physiological index of regulatory responses during challenge. Participants' caregivers completed the Children's Behavior Questionnaire from which a composite score of the inhibitory control and attentional focusing subscales served to index executive functioning. For both CWS and CWNS, greater decrease of RSA during both video viewing and speaking was associated with more stuttering. During speaking, CWS with lower executive functioning exhibited a negative association between RSA change and stuttering; conversely, CWNS with higher executive functioning exhibited a negative association between RSA change and stuttering. Findings suggest that decreased RSA during video viewing and speaking is associated with increased stuttering and young CWS differ from CWNS in terms of how their executive functions moderate the relation between RSA change and stuttered disfluencies.

  7. Public transportation's role in responding to climate change

    DOT National Transportation Integrated Search

    2010-01-01

    This paper details the role public transportation has in responding to the challenge of climate change. It collects and analyzes data from across the country on public transportation fuel use, vehicles deployed, rides taken, and other key metrics, dr...

  8. The Effects of Respiratory Sinus Arrhythmia on Anger Reactivity and Persistence in Major Depression

    PubMed Central

    Ellis, Alissa J.; Shumake, Jason; Beevers, Christopher G.

    2016-01-01

    The experience of anger during a depressive episode has recently been identified as a poor prognostic indicator of illness course. Given the clinical implications of anger in major depressive disorder (MDD), understanding the mechanisms involved in anger reactivity and persistence is critical for improved intervention. Biological processes involved in emotion regulation during stress, such as respiratory sinus arrhythmia (RSA), may play a role in maintaining negative moods. Clinically depressed (MDD) (n=49) and non-depressed (non-MDD) (n=50) individuals were challenged with a stressful computer task shown to increase anger, while RSA (high frequency range 0.15–0.4 Hz) was collected. RSA predicted future anger, but was unrelated to current anger. That is, across participants, low baseline RSA predicted anger reactivity during the task, and in depressed individuals, those with low RSA during the task had a greater likelihood of anger persistence during a recovery period. These results suggest that low RSA may be a psychophysiological process involved in anger regulation in depression. Low RSA may contribute to sustained illness course by diminishing the repair of angry moods. PMID:27401801

  9. Normalization of respiratory sinus arrhythmia by factoring in tidal volume.

    PubMed

    Kobayashi, H

    1998-09-01

    The amplitude of respiratory sinus arrhythmia (RSA) was measured in eight healthy young male students with special reference to the effect of tidal volume (Vt). Under simultaneously controlled respiratory frequency and Vt, the heart rate variability (HRV) of the subjects was measured. While the respiratory frequency was adjusted to either 0.25 or 0.10 Hz, the Vt was controlled at 13 different volumes for each frequency. Linear relationships between RSA amplitude and Vt were observed and close correlations were obtained for 0.25 Hz compared with 0.10 Hz. However, regression equations showed a marked variation among subjects. Furthermore, RSA amplitude was related to vital capacity. Subjects who had lower vital capacity tended to show higher RSA amplitudes at the same Vt. Therefore, the ratio (% Vt) of Vt to vital capacity is a more effective index in normalizing RSA than raw tidal volume. From these results, we have proposed a normalized RSA (RSA amplitude/% Vt) as a new index of autonomic activity that provides a constant value regardless of Vt.

  10. A Framework for Developing the Structure of Public Health Economic Models.

    PubMed

    Squires, Hazel; Chilcott, James; Akehurst, Ronald; Burr, Jennifer; Kelly, Michael P

    2016-01-01

    A conceptual modeling framework is a methodology that assists modelers through the process of developing a model structure. Public health interventions tend to operate in dynamically complex systems. Modeling public health interventions requires broader considerations than clinical ones. Inappropriately simple models may lead to poor validity and credibility, resulting in suboptimal allocation of resources. This article presents the first conceptual modeling framework for public health economic evaluation. The framework presented here was informed by literature reviews of the key challenges in public health economic modeling and existing conceptual modeling frameworks; qualitative research to understand the experiences of modelers when developing public health economic models; and piloting a draft version of the framework. The conceptual modeling framework comprises four key principles of good practice and a proposed methodology. The key principles are that 1) a systems approach to modeling should be taken; 2) a documented understanding of the problem is imperative before and alongside developing and justifying the model structure; 3) strong communication with stakeholders and members of the team throughout model development is essential; and 4) a systematic consideration of the determinants of health is central to identifying the key impacts of public health interventions. The methodology consists of four phases: phase A, aligning the framework with the decision-making process; phase B, identifying relevant stakeholders; phase C, understanding the problem; and phase D, developing and justifying the model structure. Key areas for further research involve evaluation of the framework in diverse case studies and the development of methods for modeling individual and social behavior. This approach could improve the quality of Public Health economic models, supporting efficient allocation of scarce resources. Copyright © 2016 International Society for Pharmacoeconomics

