2017-12-01
Information Systems Center of Expertise (RS/GIS CX) (CEERD-RZR), U.S. Army Engineer Research and Development Center, Cold Regions Research and...GIS Geographic Information Systems GPS Global Positioning System HH Handheld IWR U.S. Army Engineer Institute for Water Resources n/a Not...Applicable NAE U.S. Army New England Regulatory District RS/GIS Remote Sensing/Geographic Information Systems SD Secure Digital SDHC Secure Digital High
Applying the SERENITY Methodology to the Domain of Trusted Electronic Archiving
NASA Astrophysics Data System (ADS)
Porekar, Jan; Klobučar, Tomaž; Šaljič, Svetlana; Gabrijelčič, Dušan
We present the application of the SERENITY methodology to the domain of long-term trusted electronic archiving, sometimes also referred to as trusted digital notary services. We address the SERENITY approach from thepoint of view of a company providing security solutions in the mentioned domain and adopt the role of a solution developer. In this chapter we show a complete vertical slice through the trusted archiving domain providing: (i) the relevant S&D properties, (ii) the S&D classes and S&D patterns on both organizational and technical level, (iii) describe how S&D patterns are integrated into a trusted longterm archiving service using the SERENITY Run-Time Framework (SRF). At the end of the chapter we put in perspective what a solution developer can learn from the process of capturing security knowledge according to SERENITY methodology and we discuss how existing implementations of archiving services can benefit from SERENITY approach in the future.
Digital security technology simplified.
Scaglione, Bernard J
2007-01-01
Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.
SERENITY Aware System Development Process
NASA Astrophysics Data System (ADS)
Serrano, Daniel; Maña, Antonio; Llarena, Rafael; Crespo, Beatriz Gallego-Nicasio; Li, Keqin
Traditionally, security patterns have successfully been used to describe security and dependability. In the SERENITY Project the notion of security and dependability (S&D) pattern has been extended to exact specifications of re-usable security mechanisms for Ambient Intelligence (AmI) systems. These S&D Patterns include information on the security properties satisfied by the solution and on the context conditions to be fulfilled. This chapter presents the development of applications supported by SERENITY. In the context of SERENITY we refer to these applications as Serenity-aware applications. Firstly, this chapter presents the Serenity-aware application design using S&D Artefacts. Secondly, it proposes a Java Application Programming Interface (API) to be used in the application development. And, finally, it introduces the development of an example Serenity-aware application.
Specification of Security and Dependability Properties
NASA Astrophysics Data System (ADS)
Gürgens, Sigrid; Pujol, Gimena
SERENITY S&D Classes as well as S&D Patterns specify the security properties they provide. In order for a system designer to select the correct class and pattern, the security property specification must be both unambiguous and intuitive. Furthermore, in case no class or pattern can be found that provides the exact property desired by the system designer, classes and patterns providing stronger properties will also serve his/her needs. Hence there is the necessity to be able to find and prove relations between properties. In this chapter we introduce the SERENITY approach for the specification of S&D properties that are both intuitively understandable and based on a formal semantics that allows to prove relations between properties. In fact, we use two different languages: the Operational S&D Properties Language, and the Formal S&D Properties Language.
Security and Dependability Solutions for Web Services and Workflows
NASA Astrophysics Data System (ADS)
Kokolakis, Spyros; Rizomiliotis, Panagiotis; Benameur, Azzedine; Sinha, Smriti Kumar
In this chapter we present an innovative approach towards the design and application of Security and Dependability (S&D) solutions for Web services and service-based workflows. Recently, several standards have been published that prescribe S&D solutions for Web services, e.g. OASIS WS-Security. However,the application of these solutions in specific contexts has been proven problematic. We propose a new framework for the application of such solutions based on the SERENITY S&D Pattern concept. An S&D Pattern comprises all the necessary information for the implementation, verification, deployment, and active monitoring of an S&D Solution. Thus, system developers may rely on proven solutions that are dynamically deployed and monitored by the Serenity Runtime Framework. Finally, we further extend this approach to cover the case of executable workflows which are realised through the orchestration of Web services.
System Control for the Transitional DCS. Appendices.
1978-12-01
the deployment of the AN/TTC-39 circuit switch. This is a hybrid analog/digital switch providing the following services: o Non- secure analog telephone...service. o Non- secure 16 Kb/s digital telephone service. o Secure 16 Kb/s digital telephone service with automatic key distribution and end to end... security . o Analog circuits to support current inventory 50 Kb/sec and 9.6 Kb/sec secure digital communications. In the deployment model for this study
Digital LAMP in a sample self-digitization (SD) chip
Herrick, Alison M.; Dimov, Ivan K.; Lee, Luke P.; Chiu, Daniel T.
2012-01-01
This paper describes the realization of digital loop-mediated DNA amplification (dLAMP) in a sample self-digitization (SD) chip. Digital DNA amplification has become an attractive technique to quantify absolute concentrations of DNA in a sample. While digital polymerase chain reaction is still the most widespread implementation, its use in resource—limited settings is impeded by the need for thermal cycling and robust temperature control. In such situations, isothermal protocols that can amplify DNA or RNA without thermal cycling are of great interest. Here, we showed the successful amplification of single DNA molecules in a stationary droplet array using isothermal digital loop-mediated DNA amplification. Unlike most (if not all) existing methods for sample discretization, our design allows for automated, loss-less digitization of sample volumes on-chip. We demonstrated accurate quantification of relative and absolute DNA concentrations with sample volumes of less than 2 μl. We assessed the homogeneity of droplet size during sample self-digitization in our device, and verified that the size variation was small enough such that straightforward counting of LAMP-active droplets sufficed for data analysis. We anticipate that the simplicity and robustness of our SD chip make it attractive as an inexpensive and easy-to-operate device for DNA amplification, for example in point-of-care settings. PMID:22399016
Kim, Jong-Myoung; Hong, Joo-Hyun; Cho, Myeong-Chan; Cha, Eun-Jong; Lee, Tae-Soo
2007-01-01
The present study purposed to measure the BCG (Ballistocardiogram) of subjects on a wheelchair using a noncontact electro-mechanical film sensor (EMFi sensor) and detect the respiratory rate from BCG in real-time while the subjects are moving. In order to measure wirelessly the BCG of subjects moving on a wheelchair, we made a seat-type noncontact EMFi sensor and developed a transmitter and a receiver using Zigbee wireless RF communication technology. The sensor is embedded with a 3-axis accelerometer to remove the noise of wheelchair vibration from BCG signal. Signal obtained from each sensor goes through the A/D converter and is recorded in the SD (Secure Digital) card in PDA (Personal Digital Assistance) with a receiving part. We also developed a PC (Personal Computer) data analysis program, analyzed data recorded in the SD card using the program, and presented the results in graph. Lastly, this study demonstrated that a warning message can be sent from PDA to the remote server via a CDMA (Code Division Multiple Access) network in case the person on wheelchair falls in emergency. Our experiment was carried out with healthy male and female adults in their 20s who volunteered to help this research. The results of analyzing collected data will show that the respiratory rate can be measured in real-time on a moving wheelchair.
Synchronous digitization for high dynamic range lock-in amplification in beam-scanning microscopy
Muir, Ryan D.; Sullivan, Shane Z.; Oglesbee, Robert A.; Simpson, Garth J.
2014-01-01
Digital lock-in amplification (LIA) with synchronous digitization (SD) is shown to provide significant signal to noise (S/N) and linear dynamic range advantages in beam-scanning microscopy measurements using pulsed laser sources. Direct comparisons between SD-LIA and conventional LIA in homodyne second harmonic generation measurements resulted in S/N enhancements consistent with theoretical models. SD-LIA provided notably larger S/N enhancements in the limit of low light intensities, through the smooth transition between photon counting and signal averaging developed in previous work. Rapid beam scanning instrumentation with up to video rate acquisition speeds minimized photo-induced sample damage. The corresponding increased allowance for higher laser power without sample damage is advantageous for increasing the observed signal content. PMID:24689588
Research in DRM architecture based on watermarking and PKI
NASA Astrophysics Data System (ADS)
Liu, Ligang; Chen, Xiaosu; Xiao, Dao-ju; Yi, Miao
2005-02-01
Analyze the virtue and disadvantage of the present digital copyright protecting system, design a kind of security protocol model of digital copyright protection, which equilibrium consider the digital media"s use validity, integrality, security of transmission, and trade equity, make a detailed formalize description to the protocol model, analyze the relationship of the entities involved in the digital work copyright protection. The analysis of the security and capability of the protocol model shows that the model is good at security and practicability.
Daye, Dania; Banzi, Lynda; Jones, Philip; Choy, Garry; Shepard, Jo-Anne O
2018-01-01
Background Lung cancer is the leading cause of cancer-related deaths in the United States. Despite mandated insurance coverage for eligible patients, lung cancer screening rates remain low. Digital platforms, including social media, provide a potentially valuable tool to enhance health promotion and patient engagement related to lung cancer screening (LCS). Objective The aim was to assess the effectiveness of LCS digital awareness campaigns on utilization of low-dose computed tomography (LDCT) and visits to institutional online educational content. Methods A pay-per-click campaign utilizing Google and Facebook targeted adults aged 55 years and older and caregivers aged 18 years and older (eg, spouses, adult children) with LCS content during a 20-week intervention period from May to September 2016. A concurrent pay-per-click campaign using LinkedIn and Twitter targeted health care providers with LCS content. Geographic target radius was within 60 miles of an academic medical center. Social media data included aggregate demographics and click-through rates (CTRs). Primary outcome measures were visits to institutional Web pages and scheduled LDCT exams. Study period was 20 weeks before, during, and after the digital awareness campaigns. Results Weekly visits to the institutional LCS Web pages were significantly higher during the digital awareness campaigns compared to the 20-week period prior to implementation (mean 823.9, SD 905.8 vs mean 51, SD 22.3, P=.001). The patient digital awareness campaign surpassed industry standard CTRs on Google (5.85%, 1108/18,955 vs 1.8%) and Facebook (2.59%, 47,750/1,846,070 vs 0.8%). The provider digital awareness campaign surpassed industry standard CTR on LinkedIn (1.1%, 630/57,079 vs 0.3%) but not Twitter (0.19%, 1139/587,133 vs 0.25%). Mean scheduled LDCT exam volumes per week before, during, and after the digital awareness campaigns were 17.4 (SD 7.5), 20.4 (SD 5.4), and 26.2 (SD 6.4), respectively, with the difference between the mean number of scheduled exams after the digital awareness campaigns and the number of exams scheduled before and after the digital awareness campaigns being statistically significant (P<.001). Conclusions Implementation of the LCS digital awareness campaigns was associated with increased visits to institutional educational Web pages and scheduled LDCT exams. Digital platforms are an important tool to enhance health promotion activities and engagement with patients and providers. PMID:29449199
NASA Astrophysics Data System (ADS)
Jiang, Mu-Sheng; Sun, Shi-Hai; Tang, Guang-Zhao; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei
2013-12-01
Thanks to the high-speed self-differencing single-photon detector (SD-SPD), the secret key rate of quantum key distribution (QKD), which can, in principle, offer unconditionally secure private communications between two users (Alice and Bob), can exceed 1 Mbit/s. However, the SD-SPD may contain loopholes, which can be exploited by an eavesdropper (Eve) to hack into the unconditional security of the high-speed QKD systems. In this paper, we analyze the fact that the SD-SPD can be remotely controlled by Eve in order to spy on full information without being discovered, then proof-of-principle experiments are demonstrated. Here, we point out that this loophole is introduced directly by the operating principle of the SD-SPD, thus, it cannot be removed, except for the fact that some active countermeasures are applied by the legitimate parties.
Enhanced optical security by using information carrier digital screening
NASA Astrophysics Data System (ADS)
Koltai, Ferenc; Adam, Bence
2004-06-01
Jura has developed different security features based on Information Carrier Digital Screening. Substance of such features is that a non-visible secondary image is encoded in a visible primary image. The encoded image will be visible only by using a decoding device. One of such developments is JURA's Invisible Personal Information (IPI) is widely used in high security documents, where personal data of the document holder are encoded in the screen of the document holder's photography and they can be decoded by using an optical decoding device. In order to make document verification fully automated, enhance security and eliminate human factors, digital version of IPI, the D-IPI was developed. A special 2D-barcode structure was designed, which contains sufficient quantity of encoded digital information and can be embedded into the photo. Other part of Digital-IPI is the reading software, that is able to retrieve the encoded information with high reliability. The reading software developed with a specific 2D structure is providing the possibility of a forensic analysis. Such analysis will discover all kind of manipulations -- globally, if the photography was simply changed and selectively, if only part of the photography was manipulated. Digital IPI is a good example how benefits of digital technology can be exploited by using optical security and how technology for optical security can be converted into digital technology. The D-IPI process is compatible with all current personalization printers and materials (polycarbonate, PVC, security papers, Teslin-foils, etc.) and can provide any document with enhanced security and tamper-resistance.
Jessup, Dana L; Glover Iv, McKinley; Daye, Dania; Banzi, Lynda; Jones, Philip; Choy, Garry; Shepard, Jo-Anne O; Flores, Efrén J
2018-02-15
Lung cancer is the leading cause of cancer-related deaths in the United States. Despite mandated insurance coverage for eligible patients, lung cancer screening rates remain low. Digital platforms, including social media, provide a potentially valuable tool to enhance health promotion and patient engagement related to lung cancer screening (LCS). The aim was to assess the effectiveness of LCS digital awareness campaigns on utilization of low-dose computed tomography (LDCT) and visits to institutional online educational content. A pay-per-click campaign utilizing Google and Facebook targeted adults aged 55 years and older and caregivers aged 18 years and older (eg, spouses, adult children) with LCS content during a 20-week intervention period from May to September 2016. A concurrent pay-per-click campaign using LinkedIn and Twitter targeted health care providers with LCS content. Geographic target radius was within 60 miles of an academic medical center. Social media data included aggregate demographics and click-through rates (CTRs). Primary outcome measures were visits to institutional Web pages and scheduled LDCT exams. Study period was 20 weeks before, during, and after the digital awareness campaigns. Weekly visits to the institutional LCS Web pages were significantly higher during the digital awareness campaigns compared to the 20-week period prior to implementation (mean 823.9, SD 905.8 vs mean 51, SD 22.3, P=.001). The patient digital awareness campaign surpassed industry standard CTRs on Google (5.85%, 1108/18,955 vs 1.8%) and Facebook (2.59%, 47,750/1,846,070 vs 0.8%). The provider digital awareness campaign surpassed industry standard CTR on LinkedIn (1.1%, 630/57,079 vs 0.3%) but not Twitter (0.19%, 1139/587,133 vs 0.25%). Mean scheduled LDCT exam volumes per week before, during, and after the digital awareness campaigns were 17.4 (SD 7.5), 20.4 (SD 5.4), and 26.2 (SD 6.4), respectively, with the difference between the mean number of scheduled exams after the digital awareness campaigns and the number of exams scheduled before and after the digital awareness campaigns being statistically significant (P<.001). Implementation of the LCS digital awareness campaigns was associated with increased visits to institutional educational Web pages and scheduled LDCT exams. Digital platforms are an important tool to enhance health promotion activities and engagement with patients and providers. ©Dana L Jessup, McKinley Glover IV, Dania Daye, Lynda Banzi, Philip Jones, Garry Choy, Jo-Anne O Shepard, Efrén J Flores. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 15.02.2018.
Realization of Quantum Digital Signatures without the Requirement of Quantum Memory
NASA Astrophysics Data System (ADS)
Collins, Robert J.; Donaldson, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.
2014-07-01
Digital signatures are widely used to provide security for electronic communications, for example, in financial transactions and electronic mail. Currently used classical digital signature schemes, however, only offer security relying on unproven computational assumptions. In contrast, quantum digital signatures offer information-theoretic security based on laws of quantum mechanics. Here, security against forging relies on the impossibility of perfectly distinguishing between nonorthogonal quantum states. A serious drawback of previous quantum digital signature schemes is that they require long-term quantum memory, making them impractical at present. We present the first realization of a scheme that does not need quantum memory and which also uses only standard linear optical components and photodetectors. In our realization, the recipients measure the distributed quantum signature states using a new type of quantum measurement, quantum state elimination. This significantly advances quantum digital signatures as a quantum technology with potential for real applications.
Realization of quantum digital signatures without the requirement of quantum memory.
Collins, Robert J; Donaldson, Ross J; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J; Andersson, Erika; Jeffers, John; Buller, Gerald S
2014-07-25
Digital signatures are widely used to provide security for electronic communications, for example, in financial transactions and electronic mail. Currently used classical digital signature schemes, however, only offer security relying on unproven computational assumptions. In contrast, quantum digital signatures offer information-theoretic security based on laws of quantum mechanics. Here, security against forging relies on the impossibility of perfectly distinguishing between nonorthogonal quantum states. A serious drawback of previous quantum digital signature schemes is that they require long-term quantum memory, making them impractical at present. We present the first realization of a scheme that does not need quantum memory and which also uses only standard linear optical components and photodetectors. In our realization, the recipients measure the distributed quantum signature states using a new type of quantum measurement, quantum state elimination. This significantly advances quantum digital signatures as a quantum technology with potential for real applications.
Portable electrocardiogram device using Android smartphone.
Brucal, S G E; Clamor, G K D; Pasiliao, L A O; Soriano, J P F; Varilla, L P M
2016-08-01
Portable electrocardiogram (ECG) capturing device can be interfaced to a smart phone installed with an android-based application (app). This app processes and analyses the data sent by the device to provide an interpretation of the patient/user's heart current condition (e.g.: beats per minute, heart signal waveform, R-R interval). The ECG recorded by the app is stored in the smart phone's Secure Digital (SD) card and cloud storage which can be accessed remotely by a physician to aid in providing medical diagnosis. The project aims to help patients living at a far distance from hospitals and experience difficulty in consulting their physician for regular check-ups, and assist doctors in regularly monitoring their patient's heart condition. The hardware data acquisition device and software application were subjected to trials in a clinic with volunteer-patients to measure the ECG and heart rate, data saving speed on the SD card, success rate of the saved data and uploaded file. Different ECG tests using the project prototype were done for 12 patients/users and yielded a reading difference of 7.61% in an R-R interval reading and 5.35% in heart rate reading as compared with the cardiologist's conventional 12-electrode ECG machine. Using the developed ECG device, it took less than 5 seconds to save ECG reading using SD card and approximately 2 minutes to upload via cloud.
Treatment of Low Back Pain with a Digital Multidisciplinary Pain Treatment App: Short-Term Results
Priebe, Janosch A; Baumann, Kaja-Maria; Plidschun, Anne; Schiessl, Christine; Tölle, Thomas R
2017-01-01
Background Even though modern concepts of disease management of unspecific low back pain (LBP) postulate active participation of patients, this strategy is difficult to adapt unless multidisciplinary pain therapy is applied. Recently, mobile health solutions have proven to be effective aides to foster self-management of many diseases. Objective The objective of this paper was to report on the retrospective short-term results of a digital multidisciplinary pain app for the treatment of LBP. Methods Kaia is a mobile app that digitalizes multidisciplinary pain treatment and is in the market as a medical product class I. For the current study, the data of anonymized Kaia users was retrospectively analyzed. User data were evaluated for 12 weeks regarding duration of use and effect on in-app user reported pain levels, using the numerical rating scale (NRS), depending on whether LBP was classified as acute, subacute, or chronic back pain according to current guidelines. Results Data of 180 users were available. The mean age of the users was 33.9 years (SD 10.9). Pain levels decreased from baseline NRS 4.8 to 3.75 for all users at the end of the observation period. Users who completed 4, 8, or 12 weeks showed an even more pronounced decrease in pain level NRS (baseline 4.9 [SD 1.7] versus 3.6 [SD 1.5] at 4 weeks; baseline 4.7 [SD 1.8] versus 3.2 [SD [2.0] at 8 weeks; baseline 4.6 [SD 2.2] versus 2.6 [SD 2.0] at 12 weeks). In addition, subgroup analysis of acute, subacute, or chronic classification revealed no significant main effect of group (P>.30) on the reduction of pain. Conclusions: This retrospective study showed that in a pre-selected population of app users, an app digitalizing multidisciplinary rehabilitation for the self-management of LBP reduced user-reported pain levels significantly. The observed effect size was clinically relevant. Ongoing prospective randomized controlled trials (RCTs) will adjust for potential bias and selection effects. Conclusions This retrospective study showed that in a pre-selected population of app users, an app digitalizing multidisciplinary rehabilitation for the self-management of LBP reduced user-reported pain levels significantly. The observed effect size was clinically relevant. Ongoing prospective RCTs will adjust for potential bias and selection effects. PMID:29203460
Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model
NASA Astrophysics Data System (ADS)
Uzunay, Yusuf; Incebacak, Davut; Bicakci, Kemal
How to Capture and Preserve Digital Evidence Securely? For the investigation and prosecution of criminal activities that involve computers, digital evidence collected in the crime scene has a vital importance. On one side, it is a very challenging task for forensics professionals to collect them without any loss or damage. On the other, there is the second problem of providing the integrity and authenticity in order to achieve legal acceptance in a court of law. By conceiving digital evidence simply as one instance of digital data, it is evident that modern cryptography offers elegant solutions for this second problem. However, to our knowledge, there is not any previous work proposing a systematic model having a holistic view to address all the related security problems in this particular case of digital evidence verification. In this paper, we present PKIDEV (Public Key Infrastructure based Digital Evidence Verification model) as an integrated solution to provide security for the process of capturing and preserving digital evidence. PKIDEV employs, inter alia, cryptographic techniques like digital signatures and secure time-stamping as well as latest technologies such as GPS and EDGE. In our study, we also identify the problems public-key cryptography brings when it is applied to the verification of digital evidence.
NASA Astrophysics Data System (ADS)
Yan, Xin; Zhang, Ling; Wu, Yang; Luo, Youlong; Zhang, Xiaoxing
2017-02-01
As more and more wireless sensor nodes and networks are employed to acquire and transmit the state information of power equipment in smart grid, we are in urgent need of some viable security solutions to ensure secure smart grid communications. Conventional information security solutions, such as encryption/decryption, digital signature and so forth, are not applicable to wireless sensor networks in smart grid any longer, where bulk messages need to be exchanged continuously. The reason is that these cryptographic solutions will account for a large portion of the extremely limited resources on sensor nodes. In this article, a security solution based on digital watermarking is adopted to achieve the secure communications for wireless sensor networks in smart grid by data and entity authentications at a low cost of operation. Our solution consists of a secure framework of digital watermarking, and two digital watermarking algorithms based on alternating electric current and time window, respectively. Both watermarking algorithms are composed of watermark generation, embedding and detection. The simulation experiments are provided to verify the correctness and practicability of our watermarking algorithms. Additionally, a new cloud-based architecture for the information integration of smart grid is proposed on the basis of our security solutions.
Bus driving assistance system for town area by using ATmega328P microcontroller
NASA Astrophysics Data System (ADS)
Zakaria, Mohamad Fauzi; Soon, Tan Jiah; Rohani, Munzilah Md
2017-09-01
Recently, several bus accidents happened because of bus driver's behavior. In fact, there is no dedicated tool for assisting them to drive safely. This project gives solutions to this by assisting the driver, according to the speed and acceleration of the bus. These data are collected by using a motion processing unit (MPU-6050) and a global positioning system (GPS) and then indicate the driving mode status on the LEDs. All data and status are recorded in a secure digital (SD) card for the authority or the bus company to analyze the driving behavior of a bus driver. This system has been successfully developed and tested in two different areas which includes the UTHM main campus and the road from Parit Raja to Batu Pahat.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Muir, Ryan D.; Sullivan, Shane Z.; Oglesbee, Robert A.
Digital lock-in amplification (LIA) with synchronous digitization (SD) is shown to provide significant signal to noise (S/N) and linear dynamic range advantages in beam-scanning microscopy measurements using pulsed laser sources. Direct comparisons between SD-LIA and conventional LIA in homodyne second harmonic generation measurements resulted in S/N enhancements consistent with theoretical models. SD-LIA provided notably larger S/N enhancements in the limit of low light intensities, through the smooth transition between photon counting and signal averaging developed in previous work. Rapid beam scanning instrumentation with up to video rate acquisition speeds minimized photo-induced sample damage. The corresponding increased allowance for higher lasermore » power without sample damage is advantageous for increasing the observed signal content.« less
A Cyber Security Self-Assessment Method for Nuclear Power Plants
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Coles, Garill A.; Bass, Robert B.
2004-11-01
A cyber security self-assessment method (the Method) has been developed by Pacific Northwest National Laboratory. The development of the Method was sponsored and directed by the U.S. Nuclear Regulatory Commission. Members of the Nuclear Energy Institute Cyber Security Task Force also played a substantial role in developing the Method. The Method's structured approach guides nuclear power plants in scrutinizing their digital systems, assessing the potential consequences to the plant of a cyber exploitation, identifying vulnerabilities, estimating cyber security risks, and adopting cost-effective protective measures. The focus of the Method is on critical digital assets. A critical digital asset is amore » digital device or system that plays a role in the operation, maintenance, or proper functioning of a critical system (i.e., a plant system that can impact safety, security, or emergency preparedness). A critical digital asset may have a direct or indirect connection to a critical system. Direct connections include both wired and wireless communication pathways. Indirect connections include sneaker-net pathways by which software or data are manually transferred from one digital device to another. An indirect connection also may involve the use of instructions or data stored on a critical digital asset to make adjustments to a critical system. The cyber security self-assessment begins with the formation of an assessment team, and is followed by a six-stage process.« less
Access control based on attribute certificates for medical intranet applications.
Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M
2001-01-01
Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.
Yin, Su; Dongjie, Guan; Weici, Su; Weijun, Gao
2017-11-01
The demand for global freshwater is growing, while global freshwater available for human use is limited within a certain time and space. Its security has significant impacts on both the socio-economic system and ecological system. Recently, studies have focused on the urban water security system (UWSS) in terms of either water quantity or water quality. In this study, water resources, water environment, and water disaster issues in the UWSS were combined to establish an evaluation index system with system dynamics (SD) and geographic information systems (GIS). The GIS method performs qualitative analysis from the perspective of the spatial dimension; meanwhile, the SD method performs quantitative calculation about related water security problems from the perspective of the temporal dimension. We established a UWSS model for Guizhou province, China to analyze influencing factors, main driving factors, and system variation law, by using the SD method. We simulated the water security system from 2005 to 2025 under four scenarios (Guiyang scenario, Zunyi scenario, Bijie scenario and combined scenario). The results demonstrate that: (1) the severity of water security in cities is ranked as follows: three cities are secure in Guizhou province, four cities are in basic security and two cities are in a situation of insecurity from the spatial dimension of GIS through water security synthesis; and (2) the major driving factors of UWSS in Guizhou province include agricultural irrigation water demand, soil and water losses area, a ratio increase to the standard of water quality, and investment in environmental protection. A combined scenario is the best solution for UWSS by 2025 in Guizhou province under the four scenarios from the temporal dimension of SD. The results of this study provide a useful suggestion for the management of freshwater for the cities of Guizhou province in southwest China.
Transitioning from analog to digital communications: An information security perspective
NASA Technical Reports Server (NTRS)
Dean, Richard A.
1990-01-01
A summary is given of the government's perspective on evolving digital communications as they affect secure voice users and approaches for operating during a transition period to an all digital world. An integrated architecture and a mobile satellite interface are discussed.
Dixon, Brian E; Barboza, Katherine; Jensen, Ashley E; Bennett, Katelyn J; Sherman, Scott E; Schwartz, Mark D
2017-02-15
As healthcare moves towards technology-driven population health management, clinicians must adopt complex digital platforms to access health information and document care. This study explored information literacy, a set of skills required to effectively navigate population health information systems, among primary care providers in one Veterans' Affairs (VA) medical center. Information literacy was assessed during an 8-month randomized trial that tested a population health (panel) management intervention. Providers were asked about their use and comfort with two VA digital tools for panel management at baseline, 16 weeks, and post-intervention. An 8-item scale (range 0-40) was used to measure information literacy (Cronbach's α=0.84). Scores between study arms and provider types were compared using paired t-tests and ANOVAs. Associations between self-reported digital tool use and information literacy were measured via Pearson's correlations. Providers showed moderate levels of information literacy (M= 27.4, SD 6.5). There were no significant differences in mean information literacy between physicians (M=26.4, SD 6.7) and nurses (M=30.5, SD 5.2, p=0.57 for difference), or between intervention (M=28.4, SD 6.5) and control groups (M=25.1, SD 6.2, p=0.12 for difference). Information literacy was correlated with higher rates of self-reported information system usage (r=0.547, p=0.001). Clinicians identified data access, accuracy, and interpretability as potential information literacy barriers. While exploratory in nature, cautioning generalizability, the study suggests that measuring and improving clinicians' information literacy may play a significant role in the implementation and use of digital information tools, as these tools are rapidly being deployed to enhance communication among care teams, improve health care outcomes, and reduce overall costs.
Kutzner, Karl Philipp; Pfeil, Joachim; Kovacevic, Mark Predrag
2017-07-01
Modern total hip arthroplasty is largely dependent on the successful preservation of hip geometry. Thus, a successful implementation of the preoperative planning is of great importance. The present study evaluates the accuracy of anatomic hip reconstruction predicted by 2D digital planning using a calcar-guided short stem of the newest generation. A calcar-guided short stem was implanted in 109 patients in combination with a cementless cup using the modified anterolateral approach. Preoperative digital planning was performed including implant size, caput-collum-diaphyseal angle, offset, and leg length using mediCAD II software. A coordinate system and individual scale factors were implemented. Postoperative outcome was evaluated accordingly and was compared to the planning. Intraoperatively used stem sizes were within one unit of the planned stem sizes. The postoperative stem alignment showed a minor and insignificant (p = 0.159) mean valgization of 0.5° (SD 3.79°) compared to the planned caput-collum-diaphyseal angles. Compared to the planning, mean femoral offset gained 2.18 (SD 4.24) mm, while acetabular offset was reduced by 0.78 (SD 4.36) mm during implantation resulting in an increased global offset of 1.40 (SD 5.51) mm (p = 0.0094). Postoperative femoroacetabular height increased by a mean of 5.00 (SD 5.98) mm (p < 0.0001) compared to preoperative measures. Two-dimensional digital preoperative planning in calcar-guided short-stem total hip arthroplasty assures a satisfying implementation of the intended anatomy. Valgization, which has been frequently observed in previous short-stem designs, negatively affecting offset, can be avoided. However, surgeons have to be aware of a possible leg lengthening.
Measuring Practicing Clinicians’ Information Literacy
Barboza, Katherine; Jensen, Ashley E.; Bennett, Katelyn J.; Sherman, Scott E.; Schwartz, Mark D.