  11. On the Development of Schools' External Public Relations in China.

    ERIC Educational Resources Information Center

    Tianping, Yang

    2003-01-01

    Public relations is a basic function of a modern school's management, while external public relationship is a basic principle and component of it. To develop a school's public relationship, efforts should focus on its key publics, strengthening its coordination and communication with governments, education departments, and local communities.…

  12. Identifying core competencies for public health epidemiologists.

    PubMed

    Bondy, Susan J; Johnson, Ian; Cole, Donald C; Bercovitz, Kim

    2008-01-01

    Public health authorities have prioritized the identification of competencies, yet little empirical data exist to support decisions on competency selection among particular disciplines. We sought perspectives on important competencies among epidemiologists familiar with or practicing in public health settings (local to national). Using a sequential, qualitative-quantitative mixed method design, we conducted key informant interviews with 12 public health practitioners familiar with front-line epidemiologists' practice, followed by a web-based survey of members of a provincial association of public health epidemiologists (90 respondents of 155 eligible) and a consensus workshop. Competency statements were drawn from existing core competency lists and those identified by key informants, and ranked by extent of agreement in importance for entry-level practitioners. Competencies in quantitative methods and analysis, critical appraisal of scientific evidence and knowledge transfer of scientific data to other members of the public health team were all regarded as very important for public health epidemiologists. Epidemiologist competencies focused on the provision, interpretation and 'translation' of evidence to inform decision-making by other public health professionals. Considerable tension existed around some potential competency items, particularly in the areas of more advanced database and data-analytic skills. Empirical data can inform discussions of discipline-specific competencies as one input to decisions about competencies appropriate for epidemiologists in the public health workforce.

  13. Public Response to Obamacare on Twitter.

    PubMed

    Davis, Matthew A; Zheng, Kai; Liu, Yang; Levy, Helen

    2017-05-26

    The Affordable Care Act (ACA), often called "Obamacare," is a controversial law that has been implemented gradually since its enactment in 2010. Polls have consistently shown that public opinion of the ACA is quite negative. The aim of our study was to examine the extent to which Twitter data can be used to measure public opinion of the ACA over time. We prospectively collected a 10% random sample of daily tweets (approximately 52 million since July 2011) using Twitter's streaming application programming interface (API) from July 10, 2011 to July 31, 2015. Using a list of key terms and ACA-specific hashtags, we identified tweets about the ACA and examined the overall volume of tweets about the ACA in relation to key ACA events. We applied standard text sentiment analysis to assign each ACA tweet a measure of positivity or negativity and compared overall sentiment from Twitter with results from the Kaiser Family Foundation health tracking poll. Public opinion on Twitter (measured via sentiment analysis) was slightly more favorable than public opinion measured by the Kaiser poll (approximately 50% vs 40%, respectively) but trends over time in both favorable and unfavorable views were similar in both sources. The Twitter-based measures of opinion as well as the Kaiser poll changed very little over time: correlation coefficients for favorable and unfavorable public opinion were .43 and .37, respectively. However, we found substantial spikes in the volume of ACA-related tweets in response to key events in the law's implementation, such as the first open enrollment period in October 2013 and the Supreme Court decision in June 2012. Twitter may be useful for tracking public opinion of health care reform as it appears to be comparable with conventional polling results. Moreover, in contrast with conventional polling, the overall amount of tweets also provides a potential indication of public interest of a particular issue at any point in time. ©Matthew A Davis, Kai Zheng

  14. Public Response to Obamacare on Twitter

    PubMed Central

    Zheng, Kai; Liu, Yang; Levy, Helen

    2017-01-01

    Background The Affordable Care Act (ACA), often called “Obamacare,” is a controversial law that has been implemented gradually since its enactment in 2010. Polls have consistently shown that public opinion of the ACA is quite negative. Objective The aim of our study was to examine the extent to which Twitter data can be used to measure public opinion of the ACA over time. Methods We prospectively collected a 10% random sample of daily tweets (approximately 52 million since July 2011) using Twitter’s streaming application programming interface (API) from July 10, 2011 to July 31, 2015. Using a list of key terms and ACA-specific hashtags, we identified tweets about the ACA and examined the overall volume of tweets about the ACA in relation to key ACA events. We applied standard text sentiment analysis to assign each ACA tweet a measure of positivity or negativity and compared overall sentiment from Twitter with results from the Kaiser Family Foundation health tracking poll. Results Public opinion on Twitter (measured via sentiment analysis) was slightly more favorable than public opinion measured by the Kaiser poll (approximately 50% vs 40%, respectively) but trends over time in both favorable and unfavorable views were similar in both sources. The Twitter-based measures of opinion as well as the Kaiser poll changed very little over time: correlation coefficients for favorable and unfavorable public opinion were .43 and .37, respectively. However, we found substantial spikes in the volume of ACA-related tweets in response to key events in the law’s implementation, such as the first open enrollment period in October 2013 and the Supreme Court decision in June 2012. Conclusions Twitter may be useful for tracking public opinion of health care reform as it appears to be comparable with conventional polling results. Moreover, in contrast with conventional polling, the overall amount of tweets also provides a potential indication of public interest of a particular

  15. Selling School: The Marketing of Public Education

    ERIC Educational Resources Information Center

    DiMartino, Catherine; Jessen, Sarah Butler

    2018-01-01

    This timely book outlines the growth and development of marketing and branding practices in public education. The authors highlight why these practices have become important across key fields within public education, including leadership and governance, budgeting and finance, strategic initiatives, use of new technology, the role of teachers in…

  16. Adult immunisation: A key element of public health programs: Synopsis of Asia Pacific Adult Immunisation Meeting, Tokyo, 1-2 December 2016.