2017-01-01
Summary Background As healthcare moves towards technology-driven population health management, clinicians must adopt complex digital platforms to access health information and document care. Objectives This study explored information literacy, a set of skills required to effectively navigate population health information systems, among primary care providers in one Veterans’ Affairs (VA) medical center. Methods Information literacy was assessed during an 8-month randomized trial that tested a population health (panel) management intervention. Providers were asked about their use and comfort with two VA digital tools for panel management at baseline, 16 weeks, and post-intervention. An 8-item scale (range 0-40) was used to measure information literacy (Cronbach’s a=0.84). Scores between study arms and provider types were compared using paired t-tests and ANOVAs. Associations between self-reported digital tool use and information literacy were measured via Pearson’s correlations. Results Providers showed moderate levels of information literacy (M= 27.4, SD 6.5). There were no significant differences in mean information literacy between physicians (M=26.4, SD 6.7) and nurses (M=30.5, SD 5.2, p=0.57 for difference), or between intervention (M=28.4, SD 6.5) and control groups (M=25.1, SD 6.2, p=0.12 for difference). Information literacy was correlated with higher rates of self-reported information system usage (r=0.547, p=0.001). Clinicians identified data access, accuracy, and interpretability as potential information literacy barriers. Conclusions While exploratory in nature, cautioning generalizability, the study suggests that measuring and improving clinicians’ information literacy may play a significant role in the implementation and use of digital information tools, as these tools are rapidly being deployed to enhance communication among care teams, improve health care outcomes, and reduce overall costs. PMID:28197620
Vecsei, Bálint; Joós-Kovács, Gellért; Borbély, Judit; Hermann, Péter
2017-04-01
To compare the accuracy (trueness, precision) of direct and indirect scanning CAD/CAM methods. A master cast with prepared abutments and edentulous parts was created from polymethyl methacrylate (PMMA). A high-resolution industrial scanner was used to create a reference model. Polyvinyl-siloxane (PVS) impressions and digital impressions with three intraoral scanners (iTero, Cerec, Trios) were made (n=10 for each) from the PMMA model. A laboratory scanner (Scan CS2) was used to digitize the sectioned cast made from the PVS impressions. The stereolithographic (STL) files of the impressions (n=40) were exported. Each file was compared to the reference using Geomagic Verify software. Six points were assigned to enable virtual calliper measurement of three distances of varying size within the arch. Methods were compared using interquartile range regression and equality-of-variance tests for precision, and mixed-effects linear regression for trueness. The mean (SD) deviation of short distance measurements from the reference value was -40.3 (79.7) μm using the indirect, and 22.3 (40.0) μm using the direct method. For the medium distance, indirect measurements deviated by 5.2 (SD: 111.3) μm, and direct measurements by 115.8 (SD: 50.7) μm, on average; for the long distance, the corresponding estimates were -325.8 (SD: 134.1) μm with the indirect, and -163.5 (SD: 145.5) μm with the direct method. Significant differences were found between the two methods (p<0.05). With both methods, the shorter the distance, the more accurate results were achieved. Virtual models obtained by digital impressions can be more accurate than their conventional counterparts. Copyright © 2016 Japan Prosthodontic Society. Published by Elsevier Ltd. All rights reserved.
High-Speed Large-Alphabet Quantum Key Distribution Using Photonic Integrated Circuits
2014-01-28
polarizing beam splitter, TDC: time-to-digital converter. Extra&loss& photon/bin frame size QSER secure bpp ECC secure&key&rate& none& 0.0031 64 14...to-digital converter. photon/frame frame size QSER secure bpp ECC secure&key& rate& 1.3 16 9.5 % 2.9 layered LDPC 7.3&Mbps& Figure 24: Operating
Self-digitization microfluidic chip for absolute quantification of mRNA in single cells.
Thompson, Alison M; Gansen, Alexander; Paguirigan, Amy L; Kreutz, Jason E; Radich, Jerald P; Chiu, Daniel T
2014-12-16
Quantification of mRNA in single cells provides direct insight into how intercellular heterogeneity plays a role in disease progression and outcomes. Quantitative polymerase chain reaction (qPCR), the current gold standard for evaluating gene expression, is insufficient for providing absolute measurement of single-cell mRNA transcript abundance. Challenges include difficulties in handling small sample volumes and the high variability in measurements. Microfluidic digital PCR provides far better sensitivity for minute quantities of genetic material, but the typical format of this assay does not allow for counting of the absolute number of mRNA transcripts samples taken from single cells. Furthermore, a large fraction of the sample is often lost during sample handling in microfluidic digital PCR. Here, we report the absolute quantification of single-cell mRNA transcripts by digital, one-step reverse transcription PCR in a simple microfluidic array device called the self-digitization (SD) chip. By performing the reverse transcription step in digitized volumes, we find that the assay exhibits a linear signal across a wide range of total RNA concentrations and agrees well with standard curve qPCR. The SD chip is found to digitize a high percentage (86.7%) of the sample for single-cell experiments. Moreover, quantification of transferrin receptor mRNA in single cells agrees well with single-molecule fluorescence in situ hybridization experiments. The SD platform for absolute quantification of single-cell mRNA can be optimized for other genes and may be useful as an independent control method for the validation of mRNA quantification techniques.
Access Control based on Attribute Certificates for Medical Intranet Applications
Georgiadis, Christos; Pangalos, George; Khair, Marie
2001-01-01
Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951
Using digital watermarking to enhance security in wireless medical image transmission.
Giakoumaki, Aggeliki; Perakis, Konstantinos; Banitsas, Konstantinos; Giokas, Konstantinos; Tachakra, Sapal; Koutsouris, Dimitris
2010-04-01
During the last few years, wireless networks have been increasingly used both inside hospitals and in patients' homes to transmit medical information. In general, wireless networks suffer from decreased security. However, digital watermarking can be used to secure medical information. In this study, we focused on combining wireless transmission and digital watermarking technologies to better secure the transmission of medical images within and outside the hospital. We utilized an integrated system comprising the wireless network and the digital watermarking module to conduct a series of tests. The test results were evaluated by medical consultants. They concluded that the images suffered no visible quality degradation and maintained their diagnostic integrity. The proposed integrated system presented reasonable stability, and its performance was comparable to that of a fixed network. This system can enhance security during the transmission of medical images through a wireless channel.
Treatment of Low Back Pain with a Digital Multidisciplinary Pain Treatment App: Short-Term Results.
Huber, Stephan; Priebe, Janosch A; Baumann, Kaja-Maria; Plidschun, Anne; Schiessl, Christine; Tölle, Thomas R
2017-12-04
Even though modern concepts of disease management of unspecific low back pain (LBP) postulate active participation of patients, this strategy is difficult to adapt unless multidisciplinary pain therapy is applied. Recently, mobile health solutions have proven to be effective aides to foster self-management of many diseases. The objective of this paper was to report on the retrospective short-term results of a digital multidisciplinary pain app for the treatment of LBP. Kaia is a mobile app that digitalizes multidisciplinary pain treatment and is in the market as a medical product class I. For the current study, the data of anonymized Kaia users was retrospectively analyzed. User data were evaluated for 12 weeks regarding duration of use and effect on in-app user reported pain levels, using the numerical rating scale (NRS), depending on whether LBP was classified as acute, subacute, or chronic back pain according to current guidelines. Data of 180 users were available. The mean age of the users was 33.9 years (SD 10.9). Pain levels decreased from baseline NRS 4.8 to 3.75 for all users at the end of the observation period. Users who completed 4, 8, or 12 weeks showed an even more pronounced decrease in pain level NRS (baseline 4.9 [SD 1.7] versus 3.6 [SD 1.5] at 4 weeks; baseline 4.7 [SD 1.8] versus 3.2 [SD [2.0] at 8 weeks; baseline 4.6 [SD 2.2] versus 2.6 [SD 2.0] at 12 weeks). In addition, subgroup analysis of acute, subacute, or chronic classification revealed no significant main effect of group (P>.30) on the reduction of pain. Conclusions: This retrospective study showed that in a pre-selected population of app users, an app digitalizing multidisciplinary rehabilitation for the self-management of LBP reduced user-reported pain levels significantly. The observed effect size was clinically relevant. Ongoing prospective randomized controlled trials (RCTs) will adjust for potential bias and selection effects. This retrospective study showed that in a pre-selected population of app users, an app digitalizing multidisciplinary rehabilitation for the self-management of LBP reduced user-reported pain levels significantly. The observed effect size was clinically relevant. Ongoing prospective RCTs will adjust for potential bias and selection effects. ©Stephan Huber, Janosch A Priebe, Kaja-Maria Baumann, Anne Plidschun, Christine Schiessl, Thomas R Tölle. Originally published in JMIR Rehabilitation and Assistive Technology (http://rehab.jmir.org), 04.12.2017.
Secure medical digital libraries.
Papadakis, I; Chrissikopoulos, V; Polemi, D
2001-12-01
In this paper, a secure medical digital library is presented. It is based on the CORBA specifications for distributed systems. The described approach relies on a three-tier architecture. Interaction between the medical digital library and its users is achieved through a Web server. The choice of employing Web technology for the dissemination of medical data has many advantages compared to older approaches, but also poses extra requirements that need to be fulfilled. Thus, special attention is paid to the distinguished nature of such medical data, whose integrity and confidentiality should be preserved at all costs. This is achieved through the employment of Trusted Third Parties (TTP) technology for the support of the required security services. Additionally, the proposed digital library employs smartcards for the management of the various security tokens that are used from the above services.
Lee, Hyekyung; Han, Myungein; Yoo, Taejo; Jung, Chanho; Son, Hyun-Jin; Cho, Migyung
2018-05-01
Development of computerized image analysis techniques has opened up the possibility for the quantitative analysis of nuclear chromatin in pathology. We hypothesized that the features extracted from digital images could be used to determine specific cytomorphological findings for nuclear chromatin that may be applicable for establishing a medical diagnosis. Three parameters were evaluated from nuclear chromatin images obtained from the liquid-based cervical cytology samples of patients with biopsy-proven high-grade squamous intraepithelial lesion (HGSIL), and compared between non-neoplastic squamous epithelia and dysplastic epithelia groups: (1) standard deviation (SD) of the grayscale intensity; (2) difference between the maximum and minimum grayscale intensity (M-M); and (3) thresholded area percentage. Each parameter was evaluated at the mean, mean-1SD, and mean-2SD thresholding intensity levels. Between the mean and mean-1SD levels, the thresholded nuclear chromatin pattern was most similar to the chromatin granularity of the unthresholded grayscale images. The SD of the gray intensity and the thresholded area percentage differed significantly between the non-neoplastic squamous epithelia and dysplastic epithelia of HGSIL images at all three thresholding intensity levels (mean, mean-1SD, and mean-2SD). However, the M-M significantly differed between the two sample types for only two of the thresholding intensity levels (mean-1SD and mean-2SD). The digital parameters SD and M-M of the grayscale intensity, along with the thresholded area percentage could be useful in automated cytological evaluations. Further studies are needed to identify more valuable parameters for clinical application. © 2018 Wiley Periodicals, Inc.
Wang, Chun; Zheng, Yi; Chang, Hua-Hua
2014-01-01
With the advent of web-based technology, online testing is becoming a mainstream mode in large-scale educational assessments. Most online tests are administered continuously in a testing window, which may post test security problems because examinees who take the test earlier may share information with those who take the test later. Researchers have proposed various statistical indices to assess the test security, and one most often used index is the average test-overlap rate, which was further generalized to the item pooling index (Chang & Zhang, 2002, 2003). These indices, however, are all defined as the means (that is, the expected proportion of common items among examinees) and they were originally proposed for computerized adaptive testing (CAT). Recently, multistage testing (MST) has become a popular alternative to CAT. The unique features of MST make it important to report not only the mean, but also the standard deviation (SD) of test overlap rate, as we advocate in this paper. The standard deviation of test overlap rate adds important information to the test security profile, because for the same mean, a large SD reflects that certain groups of examinees share more common items than other groups. In this study, we analytically derived the lower bounds of the SD under MST, with the results under CAT as a benchmark. It is shown that when the mean overlap rate is the same between MST and CAT, the SD of test overlap tends to be larger in MST. A simulation study was conducted to provide empirical evidence. We also compared the security of MST under the single-pool versus the multiple-pool designs; both analytical and simulation studies show that the non-overlapping multiple-pool design will slightly increase the security risk.
Photonic quantum digital signatures operating over kilometer ranges in installed optical fiber
NASA Astrophysics Data System (ADS)
Collins, Robert J.; Fujiwara, Mikio; Amiri, Ryan; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Andersson, Erika; Buller, Gerald S.; Sasaki, Masahide
2016-10-01
The security of electronic communications is a topic that has gained noteworthy public interest in recent years. As a result, there is an increasing public recognition of the existence and importance of mathematically based approaches to digital security. Many of these implement digital signatures to ensure that a malicious party has not tampered with the message in transit, that a legitimate receiver can validate the identity of the signer and that messages are transferable. The security of most digital signature schemes relies on the assumed computational difficulty of solving certain mathematical problems. However, reports in the media have shown that certain implementations of such signature schemes are vulnerable to algorithmic breakthroughs and emerging quantum processing technologies. Indeed, even without quantum processors, the possibility remains that classical algorithmic breakthroughs will render these schemes insecure. There is ongoing research into information-theoretically secure signature schemes, where the security is guaranteed against an attacker with arbitrary computational resources. One such approach is quantum digital signatures. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics while comparable classical protocols require additional resources such as anonymous broadcast and/or a trusted authority. Previously, most early demonstrations of quantum digital signatures required dedicated single-purpose hardware and operated over restricted ranges in a laboratory environment. Here, for the first time, we present a demonstration of quantum digital signatures conducted over several kilometers of installed optical fiber. The system reported here operates at a higher signature generation rate than previous fiber systems.
76 FR 6395 - Lawrence County Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-04
... in Spearfish, SD. The committee is meeting as authorized under the Secure Rural Schools and Community... N. Main. Written comments should be sent to Rhonda O'Byrne, 2014 N. Main, Spearfish, SD 57783...
Approach to spatial information security based on digital certificate
NASA Astrophysics Data System (ADS)
Cong, Shengri; Zhang, Kai; Chen, Baowen
2005-11-01
With the development of the online applications of geographic information systems (GIS) and the spatial information services, the spatial information security becomes more important. This work introduced digital certificates and authorization schemes into GIS to protect the crucial spatial information combining the techniques of the role-based access control (RBAC), the public key infrastructure (PKI) and the privilege management infrastructure (PMI). We investigated the spatial information granularity suited for sensitivity marking and digital certificate model that fits the need of GIS security based on the semantics analysis of spatial information. It implements a secure, flexible, fine-grained data access based on public technologies in GIS in the world.
Boonen, Bert; Schotanus, Martijn G M; Kerens, Bart; Hulsmans, Frans-Jan; Tuinebreijer, Wim E; Kort, Nanne P
2017-09-01
To assess whether there is a significant difference between the alignment of the individual femoral and tibial components (in the frontal, sagittal and horizontal planes) as calculated pre-operatively (digital plan) and the actually achieved alignment in vivo obtained with the use of patient-specific positioning guides (PSPGs) for TKA. It was hypothesised that there would be no difference between post-op implant position and pre-op digital plan. Twenty-six patients were included in this non-inferiority trial. Software permitted matching of the pre-operative MRI scan (and therefore calculated prosthesis position) to a pre-operative CT scan and then to a post-operative full-leg CT scan to determine deviations from pre-op planning in all three anatomical planes. For the femoral component, mean absolute deviations from planning were 1.8° (SD 1.3), 2.5° (SD 1.6) and 1.6° (SD 1.4) in the frontal, sagittal and transverse planes, respectively. For the tibial component, mean absolute deviations from planning were 1.7° (SD 1.2), 1.7° (SD 1.5) and 3.2° (SD 3.6) in the frontal, sagittal and transverse planes, respectively. Absolute mean deviation from planned mechanical axis was 1.9°. The a priori specified null hypothesis for equivalence testing: the difference from planning is >3 or <-3 was rejected for all comparisons except for the tibial transverse plane. PSPG was able to adequately reproduce the pre-op plan in all planes, except for the tibial rotation in the transverse plane. Possible explanations for outliers are discussed and highlight the importance for adequate training surgeons before they start using PSPG in their day-by-day practise. Prospective cohort study, Level II.
Digitally Controlled ’Programmable’ Active Filters.
1985-12-01
Advisor: Sherif Michael Approved for public release; distribution is unlimited. U - ~ .%~ ~ % %’.4 ~ -. 4-. " %’ -. .4. z. . 4, ,4°*-4° -o - ’ SECURITY ...CLASSIFICATION O THI PAGE ff ,’- -""" REPORT DOCUMENTATION PAGE Ia REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 2a SECURITY CLASSIFICATION...ELEMENT NO. NO NO. ACCESSION NO. S 11 TITLE (Include Security ClassWfication) , DIGITALLY CONTROLLED "PROGRAMMABLE" ACTIVE FILTERS 1 PERSONAL AUTHOR
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-26
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Digital Video Systems, Inc., Geocom Resources, Inc., and GoldMountain Exploration Corp., and Real Data, Inc. (a/k/a Galtech... securities of Digital Video Systems, Inc. because it has not filed any periodic reports since the period...
76 FR 52634 - Pennington County Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-23
... Committee will meet in Rapid City, SD. The committee is meeting as authorized under the Secure Rural Schools... sent to Robert J. Thompson, 8221 South Highway 16, Rapid City, SD 57702. Comments may also be sent via...
75 FR 37753 - Lawrence County Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-30
... will meet in Spearfish, SD. The committee is meeting as authorized under the Secure Rural Schools and..., SD 57783. Comments may also be sent via e-mail to [email protected] , or via facsimile to 605-642...
76 FR 44894 - Pennington County Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-27
... Committee will meet in Rapid City, SD. The committee is meeting as authorized under the Secure Rural Schools... J. Thompson, 8221 South Highway 16, Rapid City, SD 57702. Comments may also be sent via e-mail to...
76 FR 30641 - Pennington County Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-26
... Committee will meet in Rapid City, SD. The committee is meeting as authorized under the Secure Rural Schools... sent to Robert J. Thompson, 8221 South Highway 16, Rapid City, SD 57702. Comments may also be sent via...
76 FR 20942 - Pennington County Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-14
... meet in Rapid City, SD. The committee is meeting as authorized under the Secure Rural Schools and... J. Thompson, 8221 South Highway 16, Rapid City, SD 57702. Comments may also be sent via e-mail to...
77 FR 49778 - Pennington County Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-17
... Committee will meet in Rapid City, SD. The committee is meeting as authorized under the Secure Rural Schools.... Stansfield, 8221 South Highway 16, Rapid City, SD 57702. Comments may also be sent via email to jstansfield...
Evaluation of security algorithms used for security processing on DICOM images
NASA Astrophysics Data System (ADS)
Chen, Xiaomeng; Shuai, Jie; Zhang, Jianguo; Huang, H. K.
2005-04-01
In this paper, we developed security approach to provide security measures and features in PACS image acquisition and Tele-radiology image transmission. The security processing on medical images was based on public key infrastructure (PKI) and including digital signature and data encryption to achieve the security features of confidentiality, privacy, authenticity, integrity, and non-repudiation. There are many algorithms which can be used in PKI for data encryption and digital signature. In this research, we select several algorithms to perform security processing on different DICOM images in PACS environment, evaluate the security processing performance of these algorithms, and find the relationship between performance with image types, sizes and the implementation methods.
Securing Digital Audio using Complex Quadratic Map
NASA Astrophysics Data System (ADS)
Suryadi, MT; Satria Gunawan, Tjandra; Satria, Yudi
2018-03-01
In This digital era, exchanging data are common and easy to do, therefore it is vulnerable to be attacked and manipulated from unauthorized parties. One data type that is vulnerable to attack is digital audio. So, we need data securing method that is not vulnerable and fast. One of the methods that match all of those criteria is securing the data using chaos function. Chaos function that is used in this research is complex quadratic map (CQM). There are some parameter value that causing the key stream that is generated by CQM function to pass all 15 NIST test, this means that the key stream that is generated using this CQM is proven to be random. In addition, samples of encrypted digital sound when tested using goodness of fit test are proven to be uniform, so securing digital audio using this method is not vulnerable to frequency analysis attack. The key space is very huge about 8.1×l031 possible keys and the key sensitivity is very small about 10-10, therefore this method is also not vulnerable against brute-force attack. And finally, the processing speed for both encryption and decryption process on average about 450 times faster that its digital audio duration.
Werner-Wasik, Maria; Nelson, Arden D; Choi, Walter; Arai, Yoshio; Faulhaber, Peter F; Kang, Patrick; Almeida, Fabio D; Xiao, Ying; Ohri, Nitin; Brockway, Kristin D; Piper, Jonathan W; Nelson, Aaron S
2012-03-01
To evaluate the accuracy and consistency of a gradient-based positron emission tomography (PET) segmentation method, GRADIENT, compared with manual (MANUAL) and constant threshold (THRESHOLD) methods. Contouring accuracy was evaluated with sphere phantoms and clinically realistic Monte Carlo PET phantoms of the thorax. The sphere phantoms were 10-37 mm in diameter and were acquired at five institutions emulating clinical conditions. One institution also acquired a sphere phantom with multiple source-to-background ratios of 2:1, 5:1, 10:1, 20:1, and 70:1. One observer segmented (contoured) each sphere with GRADIENT and THRESHOLD from 25% to 50% at 5% increments. Subsequently, seven physicians segmented 31 lesions (7-264 mL) from 25 digital thorax phantoms using GRADIENT, THRESHOLD, and MANUAL. For spheres <20 mm in diameter, GRADIENT was the most accurate with a mean absolute % error in diameter of 8.15% (10.2% SD) compared with 49.2% (51.1% SD) for 45% THRESHOLD (p < 0.005). For larger spheres, the methods were statistically equivalent. For varying source-to-background ratios, GRADIENT was the most accurate for spheres >20 mm (p < 0.065) and <20 mm (p < 0.015). For digital thorax phantoms, GRADIENT was the most accurate (p < 0.01), with a mean absolute % error in volume of 10.99% (11.9% SD), followed by 25% THRESHOLD at 17.5% (29.4% SD), and MANUAL at 19.5% (17.2% SD). GRADIENT had the least systematic bias, with a mean % error in volume of -0.05% (16.2% SD) compared with 25% THRESHOLD at -2.1% (34.2% SD) and MANUAL at -16.3% (20.2% SD; p value <0.01). Interobserver variability was reduced using GRADIENT compared with both 25% THRESHOLD and MANUAL (p value <0.01, Levene's test). GRADIENT was the most accurate and consistent technique for target volume contouring. GRADIENT was also the most robust for varying imaging conditions. GRADIENT has the potential to play an important role for tumor delineation in radiation therapy planning and response assessment. Copyright © 2012. Published by Elsevier Inc.
76 FR 40678 - Pennington County Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-11
... Committee will meet in Rapid City, SD. The committee is meeting as authorized under the Secure Rural Schools... Robert J. Thompson, 8221 South Highway 16, Rapid City, SD 57702. Comments may also be sent via e-mail to...
Development open source microcontroller based temperature data logger
NASA Astrophysics Data System (ADS)
Abdullah, M. H.; Che Ghani, S. A.; Zaulkafilai, Z.; Tajuddin, S. N.
2017-10-01
This article discusses the development stages in designing, prototyping, testing and deploying a portable open source microcontroller based temperature data logger for use in rough industrial environment. The 5V powered prototype of data logger is equipped with open source Arduino microcontroller for integrating multiple thermocouple sensors with their module, secure digital (SD) card storage, liquid crystal display (LCD), real time clock and electronic enclosure made of acrylic. The program for the function of the datalogger is programmed so that 8 readings from the thermocouples can be acquired within 3 s interval and displayed on the LCD simultaneously. The recorded temperature readings at four different points on both hydrodistillation show similar profile pattern and highest yield of extracted oil was achieved on hydrodistillation 2 at 0.004%. From the obtained results, this study achieved the objective of developing an inexpensive, portable and robust eight channels temperature measuring module with capabilities to monitor and store real time data.
Maritime Cyber Security University Research
2016-05-01
traffic so vital to the global economy . The vulnerabilities associated with reliance on digital systems in the maritime environment must be continuously...Abstract (MAXIMUM 200 WORDS) Modern maritime systems are highly complex digital systems to ensure the safety and efficient operation of the shipping...integrity of the entrances to our " digital ports" and work to develop practical cyber security solutions to protect the nation’s maritime
Maritime Cyber Security University Research: Phase 1
2016-05-01
the global economy . The vulnerabilities associated with reliance on digital systems in the maritime environment must be continuously examined. System...Report: Modern maritime systems are highly complex digital systems to ensure the safety and efficient operation of the shipping traffic so vital to...entrances to our " digital ports" and work to develop practical cyber security solutions to protect the nation’s maritime infrastructure. 17. Key
Security Research on VoIP with Watermarking
NASA Astrophysics Data System (ADS)
Hu, Dong; Lee, Ping
2008-11-01
With the wide application of VoIP, many problems have occurred. One of the problems is security. The problems with securing VoIP systems, insufficient standardization and lack of security mechanisms emerged the need for new approaches and solutions. In this paper, we propose a new security architecture for VoIP which is based on digital watermarking which is a new, flexible and powerful technology that is increasingly gaining more and more attentions. Besides known applications e.g. to solve copyright protection problems, we propose to use digital watermarking to secure not only transmitted audio but also signaling protocol that VoIP is based on.
Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio
2015-08-01
The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.
75 FR 35508 - Draft Regulatory Guide: Issuance, Availability
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-22
... Systems and Networks,'' requires licensees to develop cyber-security plans and programs to protect critical digital assets, including digital safety systems, from malicious cyber attacks. Regulatory Guide 5.71, ``Cyber Security Programs for Nuclear Facilities,'' provides guidance to meet the requirements of...
Digital camera with apparatus for authentication of images produced from an image file
NASA Technical Reports Server (NTRS)
Friedman, Gary L. (Inventor)
1993-01-01
A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely based upon the private key that digital data encrypted with the private key by the processor may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating at any time the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match, since even one bit change in the image hash will cause the image hash to be totally different from the secure hash.
6. Interior, rear offices: operations assistant office looking north toward ...
6. Interior, rear offices: operations assistant office looking north toward security operations officer's office. - Ellsworth Air Force Base, Rushmore Air Force Station, Security Central Control Building, Quesada Drive, Blackhawk, Meade County, SD
77 FR 70176 - Previous Participation Certification
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-23
... percent automated and digital submission of all data and certifications is available via HUD's secure... information is designed to be 100 percent automated and digital submission of all data and certifications is available via HUD's secure Internet systems. However HUD will provide for both electronic and paper...
Digitizing and Securing Archived Laboratory Notebooks
ERIC Educational Resources Information Center
Caporizzo, Marilyn
2008-01-01
The Information Group at Millipore has been successfully using a digital rights management tool to secure the email distribution of archived laboratory notebooks. Millipore is a life science leader providing cutting-edge technologies, tools, and services for bioscience research and biopharmaceutical manufacturing. Consisting of four full-time…
Clarke, Patrick J.; Collins, Robert J.; Dunjko, Vedran; Andersson, Erika; Jeffers, John; Buller, Gerald S.
2012-01-01
Digital signatures are frequently used in data transfer to prevent impersonation, repudiation and message tampering. Currently used classical digital signature schemes rely on public key encryption techniques, where the complexity of so-called ‘one-way' mathematical functions is used to provide security over sufficiently long timescales. No mathematical proofs are known for the long-term security of such techniques. Quantum digital signatures offer a means of sending a message, which cannot be forged or repudiated, with security verified by information-theoretical limits and quantum mechanics. Here we demonstrate an experimental system, which distributes quantum signatures from one sender to two receivers and enables message sending ensured against forging and repudiation. Additionally, we analyse the security of the system in some typical scenarios. Our system is based on the interference of phase-encoded coherent states of light and our implementation utilizes polarization-maintaining optical fibre and photons with a wavelength of 850 nm. PMID:23132024
Medical image security in a HIPAA mandated PACS environment.
Cao, F; Huang, H K; Zhou, X Q
2003-01-01
Medical image security is an important issue when digital images and their pertinent patient information are transmitted across public networks. Mandates for ensuring health data security have been issued by the federal government such as Health Insurance Portability and Accountability Act (HIPAA), where healthcare institutions are obliged to take appropriate measures to ensure that patient information is only provided to people who have a professional need. Guidelines, such as digital imaging and communication in medicine (DICOM) standards that deal with security issues, continue to be published by organizing bodies in healthcare. However, there are many differences in implementation especially for an integrated system like picture archiving and communication system (PACS), and the infrastructure to deploy these security standards is often lacking. Over the past 6 years, members in the Image Processing and Informatics Laboratory, Childrens Hospital, Los Angeles/University of Southern California, have actively researched image security issues related to PACS and teleradiology. The paper summarizes our previous work and presents an approach to further research on the digital envelope (DE) concept that provides image integrity and security assurance in addition to conventional network security protection. The DE, including the digital signature (DS) of the image as well as encrypted patient information from the DICOM image header, can be embedded in the background area of the image as an invisible permanent watermark. The paper outlines the systematic development, evaluation and deployment of the DE method in a PACS environment. We have also proposed a dedicated PACS security server that will act as an image authority to check and certify the image origin and integrity upon request by a user, and meanwhile act also as a secure DICOM gateway to the outside connections and a PACS operation monitor for HIPAA supporting information. Copyright 2002 Elsevier Science Ltd.
Experimental measurement-device-independent quantum digital signatures over a metropolitan network
NASA Astrophysics Data System (ADS)
Yin, Hua-Lei; Wang, Wei-Long; Tang, Yan-Lin; Zhao, Qi; Liu, Hui; Sun, Xiang-Xiang; Zhang, Wei-Jun; Li, Hao; Puthoor, Ittoop Vergheese; You, Li-Xing; Andersson, Erika; Wang, Zhen; Liu, Yang; Jiang, Xiao; Ma, Xiongfeng; Zhang, Qiang; Curty, Marcos; Chen, Teng-Yun; Pan, Jian-Wei
2017-04-01
Quantum digital signatures (QDSs) provide a means for signing electronic communications with information-theoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable against detector side-channel attacks, just like quantum key distribution. Here we exploit a measurement-device-independent (MDI) quantum network, over a metropolitan area, to perform a field test of a three-party MDI QDS scheme that is secure against any detector side-channel attack. In so doing, we are able to successfully sign a binary message with a security level of about 10-7. Remarkably, our work demonstrates the feasibility of MDI QDSs for practical applications.
The SERENITY Runtime Framework
NASA Astrophysics Data System (ADS)
Crespo, Beatriz Gallego-Nicasio; Piñuela, Ana; Soria-Rodriguez, Pedro; Serrano, Daniel; Maña, Antonio
The SERENITY Runtime Framework (SRF) provides support for applications at runtime, by managing S&D Solutions and monitoring the systems’ context. The main functionality of the SRF, amongst others, is to provide S&D Solutions, by means of Executable Components, in response to applications security requirements. Runtime environment is defined in SRF through the S&D Library and Context Manager components. S&D Library is a local S&D Artefact repository, and stores S&D Classes, S&D Patterns and S&D Implementations. The Context Manager component is in charge of storing and management of the information used by the SRF to select the most appropriate S&D Pattern for a given scenario. The management of the execution of the Executable Component, as running realizations of the S&D Patterns, including instantiation, de-activation and control, as well as providing communication and monitoring mechanisms, besides the recovery and reconfiguration aspects, complete the list of tasks performed by the SRF.
Leap Frog Digital Sensors and Definition, Integration & Testing FY 2003 Annual Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meitzler, Wayne D.; Ouderkirk, Steven J.; Shoemaker, Steven V.
2003-12-31
The objective of Leap Frog is to develop a comprehensive security tool that is transparent to the user community and more effective than current methods for preventing and detecting security compromises of critical physical and digital assets. Current security tools intrude on the people that interact with these critical assets by requiring them to perform additional functions or having additional visible sensors. Leap Frog takes security to the next level by being more effective and reducing the adverse impact on the people interacting with protected assets.
Insecurity, polio vaccination rates, and polio incidence in northwest Pakistan.
Verma, Amol A; Jimenez, Marcia P; Tangermann, Rudolf H; Subramanian, S V; Razak, Fahad
2018-02-13
Pakistan is one of three countries in which endemic transmission of poliovirus has never been stopped. Insecurity is often cited but poorly studied as a barrier to eradicating polio. We analyzed routinely collected health data from 32 districts of northwest Pakistan and constructed an index of insecurity based on journalistic reports of the monthly number of deaths and injuries resulting from conflict-related security incidents. The primary outcomes were the monthly incidence of paralytic polio cases within each district between 2007 and 2014 and the polio vaccination percentage from 666 district-level vaccination campaigns between 2007 and 2009, targeting ∼5.7 million children. Multilevel Poisson regression controlling for time and district fixed effects was used to model the association between insecurity, vaccinator access, vaccination rates, and polio incidence. The number of children inaccessible to vaccinators was 19.7% greater (95% CI: 19.2-20.2%), and vaccination rates were 5.3% lower (95% CI: 5.2-5.3%) in "high-insecurity" campaigns compared with "secure" campaigns. The unadjusted mean vaccination rate was 96.3% (SD = 8.6) in secure campaigns and 88.3% (SD = 19.2) in high-insecurity campaigns. Polio incidence was 73.0% greater (95% CI: 30-131%) during high-insecurity months (unadjusted mean = 0.13 cases per million people, SD = 0.71) compared with secure months (unadjusted mean = 1.23 cases per million people, SD = 4.28). Thus, insecurity was associated with reduced vaccinator access, reduced polio vaccination, and increased polio incidence in northwest Pakistan. These findings demonstrate that insecurity is an important obstacle to global polio eradication.
Digital vs. conventional full-arch implant impressions: a comparative study.
Amin, Sarah; Weber, Hans Peter; Finkelman, Matthew; El Rafie, Khaled; Kudara, Yukio; Papaspyridakos, Panos
2017-11-01
To test whether or not digital full-arch implant impressions with two different intra-oral scanners (CEREC Omnicam and True Definition) have the same accuracy as conventional ones. The hypothesis was that the splinted open-tray impressions would be more accurate than digital full-arch impressions. A stone master cast representing an edentulous mandible using five internal connection implant analogs (Straumann Bone Level RC, Basel, Switzerland) was fabricated. The three median implants were parallel to each other, the far left implant had 10°, and the far right had 15° distal angulation. A splinted open-tray technique was used for the conventional polyether impressions (n = 10) for Group 1. Digital impressions (n = 10) were taken with two intra-oral optical scanners (CEREC Omnicam and 3M True Definition) after connecting polymer scan bodies to the master cast for groups 2 and 3. Master cast and conventional impression test casts were digitized with a high-resolution reference scanner (Activity 880 scanner; Smart Optics, Bochum, Germany) to obtain digital files. Standard tessellation language (STL) datasets from the three test groups of digital and conventional impressions were superimposed with the STL dataset from the master cast to assess the 3D deviations. Deviations were recorded as root-mean-square error. To compare the master cast with conventional and digital impressions at the implant level, Welch's F-test was used together with Games-Howell post hoc test. Group I had a mean value of 167.93 μm (SD 50.37); Group II (Omnicam) had a mean value of 46.41 μm (SD 7.34); Group III (True Definition) had a mean value of 19.32 μm (SD 2.77). Welch's F-test was used together with the Games-Howell test for post hoc comparisons. Welch's F-test showed a significant difference between the groups (P < 0.001). The Games-Howell test showed statistically significant 3D deviations for all three groups (P < 0.001). Full-arch digital implant impressions using True Definition scanner and Omnicam were significantly more accurate than the conventional impressions with the splinted open-tray technique. Additionally, the digital impressions with the True Definition scanner had significantly less 3D deviations when compared with the Omnicam. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
Safeguarding Digital Library Contents: Charging for Online Content.
ERIC Educational Resources Information Center
Herzberg, Amir
1998-01-01
Investigates the need for mechanisms for charging by digital libraries and other providers of online content, in particular for micropayments, i.e., charging for small amounts. The SSL (Secure Socket Layer) and SET (Secure Electronic Transactions) protocols for charge card payments and the MiniPay micropayment mechanism for charging small amounts…
76 FR 18738 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-05
... Records in the System: First, middle and last name, nickname, last four digits of Social Security Number..., Accessing, Retaining, and Disposing of Records: Storage: Records are stored on electronic storage media... characteristics (such as name, last four digits of Social Security Number (SSN), series, grade, dates of service...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-17
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Data Fortress Systems Group Ltd., Digital Youth Network Corp., Fantom Technologies, Inc., and KIK Technology International, Inc., Order of... of current and accurate information concerning the securities of Data Fortress Systems Group Ltd...
NASA Astrophysics Data System (ADS)
Siregar, H.; Junaeti, E.; Hayatno, T.
2017-03-01
Activities correspondence is often used by agencies or companies, so that institutions or companies set up a special division to handle issues related to the letter management. Most of the distribution of letters using electronic media, then the letter should be kept confidential in order to avoid things that are not desirable. Techniques that can be done to meet the security aspect is by using cryptography or by giving a digital signature. The addition of asymmetric and symmetric algorithms, i.e. RSA and AES algorithms, on the digital signature had been done in this study to maintain data security. The RSA algorithm was used during the process of giving digital signature, while the AES algorithm was used during the process of encoding a message that will be sent to the receiver. Based on the research can be concluded that the additions of AES and RSA algorithms on the digital signature meet four objectives of cryptography: Secrecy, Data Integrity, Authentication and Non-repudiation.
Effects of Cognitive Training on Cognitive Performance of Healthy Older Adults.
Golino, Mariana Teles Santos; Flores Mendoza, Carmen; Golino, Hudson Fernandes
2017-09-20
The purpose of this study was to determine the immediate effects of cognitive training on healthy older adults and verify the transfer effects of targeted and non-targeted abilities. The design consisted of a semi-randomized clinical controlled trial. The final sample was composed of 80 volunteers recruited from a Brazilian community (mean age = 69.69; SD = 7.44), which were separated into an intervention group (N = 47; mean age = 69.66, SD = 7.51) and a control group (N = 33; mean age = 69.73, SD = 7.45). Intervention was characterized by adaptive cognitive training with 12 individual training sessions of 60 to 90 minutes (once a week). Eight instruments were used to assess effects of cognitive training. Five were used to assess trained abilities (near effects), including: Memorization Tests (List and History), Picture Completion, Digit Span, Digit Symbol-Coding, and Symbol Search (the last four from WAIS-III). Two instruments assessed untrained abilities (far effects): Arithmetic and Matrix Reasoning (WAIS-III). The non-parametric repeated measures ANOVA test revealed a significant interaction between group by time interaction for Picture Completion [F(74) = 14.88, p = .0002, d = 0.90, CLES = 73.69%], Digit Symbol-Coding [F(74) = 5.66, p = .019, d = 0.55, CLES = 65.21%] and Digit Span [F(74) = 5.38, p = .02, d = 0.54, CLES = 64.85%], suggesting an interventional impact on these performance tasks. The results supported near transfer effects, but did not demonstrate a far transfer effects.
Practical quantum digital signature
NASA Astrophysics Data System (ADS)
Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing
2016-03-01
Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.
Security Sector Reform’s Utility in Conflict Prevention
2013-12-10
Publications, 1994), 18. 40 Many of these countries in Africa are states in name only due to ill defined borders, fiscal limitations, nomadic ...Security Watch, 12 OCT 2009), Online at http://www.isn.ethz.ch/isn/ Digital -Library/Articles/Detail/?lng= en&id= 108451[accessed on 27 May 2013]. 85...ISN Security Watch, 12 OCT 2009. Online at http://www.isn.ethz.ch/isn/ Digital -Library/Articles/Detail/?lng= en&id= 108451[accessed on 27 May 2013
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-03
...'s or entity's name; Digital photograph; Date of birth, place of birth, and age; Social security number; Duty/work address and telephone number; Alias; Race and ethnicity; Citizenship; Fingerprints; Sex... servers, magnetic disc, tape, digital media, and CD-ROM. RETRIEVABILITY: Records may be retrieved by...
Prototype system of secure VOD
NASA Astrophysics Data System (ADS)
Minemura, Harumi; Yamaguchi, Tomohisa
1997-12-01
Secure digital contents delivery systems are to realize copyright protection and charging mechanism, and aim at secure delivery service of digital contents. Encrypted contents delivery and history (log) management are means to accomplish this purpose. Our final target is to realize a video-on-demand (VOD) system that can prevent illegal usage of video data and manage user history data to achieve a secure video delivery system on the Internet or Intranet. By now, mainly targeting client-server systems connected with enterprise LAN, we have implemented and evaluated a prototype system based on the investigation into the delivery method of encrypted video contents.
Study and validation of tools interoperability in JPSEC
NASA Astrophysics Data System (ADS)
Conan, V.; Sadourny, Y.; Jean-Marie, K.; Chan, C.; Wee, S.; Apostolopoulos, J.
2005-08-01
Digital imagery is important in many applications today, and the security of digital imagery is important today and is likely to gain in importance in the near future. The emerging international standard ISO/IEC JPEG-2000 Security (JPSEC) is designed to provide security for digital imagery, and in particular digital imagery coded with the JPEG-2000 image coding standard. One of the primary goals of a standard is to ensure interoperability between creators and consumers produced by different manufacturers. The JPSEC standard, similar to the popular JPEG and MPEG family of standards, specifies only the bitstream syntax and the receiver's processing, and not how the bitstream is created or the details of how it is consumed. This paper examines the interoperability for the JPSEC standard, and presents an example JPSEC consumption process which can provide insights in the design of JPSEC consumers. Initial interoperability tests between different groups with independently created implementations of JPSEC creators and consumers have been successful in providing the JPSEC security services of confidentiality (via encryption) and authentication (via message authentication codes, or MACs). Further interoperability work is on-going.
Watermarking protocols for authentication and ownership protection based on timestamps and holograms
NASA Astrophysics Data System (ADS)
Dittmann, Jana; Steinebach, Martin; Croce Ferri, Lucilla
2002-04-01
Digital watermarking has become an accepted technology for enabling multimedia protection schemes. One problem here is the security of these schemes. Without a suitable framework, watermarks can be replaced and manipulated. We discuss different protocols providing security against rightful ownership attacks and other fraud attempts. We compare the characteristics of existing protocols for different media like direct embedding or seed based and required attributes of the watermarking technology like robustness or payload. We introduce two new media independent protocol schemes for rightful ownership authentication. With the first scheme we ensure security of digital watermarks used for ownership protection with a combination of two watermarks: first watermark of the copyright holder and a second watermark from a Trusted Third Party (TTP). It is based on hologram embedding and the watermark consists of e.g. a company logo. As an example we use digital images and specify the properties of the embedded additional security information. We identify components necessary for the security protocol like timestamp, PKI and cryptographic algorithms. The second scheme is used for authentication. It is designed for invertible watermarking applications which require high data integrity. We combine digital signature schemes and digital watermarking to provide a public verifiable integrity. The original data can only be reproduced with a secret key. Both approaches provide solutions for copyright and authentication watermarking and are introduced for image data but can be easily adopted for video and audio data as well.
Realization and optimization of AES algorithm on the TMS320DM6446 based on DaVinci technology
NASA Astrophysics Data System (ADS)
Jia, Wen-bin; Xiao, Fu-hai
2013-03-01
The application of AES algorithm in the digital cinema system avoids video data to be illegal theft or malicious tampering, and solves its security problems. At the same time, in order to meet the requirements of the real-time, scene and transparent encryption of high-speed data streams of audio and video in the information security field, through the in-depth analysis of AES algorithm principle, based on the hardware platform of TMS320DM6446, with the software framework structure of DaVinci, this paper proposes the specific realization methods of AES algorithm in digital video system and its optimization solutions. The test results show digital movies encrypted by AES128 can not play normally, which ensures the security of digital movies. Through the comparison of the performance of AES128 algorithm before optimization and after, the correctness and validity of improved algorithm is verified.
NASA Astrophysics Data System (ADS)
Collins, Robert J.; Donaldon, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.
2014-10-01
Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority. Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.
Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era
NASA Astrophysics Data System (ADS)
Ali, Firkhan Ali Bin Hamid; Zalisham Jali, Mohd, Dr
2018-05-01
The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and to indicate degradations.
Systems and methods for performing wireless financial transactions
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCown, Steven Harvey
2012-07-03
A secure computing module (SCM) is configured for connection with a host device. The SCM includes a processor for performing secure processing operations, a host interface for coupling the processor to the host device, and a memory connected to the processor wherein the processor logically isolates at least some of the memory from access by the host device. The SCM also includes a proximate-field wireless communicator connected to the processor to communicate with another SCM associated with another host device. The SCM generates a secure digital signature for a financial transaction package and communicates the package and the signature tomore » the other SCM using the proximate-field wireless communicator. Financial transactions are performed from person to person using the secure digital signature of each person's SCM and possibly message encryption. The digital signatures and transaction details are communicated to appropriate financial organizations to authenticate the transaction parties and complete the transaction.« less
Assessing security technology's impact: old tools for new problems.
Kreissl, Reinhard
2014-09-01
The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.
Hand burns surface area: A rule of thumb.
Dargan, Dallan; Mandal, Anirban; Shokrollahi, Kayvan
2018-08-01
Rapid estimation of acute hand burns is important for communication, standardisation of assessment, rehabilitation and research. Use of an individual's own thumbprint area as a fraction of their total hand surface area was evaluated to assess potential utility in hand burn evaluation. Ten health professionals used an ink-covered dominant thumb pulp to cover the surfaces of their own non-dominant hand using the contralateral thumb. Thumbprints were assessed on the web spaces, sides of digits and dorsum and palm beyond the distal wrist crease. Hand surface area was estimated using the Banerjee and Sen method, and thumbprint ellipse area calculated to assess correlation. Mean estimated total hand surface area was 390.0cm 2 ±SD 51.5 (328.3-469.0), mean thumbprint ellipse area was 5.5cm 2 ±SD 1.3 (3.7-8.4), and mean estimated print number was 73.5±SD 11.0 (range 53.1-87.8, 95% CI 6.8). The mean observed number of thumbprints on one hand was 80.1±SD 5.9 (range 70.0-88.0, 95% CI 3.7), χ 2 =0.009. The combined mean of digital prints was 42, comprising a mean of two prints each on volar, dorsal, radial and ulnar digit surfaces, except volar middle and ring (3 prints each). Palmar prints were 15 (11-19), dorsal 15 (11-19), ulnar palm border 3, first web space 2, and second, third and fourth web spaces one each. Using the surface of the palm alone, excluding digits, as 0.5% of total body surface area, the area of one thumbprint was approximated as 1/30th of 1%. We have demonstrated how thumbprint area serves as a simple method for evaluating hand burn surface area. Copyright © 2018 Elsevier Ltd and ISBI. All rights reserved.
NASA Astrophysics Data System (ADS)
Jun, An Won
2006-01-01
We implement a first practical holographic security system using electrical biometrics that combines optical encryption and digital holographic memory technologies. Optical information for identification includes a picture of face, a name, and a fingerprint, which has been spatially multiplexed by random phase mask used for a decryption key. For decryption in our biometric security system, a bit-error-detection method that compares the digital bit of live fingerprint with of fingerprint information extracted from hologram is used.
3D Digital Legos for Teaching Security Protocols
ERIC Educational Resources Information Center
Yu, Li; Harrison, L.; Lu, Aidong; Li, Zhiwei; Wang, Weichao
2011-01-01
We have designed and developed a 3D digital Lego system as an education tool for teaching security protocols effectively in Information Assurance courses (Lego is a trademark of the LEGO Group. Here, we use it only to represent the pieces of a construction set.). Our approach applies the pedagogical methods learned from toy construction sets by…
Raghunath, Vignesh; Braxton, Melissa O.; Gagnon, Stephanie A.; Brunyé, Tad T.; Allison, Kimberly H.; Reisch, Lisa M.; Weaver, Donald L.; Elmore, Joann G.; Shapiro, Linda G.
2012-01-01
Context: Digital pathology has the potential to dramatically alter the way pathologists work, yet little is known about pathologists’ viewing behavior while interpreting digital whole slide images. While tracking pathologist eye movements when viewing digital slides may be the most direct method of capturing pathologists’ viewing strategies, this technique is cumbersome and technically challenging to use in remote settings. Tracking pathologist mouse cursor movements may serve as a practical method of studying digital slide interpretation, and mouse cursor data may illuminate pathologists’ viewing strategies and time expenditures in their interpretive workflow. Aims: To evaluate the utility of mouse cursor movement data, in addition to eye-tracking data, in studying pathologists’ attention and viewing behavior. Settings and Design: Pathologists (N = 7) viewed 10 digital whole slide images of breast tissue that were selected using a random stratified sampling technique to include a range of breast pathology diagnoses (benign/atypia, carcinoma in situ, and invasive breast cancer). A panel of three expert breast pathologists established a consensus diagnosis for each case using a modified Delphi approach. Materials and Methods: Participants’ foveal vision was tracked using SensoMotoric Instruments RED 60 Hz eye-tracking system. Mouse cursor movement was tracked using a custom MATLAB script. Statistical Analysis Used: Data on eye-gaze and mouse cursor position were gathered at fixed intervals and analyzed using distance comparisons and regression analyses by slide diagnosis and pathologist expertise. Pathologists’ accuracy (defined as percent agreement with the expert consensus diagnoses) and efficiency (accuracy and speed) were also analyzed. Results: Mean viewing time per slide was 75.2 seconds (SD = 38.42). Accuracy (percent agreement with expert consensus) by diagnosis type was: 83% (benign/atypia); 48% (carcinoma in situ); and 93% (invasive). Spatial coupling was close between eye-gaze and mouse cursor positions (highest frequency ∆x was 4.00px (SD = 16.10), and ∆y was 37.50px (SD = 28.08)). Mouse cursor position moderately predicted eye gaze patterns (Rx = 0.33 and Ry = 0.21). Conclusions: Data detailing mouse cursor movements may be a useful addition to future studies of pathologists’ accuracy and efficiency when using digital pathology. PMID:23372984
Raghunath, Vignesh; Braxton, Melissa O; Gagnon, Stephanie A; Brunyé, Tad T; Allison, Kimberly H; Reisch, Lisa M; Weaver, Donald L; Elmore, Joann G; Shapiro, Linda G
2012-01-01
Digital pathology has the potential to dramatically alter the way pathologists work, yet little is known about pathologists' viewing behavior while interpreting digital whole slide images. While tracking pathologist eye movements when viewing digital slides may be the most direct method of capturing pathologists' viewing strategies, this technique is cumbersome and technically challenging to use in remote settings. Tracking pathologist mouse cursor movements may serve as a practical method of studying digital slide interpretation, and mouse cursor data may illuminate pathologists' viewing strategies and time expenditures in their interpretive workflow. To evaluate the utility of mouse cursor movement data, in addition to eye-tracking data, in studying pathologists' attention and viewing behavior. Pathologists (N = 7) viewed 10 digital whole slide images of breast tissue that were selected using a random stratified sampling technique to include a range of breast pathology diagnoses (benign/atypia, carcinoma in situ, and invasive breast cancer). A panel of three expert breast pathologists established a consensus diagnosis for each case using a modified Delphi approach. Participants' foveal vision was tracked using SensoMotoric Instruments RED 60 Hz eye-tracking system. Mouse cursor movement was tracked using a custom MATLAB script. Data on eye-gaze and mouse cursor position were gathered at fixed intervals and analyzed using distance comparisons and regression analyses by slide diagnosis and pathologist expertise. Pathologists' accuracy (defined as percent agreement with the expert consensus diagnoses) and efficiency (accuracy and speed) were also analyzed. Mean viewing time per slide was 75.2 seconds (SD = 38.42). Accuracy (percent agreement with expert consensus) by diagnosis type was: 83% (benign/atypia); 48% (carcinoma in situ); and 93% (invasive). Spatial coupling was close between eye-gaze and mouse cursor positions (highest frequency ∆x was 4.00px (SD = 16.10), and ∆y was 37.50px (SD = 28.08)). Mouse cursor position moderately predicted eye gaze patterns (Rx = 0.33 and Ry = 0.21). Data detailing mouse cursor movements may be a useful addition to future studies of pathologists' accuracy and efficiency when using digital pathology.
Digital rights management for digital cinema
NASA Astrophysics Data System (ADS)
Kirovski, Darko; Peinado, Marcus; Petitcolas, Fabien A. P.
2001-12-01
There is a wide consensus among the feature film production studios that the Internet era brings a new paradigm for film distribution to cinemas worldwide. The benefits of digital cinema to both producers and cinemas are numerous: significantly lower distribution and maintenance costs, immediate access to film libraries, higher presentation quality, and strong potential for developing new business models. Despite these advantages, the studios are still reluctant to jump into the digital age. The main showstopper for digital cinema is the danger of widespread piracy. Piracy already costs Hollywood an estimated two billion dollars annually and digital cinema without proper copyright enforcement could increase this number. In this paper, we present a copyright management system that aims at providing the set of necessary security tools: standard cryptographic primitives and copyright protection mechanisms that enable a reliable and secure feature film delivery system.
Co-operation of digital nonlinear equalizers and soft-decision LDPC FEC in nonlinear transmission.
Tanimura, Takahito; Oda, Shoichiro; Hoshida, Takeshi; Aoki, Yasuhiko; Tao, Zhenning; Rasmussen, Jens C
2013-12-30
We experimentally and numerically investigated the characteristics of 128 Gb/s dual polarization - quadrature phase shift keying signals received with two types of nonlinear equalizers (NLEs) followed by soft-decision (SD) low-density parity-check (LDPC) forward error correction (FEC). Successful co-operation among SD-FEC and NLEs over various nonlinear transmissions were demonstrated by optimization of parameters for NLEs.
Long-Term Episodic Memory in Children with Attention-Deficit/Hyperactivity Disorder
ERIC Educational Resources Information Center
Skowronek, Jeffrey S.; Leichtman, Michelle D.; Pillemer, David B.
2008-01-01
Twenty-nine grade-matched 4th-8th-grade males, 12 with attention-deficit/hyperactivity disorder (ADHD) (age M = 12.2 years, SD = 1.48), and 17 without (age M = 11.5, SD = 1.59), completed two working memory tasks (digit span and the Simon game) and three long-term episodic memory tasks (a personal event memory task, story memory task, and picture…
NASA Astrophysics Data System (ADS)
Rychter, M.; Rychter, R.
2016-09-01
Secure digital tachograph system is indisputably a means having the great influence on road safety, enforcement of the social conditions for drivers in road transport as well as supporting the fair competition between road transport undertakings. In order to better monitor the compliance of road transport with the rules in force, inter alia the provisions on usage the digital tachographs, the European Union regulation introduces the European Registers of Road Transport Undertakings (ERRU), a system that allows a better exchange of information between Member States. The main purpose of this analysis is to present the measures for enforcement the execution of the provisions on obligation of installation and usage of digital tachographs in road transport and for improving the security of data recorded within digital tachograph system especially through exchange of the information on the most serious infringements committed by hauliers in any Member State, which may lead to the loss of good repute and the e-document engineering method used by the ERRU system.
NASA Astrophysics Data System (ADS)
Zhang, Jianguo; Chen, Xiaomeng; Zhuang, Jun; Jiang, Jianrong; Zhang, Xiaoyan; Wu, Dongqing; Huang, H. K.
2003-05-01
In this paper, we presented a new security approach to provide security measures and features in both healthcare information systems (PACS, RIS/HIS), and electronic patient record (EPR). We introduced two security components, certificate authoring (CA) system and patient record digital signature management (DSPR) system, as well as electronic envelope technology, into the current hospital healthcare information infrastructure to provide security measures and functions such as confidential or privacy, authenticity, integrity, reliability, non-repudiation, and authentication for in-house healthcare information systems daily operating, and EPR exchanging among the hospitals or healthcare administration levels, and the DSPR component manages the all the digital signatures of patient medical records signed through using an-symmetry key encryption technologies. The electronic envelopes used for EPR exchanging are created based on the information of signers, digital signatures, and identifications of patient records stored in CAS and DSMS, as well as the destinations and the remote users. The CAS and DSMS were developed and integrated into a RIS-integrated PACS, and the integration of these new security components is seamless and painless. The electronic envelopes designed for EPR were used successfully in multimedia data transmission.
A Fast lattice-based polynomial digital signature system for m-commerce
NASA Astrophysics Data System (ADS)
Wei, Xinzhou; Leung, Lin; Anshel, Michael
2003-01-01
The privacy and data integrity are not guaranteed in current wireless communications due to the security hole inside the Wireless Application Protocol (WAP) version 1.2 gateway. One of the remedies is to provide an end-to-end security in m-commerce by applying application level security on top of current WAP1.2. The traditional security technologies like RSA and ECC applied on enterprise's server are not practical for wireless devices because wireless devices have relatively weak computation power and limited memory compared with server. In this paper, we developed a lattice based polynomial digital signature system based on NTRU's Polynomial Authentication and Signature Scheme (PASS), which enabled the feasibility of applying high-level security on both server and wireless device sides.
Real-Time Remote Monitoring with Data Acquisition System
NASA Astrophysics Data System (ADS)
Faizal Zainal Abidin, Ahmad; Huzaimy Jusoh, Mohammad; James, Elster; Junid, Syed Abdul Mutalib Al; Mohd Yassin, Ahmad Ihsan
2015-11-01
The purpose of this system is to provide monitoring system for an electrical device and enable remote monitoring via web based application. This monitoring system allow the user to monitor the device condition from anywhere as the information will be synchronised to the website. The current and voltage reading of the monitored equipment, ambient temperature and humidity level are monitored and recorded. These parameters will be updated on the web page. All these sensor are connected to the microcontroller and the data will saved in micro secure digital (SD) card and send all the gathered information to a web page using the GPRS service connection synchronously. The collected data will be displayed on the website and the user enable to download the data directly from the website. The system will help user to monitor the devices condition and ambient changes with ease. The system is successfully developed, tested and has been installed at residential area in Taman Cahaya Alam, Section U12, Shah Alam, Selangor, Malaysia.
Personal graphical communicator.
Stephens, Michael; Barrett, Steven
2008-01-01
A device to help a child communicate was requested by an educator. The child cannot read, write, or speak but can recognize symbols and use those symbols to communicate. While this communication works, it doesn't work well in situations where another person does not know how to use the symbols to communicate. For this reason, a device was requested that could display images to a child and play a phrase when that image was chosen. To meet this need an MP3 player like device was constructed. The device stores images and Mpeg-Layer III (MP3) sound clips on a replaceable Secure Digital (SD) card. The images are displayed on a color Liquid Crystal Display (LCD) where the user is able to skip through images to find the phrase that needs to be said. Once found simply hitting the play button will play the sound clip associated with the image. The device is portable and compact for easy use. It uses Universal Serial Bus (USB) to recharge its batteries, communicate with the PC and update the firmware.
The effects of Patent Blue dye on peripheral and cerebral oxyhaemoglobin saturations.
Ishiyama, T; Kotoda, M; Asano, N; Ikemoto, K; Mitsui, K; Sato, H; Matsukawa, T; Sessler, D I
2015-04-01
We measured the effect of Patent Blue dye on oxyhaemoglobin saturations after injection into breast tissue: 40 women had anaesthesia for breast surgery maintained with sevoflurane or propofol (20 randomly allocated to each). Saturations were recorded with a digital pulse oximeter, in arterial blood samples and with a cerebral tissue oximeter before dye injection and 10, 20, 30, 40, 50, 60, 75, 90, 105 and 120 min afterwards. Patent Blue did not decrease arterial blood oxyhaemoglobin saturation, but it did reduce mean (SD) digital and cerebral oxyhaemoglobin saturations by 1.1 (1.1) % and 6.8 (7.0) %, p < 0.0001 for both. The falsely reduced oximeter readings persisted for at least 2 h. The mean (SD) intra-operative digital pulse oxyhaemoglobin readings were lower with sevoflurane than propofol, 97.8 (1.2) % and 98.8 (1.0) %, respectively, p < 0.0001. © 2014 The Association of Anaesthetists of Great Britain and Ireland.
Introducing AgilePQ DCM (Digital Conversion Module) - Video Text Version
monolith. There's not one thing you do to make things digitally secure. We talk in terms of confidentiality enable these nonfunctional attributes. There's not, as I said, one thing you can do to satisfy the whole subject of cyber security. And there's not one thing you can do to fully enable these nonfunctional
NASA Astrophysics Data System (ADS)
Riesmeier, Joerg; Eichelberg, Marco; Kleber, Klaus; Groenemeyer, Dietrich H.; Oosterwijk, Herman J.; Jensch, Peter F.
2002-05-01
With the release of 'DICOM Structured Reporting' (SR) as an official extension of the standard about two years ago, DICOM has entered a new domain that is only indirectly related to medical imaging. Basically, DICOM SR is a general model allowing to encode medical reports in a structured manner in DICOM's tag-based format. Therefore, the existing DICOM infrastructure can be used to archive and communicate structured reports, with only relatively small changes to existing systems. As a consequence of the introduction of medical reports in a digital form, the relevance of security measures increases significantly. We have developed a prototype implementation of DICOM structured reporting together with the new security extensions for secure transport connections and digital signatures. The application allows to create, read and modify any SR document, to digitally sign an SR document in whole or part and to transmit such documents over a network. While the secure transport connection protects data from modifications or unauthorized access only during transmission, digital signatures provide a lifetime integrity check and, therefore, maintain the legal document status of structured reports. The application has been successfully demonstrated at RSNA 2000 and ECR 2001, and is freely available on the Internet.
Selecting the right digital camera for telemedicine-choice for 2009.
Patricoski, Chris; Ferguson, A Stewart; Brudzinski, Jay; Spargo, Garret
2010-03-01
Digital cameras are fundamental tools for store-and-forward telemedicine (electronic consultation). The choice of a camera may significantly impact this consultative process based on the quality of the images, the ability of users to leverage the cameras' features, and other facets of the camera design. The goal of this research was to provide a substantive framework and clearly defined process for reviewing digital cameras and to demonstrate the results obtained when employing this process to review point-and-shoot digital cameras introduced in 2009. The process included a market review, in-house evaluation of features, image reviews, functional testing, and feature prioritization. Seventy-two cameras were identified new on the market in 2009, and 10 were chosen for in-house evaluation. Four cameras scored very high for mechanical functionality and ease-of-use. The final analysis revealed three cameras that had excellent scores for both color accuracy and photographic detail and these represent excellent options for telemedicine: Canon Powershot SD970 IS, Fujifilm FinePix F200EXR, and Panasonic Lumix DMC-ZS3. Additional features of the Canon Powershot SD970 IS make it the camera of choice for our Alaska program.