    PubMed

    Rochman-Fowler, Jessica; Duarte Walsh, Virginia; Barratt, Jane

    2018-06-01

    To (i) improve scientific knowledge and understanding of the importance of adult vaccination within a public health framework; (ii) share an understanding of the principles of good practice that have improved adult vaccination uptake rates; (iii) appreciate the diverse nature of country-specific barriers; and (iv) reach consensus on principles of a call to action to increase adult vaccination uptake rates. Non-governmental organisations, the International Federation on Ageing and Friends of International Federation on Ageing Japan, convened the Asia Pacific Adult Immunisation Meeting, herein referred to as the 'Asia Pacific Meeting'. Delegates identified fundamental barriers to adult vaccination similar to those reported at previous meetings in Latin America and Europe and formed a road map to respond to key barriers in countries represented at the Asia Pacific Meeting. Older people are uniquely vulnerable to vaccine-preventable diseases and therefore need to be the target of a series of actions intended to improve uptake rates in this subpopulation. © 2018 AJA Inc.

  17. 77 FR 39489 - Notice of Public Meetings for the Naval Air Station Key West Airfield Operations Draft...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-03

    ... via the U.S. Postal Service to Naval Facilities Engineering Command Southeast, NAS Key West Air... the project Web site ( http://www.keywesteis.com ). All statements, oral or written, submitted during... Engineering Command Southeast, NAS Key West Air Operations EIS Project Manager, P.O. Box 30, Building 903, NAS...

  18. The National Public Health Leadership Institute: evaluation of a team-based approach to developing collaborative public health leaders.

    PubMed

    Umble, Karl; Steffen, David; Porter, Janet; Miller, Delesha; Hummer-McLaughlin, Kelley; Lowman, Amy; Zelt, Susan

    2005-04-01

    Recent public health literature contains calls for collaborative public health interventions and for leaders capable of guiding them. The National Public Health Leadership Institute aims to develop collaborative leaders and to strengthen networks of leaders who share knowledge and jointly address public health problems. Evaluation results show that completing the institute training increases collaborative leadership and builds knowledge-sharing and problem-solving networks. These practices and networks strengthen interorganizational relationships, coalitions, services, programs, and policies. Intensive team-and project-based learning are key to the program's impact.

  19. Public Education Primer

    ERIC Educational Resources Information Center

    Sorace, Danene

    2010-01-01

    To advance sexuality education for students in grades Pre-K through Grade 12, sexuality education professionals must work more closely with public schools. Though this may be stating the obvious, one of the key priorities identified by the Future of Sex Education Project is: the need to build understanding of--and relationships with--the public…

  20. The effects of distraction and reappraisal on children's parasympathetic regulation of sadness and fear.

    PubMed

    Davis, Elizabeth L; Quiñones-Camacho, Laura E; Buss, Kristin A

    2016-02-01

    Children commonly experience negative emotions like sadness and fear, and much recent empirical attention has been devoted to understanding the factors supporting and predicting effective emotion regulation. Respiratory sinus arrhythmia (RSA), a cardiac index of parasympathetic function, has emerged as a key physiological correlate of children's self-regulation. But little is known about how children's use of specific cognitive emotion regulation strategies corresponds to concurrent parasympathetic regulation (i.e., RSA reactivity while watching an emotion-eliciting video). The current study describes an experimental paradigm in which 101 5- and 6-year-olds were randomly assigned to one of three different emotion regulation conditions: Control, Distraction, or Reappraisal. All children watched a sad film and a scary film (order counterbalanced), and children in the Distraction and Reappraisal conditions received instructions to deploy the target strategy to manage sadness/fear while they watched. Consistent with predictions, children assigned to use either emotion regulation strategy showed greater RSA augmentation from baseline than children in the Control condition (all children showed an overall increase in RSA levels from baseline), suggesting enhanced parasympathetic calming when children used distraction or reappraisal to regulate sadness and fear. But this pattern was found only among children who viewed the sad film before the scary film. Among children who viewed the scary film first, reappraisal promoted marginally better parasympathetic regulation of fear (no condition differences emerged for parasympathetic regulation of sadness when the sad film was viewed second). Results are discussed in terms of their implications for our understanding of children's emotion regulation and affective physiology. Copyright © 2015 Elsevier Inc. All rights reserved.