2013-03-30
canvas sling. Heart rate, respiration rate, and oxygen saturation were monitored continuously using a pulse oximeter (VetOx G2 Digital, Heska Corporation...Pre Post 30 min Mean SD Median Range Mean SD Median Range Mean SD Median Range Oxygen saturation % 93.7 2.1 93.7 91–97 63.2* 17.4 66.5 36.7–91.3 92.2...as actin in human RBC membranes [29] and human neutrophils [34]. Discussion General findings Changes in heart rate, venous-blood oxygen saturation
The application of data encryption technology in computer network communication security
NASA Astrophysics Data System (ADS)
Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen
2017-04-01
With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.
Digital image envelope: method and evaluation
NASA Astrophysics Data System (ADS)
Huang, H. K.; Cao, Fei; Zhou, Michael Z.; Mogel, Greg T.; Liu, Brent J.; Zhou, Xiaoqiang
2003-05-01
Health data security, characterized in terms of data privacy, authenticity, and integrity, is a vital issue when digital images and other patient information are transmitted through public networks in telehealth applications such as teleradiology. Mandates for ensuring health data security have been extensively discussed (for example The Health Insurance Portability and Accountability Act, HIPAA) and health informatics guidelines (such as the DICOM standard) are beginning to focus on issues of data continue to be published by organizing bodies in healthcare; however, there has not been a systematic method developed to ensure data security in medical imaging Because data privacy and authenticity are often managed primarily with firewall and password protection, we have focused our research and development on data integrity. We have developed a systematic method of ensuring medical image data integrity across public networks using the concept of the digital envelope. When a medical image is generated regardless of the modality, three processes are performed: the image signature is obtained, the DICOM image header is encrypted, and a digital envelope is formed by combining the signature and the encrypted header. The envelope is encrypted and embedded in the original image. This assures the security of both the image and the patient ID. The embedded image is encrypted again and transmitted across the network. The reverse process is performed at the receiving site. The result is two digital signatures, one from the original image before transmission, and second from the image after transmission. If the signatures are identical, there has been no alteration of the image. This paper concentrates in the method and evaluation of the digital image envelope.
Optical design of cipher block chaining (CBC) encryption mode by using digital holography
NASA Astrophysics Data System (ADS)
Gil, Sang Keun; Jeon, Seok Hee; Jung, Jong Rae; Kim, Nam
2016-03-01
We propose an optical design of cipher block chaining (CBC) encryption by using digital holographic technique, which has higher security than the conventional electronic method because of the analog-type randomized cipher text with 2-D array. In this paper, an optical design of CBC encryption mode is implemented by 2-step quadrature phase-shifting digital holographic encryption technique using orthogonal polarization. A block of plain text is encrypted with the encryption key by applying 2-step phase-shifting digital holography, and it is changed into cipher text blocks which are digital holograms. These ciphered digital holograms with the encrypted information are Fourier transform holograms and are recorded on CCDs with 256 gray levels quantized intensities. The decryption is computed by these encrypted digital holograms of cipher texts, the same encryption key and the previous cipher text. Results of computer simulations are presented to verify that the proposed method shows the feasibility in the high secure CBC encryption system.
NASA Technical Reports Server (NTRS)
Doland, G. D.
1977-01-01
System employs electronically randomized variant of quadraphase modulation and demodulation between two synchronized transceivers. System uses off-the-shelf components. It may be used with digital data, command signals, delta-modulated voice signals, digital television signals, or other data converted to digital form.
Status of Optical Disk Standards and Copy Protection Technology
2000-01-01
Technology (IT), the Consumer Electronics (CE) and the Content Providers such as the Motion Picture Association (MPA) and Secure Digital Music ...and Access Control. On audio recording, Secure Digital Music Initiative (SDMI) is leading the effort. 10 Besides these organizations, a world wide...coordinating orgainzation which ia working with the Information Technology Inductry Association (ITI), the Content Providers such as the Motion Picture
[Assessment for effect of low level lead-exposure on neurobehavior in workers of printing house].
Niu, Q; Dai, F; Chen, Y
1998-11-30
WHO Neurobehavioral Core Test Battery (NCTB) was conducted among 28 lead-exposed workers (mean age 24.84, SD2.85) in printing house and 46 controls (mean age 22.78, SD1.45), in order to assess whether low level lead exposure may be related to neurobehavioral dysfunction. The items of test were: 1. Profile of mood state(POMS), (2) Simple reaction time, (3) Digit span, (4) Santa Anna manual dexterity, (5) Digit simbol, (6) Benton visual retention; and Prusuit aiming test. In all the NCTB test values, there was no significant difference between two groups. Multiple stepwise regression analysis shows that exposure duration is related to neurobehavior scores. Mild lead exposure may affect neurobehavior in some degree but not significant.
ERIC Educational Resources Information Center
Hassler, Vesna; Biely, Helmut
1999-01-01
Describes the Digital Signature Project that was developed in Austria to establish an infrastructure for applying smart card-based digital signatures in banking and electronic-commerce applications. Discusses the need to conform to international standards, an international certification infrastructure, and security features for a public directory…
Advancing the science of forensic data management
NASA Astrophysics Data System (ADS)
Naughton, Timothy S.
2002-07-01
Many individual elements comprise a typical forensics process. Collecting evidence, analyzing it, and using results to draw conclusions are all mutually distinct endeavors. Different physical locations and personnel are involved, juxtaposed against an acute need for security and data integrity. Using digital technologies and the Internet's ubiquity, these diverse elements can be conjoined using digital data as the common element. This result is a new data management process that can be applied to serve all elements of the community. The first step is recognition of a forensics lifecycle. Evidence gathering, analysis, storage, and use in legal proceedings are actually just distinct parts of a single end-to-end process, and thus, it is hypothesized that a single data system that can also accommodate each constituent phase using common network and security protocols. This paper introduces the idea of web-based Central Data Repository. Its cornerstone is anywhere, anytime Internet upload, viewing, and report distribution. Archives exist indefinitely after being created, and high-strength security and encryption protect data and ensure subsequent case file additions do not violate chain-of-custody or other handling provisions. Several legal precedents have been established for using digital information in courts of law, and in fact, effective prosecution of cyber crimes absolutely relies on its use. An example is a US Department of Agriculture division's use of digital images to back up its inspection process, with pictures and information retained on secure servers to enforce the Perishable Agricultural Commodities Act. Forensics is a cumulative process. Secure, web-based data management solutions, such as the Central Data Repository postulated here, can support each process step. Logically marrying digital technologies with Internet accessibility should help nurture a thought process to explore alternatives that make forensics data accessible to authorized individuals, whenever and wherever they need it.
Questionnaire about psychology/disease correlation–I
Ojog, DG; Pănescu, OM; Rusu, EC; Tănăsescu, MD
2011-01-01
Rationale: The existing personality inventories are exploring too general psychological features so that the possible psychology/disease associations might be leveled out. Objective: We attempt to build a tool to explore the possible correlation between certain psychological features and the most common internal disorders. Method: We have used two questionnaires containing many pairs of synonymous items (necessary for assessing the consistency of the answers). The items are divided into four main domains: preoccupation for the basal conditions of existence (health/ disease/ death, fear, money, lodging); interaction with other people; action, will/ volition, self-assertion; and preoccupation with the exterior. In this first article we are presenting the correlations between items of the first domain, based on the answers from our first 3138 respondents. Results and discussion: The concern about health is best reflected by general formulations. The desire for security is best expressed by items combining the worry about money and dwelling, and worst by items reflecting the eagerness to gain, keep or judiciously spend money. Among the various fears, those of future, darkness, and loneliness are better indicators of security concern. In assessing the anxiety about safety/ security, specific worries are more revelatory than the general ones. Precaution and inclination for order are the best indicators for the aspiration to stability. Poorer ones are the desire for cleanliness and the tendency to attachment. Health and security concerns seem to be consistently linked. The consistency evaluating system will be based upon pairs of synonymous items correlated with a10–200 or less error probability Abbreviations: PP = psychological profile; PF = personality feature; Q1/ Q2/ Q3 = first/ second/ third questionnaire; HeSD = health subdomain; SeSD = security subdomain; StSD = stability subdomain; ChiSq = chi square; ErrProb = error probability (probability of error). PMID:21505574
Duncan, R G; Shabot, M M
2000-01-01
TCP/IP and World-Wide-Web (WWW) technology have become the universal standards for networking and delivery of information. Personal digital assistants (PDAs), cellular telephones, and alphanumeric pagers are rapidly converging on a single pocket device that will leverage wireless TCP/IP networks and WWW protocols and can be used to deliver clinical information and alerts anytime, anywhere. We describe a wireless interface to clinical information for physicians based on Palm Corp.'s Palm VII pocket computer, a wireless digital network, encrypted data transmission, secure web servers, and a clinical data repository (CDR).
Duncan, R. G.; Shabot, M. M.
2000-01-01
TCP/IP and World-Wide-Web (WWW) technology have become the universal standards for networking and delivery of information. Personal digital assistants (PDAs), cellular telephones, and alphanumeric pagers are rapidly converging on a single pocket device that will leverage wireless TCP/IP networks and WWW protocols and can be used to deliver clinical information and alerts anytime, anywhere. We describe a wireless interface to clinical information for physicians based on Palm Corp.'s Palm VII pocket computer, a wireless digital network, encrypted data transmission, secure web servers, and a clinical data repository (CDR). PMID:11079875
Owaydhah, Wejdan H; Alobaidy, Mohammad A; Alraddadi, Abdulrahman S; Soames, Roger W
2017-07-01
To understand the geometry of the proximal humerus and glenoid fossa to facilitate the design of components used in shoulder arthroplasty. The aim is to evaluate the geometry of the proximal humerus and glenoid fossa and their relationship using a MicroScribe 3D digitizer. Scans and measurements were obtained from 20 pairs of dry proximal humeri and scapulae [10 female and 10 male cadavers: median age 81 years (range 70-94 years)] using a MicroScribe 3D digitizer and Rhinoceros software. Means (±SD) of humeral inclination, medial wall angle of the bicipital groove, and radius of the humeral head values were 135 ± 11°, 39 ± 19°, and 14 ± 3 mm, respectively. Means (±SD) of glenoid height and width were 35 ± 4 and 26 ± 4 mm, while the means (±SD) of the angles of glenoid inclination, retroversion, and rotation were 87 ± 32°, 96 ± 10°, and 9 ± 6°, respectively. A significant difference in glenoid height (P ≤ 0.002) and width (P ≤ 0.0001) was observed between males and females, despite them having almost an identical radius of the humeral head, glenoid inclination, retroversion, and angle of rotation. There was also a significant difference (P ≤ 0.01) in the angle of glenoid retroversion between the right and left sides. Using a MicroScribe 3D digitizer, the glenoid fossa was observed to be significantly smaller in females than males; furthermore, there was a difference in glenoid retroversion between the right and left sides.
Scientific fraud in 20 falsified anesthesia papers : detection using financial auditing methods.
Hein, J; Zobrist, R; Konrad, C; Schuepfer, G
2012-06-01
Data from natural sources show counter-intuitive distribution patterns for the leading digits to the left of the decimal point and the digit 1 is observed more frequently than all other numbers. This pattern, which was first described by Newcomb and later confirmed by Benford, is used in financial and tax auditing to detect fraud. Deviations from the pattern indicate possible falsifications. Anesthesiology journals are affected not only by ghostwriting and plagiarism but also by counterfeiting. In the present study 20 publications in anesthesiology known to be falsified by an author were investigated for irregularities with respect to Benford's law using the χ(2)-test and the Z-test. In the 20 retracted publications an average first-digit frequency of 243.1 (standard deviation SD ± 118.2, range: 30-592) and an average second-digit frequency of 132.3 (SD ± 72.2, range: 15-383) were found. The observed distribution of the first and second digits to the left of the decimal point differed significantly (p< 0.01) from the expected distribution described by Benford. Only the observed absolute frequencies for digits 3, 4 and 5 did not differ significantly from the expected values. In an analysis of each paper 17 out of 20 studies differed significantly from the expected value for the first digit and 18 out of 20 studies varied significantly from the expected value of the second digit. Only one paper did not vary significantly from expected values for the digits to the left of the decimal. For comparison, a meta-analysis using complex mathematical procedures was chosen as a control. The analysis showed a first-digit distribution consistent with the Benford distribution. Thus, the method used in the present study seems to be sensitive for detecting fraud. Additional statements of specificity cannot yet be made as this requires further analysis of data that is definitely not falsified. Future studies exploring conformity might help prevent falsified studies from being published.
77 FR 14955 - DoD Information Assurance Scholarship Program (IASP)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-14
... IA and information technology (IT) management, technical, digital and multimedia forensics, cyber..., digital and multimedia forensics, electrical engineering, electronics engineering, information security...
Watermarking requirements for Boeing digital cinema
NASA Astrophysics Data System (ADS)
Lixvar, John P.
2003-06-01
The enormous economic incentives for safeguarding intellectual property in the digital domain have made forensic watermarking a research topic of considerable interest. However, a recent examination of some of the leading product development efforts reveals that at present there is no effective watermarking implementation that addresses both the fidelity and security requirements of high definition digital cinema. If Boeing Digital Cinema (BDC, a business unit of Boeing Integrated Defense Systems) is to succeed in using watermarking as a deterrent to the unauthorized capture and distribution of high value cinematic material, the technology must be robust, transparent, asymmetric in its insertion/detection costs, and compatible with all the other elements of Boeing's multi-layered security system, including its compression, encryption, and key management services.
Digital Photograph Security: What Plastic Surgeons Need to Know.
Thomas, Virginia A; Rugeley, Patricia B; Lau, Frank H
2015-11-01
Sharing and storing digital patient photographs occur daily in plastic surgery. Two major risks associated with the practice, data theft and Health Insurance Portability and Accountability Act (HIPAA) violations, have been dramatically amplified by high-speed data connections and digital camera ubiquity. The authors review what plastic surgeons need to know to mitigate those risks and provide recommendations for implementing an ideal, HIPAA-compliant solution for plastic surgeons' digital photography needs: smartphones and cloud storage. Through informal discussions with plastic surgeons, the authors identified the most common photograph sharing and storage methods. For each method, a literature search was performed to identify the risks of data theft and HIPAA violations. HIPAA violation risks were confirmed by the second author (P.B.R.), a compliance liaison and privacy officer. A comprehensive review of HIPAA-compliant cloud storage services was performed. When possible, informal interviews with cloud storage services representatives were conducted. The most common sharing and storage methods are not HIPAA compliant, and several are prone to data theft. The authors' review of cloud storage services identified six HIPAA-compliant vendors that have strong to excellent security protocols and policies. These options are reasonably priced. Digital photography and technological advances offer major benefits to plastic surgeons but are not without risks. A proper understanding of data security and HIPAA regulations needs to be applied to these technologies to safely capture their benefits. Cloud storage services offer efficient photograph sharing and storage with layers of security to ensure HIPAA compliance and mitigate data theft risk.
Leveraging Trade Agreements to Meet U.S. Security Aims
2016-04-08
TO MEET U.S. SECURITY AIMS 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Sd. PROJECT NUMBER LTC Allysa A. Kropp (USARNG) Se. TASK NUMBER 5f...Sanctions Programs and Country Information,” under “Resource Center, Financial Sanctions, Programs ,” https’.//wwiv.treasurv.gov/resource center/sanctions... Program , and economic integration of former adversaries through U.S. trade policy.7 In the National Security Strategy, President Obama underscored the
Collusion issue in video watermarking
NASA Astrophysics Data System (ADS)
Doerr, Gwenael; Dugelay, Jean-Luc
2005-03-01
Digital watermarking has first been introduced as a possible way to ensure intellectual property (IP) protection. However, fifteen years after its infancy, it is still viewed as a young technology and digital watermarking is far from being introduced in Digital Right Management (DRM) frameworks. A possible explanation is that the research community has so far mainly focused on the robustness of the embedded watermark and has almost ignored security aspects. For IP protection applications such as fingerprinting and copyright protection, the watermark should provide means to ensure some kind of trust in a non secure environment. To this end, security against attacks from malicious users has to be considered. This paper will focus on collusion attacks to evaluate security in the context of video watermarking. In particular, security pitfalls will be exhibited when frame-by-frame embedding strategies are enforced for video watermarking. Two alternative strategies will be surveyed: either eavesdropping the watermarking channel to identify some redundant hidden structure, or jamming the watermarking channel to wash out the embedded watermark signal. Finally, the need for a new brand of watermarking schemes will be highlighted if the watermark is to be released in a hostile environment, which is typically the case for IP protection applications.
DOE Office of Scientific and Technical Information (OSTI.GOV)
McKinnon, Archibald D.; Thompson, Seth R.; Doroshchuk, Ruslan A.
mart grid technologies are transforming the electric power grid into a grid with bi-directional flows of both power and information. Operating millions of new smart meters and smart appliances will significantly impact electric distribution systems resulting in greater efficiency. However, the scale of the grid and the new types of information transmitted will potentially introduce several security risks that cannot be addressed by traditional, centralized security techniques. We propose a new bio-inspired cyber security approach. Social insects, such as ants and bees, have developed complex-adaptive systems that emerge from the collective application of simple, light-weight behaviors. The Digital Ants frameworkmore » is a bio-inspired framework that uses mobile light-weight agents. Sensors within the framework use digital pheromones to communicate with each other and to alert each other of possible cyber security issues. All communication and coordination is both localized and decentralized thereby allowing the framework to scale across the large numbers of devices that will exist in the smart grid. Furthermore, the sensors are light-weight and therefore suitable for implementation on devices with limited computational resources. This paper will provide a brief overview of the Digital Ants framework and then present results from test bed-based demonstrations that show that Digital Ants can identify a cyber attack scenario against smart meter deployments.« less
Measurement-device-independent quantum digital signatures
NASA Astrophysics Data System (ADS)
Puthoor, Ittoop Vergheese; Amiri, Ryan; Wallden, Petros; Curty, Marcos; Andersson, Erika
2016-08-01
Digital signatures play an important role in software distribution, modern communication, and financial transactions, where it is important to detect forgery and tampering. Signatures are a cryptographic technique for validating the authenticity and integrity of messages, software, or digital documents. The security of currently used classical schemes relies on computational assumptions. Quantum digital signatures (QDS), on the other hand, provide information-theoretic security based on the laws of quantum physics. Recent work on QDS Amiri et al., Phys. Rev. A 93, 032325 (2016);, 10.1103/PhysRevA.93.032325 Yin, Fu, and Zeng-Bing, Phys. Rev. A 93, 032316 (2016), 10.1103/PhysRevA.93.032316 shows that such schemes do not require trusted quantum channels and are unconditionally secure against general coherent attacks. However, in practical QDS, just as in quantum key distribution (QKD), the detectors can be subjected to side-channel attacks, which can make the actual implementations insecure. Motivated by the idea of measurement-device-independent quantum key distribution (MDI-QKD), we present a measurement-device-independent QDS (MDI-QDS) scheme, which is secure against all detector side-channel attacks. Based on the rapid development of practical MDI-QKD, our MDI-QDS protocol could also be experimentally implemented, since it requires a similar experimental setup.
Wireless networking for the dental office: current wireless standards and security protocols.
Mupparapu, Muralidhar; Arora, Sarika
2004-11-15
Digital radiography has gained immense popularity in dentistry today in spite of the early difficulty for the profession to embrace the technology. The transition from film to digital has been happening at a faster pace in the fields of Orthodontics, Oral Surgery, Endodontics, Periodontics, and other specialties where the radiographic images (periapical, bitewing, panoramic, cephalometric, and skull radiographs) are being acquired digitally, stored within a server locally, and eventually accessed for diagnostic purposes, along with the rest of the patient data via the patient management software (PMS). A review of the literature shows the diagnostic performance of digital radiography is at least comparable to or even better than that of conventional radiography. Similarly, other digital diagnostic tools like caries detectors, cephalometric analysis software, and digital scanners were used for many years for the diagnosis and treatment planning purposes. The introduction of wireless charged-coupled device (CCD) sensors in early 2004 (Schick Technologies, Long Island City, NY) has moved digital radiography a step further into the wireless era. As with any emerging technology, there are concerns that should be looked into before adapting to the wireless environment. Foremost is the network security involved in the installation and usage of these wireless networks. This article deals with the existing standards and choices in wireless technologies that are available for implementation within a contemporary dental office. The network security protocols that protect the patient data and boost the efficiency of modern day dental clinics are enumerated.
Phonological learning in semantic dementia.
Jefferies, Elizabeth; Bott, Samantha; Ehsan, Sheeba; Lambon Ralph, Matthew A
2011-04-01
Patients with semantic dementia (SD) have anterior temporal lobe (ATL) atrophy that gives rise to a highly selective deterioration of semantic knowledge. Despite pronounced anomia and poor comprehension of words and pictures, SD patients have well-formed, fluent speech and normal digit span. Given the intimate connection between phonological STM and word learning revealed by both neuropsychological and developmental studies, SD patients might be expected to show good acquisition of new phonological forms, even though their ability to map these onto meanings is impaired. In contradiction of these predictions, a limited amount of previous research has found poor learning of new phonological forms in SD. In a series of experiments, we examined whether SD patient, GE, could learn novel phonological sequences and, if so, under which circumstances. GE showed normal benefits of phonological knowledge in STM (i.e., normal phonotactic frequency and phonological similarity effects) but reduced support from semantic memory (i.e., poor immediate serial recall for semantically degraded words, characterised by frequent item errors). Next, we demonstrated normal learning of serial order information for repeated lists of single-digit number words using the Hebb paradigm: these items were well-understood allowing them to be repeated without frequent item errors. In contrast, patient GE showed little learning of nonsense syllable sequences using the same Hebb paradigm. Detailed analysis revealed that both GE and the controls showed a tendency to learn their own errors as opposed to the target items. Finally, we showed normal learning of phonological sequences for GE when he was prevented from repeating his errors. These findings confirm that the ATL atrophy in SD disrupts phonological processing for semantically degraded words but leaves the phonological architecture intact. Consequently, when item errors are minimised, phonological STM can support the acquisition of new phoneme sequences in patients with SD. Copyright © 2011 Elsevier Ltd. All rights reserved.
Digital Authenticity and Integrity: Digital Cultural Heritage Documents as Research Resources
ERIC Educational Resources Information Center
Bradley; Rachael
2005-01-01
This article presents the results of a survey addressing methods of securing digital content and ensuring the content's authenticity and integrity, as well as the perceived importance of authenticity and integrity. The survey was sent to 40 digital repositories in the United States and Canada between June 30 and July 19, 2003. Twenty-two…
Security Issues on the Internet.
ERIC Educational Resources Information Center
Bar-Ilan, Judit
1996-01-01
Discusses some basic notions of modern cryptography: public key systems and digital signatures. Describes how theoretical modern cryptography can help solve security problems on the Internet. (Author/JKP)
Hein, Sascha; Zangl, Michael
2016-01-01
The aim of this in vitro study was to investigate the color changes of human teeth caused by five different diffuser materials commonly used in dental photography, as well as software influence, and to confirm whether the use of a standardized gray reference card is effective in correcting these color changes during digital postproduction. Forty extracted human teeth were obtained from a specialized oral surgery practice in Cham, Germany. Five commonly used diffuser materials were chosen to be investigated, which included: polyethylene (PET), White Frost photographic paper, LumiQuest polyamide (nylon) material, 80 gsm white printing paper, and 3M linear polarizing filter sheet used for cross polarization. A digital single-lens reflex camera (Canon EOS 5D MKII) was used, together with a twin flash suitable for macrophotography (Canon MT-24EX Macro Twin Lite). Images were tethered into Adobe Lightroom CC using the RAW format. A standardized gray reference card (WhiBal, Michael Tapes Design) was used for exposure calibration and white balancing. Classic Color Me- ter software (Ricci Adams, version 1.6 (122)) was used to obtain CIE L*a*b* values of the specimens before and after white balancing and exposure correction. All diffusers caused visually perceivable color changes on the extracted teeth: White Frost (ΔE* 1.24; sd 0.47), 80 gsm printing paper (ΔE* 2.94; sd 0.35), LumiQuest polyamide (ΔE* 3.68; sd 0.54), PET (ΔE* 6.55; sd 0.41), and 3M linear polarizing filter sheet (ΔE* 7.58; sd 1.00). The use of a standardized gray reference card (WhiBal) could correct these values below the visually perceivable threshold: White Frost (ΔE* 0.58; sd 0.36), 80 gsm printing paper (ΔE* 0.93; sd 0.54), LumiQuest polyamide (ΔE* 0.66; sd 0.58), PET (ΔE* 0.59; sd 0.33), and 3M linear polarizing filter sheet (ΔE* 0.53; sd 0.42). The use of a standardized gray reference card with specified CIE L*a*b* values should be considered when diffusers are used in dental photography in order to reveal the color of preoperative situations (ie, shade documentation) and document postoperative results accurately.
NASA Astrophysics Data System (ADS)
Ishikawa, M.; Itoga, T.; Okuji, T.; Nakhostin, M.; Shinohara, K.; Hayashi, T.; Sukegawa, A.; Baba, M.; Nishitani, T.
2006-10-01
A line-integrated neutron emission profile is routinely measured using the radial neutron collimator system in JT-60U tokamak. Stilbene neuron detectors (SNDs), which combine a stilbene organic crystal scintillation detector (SD) with an analog neutron-gamma pulse shape discrimination (PSD) circuit, have been used to measure collimated neutron flux. Although the SND has many advantages as a neutron detector, the maximum count rate is limited up to ˜1×105counts/s due to the analog PSD circuit. To overcome this issue, a digital signal processing system (DSPS) using a flash analog-to-digital converter (Acqiris DC252, 8GHz, 10bits) has been developed at Cyclotron and Radioisotope Center in Tohoku University. In this system anode signals from photomultiplier of the SD are directory stored and digitized. Then, the PSD between neutrons and gamma rays is performed using software. The DSPS has been installed in the vertical neutron collimator system in JT-60U and applied to deuterium experiments. It is confirmed that the PSD is sufficiently performed and collimated neutron flux is successfully measured with count rate up to ˜5×105counts/s without the effect of pileup of detected pulses. The performance of the DSPS as a neutron detector, which supersedes the SND, is demonstrated.
Pre-operative digital templating in cemented hip hemiarthroplasty for neck of femur fractures.
Kwok, Iris H Y; Pallett, Scott J C; Massa, Edward; Cundall-Curry, Duncan; Loeffler, Mark D
2016-03-01
Pre-operative digital templating allows the surgeon to foresee any anatomical anomalies which may lead to intra-operative problems, and anticipate appropriate instruments and implants required during surgery. Although its role is well-established in successful elective total hip arthroplasty, little work has been done on its use in hip hemiarthroplasty in neck of femur fractures. We describe our initial experience of digital templating in 40 consecutive patients who have undergone cemented hip hemiarthroplasty, assessing templating accuracy between templated implant sizes to actual implant sizes. 81% of implanted heads were templated to within two head sizes, and 89% of implanted stems were templated to within two sizes. Although there was a moderately strong correlation of 0.52 between templated and actual head sizes, this correlation was not demonstrated in femoral stem sizes. Mean leg length discrepancy was -2.5mm (S.D. 8.5), and the mean difference in femoral offset between the operated and non-operated hip was -1mm (S.D. 4.4). Digital templating is a useful adjunct to the surgeon in pre-operative planning of hip hemiarthroplasty in the restoration of leg length and femoral offset. However, its accuracy is inferior to that of elective total hip arthroplasty. Copyright © 2016 Elsevier Ltd. All rights reserved.
Schepke, Ulf; Meijer, Henny J A; Kerdijk, Wouter; Cune, Marco S
2015-09-01
Digital impression-making techniques are supposedly more patient friendly and less time-consuming than analog techniques, but evidence is lacking to substantiate this assumption. The purpose of this in vivo within-subject comparison study was to examine patient perception and time consumption for 2 complete-arch impression-making methods: a digital and an analog technique. Fifty participants with a single missing premolar were included. Treatment consisted of implant therapy. Three months after implant placement, complete-arch digital (Cerec Omnicam; Sirona) and analog impressions (semi-individual tray, Impregum; 3M ESPE) were made, and the participant's opinion was evaluated with a standard questionnaire addressing several domains (inconvenience, shortness of breath, fear of repeating the impression, and feelings of helplessness during the procedure) with the visual analog scale. All participants were asked which procedure they preferred. Operating time was measured with a stopwatch. The differences between impressions made for maxillary and mandibular implants were also compared. The data were analyzed with paired and independent sample t tests, and effect sizes were calculated. Statistically significant differences were found in favor of the digital procedure regarding all subjective domains (P<.001), with medium to large effect sizes. Of all the participants, over 80% preferred the digital procedure to the analog procedure. The mean duration of digital impression making was 6 minutes and 39 seconds (SD=1:51) versus 12 minutes and 13 seconds (SD=1:24) for the analog impression (P<.001, effect size=2.7). Digital impression making for the restoration of a single implant crown takes less time than analog impression making. Furthermore, participants preferred the digital scan and reported less inconvenience, less shortness of breath, less fear of repeating the impression, and fewer feelings of helplessness during the procedure. Copyright © 2015 Editorial Council for the Journal of Prosthetic Dentistry. Published by Elsevier Inc. All rights reserved.
Quantum random oracle model for quantum digital signature
NASA Astrophysics Data System (ADS)
Shang, Tao; Lei, Qi; Liu, Jianwei
2016-10-01
The goal of this work is to provide a general security analysis tool, namely, the quantum random oracle (QRO), for facilitating the security analysis of quantum cryptographic protocols, especially protocols based on quantum one-way function. QRO is used to model quantum one-way function and different queries to QRO are used to model quantum attacks. A typical application of quantum one-way function is the quantum digital signature, whose progress has been hampered by the slow pace of the experimental realization. Alternatively, we use the QRO model to analyze the provable security of a quantum digital signature scheme and elaborate the analysis procedure. The QRO model differs from the prior quantum-accessible random oracle in that it can output quantum states as public keys and give responses to different queries. This tool can be a test bed for the cryptanalysis of more quantum cryptographic protocols based on the quantum one-way function.
Associated diacritical watermarking approach to protect sensitive arabic digital texts
NASA Astrophysics Data System (ADS)
Kamaruddin, Nurul Shamimi; Kamsin, Amirrudin; Hakak, Saqib
2017-10-01
Among multimedia content, one of the most predominant medium is text content. There have been lots of efforts to protect and secure text information over the Internet. The limitations of existing works have been identified in terms of watermark capacity, time complexity and memory complexity. In this work, an invisible digital watermarking approach has been proposed to protect and secure the most sensitive text i.e. Digital Holy Quran. The proposed approach works by XOR-ing only those Quranic letters that has certain diacritics associated with it. Due to sensitive nature of Holy Quran, diacritics play vital role in the meaning of the particular verse. Hence, securing letters with certain diacritics will preserve the original meaning of Quranic verses in case of alternation attempt. Initial results have shown that the proposed approach is promising with less memory complexity and time complexity compared to existing approaches.
Information Security - Data Loss Prevention Procedure
The purpose of this procedure is to extend and provide specificity to the Environmental Protection Agency (EPA) Information Security Policy regarding data loss prevention and digital rights management.
15 CFR Supplement No. 1 to Part 746 - Examples of Luxury Goods
Code of Federal Regulations, 2010 CFR
2010-01-01
... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS...) Personal digital assistants (PDAs) (3) Personal digital music players (4) Computer laptops (g...
Security and privacy in electronic health records: a systematic literature review.
Fernández-Alemán, José Luis; Señor, Inmaculada Carrión; Lozoya, Pedro Ángel Oliver; Toval, Ambrosio
2013-06-01
To report the results of a systematic literature review concerning the security and privacy of electronic health record (EHR) systems. Original articles written in English found in MEDLINE, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database. Only those articles dealing with the security and privacy of EHR systems. The extraction of 775 articles using a predefined search string, the outcome of which was reviewed by three authors and checked by a fourth. A total of 49 articles were selected, of which 26 used standards or regulations related to the privacy and security of EHR data. The most widely used regulations are the Health Insurance Portability and Accountability Act (HIPAA) and the European Data Protection Directive 95/46/EC. We found 23 articles that used symmetric key and/or asymmetric key schemes and 13 articles that employed the pseudo anonymity technique in EHR systems. A total of 11 articles propose the use of a digital signature scheme based on PKI (Public Key Infrastructure) and 13 articles propose a login/password (seven of them combined with a digital certificate or PIN) for authentication. The preferred access control model appears to be Role-Based Access Control (RBAC), since it is used in 27 studies. Ten of these studies discuss who should define the EHR systems' roles. Eleven studies discuss who should provide access to EHR data: patients or health entities. Sixteen of the articles reviewed indicate that it is necessary to override defined access policies in the case of an emergency. In 25 articles an audit-log of the system is produced. Only four studies mention that system users and/or health staff should be trained in security and privacy. Recent years have witnessed the design of standards and the promulgation of directives concerning security and privacy in EHR systems. However, more work should be done to adopt these regulations and to deploy secure EHR systems. Copyright © 2013 Elsevier Inc. All rights reserved.
Discovering and Mitigating Software Vulnerabilities through Large-Scale Collaboration
ERIC Educational Resources Information Center
Zhao, Mingyi
2016-01-01
In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions, store sensitive information, etc. However, this trust does not have a solid foundation, because software code that supports this digital world has security vulnerabilities. These…
Digital Camera with Apparatus for Authentication of Images Produced from an Image File
NASA Technical Reports Server (NTRS)
Friedman, Gary L. (Inventor)
1996-01-01
A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely related to the private key that digital data encrypted with the private key may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The authenticating apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match. Other techniques to address time-honored methods of deception, such as attaching false captions or inducing forced perspectives, are included.
Witt, Michael; Krefting, Dagmar
2016-01-01
Human sample data is stored in biobanks with software managing digital derived sample data. When these stand-alone components are connected and a search infrastructure is employed users become able to collect required research data from different data sources. Data protection, patient rights, data heterogeneity and access control are major challenges for such an infrastructure. This dissertation will investigate concepts for a multi-level security architecture to comply with these requirements.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moiseev, A A; Gelikonov, G V; Terpelov, D A
2014-08-31
An analogy between spectral-domain optical coherence tomography (SD OCT) data and broadband digital holography data is considered. Based on this analogy, a method for processing SD OCT data, which makes it possible to construct images with a lateral resolution in the whole investigated volume equal to the resolution in the in-focus region, is developed. Several issues concerning practical application of the proposed method are discussed. (laser biophotonics)
A Digital Radio Receiver for Ionospheric Research
2006-06-01
amplification, the signals are digitized and then processed by a digital down converter ( DDC ) and decimating low-pass filter. The resultant digital...images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 41 19a. NAME OF...the University of Calgary under a Contributions Agreement contract awarded by the Canadian Space Agency. The present paper follows an earlier article
Prototype of a low cost multiparameter probe
NASA Astrophysics Data System (ADS)
Koski, K.; Schwingle, R.; Pullin, M.
2010-12-01
Commercial multi-parameter probes provide accurate, high-resolution temporal data collection of a variety of water quality parameters, but their cost (>5,000) prohibits more than a few sampling locations. We present a design and prototype for a low cost (<250) probe. The cost of the probe is ~5% of commercially available probes, allowing for data collection from ~20 times more sampling points in a field location. The probe is constructed from a single-board microcontroller, a commercially available temperature sensor, a conductivity sensor, and a fabricated optical rhodamine sensor. Using a secure digital (SD) memory card, the probe can record over a month of data at a user specified interval. Construction, calibration, field deployment and data retrieval can be accomplished by a skilled undergraduate. Initial deployment will take place as part of a tracer test in the Valles Caldera National Preserve in northern New Mexico. Future work includes: addition of commercial ion selective electrodes (pH, bromide, nitrate, and others); construction of optically based sensors (chlorophyll, dissolved oxygen, and others); wireless networking between the sensors; and reduction of biofouling.
Data security101: avoiding the list.
Perna, Gabriel
2012-01-01
Thanks to the rampant digitization of healthcare data, breaches have become commonplace in an industry that lacks advanced security practices. In this industry-wide report, those who have dealt with breaches implore others to shore up internal security practices and be transparent. As one CIO keenly notes, "we're all in this together."
New Technology's Surprising Security Threats. Building Digital Libraries
ERIC Educational Resources Information Center
Huwe, Terence
2005-01-01
In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…
Racing to the Future: Security in the Gigabit Race?
ERIC Educational Resources Information Center
Gregory, Mark A; Cradduck, Lucy
2016-01-01
This research seeks to identify the differing national perspectives towards security and the "gigabit race" as those nations transition to their next generation broadband networks. Its aim is to critically appraise the rationales for their existing digital security frameworks in order to determine whether (and what) Australia can learn…
Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt
NASA Astrophysics Data System (ADS)
Wong, M. L. Dennis; Goh, Antionette W.-T.; Chua, Hong Siang
Secure authentication of digital medical image content provides great value to the e-Health community and medical insurance industries. Fragile Watermarking has been proposed to provide the mechanism to authenticate digital medical image securely. Transform Domain based Watermarking are typically slower than spatial domain watermarking owing to the overhead in calculation of coefficients. In this paper, we propose a new Discrete Pascal Transform based watermarking technique. Preliminary experiment result shows authentication capability. Possible improvements on the proposed scheme are also presented before conclusions.
ERIC Educational Resources Information Center
Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E.
2003-01-01
Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…
SERENITY in Air Traffic Management
NASA Astrophysics Data System (ADS)
Felici, Massimo; Meduri, Valentino; Tedeschi, Alessandra; Riccucci, Carlo
This chapter is concerned with the validation of an implementation of the SERENITY Runtime Framework (SRF) tailored for the Air Traffic Management (ATM) domain. It reports our experience in the design and validation phases of a tool, which relies on the SRF in order to support Security and Dependability (S&D) Patterns into work practices. In particular, this chapter pinpoints the activities concerning the identification of S&D Patterns, the design of an ATM prototype and its validation. The validation activities involve qualitative as well as quantitative approaches. These activities as a whole highlight the validation process for adopting S&D Patterns within the ATM domain. Moreover, they stress how S&D Patters enhance and relate to critical features within an industry domain. The empirical results point out that S&D Patterns relate to work practices. Furthermore, they highlight design and validation activities in order to tailor systems relying on S&D Patterns to specific application domains. This strengths and supports the adoption of S&D Patterns in order to address AmI (Ambient Intelligence) requirements (e.g., awareness, proactiveness, resilience, etc.) within the ATM domain.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Finley, C; Dave, J
Purpose: To characterize noise for image receptors of digital radiography systems based on pixel variance. Methods: Nine calibrated digital image receptors associated with nine new portable digital radiography systems (Carestream Health, Inc., Rochester, NY) were used in this study. For each image receptor, thirteen images were acquired with RQA5 beam conditions for input detector air kerma ranging from 0 to 110 µGy, and linearized ‘For Processing’ images were extracted. Mean pixel value (MPV), standard deviation (SD) and relative noise (SD/MPV) were obtained from each image using ROI sizes varying from 2.5×2.5 to 20×20 mm{sup 2}. Variance (SD{sup 2}) was plottedmore » as a function of input detector air kerma and the coefficients of the quadratic fit were used to derive structured, quantum and electronic noise coefficients. Relative noise was also fitted as a function of input detector air kerma to identify noise sources. The fitting functions used least-squares approach. Results: The coefficient of variation values obtained using different ROI sizes was less than 1% for all the images. The structured, quantum and electronic coefficients obtained from the quadratic fit of variance (r>0.97) were 0.43±0.10, 3.95±0.27 and 2.89±0.74 (mean ± standard deviation), respectively, indicating that overall the quantum noise was the dominant noise source. However, for one system electronic noise coefficient (3.91) was greater than quantum noise coefficient (3.56) indicating electronic noise to be dominant. Using relative noise values, the power parameter of the fitting equation (|r|>0.93) showed a mean and standard deviation of 0.46±0.02. A 0.50 value for this power parameter indicates quantum noise to be the dominant noise source whereas values around 0.50 indicate presence of other noise sources. Conclusion: Characterizing noise from pixel variance assists in identifying contributions from various noise sources that, eventually, may affect image quality. This approach may be integrated during periodic quality assessments of digital image receptors.« less
Handheld computers and the 21st century surgical team: a pilot study.
Aziz, Omer; Panesar, Sukhmeet S; Netuveli, Gopalakrishnan; Paraskeva, Paraskevas; Sheikh, Aziz; Darzi, Ara
2005-08-18
The commercial development and expansion of mobile phone networks has led to the creation of devices combining mobile phones and personal digital assistants, which could prove invaluable in a clinical setting. This pilot study aimed to look at how one such device compared with the current pager system in facilitating inter-professional communication in a hospital clinical team. The study looked at a heterogeneous team of doctors (n = 9) working in a busy surgical setting at St. Mary's Hospital in London and compared the use of a personal digital assistant with mobile phone and web-browsing facilities to the existing pager system. The primary feature of this device being compared to the conventional pager was its use as a mobile phone, but other features evaluated included the ability to access the internet, and reference data on the device. A crossover study was carried out for 6 weeks in 2004, with the team having access to the personal digital assistant every alternate week. The primary outcome measure for assessing efficiency of communication was the length of time it took for clinicians to respond to a call. We also sought to assess the ease of adoption of new technology by evaluating the perceptions of the team (n = 9) to personal digital assistants, by administering a questionnaire. Doctors equipped with a personal digital assistant rather than a pager, responded more quickly to a call and had a lower of failure to respond rate (RR: 0.44; 95%CI 0.20-0.93). Clinicians also found this technology easy to adopt as seen by a significant reduction in perceptions of nervousness to the technology over the six-week study period (mean (SD) week 1: 4.10 (SD 1.69) vs. mean (SD) week 6: 2.20 (1.99); p = 0.04). The results of this pilot study show the possible effects of replacing the current hospital pager with a newer, more technologically advanced device, and suggest that a combined personal digital assistant and mobile phone device may improve communication between doctors. In the light of these encouraging preliminary findings, we propose a large-scale clinical trial of the use of these devices in facilitating inter-professional communication in a hospital setting.
Hsu, Che-Hao; Tsai, Ming-Ya; Huang, Go-Shine; Lin, Tso-Chou; Chen, Kuen-Pao; Ho, Shung-Tai; Shyu, Liang-Yu; Li, Chi-Yuan
2012-03-01
Beat-to-beat heart rate variability (HRV) is caused by the fluctuating balance of sympathetic and parasympathetic tone. The Poincaré plot has been used to evaluate HRV. In this study, we validate that this new method may qualitatively and quantitatively assess the sympathovagal fluctuation in patients during induction of anesthesia with sevoflurane. Twenty-eight young patients were allocated for the study. The patients received a tilt test and on the next day they sustained anesthesia induced with inhaled anesthetics. Electrocardiography signals from the patients were relayed to an analogue-digital converter. The Poincaré plot is quantified by measuring SD1, SD2, and SD1/SD2. Power spectral analyses were performed and LF, HF and HF/LF were calculated. The LF power and the SD2 of the Poincaré plot increased while subjects were tilt-up from the supine position. Additionally, a significant correlation were found between LF and SD2, HF and SD1 (p < 0.05), and LF/HF and SD2/SD1 (p < 0.01). Sevoflurane inhalation for 10 minutes had no effect on heart rate, but diminished LF, total power and SD1, SD2 of the Poincaré plot respectively. However, the LF, SD2 and LF/HF increased; the HF, SD1 and SD1/SD2 ratio decreased after intubation stimulation. Poincaré plot and power spectral analysis of HRV during tilt test and sevoflurane induction significantly correlate. Poincaré plot analysis is easier and more sensitive at evaluating the sympathovagal balance and observing the beat-to-beat HRV. Copyright © 2012. Published by Elsevier B.V.
Steinmetz, Michael P; Mroz, Thomas E; Krishnaney, Ajit; Modic, Michael
2009-12-01
In today's health-care environment, operational efficiency is intrinsic to balancing the need for increased productivity driven by rising costs and potentially decreasing reimbursement. Other operational factors kept constant, decreasing the time for a procedure can be viewed as one marker for increased efficiency. To prospectively evaluate the time and operating room efficiency differences between the two methods for intraoperative level localization. STYDY DESIGN: Prospective nonrandomized study. Prospective consecutive patients undergoing a single-level anterior cervical discectomy and fusion (ACDF) with plate and allograft. Time for performance and interpretation of intraoperative localization radiograph. This is a prospective nonrandomized study of patients treated consecutively with a single-level ACDF with allograft and plating. All the patients underwent a conventional approach to the cervical spine. After exposure, a spinal needle was placed in the exposed intervertebral disc and a radiography was performed. Either a conventional or a digital radiography was used in each case. Eighteen patients were enrolled in this study. Ten patients underwent localization with conventional radiography, whereas eight patients underwent localization with digital imaging. The mean time for conventional radiography was 823 seconds (standard deviation [SD], 159), and for digital, it was 100 seconds (SD, 34; p<.001). Current technology provides options for level localization. Digital imaging provides equally accurate information as conventional radiography in a significantly reduced amount of time. Image quality, ease or archival, and manipulation provided by digital radiography are superior to those by provided fluoroscopy. Keeping operational factors constant, decreasing the time for a procedure, and increasing the efficiency of the environment may be viewed as a surrogate for improving the cost basis for a procedure.
Caranguian, Luther Paul R; Pancho-Festin, Susan; Sison, Luis G
2012-01-01
In this study, we focused on the interoperability and authentication of medical devices in the context of telemedical systems. A recent standard called the ISO/IEEE 11073 Personal Health Device (X73-PHD) Standards addresses the device interoperability problem by defining common protocols for agent (medical device) and manager (appliance) interface. The X73-PHD standard however has not addressed security and authentication of medical devices which is important in establishing integrity of a telemedical system. We have designed and implemented a security policy within the X73-PHD standards. The policy will enable device authentication using Asymmetric-Key Cryptography and the RSA algorithm as the digital signature scheme. We used two approaches for performing the digital signatures: direct software implementation and use of embedded security modules (ESM). The two approaches were evaluated and compared in terms of execution time and memory requirement. For the standard 2048-bit RSA, ESM calculates digital signatures only 12% of the total time for the direct implementation. Moreover, analysis shows that ESM offers more security advantage such as secure storage of keys compared to using direct implementation. Interoperability with other systems was verified by testing the system with LNI Healthlink, a manager software that implements the X73-PHD standard. Lastly, security analysis was done and the system's response to common attacks on authentication systems was analyzed and several measures were implemented to protect the system against them.
Verification of S&D Solutions for Network Communications and Devices
NASA Astrophysics Data System (ADS)
Rudolph, Carsten; Compagna, Luca; Carbone, Roberto; Muñoz, Antonio; Repp, Jürgen
This chapter describes the tool-supported verification of S&D Solutions on the level of network communications and devices. First, the general goals and challenges of verification in the context of AmI systems are highlighted and the role of verification and validation within the SERENITY processes is explained.Then, SERENITY extensions to the SH VErification tool are explained using small examples. Finally, the applicability of existing verification tools is discussed in the context of the AVISPA toolset. The two different tools show that for the security analysis of network and devices S&D Patterns relevant complementary approachesexist and can be used.
Using Swarming Agents for Scalable Security in Large Network Environments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Crouse, Michael; White, Jacob L.; Fulp, Errin W.
2011-09-23
The difficulty of securing computer infrastructures increases as they grow in size and complexity. Network-based security solutions such as IDS and firewalls cannot scale because of exponentially increasing computational costs inherent in detecting the rapidly growing number of threat signatures. Hostbased solutions like virus scanners and IDS suffer similar issues, and these are compounded when enterprises try to monitor these in a centralized manner. Swarm-based autonomous agent systems like digital ants and artificial immune systems can provide a scalable security solution for large network environments. The digital ants approach offers a biologically inspired design where each ant in the virtualmore » colony can detect atoms of evidence that may help identify a possible threat. By assembling the atomic evidences from different ant types the colony may detect the threat. This decentralized approach can require, on average, fewer computational resources than traditional centralized solutions; however there are limits to its scalability. This paper describes how dividing a large infrastructure into smaller managed enclaves allows the digital ant framework to effectively operate in larger environments. Experimental results will show that using smaller enclaves allows for more consistent distribution of agents and results in faster response times.« less
Initial On-Orbit Radiometric Calibration of the Suomi NPP VIIRS Reflective Solar Bands
NASA Technical Reports Server (NTRS)
Lei, Ning; Wang, Zhipeng; Fulbright, Jon; Lee, Shihyan; McIntire, Jeff; Chiang, Vincent; Xiong, Jack
2012-01-01
The on-orbit radiometric response calibration of the VISible/Near InfraRed (VISNIR) and the Short-Wave InfraRed (SWIR) bands of the Visible/Infrared Imager/Radiometer Suite (VIIRS) aboard the Suomi National Polar-orbiting Partnership (NPP) satellite is carried out through a Solar Diffuser (SD). The transmittance of the SD screen and the SD's Bidirectional Reflectance Distribution Function (BRDF) are measured before launch and tabulated, allowing the VIIRS sensor aperture spectral radiance to be accurately determined. The radiometric response of a detector is described by a quadratic polynomial of the detector?s digital number (dn). The coefficients were determined before launch. Once on orbit, the coefficients are assumed to change by a common factor: the F-factor. The radiance scattered from the SD allows the determination of the F-factor. In this Proceeding, we describe the methodology and the associated algorithms in the determination of the F-factors and discuss the results.
29 CFR 5.5 - Contract provisions and related matters.
Code of Federal Regulations, 2010 CFR
2010-07-01
... contain the name, address, and social security number of each such worker, his or her correct... maintained under 29 CFR 5.5(a)(3)(i), except that full social security numbers and home addresses shall not... identifying number for each employee (e.g., the last four digits of the employee's social security number...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Municipal Mortgage & Equity LLC, Prolink Holdings Corp., RPM Technologies, Inc., SARS Corp., Secured Digital Storage Corp., Siboney Corp., SiriCOMM... securities of SARS Corp. because it has not filed any periodic reports since the period ended June 30, 2008...
10 CFR 73.54 - Protection of digital computer and communication systems and networks.
Code of Federal Regulations, 2011 CFR
2011-01-01
....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...
10 CFR 73.54 - Protection of digital computer and communication systems and networks.
Code of Federal Regulations, 2010 CFR
2010-01-01
....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...
10 CFR 73.54 - Protection of digital computer and communication systems and networks.
Code of Federal Regulations, 2014 CFR
2014-01-01
....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...
10 CFR 73.54 - Protection of digital computer and communication systems and networks.
Code of Federal Regulations, 2012 CFR
2012-01-01
....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...
10 CFR 73.54 - Protection of digital computer and communication systems and networks.
Code of Federal Regulations, 2013 CFR
2013-01-01
....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...
78 FR 19400 - Registry for Attorneys and Representatives
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-01
... digits of his or her Social Security number. See 68 FR 75162. EOIR notes that online security standards... are only accredited to appear before the Department of Homeland Security. See id. \\3\\ As part of the... accredited representative registers, he or she will create a unique UserID and password for online access to...
75 FR 34286 - Federal Acquisition Regulation; FAR Case 2009-018, Payrolls and Basic Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-16
... removed the requirement to submit complete social security numbers and home addresses of individual... of full social security numbers and home addresses of individual workers from the prime contractor on... for each employee (e.g., the last four digits of the employee's social security number). The...
Development of the New DAQ System for the SD Array of TA×4 and TALE
NASA Astrophysics Data System (ADS)
Takahashi, Yuichi; Sahara, Ryosuke; Konishi, Shogo; Goto, Takashi; Ogio, Shoichi
The data acquisition (DAQ) system for the surface detector (SD) arrays of TA×4 and TALE will be presented. Each SD records digital signals with 50 MHz FADCs and sends the data to a central communication center (of the "communication tower") via a wireless network system. The technique employed here is based on the currently-running DAQ system of the Telescope Array, and there are some improvements including i) replacement of a wireless LAN module with a custom protocol to another with TCP/IP, and ii) replacement of the "tower electronics" to a generic Linux board PC of Raspberry Pi Type II B. The details and performance of the new DAQ system are described below.
A cryptologic based trust center for medical images.
Wong, S T
1996-01-01
To investigate practical solutions that can integrate cryptographic techniques and picture archiving and communication systems (PACS) to improve the security of medical images. The PACS at the University of California San Francisco Medical Center consolidate images and associated data from various scanners into a centralized data archive and transmit them to remote display stations for review and consultation purposes. The purpose of this study is to investigate the model of a digital trust center that integrates cryptographic algorithms and protocols seamlessly into such a digital radiology environment to improve the security of medical images. The timing performance of encryption, decryption, and transmission of the cryptographic protocols over 81 volumetric PACS datasets has been measured. Lossless data compression is also applied before the encryption. The transmission performance is measured against three types of networks of different bandwidths: narrow-band Integrated Services Digital Network, Ethernet, and OC-3c Asynchronous Transfer Mode. The proposed digital trust center provides a cryptosystem solution to protect the confidentiality and to determine the authenticity of digital images in hospitals. The results of this study indicate that diagnostic images such as x-rays and magnetic resonance images could be routinely encrypted in PACS. However, applying encryption in teleradiology and PACS is a tradeoff between communications performance and security measures. Many people are uncertain about how to integrate cryptographic algorithms coherently into existing operations of the clinical enterprise. This paper describes a centralized cryptosystem architecture to ensure image data authenticity in a digital radiology department. The system performance has been evaluated in a hospital-integrated PACS environment.
A cryptologic based trust center for medical images.
Wong, S T
1996-01-01
OBJECTIVE: To investigate practical solutions that can integrate cryptographic techniques and picture archiving and communication systems (PACS) to improve the security of medical images. DESIGN: The PACS at the University of California San Francisco Medical Center consolidate images and associated data from various scanners into a centralized data archive and transmit them to remote display stations for review and consultation purposes. The purpose of this study is to investigate the model of a digital trust center that integrates cryptographic algorithms and protocols seamlessly into such a digital radiology environment to improve the security of medical images. MEASUREMENTS: The timing performance of encryption, decryption, and transmission of the cryptographic protocols over 81 volumetric PACS datasets has been measured. Lossless data compression is also applied before the encryption. The transmission performance is measured against three types of networks of different bandwidths: narrow-band Integrated Services Digital Network, Ethernet, and OC-3c Asynchronous Transfer Mode. RESULTS: The proposed digital trust center provides a cryptosystem solution to protect the confidentiality and to determine the authenticity of digital images in hospitals. The results of this study indicate that diagnostic images such as x-rays and magnetic resonance images could be routinely encrypted in PACS. However, applying encryption in teleradiology and PACS is a tradeoff between communications performance and security measures. CONCLUSION: Many people are uncertain about how to integrate cryptographic algorithms coherently into existing operations of the clinical enterprise. This paper describes a centralized cryptosystem architecture to ensure image data authenticity in a digital radiology department. The system performance has been evaluated in a hospital-integrated PACS environment. PMID:8930857
How Secure Is Your Radiology Department? Mapping Digital Radiology Adoption and Security Worldwide.
Stites, Mark; Pianykh, Oleg S
2016-04-01
Despite the long history of digital radiology, one of its most critical aspects--information security--still remains extremely underdeveloped and poorly standardized. To study the current state of radiology security, we explored the worldwide security of medical image archives. Using the DICOM data-transmitting standard, we implemented a highly parallel application to scan the entire World Wide Web of networked computers and devices, locating open and unprotected radiology servers. We used only legal and radiology-compliant tools. Our security-probing application initiated a standard DICOM handshake to remote computer or device addresses, and then assessed their security posture on the basis of handshake replies. The scan discovered a total of 2774 unprotected radiology or DICOM servers worldwide. Of those, 719 were fully open to patient data communications. Geolocation was used to analyze and rank our findings according to country utilization. As a result, we built maps and world ranking of clinical security, suggesting that even the most radiology-advanced countries have hospitals with serious security gaps. Despite more than two decades of active development and implementation, our radiology data still remains insecure. The results provided should be applied to raise awareness and begin an earnest dialogue toward elimination of the problem. The application we designed and the novel scanning approach we developed can be used to identify security breaches and to eliminate them before they are compromised.
Building the Digital Library Infrastructure: A Primer.
ERIC Educational Resources Information Center
Tebbetts, Diane R.
1999-01-01
Provides a framework for examining the complex infrastructure needed to successfully implement a digital library. Highlights include database development, online public-access catalogs, interactive technical services, full-text documents, hardware and wiring, licensing, access, and security issues. (Author/LRW)
Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wheeler, Timothy A.; Denman, Matthew R.; Williams, R. A.
Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities.more » iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber exploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by coupling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated impact and the associated degree of difficulty to achieve the attack vector) on accident management establishes a technical risk informed framework for developing effective cyber security controls for nuclear power.« less
Camouflaging in Digital Image for Secure Communication
NASA Astrophysics Data System (ADS)
Jindal, B.; Singh, A. P.
2013-06-01
The present paper reports on a new type of camouflaging in digital image for hiding crypto-data using moderate bit alteration in the pixel. In the proposed method, cryptography is combined with steganography to provide a two layer security to the hidden data. The novelty of the algorithm proposed in the present work lies in the fact that the information about hidden bit is reflected by parity condition in one part of the image pixel. The remaining part of the image pixel is used to perform local pixel adjustment to improve the visual perception of the cover image. In order to examine the effectiveness of the proposed method, image quality measuring parameters are computed. In addition to this, security analysis is also carried by comparing the histograms of cover and stego images. This scheme provides a higher security as well as robustness to intentional as well as unintentional attacks.
Processing of Cloud Databases for the Development of an Automated Global Cloud Climatology
1991-06-30
cloud amounts in each DOE grid box. The actual population values were coded into one- and two- digit codes primarily for printing purposes. For example...IPIALES 72652 43.07 -95.53 0423 PICKSTOWNE S.D. 80110 6.22 -75.60 1498 MEDELLIN 72424 37.90 -85.97 0233 FT. KNOX KY 80069 7.00 -74.72 0610 AMALFI...12 According to Lund, Grantham, and Davis (1980), the quality of the whole sky photographs used in producing the WSP digital data ensemble was
Cyber Security Audit and Attack Detection Toolkit
DOE Office of Scientific and Technical Information (OSTI.GOV)
Peterson, Dale
2012-05-31
This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.
A 21st Century Science, Technology, and Innovation Strategy for Americas National Security
2016-05-01
areas. Advanced Computing and Communications The exponential growth of the digital economy, driven by ubiquitous computing and communication...weapons- focused R&D, many of the capabilities being developed have significant dual-use potential. Digital connectivity, for instance, brings...scale than traditional recombinant DNA techniques, and to share these designs digitally . Nanotechnology promises the ability to engineer entirely
Digital Refractometry of Piezoelectric Crystalline Media
1988-11-01
Research and Development Technical Report SLCET-TR-87-0727-1 III DIGITAL REFRACTOMETRY OF PIEZOELECTRIC CRYSTALLINE MEDIA CD Dr. Edward Collett...1L 1 DA313485 11. TITLE (include Security Classification) DIGITAL REFRACTOMETRY OF PIEZOELECTRIC CRYSTALLINE MEDIA (U) 12. PERSONAL AUTHOR(S) Dr...GROUP SUB-GROUP Lasers; quartz; dielectrics; permittivity; refractometry 9 U-1optics; millimeter waves; microwaves; crystals. ,. ABSTRACT (Continue on
Nonimmigrant Overstays: Brief Synthesis of the Issue
2010-01-15
finger biometric system for immigration identification17 to the major identity management and screening... finger scans and digital photographs) to check identity. Enhanced Border Security and Visa Entry Reform Act of 2002 The Enhanced Border Security ...further provides: “A determination by the Secretary of Homeland Security that an alien who applied for authorization to travel to the United States
Securing Secrets and Managing Trust in Modern Computing Applications
ERIC Educational Resources Information Center
Sayler, Andy
2016-01-01
The amount of digital data generated and stored by users increases every day. In order to protect this data, modern computing systems employ numerous cryptographic and access control solutions. Almost all of such solutions, however, require the keeping of certain secrets as the basis of their security models. How best to securely store and control…
The Case for Inclusion of Competitive Teams in Security Education
ERIC Educational Resources Information Center
Serapiglia, Anthony
2016-01-01
Through industry news as well as contemporary reporting, the topic of computer security has become omnipresent in our daily lives. Whether the news is about corporate data breaches, international cyber espionage, or personal data compromises and identity theft--EVERYONE has had to deal with digital security in some way. Because of this, one of the…
Security Meets Real-World Computing. Building Digital Libraries
ERIC Educational Resources Information Center
Huwe, Terence K.
2005-01-01
The author of this column describes several instances in which secure data on computers were compromised. In each of these instances, a different route was involved in gaining access to the secure data--one by office-based theft, one by hacking, and one by burglary. Is is proposed that the most difficult factor to guarantee in the protection of…
Network security system for health and medical information using smart IC card
NASA Astrophysics Data System (ADS)
Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki
1998-07-01
A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.
Cyber security best practices for the nuclear industry
DOE Office of Scientific and Technical Information (OSTI.GOV)
Badr, I.
2012-07-01
When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)
Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework
NASA Astrophysics Data System (ADS)
Tsigkritis, Theocharis; Spanoudakis, George; Kloukinas, Christos; Lorenzoli, Davide
The SERENITY monitoring framework offers mechanisms for diagnosing the causes of violations of security and dependability (S&D) properties and detecting potential violations of such properties, called "Cthreats". Diagnostic information and threat detection are often necessary for deciding what an appropriate reaction to a violation is and taking pre-emptive actions against predicted violations, respectively. In this chapter, we describe the mechanisms of the SERENITY monitoring framework which generate diagnostic information for violations of S&D properties and detecting threats.
Turning Access into a web-enabled secure information system for clinical trials.
Dongquan Chen; Chen, Wei-Bang; Soong, Mayhue; Soong, Seng-Jaw; Orthner, Helmuth F
2009-08-01
Organizations that have limited resources need to conduct clinical studies in a cost-effective, but secure way. Clinical data residing in various individual databases need to be easily accessed and secured. Although widely available, digital certification, encryption, and secure web server, have not been implemented as widely, partly due to a lack of understanding of needs and concerns over issues such as cost and difficulty in implementation. The objective of this study was to test the possibility of centralizing various databases and to demonstrate ways of offering an alternative to a large-scale comprehensive and costly commercial product, especially for simple phase I and II trials, with reasonable convenience and security. We report a working procedure to transform and develop a standalone Access database into a secure Web-based secure information system. For data collection and reporting purposes, we centralized several individual databases; developed, and tested a web-based secure server using self-issued digital certificates. The system lacks audit trails. The cost of development and maintenance may hinder its wide application. The clinical trial databases scattered in various departments of an institution could be centralized into a web-enabled secure information system. The limitations such as the lack of a calendar and audit trail can be partially addressed with additional programming. The centralized Web system may provide an alternative to a comprehensive clinical trial management system.
Digital telephony analysis model and issues
NASA Astrophysics Data System (ADS)
Keuthan, Lynn M.
1995-09-01
Experts in the fields of digital telephony and communications security have stated the need for an analytical tool for evaluating complex issues. Some important policy issues discussed by experts recently include implementing digital wire-taps, implementation of the 'Clipper Chip', required registration of encryption/decryption keys, and export control of cryptographic equipment. Associated with the implementation of these policies are direct costs resulting from implementation, indirect cost benefits from implementation, and indirect costs resulting from the risks of implementation or factors reducing cost benefits. Presented herein is a model for analyzing digital telephony policies and systems and their associated direct costs and indirect benefit and risk factors. In order to present the structure of the model, issues of national importance and business-related issues are discussed. The various factors impacting the implementation of the associated communications systems and communications security are summarized, and various implementation tradeoffs are compared based on economic benefits/impact. The importance of the issues addressed herein, as well as other digital telephony issues, has greatly increased with the enormous increases in communication system connectivity due to the advance of the National Information Infrastructure.
Optical/digital identification/verification system based on digital watermarking technology
NASA Astrophysics Data System (ADS)
Herrigel, Alexander; Voloshynovskiy, Sviatoslav V.; Hrytskiv, Zenon D.
2000-06-01
This paper presents a new approach for the secure integrity verification of driver licenses, passports or other analogue identification documents. The system embeds (detects) the reference number of the identification document with the DCT watermark technology in (from) the owner photo of the identification document holder. During verification the reference number is extracted and compared with the reference number printed in the identification document. The approach combines optical and digital image processing techniques. The detection system must be able to scan an analogue driver license or passport, convert the image of this document into a digital representation and then apply the watermark verification algorithm to check the payload of the embedded watermark. If the payload of the watermark is identical with the printed visual reference number of the issuer, the verification was successful and the passport or driver license has not been modified. This approach constitutes a new class of application for the watermark technology, which was originally targeted for the copyright protection of digital multimedia data. The presented approach substantially increases the security of the analogue identification documents applied in many European countries.
Deelen, S M; Ollivett, T L; Haines, D M; Leslie, K E
2014-01-01
The objective of this study was to evaluate the utility of a digital Brix refractometer for the assessment of success of passive transfer of maternal immunoglobulin compared with the measurement of serum total protein (STP) by refractometry. Blood samples (n = 400) were collected from calves at 3 to 6d of age. Serum IgG concentration was determined by radial immunodiffusion (RID), and STP and percentage Brix (%Brix) were determined using a digital refractometer. The mean IgG concentration was 24.1g/L [standard deviation (SD) ± 10.0] with a range from 2.1 to 59.1g/L. The mean STP concentration was 6.0 g/dL (SD ± 0.8) with a range from 4.4 to 8.8 g/dL. The mean %Brix concentration was 9.2% (SD ± 0.9) with a range of 7.3 to 12.4%. Brix percentage was highly correlated with IgG (r = 0.93). Test characteristics were calculated to assess failure of passive transfer (FPT; serum IgG <10 g/L). The sensitivity and specificity of STP at 5.5 g/dL were 76.3 and 94.4%, respectively. A receiver operating characteristic curve was created to plot the true positive rate against the false positive rate for consecutive %Brix values. The optimal combination of sensitivity (88.9%) and specificity (88.9%) was at 8.4% Brix. Serum total protein was also positively correlated with %Brix (r = 1.00) and IgG (r = 0.93). Dairy producers can successfully monitor their colostrum management and the overall success of passive transfer using a digital Brix refractometer to estimate IgG concentration of colostrum and calf serum. Copyright © 2014 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.
Camargos, Einstein F; Louzada, Luciana L; Quintas, Juliana L; Naves, Janeth O S; Louzada, Fernando M; Nóbrega, Otávio T
2014-12-01
There are no randomized clinical trials regarding efficacy of trazodone in the treatment of sleep disturbances (SD) in patients with Alzheimer disease (AD). We tested the efficacy and safety of trazodone to treat SD in patients with AD. We conducted a double-blind, randomized and controlled trial during periods of 7-9 days at baseline and 2 weeks of treatment. Geriatric medical center of the university's general hospital. Individuals with probable AD and SD. The complete analysis comprised 30 patients assigned to either the active treatment group (N = 15) or the placebo group (N = 15). Patients received 50 mg of trazodone once daily at 10:00 P.M. or placebo in a 1:1 ratio for 2 weeks. Patients were evaluated using actigraphy and structured scales before and after intervention. Compared with the placebo group, trazodone users slept 42.5 more minutes per night and had their nighttime percent sleep increased 8.5 percentage points according to actigraphic data post-treatment. Neither trazodone nor placebo induced significant daytime sleepiness or naps. The treatments with trazodone or placebo did not show any effects either on cognition (Mini-Mental State Examination, forward/backward digit span task, letter-number sequencing, arithmetic, digit symbol-coding, and symbol search) or functionality (Katz index). There were no differences in frequency or severity rating of adverse events between the groups. This study shows significant therapeutic effects of trazodone 50 mg in community-dwelling AD patients with SD. Copyright © 2014 American Association for Geriatric Psychiatry. Published by Elsevier Inc. All rights reserved.
Tusler, Charlotte A; Maggs, David J; Kass, Philip H; Paul-Murphy, Joanne R; Schwab, Ivan R; Murphy, Christopher J
2015-01-01
To describe using spectral domain optical coherence tomography (SD-OCT), digital slit-lamp biomicroscopy, and external photography, changes in the ophidian cuticle, spectacle, and cornea during ecdysis. Four normal royal pythons (Python regius). Snakes were assessed once daily throughout a complete shed cycle using nasal, axial, and temporal SD-OCT images, digital slit-lamp biomicroscopy, and external photography. Spectral domain optical coherence tomography (SD-OCT) images reliably showed the spectacular cuticle and stroma, subcuticular space (SCS), cornea, anterior chamber, iris, and Schlemm's canal. When visible, the subspectacular space (SSS) was more distended peripherally than axially. Ocular surface changes throughout ecdysis were relatively conserved among snakes at all three regions imaged. From baseline (7 days following completion of a full cycle), the spectacle gradually thickened before separating into superficial cuticular and deep, hyper-reflective stromal components, thereby creating the SCS. During spectacular separation, the stroma regained original reflectivity, and multiple hyper-reflective foci (likely fragments from the cuticular-stromal interface) were noted within the SCS. The cornea was relatively unchanged in character or thickness throughout all stages of ecdysis. Slit-lamp images did not permit observation of these changes. Spectral domain optical coherence tomography (SD-OCT) provided excellent high-resolution images of the snake anterior segment, and especially the cuticle, spectacle, and cornea of manually restrained normal snakes at all stages of ecdysis and warrants investigation in snakes with anterior segment disease. The peripheral spectacle may be the preferred entry point for diagnostic or therapeutic injections into the SSS and for initiating spectacular surgery. © 2014 American College of Veterinary Ophthalmologists.
a Review of Digital Watermarking and Copyright Control Technology for Cultural Relics
NASA Astrophysics Data System (ADS)
Liu, H.; Hou, M.; Hu, Y.
2018-04-01
With the rapid growth of the application and sharing of the 3-D model data in the protection of cultural relics, the problem of Shared security and copyright control of the three-dimensional model of cultural relics is becoming increasingly prominent. Followed by a digital watermarking copyright control has become the frontier technology of 3-D model security protection of cultural relics and effective means, related technology research and application in recent years also got further development. 3-D model based on cultural relics digital watermarking and copyright control technology, introduces the research background and demand, its unique characteristics were described, and its development and application of the algorithm are discussed, and the prospects of the future development trend and some problems and the solution.
A Double-function Digital Watermarking Algorithm Based on Chaotic System and LWT
NASA Astrophysics Data System (ADS)
Yuxia, Zhao; Jingbo, Fan
A double- function digital watermarking technology is studied and a double-function digital watermarking algorithm of colored image is presented based on chaotic system and the lifting wavelet transformation (LWT).The algorithm has realized the double aims of the copyright protection and the integrity authentication of image content. Making use of feature of human visual system (HVS), the watermark image is embedded into the color image's low frequency component and middle frequency components by different means. The algorithm has great security by using two kinds chaotic mappings and Arnold to scramble the watermark image at the same time. The algorithm has good efficiency by using LWT. The emulation experiment indicates the algorithm has great efficiency and security, and the effect of concealing is really good.
Content Management and the Future of Academic Libraries.
ERIC Educational Resources Information Center
Wu, Yuhfen Diana; Liu, Mengxiong
2001-01-01
Discusses Internet-based electronic content management in digital libraries and considers the future of academic libraries. Topics include digital technologies; content management systems; standards; bandwidth; security and privacy concerns; legal matters, including copyrights and ownership; lifecycle; and multilingual access and interface. (LRW)
TCP/IP Implementations and Vendors Guide,
1986-02-01
DOCUMENTATION PAGE la. REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 2a. SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/ AVAILABILIT OF...UNIX System V (5.2) IMPLEMENTATION-LANGUAGE: C DISTRIBUTOR: UNIQ Digital Technologies 28 S. Water St. Batavia, fI1 60510 (312) 879-1008 CONTACT
Spelling Well Despite Developmental Language Disorder: What Makes it Possible?
Rakhlin, Natalia; Cardoso-Martins, Cláudia; Kornilov, Sergey A.; Grigorenko, Elena L.
2013-01-01
The goal of the study was to investigate the overlap between Developmental Language Disorder (DLD) and Developmental Dyslexia, identified through spelling difficulties (SD), in Russian-speaking children. In particular, we studied the role of phoneme awareness (PA), rapid automatized naming (RAN), pseudoword repetition (PWR), morphological (MA) and orthographic awareness (OA) in differentiating between children with DLD who have SD from children with DLD who are average spellers by comparing the two groups to each other, to typically developing children as well as children with SD but without spoken language deficits. One hundred forty nine children, aged 10.40 to 14.00, participated in the study. The results indicated that the SD, DLD, and DLD/SD groups did not differ from each other on PA and RAN Letters and underperformed in comparison to the control groups. However, whereas the children with written language deficits (SD and DLD/SD groups) underperformed on RAN Objects and Digits, PWR, OA and MA, the children with DLD and no SD performed similarly to the children from the control groups on these measures. In contrast, the two groups with spoken language deficits (DLD and DLD/SD) underperformed on RAN Colors in comparison to the control groups and the group of children with SD only. The results support the notion that those children with DLD who have unimpaired PWR and RAN skills are able to overcome their weaknesses in spoken language and PA and acquire basic literacy on a par with their age peers with typical language. We also argue that our findings support a multifactorial model of developmental language disorders (DLD). PMID:23860907
Kiyuna, Asanori; Kise, Norimoto; Hiratsuka, Munehisa; Kondo, Shunsuke; Uehara, Takayuki; Maeda, Hiroyuki; Ganaha, Akira; Suzuki, Mikio
2017-05-01
Spasmodic dysphonia (SD) is considered a focal dystonia. However, the detailed pathophysiology of SD remains unclear, despite the detection of abnormal activity in several brain regions. The aim of this study was to clarify the pathophysiological background of SD. This is a case-control study. Both task-related brain activity measured by functional magnetic resonance imaging by reading the five-digit numbers and resting-state functional connectivity (FC) measured by 150 T2-weighted echo planar images acquired without any task were investigated in 12 patients with adductor SD and in 16 healthy controls. The patients with SD showed significantly higher task-related brain activation in the left middle temporal gyrus, left thalamus, bilateral primary motor area, bilateral premotor area, bilateral cerebellum, bilateral somatosensory area, right insula, and right putamen compared with the controls. Region of interest voxel FC analysis revealed many FC changes within the cerebellum-basal ganglia-thalamus-cortex loop in the patients with SD. Of the significant connectivity changes between the patients with SD and the controls, the FC between the left thalamus and the left caudate nucleus was significantly correlated with clinical parameters in SD. The higher task-related brain activity in the insula and cerebellum was consistent with previous neuroimaging studies, suggesting that these areas are one of the unique characteristics of phonation-induced brain activity in SD. Based on FC analysis and their significant correlations with clinical parameters, the basal ganglia network plays an important role in the pathogenesis of SD. Copyright © 2017 The Voice Foundation. Published by Elsevier Inc. All rights reserved.
Joda, Tim; Brägger, Urs
2015-01-01
To compare time-efficiency in the production of implant crowns using a digital workflow versus the conventional pathway. This prospective clinical study used a crossover design that included 20 study participants receiving single-tooth replacements in posterior sites. Each patient received a customized titanium abutment plus a computer-aided design/computer-assisted manufacture (CAD/CAM) zirconia suprastructure (for those in the test group, using digital workflow) and a standardized titanium abutment plus a porcelain-fused-to-metal crown (for those in the control group, using a conventional pathway). The start of the implant prosthetic treatment was established as the baseline. Time-efficiency analysis was defined as the primary outcome, and was measured for every single clinical and laboratory work step in minutes. Statistical analysis was calculated with the Wilcoxon rank sum test. All crowns could be provided within two clinical appointments, independent of the manufacturing process. The mean total production time, as the sum of clinical plus laboratory work steps, was significantly different. The mean ± standard deviation (SD) time was 185.4 ± 17.9 minutes for the digital workflow process and 223.0 ± 26.2 minutes for the conventional pathway (P = .0001). Therefore, digital processing for overall treatment was 16% faster. Detailed analysis for the clinical treatment revealed a significantly reduced mean ± SD chair time of 27.3 ± 3.4 minutes for the test group compared with 33.2 ± 4.9 minutes for the control group (P = .0001). Similar results were found for the mean laboratory work time, with a significant decrease of 158.1 ± 17.2 minutes for the test group vs 189.8 ± 25.3 minutes for the control group (P = .0001). Only a few studies have investigated efficiency parameters of digital workflows compared with conventional pathways in implant dental medicine. This investigation shows that the digital workflow seems to be more time-efficient than the established conventional production pathway for fixed implant-supported crowns. Both clinical chair time and laboratory manufacturing steps could be effectively shortened with the digital process of intraoral scanning plus CAD/CAM technology.
Statistical Smoothing Methods and Image Analysis
1988-12-01
83 - 111. Rosenfeld, A. and Kak, A.C. (1982). Digital Picture Processing. Academic Press,Qrlando. Serra, J. (1982). Image Analysis and Mat hematical ...hypothesis testing. IEEE Trans. Med. Imaging, MI-6, 313-319. Wicksell, S.D. (1925) The corpuscle problem. A mathematical study of a biometric problem
Lionetti, Francesca
2014-01-01
Life before adoption is characterized by the lack of sensitive and stable caregiving, putting infants at risk for non-secure attachment patterns. What leads to adoptees' attachment security in their adoptive families has not been conclusively determined. We investigated the roles of children's temperament and adoptive parents' attachment on adoptees' attachment security. The variables were studied in a sample of 30 early-placed adoptees (age at adoption placement M = 5.37 months, SD = 4.43) and their adoptive mothers and fathers. Attachment patterns were investigated by means of the Strange Situation Procedure and the Adult Attachment Interview, and temperament via the Infant Behavior Questionnaire. Results showed that mothers' secure attachment, but not fathers' attachment or adoptees' temperament, increased the chance of secure attachment in adoptees. Temperament moderated the mother-child attachment match.
Cyber-Security Curricula for Basic Users
2013-09-01
like cyberbullying , digital cheating, and safety and security concerns‖ [7]. The need to teach security principles to this age demographic is at an...addresses the following topics: Cyberbullying , Inappropriate content, 25 Predators, Revealing too much Information, Spyware, spam, and scams. Each...emerging technology, surfing the web, video gaming, the dark side – cyberbullying . Each topic is covered by providing facts for the teacher to present
Digital watermarking for secure and adaptive teleconferencing
NASA Astrophysics Data System (ADS)
Vorbrueggen, Jan C.; Thorwirth, Niels
2002-04-01
The EC-sponsored project ANDROID aims to develop a management system for secure active networks. Active network means allowing the network's customers to execute code (Java-based so-called proxylets) on parts of the network infrastructure. Secure means that the network operator nonetheless retains full control over the network and its resources, and that proxylets use ANDROID-developed facilities to provide secure applications. Management is based on policies and allows autonomous, distributed decisions and actions to be taken. Proxylets interface with the system via policies; among actions they can take is controlling execution of other proxylets or redirection of network traffic. Secure teleconferencing is used as the application to demonstrate the approach's advantages. A way to control a teleconference's data streams is to use digital watermarking of the video, audio and/or shared-whiteboard streams, providing an imperceptible and inseparable side channel that delivers information from originating or intermediate stations to downstream stations. Depending on the information carried by the watermark, these stations can take many different actions. Examples are forwarding decisions based on security classifications (possibly time-varying) at security boundaries, set-up and tear-down of virtual private networks, intelligent and adaptive transcoding, recorder or playback control (e.g., speaking off the record), copyright protection, and sender authentication.
Code of Federal Regulations, 2012 CFR
2012-01-01
... and safety or the common defense and security; security measures for the physical protection and... computer that contains the participant's name, e-mail address, and participant's digital signature, proves... inspection. It is also the place where NRC makes computer terminals available to access the Publicly...
Code of Federal Regulations, 2010 CFR
2010-01-01
... and safety or the common defense and security; security measures for the physical protection and... computer that contains the participant's name, e-mail address, and participant's digital signature, proves... inspection. It is also the place where NRC makes computer terminals available to access the Publicly...
ERIC Educational Resources Information Center
Technology & Learning, 2008
2008-01-01
Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…
Exploring TechQuests Through Open Source and Tools That Inspire Digital Natives
NASA Astrophysics Data System (ADS)
Hayden, K.; Ouyang, Y.; Kilb, D.; Taylor, N.; Krey, B.
2008-12-01
"There is little doubt that K-12 students need to understand and appreciate the Earth on which they live. They can achieve this understanding only if their teachers are well prepared". Dan Barstow, Director of Center for Earth and Space Science Education at TERC. The approach of San Diego County's Cyberinfrastructure Training, Education, Advancement, and Mentoring (SD Cyber-TEAM) project is to build understandings of Earth systems for middle school teachers and students through a collaborative that has engaged the scientific community in the use of cyber-based tools and environments for learning. The SD Cyber-TEAM has used Moodle, an open source management system with social networking tools, that engage digital native students and their teachers in collaboration and sharing of ideas and research related to Earth science. Teachers participate in on-line professional dialog through chat, wikis, blogs, forums, journals and other tools and choose the tools that will best fit their classroom. The use of Moodle during the Summer Cyber Academy developed a cyber-collaboratory environment where teaching strategies were discussed, supported and actualized by participants. These experiences supported digital immigrants (teachers) in adapting teaching strategies using technologies that are most attractive and familiar to students (digital natives). A new study by the National School Boards Association and Grunwald Associates LLC indicated that "the online behaviors of U.S. teens and 'tweens shows that 96 percent of students with online access use social networking technologies, such as chatting, text messaging, blogging, and visiting online communities such as Facebook, MySpace, and Webkinz". While SD Cyber-TEAM teachers are implementing TechQuests in classrooms they use these social networking elements to capture student interest and address the needs of digital natives. Through the Moodle environment, teachers have explored a variety of learning objects called TechQuests, to support classroom instruction previously outlined through a textbook. Project classrooms have participated in videoconferences over high-speed networks and through satellite connections with experts in the field investigating scientific data found in the CA State Park of Anza Borrego. Other engaging tools include: An Interactive Epicenter Locator Tool developed through the project in collaboration with the Scripps Institution of Oceanography to engage students in the use of data to determine earthquake epicenters during hands on investigations, and a TechQuest activity where GoogleEarth allows students to explore geographic locations and scientific data.
Secure public cloud platform for medical images sharing.
Pan, Wei; Coatrieux, Gouenou; Bouslimi, Dalel; Prigent, Nicolas
2015-01-01
Cloud computing promises medical imaging services offering large storage and computing capabilities for limited costs. In this data outsourcing framework, one of the greatest issues to deal with is data security. To do so, we propose to secure a public cloud platform devoted to medical image sharing by defining and deploying a security policy so as to control various security mechanisms. This policy stands on a risk assessment we conducted so as to identify security objectives with a special interest for digital content protection. These objectives are addressed by means of different security mechanisms like access and usage control policy, partial-encryption and watermarking.
Chen, Tzer-Long; Lin, Frank Y S
2011-08-01
Electronic medical records can be defined as a digital format of the traditionally paper-based anamneses, which contains the history of a patient such as his somewhat illness, current health problems, and his chronic treatments. An electronic anamnesis is meant to make the patient's health information more conveniently accessible and transferable between different medical institutions and also easier to be kept quite a long time. Because of such transferability and accessibility of electronic anamneses, we can use less resource than before on storing the patients' medical information. This also means that medical care providers could save more funds on record-keeping and access a patient's medical background directly since shown on the computer screen more quickly and easily. Overall, the service quality has seemingly improved greatly. However, the usage of electronic anamneses involves in some concerned issues such as its related law declaration, and the security of the patient's confidential information. Because of these concerns, a secure medical networking scheme is taking into consideration. Nowadays, the administrators at the medical institutions are facing more challenges on monitoring computers and network systems, because of dramatic advances in this field. For instance, a trusted third party is authorized to access some medical records for a certain period of time. In regard to the security purpose, all the electronic medical records are embedded with both of the public-key infrastructure (PKI) cryptography and the digital signature technique so as to ensure the records well-protected. Since the signatures will be invalid due to the revocation or time expiration, the security of records under this premise would turn into vulnerable. Hence, we propose a re-signing scheme, whose purpose is to make a going-expired digital signature been resigned in time, in keeping with the premise of not conflicting with the laws, morals, and privacy while maintaining the security of the electronic medical records.
Collins, Robert J; Amiri, Ryan; Fujiwara, Mikio; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Sasaki, Masahide; Andersson, Erika; Buller, Gerald S
2017-06-12
Ensuring the integrity and transferability of digital messages is an important challenge in modern communications. Although purely mathematical approaches exist, they usually rely on the computational complexity of certain functions, in which case there is no guarantee of long-term security. Alternatively, quantum digital signatures offer security guaranteed by the physical laws of quantum mechanics. Prior experimental demonstrations of quantum digital signatures in optical fiber have typically been limited to operation over short distances and/or operated in a laboratory environment. Here we report the experimental transmission of quantum digital signatures over channel losses of up to 42.8 ± 1.2 dB in a link comprised of 90 km of installed fiber with additional optical attenuation introduced to simulate longer distances. The channel loss of 42.8 ± 1.2 dB corresponds to an equivalent distance of 134.2 ± 3.8 km and this represents the longest effective distance and highest channel loss that quantum digital signatures have been shown to operate over to date. Our theoretical model indicates that this represents close to the maximum possible channel attenuation for this quantum digital signature protocol, defined as the loss for which the signal rate is comparable to the dark count rate of the detectors.
Teaching Multimedia Data Protection through an International Online Competition
ERIC Educational Resources Information Center
Battisti, F.; Boato, G.; Carli, M.; Neri, A.
2011-01-01
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
First Digit Law and Its Application to Digital Forensics
NASA Astrophysics Data System (ADS)
Shi, Yun Q.
Digital data forensics, which gathers evidence of data composition, origin, and history, is crucial in our digital world. Although this new research field is still in its infancy stage, it has started to attract increasing attention from the multimedia-security research community. This lecture addresses the first digit law and its applications to digital forensics. First, the Benford and generalized Benford laws, referred to as first digit law, are introduced. Then, the application of first digit law to detection of JPEG compression history for a given BMP image and detection of double JPEG compressions are presented. Finally, applying first digit law to detection of double MPEG video compressions is discussed. It is expected that the first digit law may play an active role in other task of digital forensics. The lesson learned is that statistical models play an important role in digital forensics and for a specific forensic task different models may provide different performance.
Heyne, J P; Merbold, H; Sehner, J; Neumann, R; Freesmeyer, M; Jonetz-Mentzel, L; Kaiser, W A
1999-07-01
How much can the radiation dose be reduced for skull radiography by using digital luminescence radiography (DLR) compared to a conventional screen film system with a grid cassette? A skull phantom (3M) was x-rayed in anterior-posterior orientation using both a conventional screen film system with grid cassette and DLR (ADC-70, Agfa). The tube current time product (mAs) was diminished gradually while keeping the voltage constant. The surface entrance dose was measured by a sensor of Dosimax (Wellhöfer). Five investigators evaluated the images by characteristic and critical features, spatial resolution and contrast. The surface entrance dose at 73 kV/22 mAs was 0.432 mGy in conventional screen film system and 0.435 mGy in DLR. The images could be evaluated very well down to an average dose of 71% (0.308 mGy; SD 0.050); sufficient images were obtained down to an average dose of 31% (0.136 mGy; SD 0.065). The resolution of the line pairs were reduced down to 2 levels depending on the investigator. Contrast was assessed as being very good to sufficient. The acceptance of the postprocessed images (MUSICA-software) was individually different and resulted in an improvement of the assessment of bone structures and contrast in higher dose ranges only. For the sufficient assessment of a possible fracture/of paranasal sinuses/of measurement of the skull the dose can be reduced to at least 56% (phi 31%; SD 14.9%)/40% (phi 27%; SD 9.3%)/18% (phi 14%; SD 4.4%). Digital radiography allows question-referred exposure parameters with clearly reduced dose, so e.g. for fracture exclusion 73 kV/12.5 mAs and to skull measurement 73 kV/4 mAs.
Meeting the Challenges of Regional Security
1994-02-01
targets over time, assessing strike damage, and, of course, developing up-to- date maps of crucial urban and industrial areas. Coupled with modem digital ...of huge diverse data bases is key to dissecting criminal infrastructures, and identifying relevant regional and global linkages. New digital processing...cities). They can aid in reaction force planning and training. One 10-inch optical disc can easily store 25 (and display at any scale with 4- digit
2009-05-01
information technology revolution. The architecture of the Nation’s digital infrastructure, based largely upon the Internet, is not secure or resilient...thriving digital infrastructure. In addi tion, differing national and regional laws and practices —such as laws concerning the investigation and... technology has transformed the global economy and connected people and markets in ways never imagined. To realize the full benefits of the digital
DOE Office of Scientific and Technical Information (OSTI.GOV)
Punnoose, Ratish J.; Armstrong, Robert C.; Wong, Matthew H.
Formal methods have come into wide use because of their effectiveness in verifying "safety and security" requirements of digital systems; a set of requirements for which testing is mostly ineffective. Formal methods are routinely used in the design and verification of high-consequence digital systems in industry. This report outlines our work in assessing the capabilities of commercial and open source formal tools and the ways in which they can be leveraged in digital design workflows.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-30
..., June 4, 2013--1:00 p.m. Until 5:00 p.m. The Subcommittee will review and discuss all cyber security... Flint North building, 11555 Rockville Pike, Rockville, MD. After registering with security, please...
IT Security on Campus: A Fragile Equilibrium.
ERIC Educational Resources Information Center
Wada, Kent
2003-01-01
Considers how to provide appropriate levels of information technology (IT) security in the higher education environment. Discusses implications of the Digital Millennium Copyright Act, the USA Patriot Act, the Health Insurance Portability and Accountability Act of 1996, California Information Practices Act, VISA USA Cardholder Information Security…
20 CFR 405.333 - Submitting documents.
Code of Federal Regulations, 2010 CFR
2010-04-01
... digits of the claimant's social security number. All such documents must be clear and legible to the... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Submitting documents. 405.333 Section 405.333 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW PROCESS FOR ADJUDICATING INITIAL...
Single-electron random-number generator (RNG) for highly secure ubiquitous computing applications
NASA Astrophysics Data System (ADS)
Uchida, Ken; Tanamoto, Tetsufumi; Fujita, Shinobu
2007-11-01
Since the security of all modern cryptographic techniques relies on unpredictable and irreproducible digital keys generated by random-number generators (RNGs), the realization of high-quality RNG is essential for secure communications. In this report, a new RNG, which utilizes single-electron phenomena, is proposed. A room-temperature operating silicon single-electron transistor (SET) having nearby an electron pocket is used as a high-quality, ultra-small RNG. In the proposed RNG, stochastic single-electron capture/emission processes to/from the electron pocket are detected with high sensitivity by the SET, and result in giant random telegraphic signals (GRTS) on the SET current. It is experimentally demonstrated that the single-electron RNG generates extremely high-quality random digital sequences at room temperature, in spite of its simple configuration. Because of its small-size and low-power properties, the single-electron RNG is promising as a key nanoelectronic device for future ubiquitous computing systems with highly secure mobile communication capabilities.
Integrated fingerprinting in secure digital cinema projection
NASA Astrophysics Data System (ADS)
Delannay, Damien; Delaigle, Jean-Francois; Macq, Benoit M. M.; Quisquater, Jean-Jacques; Mas Ribes, Joan M.; Boucqueau, Jean M.; Nivart, Jean-Francois
2001-12-01
This paper describes the functional model of a combined conditional access and fingerprinting copyright (-or projectionright) protection system in a digital cinema framework. In the cinema industry, a large part of early movie piracy comes from copies made in the theater itself with a camera. The evolution towards digital cinema broadcast enables watermark based fingerprinting protection systems. Besides an appropriate fingerprinting technology, a number of well defined security/cryptographic tools are integrated in order to guaranty the integrity of the whole system. The requirements are two-fold: On one side, we must ensure that the media content is only accessible at exhibition time (under specific authorization obtained after an ad-hoc film rental agreement) and contains the related exhibition fingerprint. At the other end, we must prove our ability to retrieve the fingerprint information from an illegal copy of the media.
Effects of Ammonium Dinitramide in Human Liver Slices: An EPR/Spin Trapping Study.
1995-09-01
environmentally safe than AP. EPR/spin trapping studies with the spin trap N-tert-butyl-a-phenyl nitrone (PBN lOmM) for 5 min in the presence of ADN yielded...N-tert-butyl-a-phenyl nitrone PBN 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY CLASSIFICATION OF THIS PAGE UNCLASSIFIED... nitrone s second SCN- thiocyanate SD standard deviation Vll INTRODUCTION This is a study of the reactions of free radicals formed when ammonium
Gravity observation data analysis 1988 -1998 - 2011 to determine gravity changes of Merapi volcano
NASA Astrophysics Data System (ADS)
Indriana, R. D.; Kirbani, S. B.; Setiawan, A.; Sunantyo, T. A.
2018-03-01
The big eruption of Merapi Volcano in 2010 resulted in a Merapi-type eruption being a phreatic type that is thought to be the result of subsurface changes. The study of gravitational gravity change in observational data of gravity observation in 1988, 1998, 2011 was conducted to determine the sub-surface changes of Merapi pre and post-eruption of 2010. The research data consisted of primary and secondary gravity data provided by Geophysics Laboratory Department of Physics Gadjah Mada University in Yogyakarta consisted of g observation data in 1988, 1998, 2011 and Data Digital Elevation Model (DEM). The result of this study is the relative terrestrial g_observation of 1998-1988 around the peak of Merapi is - 85 s.d. 70 mgal, in the northwest and north of the peak is -15 s.d. - 55 mgal, east and west worth 5 s.d. 15 mgal and south of peak anomaly change is -5 s.d. 0 mgal. The relative gestation of the relative terrestrial observations of 2011 on relative terrestrial g_observation in 1998 showed changes in patterns around the peak of Merapi. The value of terrestrial observation g relative changes 2011-1998. The relative value of terrestrial g_observation change is -85 s.d. 70 mgal, northwest -5 s.d. - 20 mgal, east and west peaks 0 s.d. 10 mgal, in the southern peak of Merapi there is an anomaly value change -5 s.d. -50 mgal. The pattern of contour change has been compatible with the Merapi eruption mass distribution map 1911 s.d. 2006 and DEM changes.
Semantic dementia and persisting Wernicke's aphasia: linguistic and anatomical profiles.
Ogar, J M; Baldo, J V; Wilson, S M; Brambati, S M; Miller, B L; Dronkers, N F; Gorno-Tempini, M L
2011-04-01
Few studies have directly compared the clinical and anatomical characteristics of patients with progressive aphasia to those of patients with aphasia caused by stroke. In the current study we examined fluent forms of aphasia in these two groups, specifically semantic dementia (SD) and persisting Wernicke's aphasia (WA) due to stroke. We compared 10 patients with SD to 10 age- and education-matched patients with WA in three language domains: language comprehension (single words and sentences), spontaneous speech and visual semantics. Neuroanatomical involvement was analyzed using disease-specific image analysis techniques: voxel-based morphometry (VBM) for patients with SD and overlays of lesion digitized lesion reconstructions in patients with WA. Patients with SD and WA were both impaired on tasks that involved visual semantics, but patients with SD were less impaired in spontaneous speech and sentence comprehension. The anatomical findings showed that different regions were most affected in the two disorders: the left anterior temporal lobe in SD and the left posterior middle temporal gyrus in chronic WA. This study highlights that the two syndromes classically associated with language comprehension deficits in aphasia due to stroke and neurodegenerative disease are clinically distinct, most likely due to distinct distributions of damage in the temporal lobe. Copyright © 2010 Elsevier Inc. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-10
...., Digital Management Group, Mercury Air Group, Inc., Greenwood, and Professional Maintenance of Charleston... Solutions, Becht Engineering, Engineering Support Systems, Manufacturing Management Services, US Securities, WB Wells, Belcan, American Engineers, CH2M Hill Engineers, Inc., Digital Management Group, Mercury...
Code of Federal Regulations, 2014 CFR
2014-10-01
... VRS access technology. Such calls are made by means of ten-digit NANP numbers assigned to customers by...'s social security number, or the last four digits of that number; mother's maiden name; home address... driver's license, passport, or comparable ID that has not expired. (v) Video relay service. The term...
Code of Federal Regulations, 2013 CFR
2013-10-01
... VRS access technology. Such calls are made by means of ten-digit NANP numbers assigned to customers by...'s social security number, or the last four digits of that number; mother's maiden name; home address... driver's license, passport, or comparable ID that has not expired. (v) Video relay service. The term...
Multimodal biometric digital watermarking on immigrant visas for homeland security
NASA Astrophysics Data System (ADS)
Sasi, Sreela; Tamhane, Kirti C.; Rajappa, Mahesh B.
2004-08-01
Passengers with immigrant Visa's are a major concern to the International Airports due to the various fraud operations identified. To curb tampering of genuine Visa, the Visa's should contain human identification information. Biometric characteristic is a common and reliable way to authenticate the identity of an individual [1]. A Multimodal Biometric Human Identification System (MBHIS) that integrates iris code, DNA fingerprint, and the passport number on the Visa photograph using digital watermarking scheme is presented. Digital Watermarking technique is well suited for any system requiring high security [2]. Ophthalmologists [3], [4], [5] suggested that iris scan is an accurate and nonintrusive optical fingerprint. DNA sequence can be used as a genetic barcode [6], [7]. While issuing Visa at the US consulates, the DNA sequence isolated from saliva, the iris code and passport number shall be digitally watermarked in the Visa photograph. This information is also recorded in the 'immigrant database'. A 'forward watermarking phase' combines a 2-D DWT transformed digital photograph with the personal identification information. A 'detection phase' extracts the watermarked information from this VISA photograph at the port of entry, from which iris code can be used for identification and DNA biometric for authentication, if an anomaly arises.
Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fink, Glenn A.; Oehmen, Christopher S.
This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agency’s R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF canmore » be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit both our client’s efforts in system behavior modeling and cyber security to the overall benefit of the nation.« less
47 CFR 76.1204 - Availability of equipment performing conditional access or security functions.
Code of Federal Regulations, 2011 CFR
2011-10-01
... system; and (3) Does not provide access to any digital transmission of multichannel video programming or... COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Competitive... security functions. (a)(1) A multichannel video programming distributor that utilizes navigation devices to...
Modulation of Retinal Arteriolar Central Reflection by APOE Genotype.
Frost, Shaun; Bhuiyan, Alauddin; Offerman, David; Doecke, James D; Macaulay, S Lance; Sohrabi, Hamid R; Ames, David; Masters, Colin; Martins, Ralph N; Kanagasingam, Yogesan; Group, Aibl Research
2017-01-01
This study investigated the retinal arteriolar central reflex (CR, the central reflection observed in photographs of retinal vessels), which may provide information about micro-vascular health in the retina and also the brain, due to the homology between these vascular networks. The study also describes a novel computer based semi-automated technique that accurately quantifies retinal arteriolar CR and vessel width, and calculates the CR to vessel width ratio (CRR) from digital retinal photographs. Digital retinal photographs were collected from participants in the Australian Imaging, Biomarkers and Lifestyle study of ageing (AIBL), including 25 participants diagnosed with Alzheimer's disease (AD) (age 72.4 ± 7.5 yrs, 12 male, 13 female) and 123 elderly participants without dementia (cognitively normals: CN) (age 71.6 ± 5.6 yrs, 55 male, 68 female). Using a sub-cohort of 144 (22 AD, 122 CN) with the novel CRR measures, we identified significantly higher CRR levels in AD participants (mean CRR 0.253 (SD 0.04)) as compared with CN's (mean CRR 0.231 (SD 0.04), p = 0.025). Adjustment for APOE ε4 allele status however, reduced the significance (p = 0.081). CRR was significantly higher in APOE ε4 allele carriers (mean CRR 0.254 (SD 0.03) as compared with non-carriers (mean CRR 0.224 (SD 0.05), p < 0.0001). These data indicate that CRR is strongly linked to APOE ε4 status and exhibits a weaker, independent trend with AD diagnosis. The retina may be useful as a novel model for non-invasive monitoring of the effects of APOE ε4 on the central nervous system, particularly in cerebrovascular disease. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.
Securing Digital Images Integrity using Artificial Neural Networks
NASA Astrophysics Data System (ADS)
Hajji, Tarik; Itahriouan, Zakaria; Ouazzani Jamil, Mohammed
2018-05-01
Digital image signature is a technique used to protect the image integrity. The application of this technique can serve several areas of imaging applied to smart cities. The objective of this work is to propose two methods to protect digital image integrity. We present a description of two approaches using artificial neural networks (ANN) to digitally sign an image. The first one is “Direct Signature without learning” and the second is “Direct Signature with learning”. This paper presents the theory of proposed approaches and an experimental study to test their effectiveness.
Caliper Method Versus Digital Photogrammetry for Assessing Arch Height Index in Pregnant Women.
Harrison, Kathryn D; McCrory, Jean L
2016-11-01
Foot anthropometry may be altered during pregnancy. Pregnant women often report lower-extremity pain that may be related to these alterations. The Arch Height Index Measurement System is a common method of foot arch assessment; however, the required calipers are costly and are not widely available. Thus, we compared the reliability of a digital photogrammetry method of arch height index (AHI) assessment with that of the Arch Height Index Measurement System. Ten pregnant women (mean ± SD: age, 29 ± 4 years; height, 166.9 ± 6.8 cm; weight, 63.3 ± 8.8 kg) in their second trimester were recruited to participate, along with a control group of 10 nulliparous weight-matched women (mean ± SD: age, 22 ± 2 years; height, 164.6 ± 4.8 cm; weight, 61.5 ± 8.1 kg). During the second and third trimesters, and once postpartum, AHI was assessed using calipers and using digital photogrammetry. Mixed model absolute agreement type intraclass correlation coefficient (ICC) was used to determine correlation between the two methods for sitting and standing AHI. The ICC results for sitting AHI only (0.819-0.968) were reasonable for clinical measures; ICC values for standing AHI (0.674-0.789) did not reach values deemed reasonable for clinical use. Caliper and digital photogrammetry methods of AHI assessment are correlated in pregnant women; however, for standing AHI, the correlation is not sufficient for clinical use. Photogrammetry may still be appropriate for clinical use, as long as values from this method are not substituted directly for results obtained from calipers.
Platelet-Rich Plasma Versus Tretinoin in Treatment of Striae Distensae: A Comparative Study.
Gamil, Hend D; Ibrahim, Samia A; Ebrahim, Howyda M; Albalat, Waleed
2018-05-01
Striae distensae (SD) are dermal scars associated with atrophy of the epidermis. To evaluate the effect and safety of intralesional injection of platelet-rich plasma (PRP) versus topical tretinoin 0.05% in treatment of SD. Thirty patients (27 females and 3 males) had bilateral striae distensae were enrolled in this study. In every patient, half of the selected striae were treated with PRP intralesional injection. The other half was treated by topical tretinoin. Skin biopsies were taken from both sides before and after the treatment. Digital photographs were taken at the baseline and at the end of follow-up period. Clinical improvement was evaluated by 2 blind dermatologists in addition to the patient's satisfaction rating. There was statistically significant improvement in the SD treated with PRP and topical tretinoin cream. The improvement was more in the SD treated with PRP injections (p = .015). Patient's satisfaction showed that the improvement was more in the PRP-treated side (p = .003). Collagen and elastic fibers in the dermis were increased in all biopsies after treatment. PRP injection and topical tretinoin are safe for the treatment of SD, but PRP is more effective and it gives better therapeutic response than tretinoin.
The sdA problem - I. Physical properties
NASA Astrophysics Data System (ADS)
Pelisoli, Ingrid; Kepler, S. O.; Koester, D.
2018-04-01
The so-called sdA stars are defined by having H-rich spectra and surface gravities similar to hot subdwarf stars, but effective temperature below the zero-age horizontal branch. Their evolutionary history is an enigma: their surface gravity is too high for main-sequence stars, but too low for single evolution white dwarfs. They are most likely byproducts of binary evolution, including blue-stragglers, extremely-low mass white dwarf stars (ELMs) and their precursors (pre-ELMs). A small number of ELMs with similar properties to sdAs is known. Other possibilities include metal-poor A/F dwarfs, second generation stars, or even stars accreted from dwarf galaxies. In this work, we analyse colours, proper motions, and spacial velocities of a sample of sdAs from the Sloan Digital Sky Survey to assess their nature and evolutionary origin. We define a probability of belonging to the main sequence and a probability of being a (pre-)ELM based on these properties. We find that 7 per cent of the sdAs are more likely to be (pre-)ELMs than main-sequence stars. However, the spacial velocity distribution suggests that over 35 per cent of them cannot be explained as single metal-poor A/F stars.
Shin, Hyoseung; Kim, Dong Hyun; Ryu, Hyeong Ho; Yoon, So Young; Jo, Seong Jin
2014-03-01
We evaluated the diagnostic accuracy of teleconsultations for skin diseases common in the army using a smartphone multimedia messaging service (MMS). Images of skin lesions were obtained from 100 army patients using digital cameras built into smartphones. Three remotely located dermatologists received the dermatology images and associated clinical information via the MMS. The teledermatologists' diagnoses were compared with those obtained from face-to-face examinations. The three most common diagnoses made at the dermatology clinics were eczema, viral warts and fungal infections. The mean diagnostic agreement between face-to-face and teledermatology consultations was 71% (SD 2). The mean kappa coefficient was 0.73 (SD 0.06) for the three most common diagnostic categories. The mean values for sensitivity were 78% (SD 0), 88% (SD 21) and 61% (SD 11) for eczema, viral warts and fungal infections, respectively, and the specificity values were above 90% for these skin diseases. Teledermatology consultation using smartphones is simple. Although diagnoses using telemedicine do not perfectly match diagnoses from face-to-face consultations the diagnostic accuracy using smartphones is superior to that of clinicians who are not specialized in dermatology.
CR digital mammography: an affordable entry.
Fischer, Cathy
2006-01-01
CR full-field digital mammography (FFDM) has been used extensively in other countries, and it was one of the 4 digital mammography technologies employed in the Digital Mammographic Imaging Screening Trial. Affordability and easy integration with pre-existing mammography systems makes CR FFDM an attractive way to secure the advantages of filmless mammography imaging. CR mammography is true digital mammography--it is merely a different way of acquiring the image. The FDA has recently approved the first CR FFDM system for sale in the United States. At Gundersen Lutheran Health System (La Crosse, Wisconsin), CR FFDM is the most practical technology for realizing the potential everyday clinical benefits of filmless mammography imaging.
Almehmadi, Fares S; Chatterjee, Monish R
2015-01-10
Electrocardiography (ECG) signals are used for both medical purposes and identifying individuals. It is often necessary to encrypt this highly sensitive information before it is transmitted over any channel. A closed-loop acousto-optic hybrid device acting as a chaotic modulator is applied to ECG signals to achieve this encryption. Recently improved modeling of this approach using profiled optical beams has shown it to be very sensitive to key parameters that characterize the encryption and decryption process, exhibiting its potential for secure transmission of analog and digital signals. Here the encryption and decryption is demonstrated for ECG signals, both analog and digital versions, illustrating strong encryption without significant distortion. Performance analysis pertinent to both analog and digital transmission of the ECG waveform is also carried out using output signal-to-noise, signal-to-distortion, and bit-error-rate measures relative to the key parameters and presence of channel noise in the system.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-11
...-on, more detailed, digital forensics analysis or damage assessments of individual incidents... information. In addition, during any follow-on forensics or damage assessment activities, the Government and...), (c) and (d) of this section are maintained by the digital and multimedia forensics laboratory at DC3...
75 FR 43498 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... effective without further notice on August 25, 2010 unless comments are received which result in a contrary.... Categories of records in the system: Name, last four digits of the Social Security Number (SSN), date of... system: Storage: Electronic storage media. Retrievability: Last name, first name and/or last four digits...
Developing Thoughtful "Cybercitizens"
ERIC Educational Resources Information Center
Berson, Michael J.; Berson, Ilene R.
2004-01-01
What does it mean to be a citizen in a digital world where technology has facilitated global connections? The children of today are immersed in a digital age, and as increasing numbers of students go online, they require skills to securely and responsibly take full advantage of computers and the Internet. Despite the natural enthusiasm that many…
Playing Digital Security: Youth Voices on Their Digital Rights
ERIC Educational Resources Information Center
Costa, Conceição; Sousa, Carla; Rogado, José; Henriques, Sara
2017-01-01
The United Nations (UN) Convention (1989) on the Rights of the Child changed the way children are viewed and treated worldwide. The Convention has been affecting governments, civil society and the private sector. ICT driven companies on the internet should not be an exception. According to Livingstone, Carr and Byrne (2015), Internet governance…
Effect of limb rotation on radiographic alignment in total knee arthroplasties.
Radtke, Kerstin; Becher, Christoph; Noll, Yvonne; Ostermeier, Sven
2010-04-01
Even in a well-aligned total knee arthroplasty (TKA), limb rotation at the time of radiographic assessment will alter the measurement of alignment. This could influence the radiographic outcome of TKA. The purpose of this study was to evaluate the effect of limb rotation on radiographic alignment after TKA and to establish a re-calculation of this rotation by using existing radiographic landmarks. Synthetic femur and tibia (Sawbones), Inc. Vashon Island, WA) were used to create a TKA of the Triathlon knee prosthesis system (Stryker), Limerick, Ireland). The femoral alignment was 6.5 degrees valgus. The model was fixed in an upright stand. Five series of nine anteroposterior (AP) long leg radiographs were taken on a 30 cm x 120 cm plates in full extension with the limb rotated, in 5 degrees increments, from 20 degrees external rotation to 20 degrees internal rotation. After digitizing each radiograph (Scanner Hewlett Packard XJ 527), an observer measured the anatomic mechanical angle of the femur [AMA ( degrees )], the mechanical lateral proximal femur angle [mLPFA ( degrees )], the mechanical lateral distal femur angle [mLDFA ( degrees )], the mechanical medial proximal tibia angle [mMPTA ( degrees )] and the mechanical lateral distal tibia angle [mLDTA ( degrees )] using a digital measurement software (MediCAD, Hectec, Altfraunhofen, Germany). Besides, the observer measured the geometrical distances of the femoral component figured on the long leg radiograph. A ratio of one distance to another was measured (called femoral component distance ratio). The average radiographic anatomic alignment ranged from 6.827 degrees AMA (SD = 0.22 degrees ) in 20 degrees internal rotation to 4.627 degrees AMA (SD = 0.22 degrees ) in 20 degrees external rotation. Average mLPFA ( degrees ) ranged from 101.63 degrees (SD = 0.63) in 20 degrees internal rotation to 93.60 degrees (SD = 0.74 degrees ) in 20 degrees external rotation. Average mLDFA ( degrees ) ranged from 90.59 degrees (SD = 3.01 degrees ) in 20 degrees internal rotation to 86.76 degrees (SD = 0.36 degrees ) in 20 degrees external rotation. Average mMPTA ( degrees ) ranged from 90.35 degrees (SD = 0.81 degrees ) in 20 degrees internal rotation to 88.49 degrees (SD = 0.52 degrees ) in 20 degrees external rotation. Average mLDTA ( degrees ) ranged from 98.89 degrees (SD = 2.3 degrees ) in 20 degrees internal rotation to 90.53 degrees (SD = 3.39 degrees ) in 20 degrees external rotation. Without an application of limb rotation, the femoral component distance ratio was measured to be 0.89 (SD = 0.01), in 20 degrees internal rotation 0.63 (SD = 0.01) and in 20 degrees external rotation 1.16 (SD = 0.01). Limb rotation had a highly statistically significant effect on measured anatomic alignment and mechanical angles. A correlation between limb rotation, anatomic mechanical angle, mechanical angles measured at femur and tibia and the femoral component distance ratio was established. As the anatomic mechanical angle and the femoral component distance ratio change linearly in the range of 20 degrees internal and external limb rotation, a calculation of the femoral component distance ratio could be used to re-calculate the limb rotation at the time of radiographic assessment to evaluate the evidence of a long leg radiograph.
Adapting Digital Libraries to Continual Evolution
NASA Technical Reports Server (NTRS)
Barkstrom, Bruce R.; Finch, Melinda; Ferebee, Michelle; Mackey, Calvin
2002-01-01
In this paper, we describe five investment streams (data storage infrastructure, knowledge management, data production control, data transport and security, and personnel skill mix) that need to be balanced against short-term operating demands in order to maximize the probability of long-term viability of a digital library. Because of the rapid pace of information technology change, a digital library cannot be a static institution. Rather, it has to become a flexible organization adapted to continuous evolution of its infrastructure.
2016-05-05
SECURITY CLASSIFICATION OF: The goal of this proposal is to purchase the GWC Technologies, Inc. Horizontal Surface Plasmon Resonance Imaging (SPRi...Unlimited UU UU UU UU 05-05-2016 1-Feb-2014 31-Jan-2016 Final Report: Acquisition of a Surface Plasmon Resonance Imager, Digital Microscope, and...S) AND ADDRESS (ES) U.S. Army Research Office P.O. Box 12211 Research Triangle Park, NC 27709-2211 Surface Plasmon Resonance Imager, Digital
2009-12-17
IEEE TDKE, 1996. 8( 1). 14. Garvey, T.D., The inference Problem for Computer Security. 1992, SRI International. 15. Chaum , D ., Blind Signatures for...Pervasive Computing Environments. IEEE Transactions on Vehicular Technology, 2006. 55(4). 17. Chaum , D ., Security without Identification: Transaction...Systems to make Big Brother Obsolete. Communications of the ACM 1985. 28(10). 18. Chaum , D ., Untraceable Electronic Mail, Return Addresses, and Digital
2010-04-23
from the stock market. Journal of Computer Security, 11(3):431–448, 2003. [7] D . Chaum . Untraceable electronic mail, return addresses, and digital...to cross several other administrative boundaries (e.g., ISPs C, D , . . .), causing potential congestion at all of these intermediaries. A very...Quarterly Journal of Economics, 108(1):259–271, February 1993. [9] P. Ferguson and D . Senie. Network ingress filtering: Defeating denial of service
Digital Watermarking of Autonomous Vehicles Imagery and Video Communication
2005-10-01
world’s recent events, the increasing need in different domains, those being: spatial, spectral and corn- homeland security and defense is a critical topic...watermarking schemes benefit in that security and analysis is also vital, especially when using there is no need for full or partial decompression, which...are embedded Arguably, the most widely used technique is spread spec- change with each application. Whether it is secure covert trum watermarking (SS
Error analysis on spinal motion measurement using skin mounted sensors.
Yang, Zhengyi; Ma, Heather Ting; Wang, Deming; Lee, Raymond
2008-01-01
Measurement errors of skin-mounted sensors in measuring forward bending movement of the lumbar spines are investigated. In this investigation, radiographic images capturing the entire lumbar spines' positions were acquired and used as a 'gold' standard. Seventeen young male volunteers (21 (SD 1) years old) agreed to participate in the study. Light-weight miniature sensors of the electromagnetic tracking systems-Fastrak were attached to the skin overlying the spinous processes of the lumbar spine. With the sensors attached, the subjects were requested to take lateral radiographs in two postures: neutral upright and full flexion. The ranges of motions of lumbar spine were calculated from two sets of digitized data: the bony markers of vertebral bodies and the sensors and compared. The differences between the two sets of results were then analyzed. The relative movement between sensor and vertebrae was decomposed into sensor sliding and titling, from which sliding error and titling error were introduced. Gross motion range of forward bending of lumbar spine measured from bony markers of vertebrae is 67.8 degrees (SD 10.6 degrees ) and that from sensors is 62.8 degrees (SD 12.8 degrees ). The error and absolute error for gross motion range were 5.0 degrees (SD 7.2 degrees ) and 7.7 degrees (SD 3.9 degrees ). The contributions of sensors placed on S1 and L1 to the absolute error were 3.9 degrees (SD 2.9 degrees ) and 4.4 degrees (SD 2.8 degrees ), respectively.
Performance of digital RGB reflectance color extraction for plaque lesion
NASA Astrophysics Data System (ADS)
Hashim, Hadzli; Taib, Mohd Nasir; Jailani, Rozita; Sulaiman, Saadiah; Baba, Roshidah
2005-01-01
Several clinical psoriasis lesion groups are been studied for digital RGB color features extraction. Previous works have used samples size that included all the outliers lying beyond the standard deviation factors from the peak histograms. This paper described the statistical performances of the RGB model with and without removing these outliers. Plaque lesion is experimented with other types of psoriasis. The statistical tests are compared with respect to three samples size; the original 90 samples, the first size reduction by removing outliers from 2 standard deviation distances (2SD) and the second size reduction by removing outliers from 1 standard deviation distance (1SD). Quantification of data images through the normal/direct and differential of the conventional reflectance method is considered. Results performances are concluded by observing the error plots with 95% confidence interval and findings of the inference T-tests applied. The statistical tests outcomes have shown that B component for conventional differential method can be used to distinctively classify plaque from the other psoriasis groups in consistent with the error plots finding with an improvement in p-value greater than 0.5.
Picture archiving and communication in radiology.
Napoli, Marzia; Nanni, Marinella; Cimarra, Stefania; Crisafulli, Letizia; Campioni, Paolo; Marano, Pasquale
2003-01-01
After over 80 years of exclusive archiving of radiologic films, at present, in Radiology, digital archiving is increasingly gaining ground. Digital archiving allows a considerable reduction in costs and space saving, but most importantly, immediate or remote consultation of all examinations and reports in the hospital clinical wards, is feasible. The RIS system, in this case, is the starting point of the process of electronic archiving which however is the task of PACS. The latter can be used as radiologic archive in accordance with the law provided that it is in conformance with some specifications as the use of optical long-term storage media or with electronic track of change. PACS archives, in a hierarchical system, all digital images produced by each diagnostic imaging modality. Images and patient data can be retrieved and used for consultation or remote consultation by the reporting radiologist who requires images and reports of previous radiologic examinations or by the referring physician of the ward. Modern PACS owing to the WEB server allow remote access to extremely simplified images and data however ensuring the due regulations and access protections. Since the PACS enables a simpler data communication within the hospital, security and patient privacy should be protected. A secure and reliable PACS should be able to minimize the risk of accidental data destruction, and should prevent non authorized access to the archive with adequate security measures in relation to the acquired knowledge and based on the technological advances. Archiving of data produced by modern digital imaging is a problem now present also in small Radiology services. The technology is able to readily solve problems which were extremely complex up to some years ago as the connection between equipment and archiving system owing also to the universalization of the DICOM 3.0 standard. The evolution of communication networks and the use of standard protocols as TCP/IP can minimize problems of data and image remote transmission within the healthcare enterprise as well as over the territory. However, new problems are appearing as that of digital data security profiles and of the different systems which should ensure it. Among these, algorithms of electronic signature should be mentioned. In Italy they are validated by law and therefore can be used in digital archives in accordance with the law.
Sim, Julius; Lewis, Martyn
2012-03-01
To investigate methods to determine the size of a pilot study to inform a power calculation for a randomized controlled trial (RCT) using an interval/ratio outcome measure. Calculations based on confidence intervals (CIs) for the sample standard deviation (SD). Based on CIs for the sample SD, methods are demonstrated whereby (1) the observed SD can be adjusted to secure the desired level of statistical power in the main study with a specified level of confidence; (2) the sample for the main study, if calculated using the observed SD, can be adjusted, again to obtain the desired level of statistical power in the main study; (3) the power of the main study can be calculated for the situation in which the SD in the pilot study proves to be an underestimate of the true SD; and (4) an "efficient" pilot size can be determined to minimize the combined size of the pilot and main RCT. Trialists should calculate the appropriate size of a pilot study, just as they should the size of the main RCT, taking into account the twin needs to demonstrate efficiency in terms of recruitment and to produce precise estimates of treatment effect. Copyright © 2012 Elsevier Inc. All rights reserved.
Gaming the System: Developing an Educational Game for Securing Principles of Arterial Blood Gases.
Boyd, Cory Ann; Warren, Jonah; Glendon, Mary Ann
2016-01-01
This article describes the development process for creating a digital educational mini game prototype designed to provide practice opportunities for learning fundamental principles of arterial blood gases. Mini games generally take less than an hour to play and focus on specific subject matter. An interdisciplinary team of faculty from two universities mentored student game developers to design a digital educational mini game prototype. Sixteen accelerated bachelor of science in nursing students collaborated with game development students and playtested the game prototype during the last semester of their senior year in nursing school. Playtesting is a form of feedback that supports an iterative design process that is critical to game development. A 10-question survey was coupled with group discussions addressing five broad themes of an archetypical digital educational mini game to yield feedback on game design, play, and content. Four rounds of playtesting and incorporating feedback supported the iterative process. Accelerated bachelor of science in nursing student playtester feedback suggests that the digital educational mini game prototype has potential for offering an engaging, playful game experience that will support securing the fundamental principles of arterial blood gases. Next steps are to test the digital educational mini game for teaching and learning effectiveness. Copyright © 2016 Elsevier Inc. All rights reserved.
Digital information management: a progress report on the National Digital Mammography Archive
NASA Astrophysics Data System (ADS)
Beckerman, Barbara G.; Schnall, Mitchell D.
2002-05-01
Digital mammography creates very large images, which require new approaches to storage, retrieval, management, and security. The National Digital Mammography Archive (NDMA) project, funded by the National Library of Medicine (NLM), is developing a limited testbed that demonstrates the feasibility of a national breast imaging archive, with access to prior exams; patient information; computer aids for image processing, teaching, and testing tools; and security components to ensure confidentiality of patient information. There will be significant benefits to patients and clinicians in terms of accessible data with which to make a diagnosis and to researchers performing studies on breast cancer. Mammography was chosen for the project, because standards were already available for digital images, report formats, and structures. New standards have been created for communications protocols between devices, front- end portal and archive. NDMA is a distributed computing concept that provides for sharing and access across corporate entities. Privacy, auditing, and patient consent are all integrated into the system. Five sites, Universities of Pennsylvania, Chicago, North Carolina and Toronto, and BWXT Y12, are connected through high-speed networks to demonstrate functionality. We will review progress, including technical challenges, innovative research and development activities, standards and protocols being implemented, and potential benefits to healthcare systems.
Speed of processing and strategic control of attention after traumatic brain injury.
Dymowski, Alicia Rhian; Owens, Jacqueline Anne; Ponsford, Jennie Louise; Willmott, Catherine
2015-01-01
Slowed information processing speed has consistently been documented after traumatic brain injury (TBI). Debate continues as to whether deficits in strategic control are proportionate to, or remain after controlling for, reduced speed of processing. The study aim was to investigate the association of speed of processing and strategic control of attention with working memory, selective attention, response inhibition, and mental flexibility task performance after TBI using traditional and novel clinical measures. Twenty-five individuals with complicated mild to severe TBI (post-traumatic amnesia duration, M = 39.52 days, SD = 38.34; worst Glasgow Coma Scale score, M = 7.33, SD = 4.35; time post-injury, M = 392.64 days, SD = 537.19) and 25 matched healthy controls completed assessment of attentional and executive functioning. Measures included the Symbol Digit Modalities Test (SDMT), the computerized Selective Attention Task (SAT), the Ruff 2&7 Selective Attention Test (2&7), the visual n-back, Digit Span, Hayling Test, and Trail Making Test (TMT). t tests revealed that individuals with TBI demonstrated reduced processing speed on the SDMT, n-back, SAT, 2&7, Hayling Test, and TMT-A (p ≤ .002 for all). Digit Span performance did not differ between groups. Mixed-model ANOVAs revealed that individuals with TBI demonstrated a disproportionate increase in reaction time with complexity, which was accounted for by speed on the SAT but remained on the Hayling Inhibition Test after controlling for speed in ANCOVAs. Mann-Whitney U tests revealed that individuals with TBI also made more errors on the Hayling Test, missed responses on the n-back and were unable to benefit from the automatic condition of the 2&7. While slowed speed of information processing was pervasive across tasks after TBI, residual difficulties in response inhibition remained after controlling for slowness, which suggests impaired strategic control. These findings support targeted intervention for slowed speed of thinking and inhibition following TBI.
Protecting Digital Evidence Integrity by Using Smart Cards
NASA Astrophysics Data System (ADS)
Saleem, Shahzad; Popov, Oliver
RFC 3227 provides general guidelines for digital evidence collection and archiving, while the International Organization on Computer Evidence offers guidelines for best practice in the digital forensic examination. In the light of these guidelines we will analyze integrity protection mechanism provided by EnCase and FTK which is mainly based on Message Digest Codes (MDCs). MDCs for integrity protection are not tamper proof, hence they can be forged. With the proposed model for protecting digital evidence integrity by using smart cards (PIDESC) that establishes a secure platform for digitally signing the MDC (in general for a whole range of cryptographic services) in combination with Public Key Cryptography (PKC), one can show that this weakness might be overcome.
Center for Coastline Security Technology, Year 3
2008-05-01
Polarization control for 3D Imaging with the Sony SRX-R105 Digital Cinema Projectors 3.4 HDMAX Camera and Sony SRX-R105 Projector Configuration for 3D...HDMAX Camera Pair Figure 3.2 Sony SRX-R105 Digital Cinema Projector Figure 3.3 Effect of camera rotation on projected overlay image. Figure 3.4...system that combines a pair of FAU’s HD-MAX video cameras with a pair of Sony SRX-R105 digital cinema projectors for stereo imaging and projection
Advanced Information Assurance Handbook
2004-03-01
and extraction of stored or recorded digital /electronic evidence (from the Latin root “ forensis ,” relating to the forum/legal business). 4.3...up over 100 MB of memory ) and also open the door to potential security incidents. Services can be set to start automatically upon boot or they can... digital certificates, thereby increasing the reliability of the authentication considerably. 12
Intranasal Insulin for Improving Cognitive Function in Multiple Sclerosis
2017-10-01
Insulin, Symbol Digit Modalities Test , Minimal Assessment of Cognitive Function in Multiple Sclerosis 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...going to evaluate if intranasal insulin improves cognition in people with MS, as assessed by standardized cognitive assessment tests . 2. KEYWORDS...Multiple Sclerosis, Cognitive Impairment, Neurodegenerative diseases, Intranasal Insulin, Symbol Digit Modalities Test , Minimal Assessment of Cognitive
Digitization of Electrocardiogram From Telemetry Prior to In-hospital Cardiac Arrest: A Pilot Study.
Attin, Mina; Wang, Lu; Soroushmehr, S M Reza; Lin, Chii-Dean; Lemus, Hector; Spadafore, Maxwell; Najarian, Kayvan
2016-03-01
Analyzing telemetry electrocardiogram (ECG) data over an extended period is often time-consuming because digital records are not widely available at hospitals. Investigating trends and patterns in the ECG data could lead to establishing predictors that would shorten response time to in-hospital cardiac arrest (I-HCA). This study was conducted to validate a novel method of digitizing paper ECG tracings from telemetry systems in order to facilitate the use of heart rate as a diagnostic feature prior to I-HCA. This multicenter study used telemetry to investigate full-disclosure ECG papers of 44 cardiovascular patients obtained within 1 hr of I-HCA with initial rhythms of pulseless electrical activity and asystole. Digital ECGs were available for seven of these patients. An algorithm to digitize the full-disclosure ECG papers was developed using the shortest path method. The heart rate was measured manually (averaging R-R intervals) for ECG papers and automatically for digitized and digital ECGs. Significant correlations were found between manual and automated measurements of digitized ECGs (p < .001) and between digitized and digital ECGs (p < .001). Bland-Altman methods showed bias = .001 s, SD = .0276 s, lower and upper 95% limits of agreement for digitized and digital ECGs = .055 and -.053 s, and percentage error = 0.22%. Root mean square (rms), percentage rms difference, and signal to noise ratio values were in acceptable ranges. The digitization method was validated. Digitized ECG provides an efficient and accurate way of measuring heart rate over an extended period of time. © The Author(s) 2015.
Activities report of PTT Research
NASA Astrophysics Data System (ADS)
In the field of postal infrastructure research, activities were performed on postcode readers, radiolabels, and techniques of operations research and artificial intelligence. In the field of telecommunication, transportation, and information, research was made on multipurpose coding schemes, speech recognition, hypertext, a multimedia information server, security of electronic data interchange, document retrieval, improvement of the quality of user interfaces, domotics living support (techniques), and standardization of telecommunication prototcols. In the field of telecommunication infrastructure and provisions research, activities were performed on universal personal telecommunications, advanced broadband network technologies, coherent techniques, measurement of audio quality, near field facilities, local beam communication, local area networks, network security, coupling of broadband and narrowband integrated services digital networks, digital mapping, and standardization of protocols.
Graetz, Ilana; Gordon, Nancy; Fung, Vick; Hamity, Courtnee; Reed, Mary E
2016-08-01
Online access to health records and the ability to exchange secure messages with physicians can improve patient engagement and outcomes; however, the digital divide could limit access to web-based portals among disadvantaged groups. To understand whether sociodemographic differences in patient portal use for secure messaging can be explained by differences in internet access and care preferences. Cross-sectional survey to examine the association between patient sociodemographic characteristics and internet access and care preferences; then, the association between sociodemographic characteristics and secure message use with and without adjusting for internet access and care preference. One thousand forty-one patients with chronic conditions in a large integrated health care delivery system (76% response rate). Internet access, portal use for secure messaging, preference for in-person or online care, and sociodemographic and health characteristics. Internet access and preference mediated some of the differences in secure message use by age, race, and income. For example, using own computer to access the internet explained 52% of the association between race and secure message use and 60% of the association between income and use (Sobel-Goodman mediation test, P<0.001 for both). Education and sex-related differences in portal use remained statistically significant when controlling for internet access and preference. As the availability and use of patient portals increase, it is important to understand which patients have limited access and the barriers they may face. Improving internet access and making portals available across multiple platforms, including mobile, may reduce some disparities in secure message use.
Lu, Shu-Hua; Dai, Yu-Tzu; Yen, Chung-Jen
2009-11-01
Accurate baseline body temperature measurement is essential for assessment. Tympanic membrane temperature (TMT) measurement is popular, but there is no consensus on whether it is as accurate as oral temperature (OT) for use with the elderly at varying ambient temperature levels. To test agreement between TMT and OT measurement of body temperature among an elderly population; and to explore whether agreement between the two sites depends on ambient temperature. A cross-sectional comparison study. Two samples of older community-dwelling adults were recruited from 17 community senior citizen centers in Taipei, Taiwan in winter (n=262) and summer (n=257) of 2007. TMT and OT were simultaneously measured by electronic infrared ear thermometer and electronic digital thermometer. Ambient temperatures measured by digital thermo-hygrometer of the data collection setting were recorded when body temperature was taken. In winter mean TMT was 36.64 degrees C (S.D. 0.37), and mean OT was 36.74 degrees C (S.D. 0.18). In summer, the mean TMT was 37.05 degrees C (S.D. 0.30) and mean OT was 36.85 degrees C (S.D. 0.22). The relationship between TMT and OT were r=0.42 (p<0.001) in winter and r=0.57 (p<0.001) in summer. The values of OT were used as standard to assess the accuracy of the measurement. The bias between TMT and OT was -0.10 degrees C (S.D. 0.34) and 95% limits of agreement were 0.57 and -0.77 degrees C in winter; and bias was 0.20 degrees C (S.D. 0.25) and 95% limits of agreement were 0.69 and -0.29 degrees C in summer. The findings of this study demonstrate that the TMT has high variability that may under or over estimate body temperatures. There is a lack of agreement in body temperatures values between TMT and OT in community-dwelling elderly in both winter and summer. OT was more stable than TMT regardless of ambient temperature influences. Therefore, the oral cavity is preferable to the TM site for temperature measurement in alert elderly. The limitation of this study is that hospitalized patients who are most likely to need temperature measurement are not included in this study.
41. Upper level, electronic racks, left to rightprogrammer group, status ...
41. Upper level, electronic racks, left to right--programmer group, status command message processing group, UHF radio, impss rack security - Ellsworth Air Force Base, Delta Flight, Launch Facility, On County Road T512, south of Exit 116 off I-90, Interior, Jackson County, SD
Venskutonis, Tadas; Daugela, Povilas; Strazdas, Marijus; Juodzbalys, Gintaras
2014-04-01
The aim of the present study was to compare the accuracy of intraoral digital periapical radiography and cone beam computed tomography in the detection of periapical radiolucencies in endodontically treated teeth. Radiographic images (cone beam computed tomography [CBCT] scans and digital periapical radiography [PR] images) from 60 patients, achieved from September 2008 to July 2013, were retrieved from databases of the Department of Oral Diseases, Lithuanian University of Health Sciences. Twenty patients met inclusion criteria and were selected for further evaluation. In 20 patients (42.4 [SD 12.1] years, 65% men and 35% women) a total of 35 endodontically treated teeth (1.75 [SD 0.91]; 27 in maxilla and 8 in mandible) were evaluated. Overall, it was observed a statistical significant difference between the number of periapical lesions observed in the CBCT (n = 42) and radiographic (n = 24) examinations (P < 0.05). In molar teeth, CBCT identify a significantly higher amount of periapical lesions than with the radiographic method (P < 0.05). There were significant differences between CBCT and PR in the mean number of lesions identified per tooth (1.2 vs 0.66, P = 0.03), number of teeth with lesions (0.71 vs 0.46, P = 0.03) and number of lesions identified per canal (0.57 vs 0.33, P = 0.005). Considering CBCT as "gold standard" in lesion detection with the sensitivity, specificity and accuracy considering as score 1, then the same parameters of PR were 0.57, 1 and 0.76 respectively. Within the limitations of the present study, it can be concluded that cone beam computed tomography scans were more accurate compared to digital periapical radiographs for detecting periapical radiolucencies in endodontically treated teeth. The difference was more pronounced in molar teeth.
Pressure sensitivity of flow oscillations in postocclusive reactive skin hyperemia.
Strucl, M; Peterec, D; Finderle, Z; Maver, J
1994-05-01
Skin blood flow was monitored using a laser-Doppler (LD) flowmeter in 21 healthy volunteers after an occlusion of the digital arteries. The peripheral vascular bed was exposed to occlusion ischemia of varying duration (1, 4, or 8 min) and to a change in digital arterial pressure produced by different positions of the arm above heart level to characterize the pattern of LD flow oscillations in postocclusive reactive hyperemia (PRH) and to elucidate the relevance of metabolic and myogenic mechanisms in governing its fundamental frequency. The descending part of the hyperemic flow was characterized by the appearance of conspicuous periodic oscillations with a mean fundamental frequency of 7.2 +/- 1.5 cycles/min (SD, n = 9), as assessed by a Fourier transform frequency analysis of 50-s sections of flow. The mean respiratory frequency during the periods of flow frequency analysis was 17.0 +/- 2.2 (SD, n = 9), and the PRH oscillations remained during apnea in all tested subjects. The area under the maximum flow curve increased significantly with prolongation of the occlusion (paired t test, P < 0.001; n = 9), but showed no dependence on the estimated blood pressure in the digital arteries, which suggests the predominant role of a metabolic component in this part of the PRH response. In contrast, the fundamental frequency of PRH oscillations exhibited a significant decrease with a reduction in the estimated digital arterial pressure (linear regression, b = 0.08, P < 0.001; n = 12), but did not change with the prolongation of arterial occlusion despite a significant increase in mean LD flow (paired t test, P < 0.001; n = 9).(ABSTRACT TRUNCATED AT 250 WORDS)
Peters-Strickland, Timothy; Pestreich, Linda; Hatch, Ainslie; Rohatagi, Shashank; Baker, Ross A; Docherty, John P; Markovtsova, Lada; Raja, Praveen; Weiden, Peter J; Walling, David P
2016-01-01
Digital medicine system (DMS) is a novel drug-device combination that objectively measures and reports medication ingestion. The DMS consists of medication embedded with an ingestible sensor (digital medicine), a wearable sensor, and software applications. This study evaluated usability of the DMS in adults with schizophrenia rated by both patients and their health care providers (HCPs) during 8-week treatment with prescribed doses of digital aripiprazole. Six US sites enrolled outpatients into this Phase IIa, open-label study (NCT02219009). The study comprised a screening phase, a training phase (three weekly site visits), and a 5-week independent phase. Patients and HCPs independently rated usability of and satisfaction with the DMS. Sixty-seven patients were enrolled, and 49 (73.1%) patients completed the study. The mean age (SD) of the patients was 46.6 years (9.7 years); the majority of them were male (74.6%), black (76.1%), and rated mildly ill on the Clinical Global Impression - Severity scale (70.1%). By the end of week 8 or early termination, 82.1% (55/67) of patients had replaced the wearable sensor independently or with minimal assistance, based on HCP rating. The patients used the wearable sensor for a mean (SD) of 70.7% (24.7%) and a median of 77.8% of their time in the trial. The patients contacted a call center most frequently at week 1. At the last visit, 78% (47/60) of patients were somewhat satisfied/satisfied/extremely satisfied with the DMS. A high proportion of patients with schizophrenia were able to use the DMS and reported satisfaction with the DMS. These data support the potential utility of the DMS in clinical practice.
Shen, Li-Qiong; Zang, Xiao-Ying; Cong, Ji-Yan
2018-04-01
Personal digital assistants, technology with various functions, have been applied in international clinical practice. Great benefits in reducing medical errors and enhancing the efficiency of clinical work have been achieved, but little research has investigated nurses' satisfaction with the use of personal digital assistants. To investigate nurses' satisfaction with use of personal digital assistants, and to explore the predictors of this. This is a cross-sectional descriptive study. We conducted a cross-sectional survey targeting nurses who used personal digital assistants in a comprehensive tertiary hospital in Beijing. A total of 383 nurses were recruited in this survey in 2015. The total score of nurses' satisfaction with use of personal digital assistants was 238.91 (SD 39.25). Nurses were less satisfied with the function of documentation, compared with the function of administering medical orders. The time length of using personal digital assistants, academic degree, and different departments predicted nurses' satisfaction towards personal digital assistant use (all P < 0.05). Nurses were satisfied with the accuracy of administering medical orders and the safety of recording data. The stability of the wireless network and efficiency related to nursing work were less promising. To some extent, nurses with higher education and longer working time with personal digital assistants were more satisfied with them. © 2018 John Wiley & Sons Australia, Ltd.
Cyber secure systems approach for NPP digital control systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCreary, T. J.; Hsu, A.
2006-07-01
Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant andmore » distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from an intruder attempting to disrupt network communications by entering the system from an attached utility network or utilizing a modem connected to a control system PC that is in turn connected to a publicly accessible phone; 2)Threat from a user connecting an unauthorized computer to the control network; 3)Threat from a security attack when an unauthorized user gains access to a PC connected to the plant network;. 4)Threat from internal disruption (by plant staff, whether, malicious or otherwise) by unauthorized usage of files or file handling media that opens the system to security threat (as typified in current situation in most control rooms). The plant I and C system cyber security design and the plant specific procedures should adequately demonstrate protection from the four pertinent classes of cyber security attacks. The combination of these features should demonstrate that the system is not vulnerable to any analyzed cyber security attacks either from internal sources or through network connections. The authors will provide configurations that will demonstrate the Cyber Security Zone. (authors)« less
NASA Astrophysics Data System (ADS)
Almehmadi, Fares S.; Chatterjee, Monish R.
2014-12-01
Using intensity feedback, the closed-loop behavior of an acousto-optic hybrid device under profiled beam propagation has been recently shown to exhibit wider chaotic bands potentially leading to an increase in both the dynamic range and sensitivity to key parameters that characterize the encryption. In this work, a detailed examination is carried out vis-à-vis the robustness of the encryption/decryption process relative to parameter mismatch for both analog and pulse code modulation signals, and bit error rate (BER) curves are used to examine the impact of additive white noise. The simulations with profiled input beams are shown to produce a stronger encryption key (i.e., much lower parametric tolerance thresholds) relative to simulations with uniform plane wave input beams. In each case, it is shown that the tolerance for key parameters drops by factors ranging from 10 to 20 times below those for uniform plane wave propagation. Results are shown to be at consistently lower tolerances for secure transmission of analog and digital signals using parameter tolerance measures, as well as BER performance measures for digital signals. These results hold out the promise for considerably greater information transmission security for such a system.
Electronic transfer of sensitive patient data.
Detterbeck, A M W; Kaiser, J; Hirschfelder, U
2015-01-01
The purpose of this study was to develop decision-making aids and recommendations for dental practitioners regarding the utilization and sharing of sensitive digital patient data. In the current environment of growing digitization, healthcare professionals need detailed knowledge of secure data management to maximize confidentiality and minimize the risks involved in both archiving patient data and sharing it through electronic channels. Despite well-defined legal requirements, an all-inclusive technological solution does not currently exist. The need for a preliminary review and critical appraisal of common practices of data transfer prompted a search of the literature and the Web to identify viable methods of secure data exchange and to develop a flowchart. A strong focus was placed on the transmission of datasets both smaller than and larger than 10 MB, and on secure communication by smartphone. Although encryption of patient-related data should be routine, it is often difficult to implement. Pretty Good Privacy (PGP) and Secure/Multipurpose Internet Mail Extensions (S/MIME) are viable standards for secure e-mail encryption. Sharing of high-volume data should be accomplished with the help of file encryption. Careful handling of sensitive patient data is mandatory, and it is the end-user's responsibility to meet any requirements for encryption, preferably by using free, open-source (and hence transparent) software.
Information Operations & Security
2012-03-05
Fred B. Schneider, Cornell The Promise of Security Metrics • Users: Purchasing decisions – Which system is the better value? • Builders ...Engineering University of Maryland, College Park DISTRIBUTION A: Approved for public release; distribution is unlimited. Digital Multimedia Anti...fingerprints for multimedia content: • Determine the time and place of recordings • Detect tampering in the multimedia content; bind video and
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-25
... publishing the names, addresses, and amounts of the 18 awards made under the set aside in Appendix A to this... Security Camera Harrison Street, Oakland, CA Surveillance System 94612. including digital video recorders... Cameras, 50 Lincoln Plaza, Wilkes-Barre, Network Video PA 18702. Recorders, and Lighting. Ft. Worth...
Local amygdala structural differences with 3T MRI in patients with Alzheimer disease
Cavedo, E.; Boccardi, M.; Ganzola, R.; Canu, E.; Beltramello, A.; Caltagirone, C.; Thompson, P.M.
2011-01-01
Objective: Histologic studies show that the amygdala is affected by Alzheimer disease (AD) pathology, and its medial aspect is the most involved. We aimed to assess in vivo local structural differences in the amygdala of patients with AD using high-field MRI. Methods: A total of 19 patients with AD (mean age 76, SD 6 years, mean Mini-Mental State Examination score [MMSE] 13, SD 4) and 19 healthy elderly controls (age 74, SD 5, MMSE 29, SD 1) were enrolled. The radial atrophy mapping technique was used to reconstruct the 3-dimensional surface of the amygdala. Maps of surface tissue loss in patients with AD vs controls were computed and statistically tested with permutation tests thresholded at p < 0.05, to correct for multiple comparisons. A digital atlas of the amygdalar nuclei was used to infer which nuclei were involved. Results: Both amygdalar volumes were significantly smaller in patients with AD (right 1,508 mm3, SD 418; left 1,646, SD 419) than controls (right 2,129 mm3, SD 316; left 2,077, SD 376; p < 0.002). In the dorsomedial part, significant local tissue loss (20%–30%) was mapped in the medial and central nuclei. Ventrally, the lateral nucleus (La) and the basolateral ventral medial nucleus (BLVM) were also involved (20%–30% loss). Conclusions: We found in vivo local structural differences in the amygdala of patients with AD. The nuclei involved have known connections to the hippocampus (BLVM, La) and olfactory system (medial nucleus) and with cholinergic pathways (central nucleus). This pattern is consistent with the known pathophysiology of neural systems affected by AD. PMID:21339500
Baumel, Amit; Correll, Christoph U; Hauser, Marta; Brunette, Mary; Rotondi, Armando; Ben-Zeev, Dror; Gottlieb, Jennifer D; Mueser, Kim T; Achtyes, Eric D; Schooler, Nina R; Robinson, Delbert G; Gingerich, Susan; Marcy, Patricia; Meyer-Kalos, Piper; Kane, John M
2016-09-01
The authors examined patients' acceptance of the Health Technology Program (HTP), an integrative approach to relapse prevention after hospitalization of adults with schizophrenia or related disorders. The program combines use of digital tools with support from a mental health technology coach (MHTC). Patients with schizophrenia spectrum disorders received six months of treatment that began within 60 days of a psychiatric hospitalization and included the development of a personalized relapse prevention plan, three digital tools, and contacts with MHTCs. A total of 200 patients (mean±SD age=34.6±10.6 years) had 28.2±2.0 contacts with the MHTC that lasted 38.3±14.2 minutes. The most discussed topic was case management (52%), and digital tools were discussed in 45% of meetings. Altogether, 87% of patients used at least one of the digital tools, with 96% of patients rating the HTP as satisfying to at least some extent. These data suggest very high acceptance of the HTP, a program that integrates available human support with digital tools.
40. Upper level, electronic racks, left to rightstatus command message ...
40. Upper level, electronic racks, left to right--status command message processing group, UHF radio, impss rack security, power supply group rack - Ellsworth Air Force Base, Delta Flight, Launch Facility, On County Road T512, south of Exit 116 off I-90, Interior, Jackson County, SD
12. Interior view of reception and secretarial space for legal ...
12. Interior view of reception and secretarial space for legal offices; showing wall mounted shelving and exterior window; center and south side of main section of building on top floor; view to southwest. - Ellsworth Air Force Base, Group Administration & Secure Storage Building, 2372 Westover Avenue, Blackhawk, Meade County, SD
23. Interior view of entrance corridor looking towards main stairway; ...
23. Interior view of entrance corridor looking towards main stairway; showing unoccupied corner office space and encased bulletin boards; center of main section of building on main floor; view to northeast. - Ellsworth Air Force Base, Group Administration & Secure Storage Building, 2372 Westover Avenue, Blackhawk, Meade County, SD
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-15
... (``maker/taker fees and rebates'') in 101 options classes (the ``Select Symbols'').\\3\\ The Exchange also... Symbols''). \\3\\ Options classes subject to maker/taker fees and rebates are identified by their ticker.... (``PEP''), SandRidge Energy, Inc. (``SD''), Union Pacific Corporation (``UNP''), United Technologies...
Yang, Hongyu; Wang, Ying; Zhou, Zhenyu; Gong, Hui; Luo, Qingming; Wang, Yiwen; Lu, Zuhong
2009-12-01
Sex differences in cognitive tasks have been widely investigated. With brain-imaging techniques, the functions of the brain during the performance of tasks can be examined. Mental arithmetic and near-infrared spectroscopy (NIRS) were used to assess sex differences in prefrontal area activation in a functional brain study. Healthy college students were recruited to perform 2 mental arithmetic tasks. In the first (easy) task, students had to subtract a 1-digit number from a 3-digit number. In the second (difficult) task, they had to subtract a 2-digit number from a 3-digit number. Changes in the concentration of oxygenated hemoglobin (oxy-Hgb) in the prefrontal area during the tasks were measured with NIRS. Thirty students (15 men, 15 women; mean [SD] age: 24.9 [2.2] and 24.3 [2.6] years, respectively) were recruited from Southeast University, Nanjing, China, to participate in the study. The concentration of oxy-Hgb increased during both mental arithmetic tasks (difficult task vs easy task, mean [SD] % arbitrary units: 4.36 [4.38] vs 2.26 [2.82]; F(1,28) = 222.80; P < 0.01). Significant interactions of task x sex (F(1,28) = 82.95), time x sex (F(1,28) = 34.48), task x time (F(1,28) = 222.57), and task x time x sex (F(1,28) = 83.09) were obtained (all, P < 0.01). However, for the 2 tasks, no significant differences between men and women were observed in the mean (SD) response time (men vs women, sec: 3.60 [0.74] vs 3.56 [0.49] for the easy task, 6.55 [0.77] vs 6.44 [0.75] for the difficult task; F(1,28) = 0.67; P = NS) or accuracy rate (men vs women, %: 95.33 [7.40] vs 92.77 [8.80] for the easy task, 62.67 [28.56] vs 54.67 [18.75] for the difficult task; F(1,28) = 0.54; P = NS). Male students showed neural efficiency (less prefrontal activation in subjects with better performance) during the difficult task. In these subjects, sex differences in prefrontal response when performing mental arithmetic were associated with the intensity of the task. Compared with men, women had greater efficiency in task performance (ie, less activation or oxygen consumption for equal performance). Copyright 2009 Excerpta Medica Inc. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Strait, R.S.; Wagner, E.E.
1994-07-01
The US Department of Energy (DOE) Office of Safeguards and Security initiated the DOE Integrated Security System / Electronic Transfer (DISS/ET) for the purpose of reducing the time required to process security clearance requests. DISS/ET will be an integrated system using electronic commerce technologies for the collection and processing of personnel security clearance data, and its transfer between DOE local security clearance offices, DOE Operations Offices, and the Office of Personnel Management. The system will use electronic forms to collect clearance applicant data. The forms data will be combined with electronic fingerprint images and packaged in a secure encrypted electronicmore » mail envelope for transmission across the Internet. Information provided by the applicant will be authenticated using digital signatures. All processing will be done electronically.« less
21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for storing and using a private key... Digital Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for... and private key. (b) The certificate holder must provide FIPS-approved secure storage for the private...
21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...
21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...
21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...
21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Misra, Shashank
2017-11-01
The digital electronics at the atomic limit (DEAL) project seeks to leverage Sandia's atomic-precision fabrication capability to realize the theorized orders-of-magnitude improvement in operating voltage for tunnel field effect transistors (TFETs) compared to CMOS. Not only are low-power digital circuits a critical element of many national security systems (e.g. satellites), TFETs can perform circuit functions inaccessible to CMOS (e.g. polymorphism).
Digital Troposcatter Performance Model. Users Manual.
1983-11-01
and Information Systems - .,- - - UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (When Data Entered) S REPORT DOCUIAENTATION PAGE READ...Diffraction Multipath Prediction MD-918 Modem Error Rate Prediction AN/TRC-170 Link Analysis 20. ABSTRACT (Continue en reverse esie If neceseay end...configurations used in the Defense Communications System (DCS), and prediction of the performance of both the MD-918 and AN/TRC-170 digital troposcatter modems
1985-03-01
005 4-, /nImII 1 liIm ulnli iiliiii I I UNCLASSIFIED SECURITY CLASSIFICATION OF TNIS PAGE ("on Data Bnter6t0 REPORT DOCUMENTATION PAGE READ...II different from ControllIng Office) 15. SECURITY CLASS (of thin report) Unclassified IS. OECLASSIFICATION/ DOWNGRADING SCMEDULE 1. DISTRIBUTION...EDITION OF I NOV 65 IS OBSOLETE UNCLASSIFIED N0102LF-0146601 1 UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (When Dote wrteed) ,IA UNCLASSIFIED
Protected interoperability of telecommunications and digital products
NASA Astrophysics Data System (ADS)
Hampel, Viktor E.; Cartier, Gene N.; Craft, James P.
1994-11-01
New federal standards for the protection of sensitive data now make it possible to ensure the authenticity, integrity and confidentiality of digital products, and non-repudiation of digital telecommunications. Under review and comment since 1991, the new Federal standards were confirmed this year and provide standard means for the protection of voice and data communications from accidental and wilful abuse. The standards are initially tailored to protect only `sensitive-but-unclassified' (SBU) data in compliance with the Computer Security Act of 1987. These data represent the majority of transactions in electronic commerce, including sensitive procurement information, trade secrets, financial data, product definitions, and company-proprietary information classified as `intellectual property.' Harmonization of the new standards with international requirements is in progress. In the United States, the confirmation of the basic standards marks the beginning of a long-range program to assure discretionary and mandatory access controls to digital resources. Upwards compatibility into the classified domain with multi-level security is a core requirement of the National Information Infrastructure. In this report we review the powerful capabilities of standard Public-Key-Cryptology, the availability of commercial and Federal products for data protection, and make recommendations for their cost-effective use to assure reliable telecommunications and process controls.
The role of optics in secure credentials
NASA Astrophysics Data System (ADS)
Lichtenstein, Terri L.
2006-02-01
The global need for secure ID credentials has grown rapidly over the last few years. This is evident both in government and commercial sectors. Governmental programs include national ID card programs, permanent resident cards for noncitizens, biometric visas or border crossing cards, foreign worker ID programs and secure vehicle registration programs. The commercial need for secure credentials includes secure banking and financial services, security and access control systems and digital healthcare record cards. All of these programs necessitate the use of multiple tamper and counterfeit resistant features for credential authentication and cardholder verification. It is generally accepted that a secure credential should include a combination of overt, covert and forensic security features. The LaserCard optical memory card is a proven example of a secure credential that uses a variety of optical features to enhance its counterfeit resistance and reliability. This paper will review those features and how they interact to create a better credential.
Implementation of digital image encryption algorithm using logistic function and DNA encoding
NASA Astrophysics Data System (ADS)
Suryadi, MT; Satria, Yudi; Fauzi, Muhammad
2018-03-01
Cryptography is a method to secure information that might be in form of digital image. Based on past research, in order to increase security level of chaos based encryption algorithm and DNA based encryption algorithm, encryption algorithm using logistic function and DNA encoding was proposed. Digital image encryption algorithm using logistic function and DNA encoding use DNA encoding to scramble the pixel values into DNA base and scramble it in DNA addition, DNA complement, and XOR operation. The logistic function in this algorithm used as random number generator needed in DNA complement and XOR operation. The result of the test show that the PSNR values of cipher images are 7.98-7.99 bits, the entropy values are close to 8, the histogram of cipher images are uniformly distributed and the correlation coefficient of cipher images are near 0. Thus, the cipher image can be decrypted perfectly and the encryption algorithm has good resistance to entropy attack and statistical attack.
NASA Astrophysics Data System (ADS)
Wang, Ying; Liu, Qi; Wang, Jun; Wang, Qiong-Hua
2018-03-01
We present an optical encryption method of multiple three-dimensional objects based on multiple interferences and single-pixel digital holography. By modifying the Mach–Zehnder interferometer, the interference of the multiple objects beams and the one reference beam is used to simultaneously encrypt multiple objects into a ciphertext. During decryption, each three-dimensional object can be decrypted independently without having to decrypt other objects. Since the single-pixel digital holography based on compressive sensing theory is introduced, the encrypted data of this method is effectively reduced. In addition, recording fewer encrypted data can greatly reduce the bandwidth of network transmission. Moreover, the compressive sensing essentially serves as a secret key that makes an intruder attack invalid, which means that the system is more secure than the conventional encryption method. Simulation results demonstrate the feasibility of the proposed method and show that the system has good security performance. Project supported by the National Natural Science Foundation of China (Grant Nos. 61405130 and 61320106015).
Chen, Chih-Yuan; Chang, Chia-Lin; Chang, Chih-Wei; Lai, Shin-Chi; Chien, Tsung-Fu; Huang, Hong-Yi; Chiou, Jin-Chern; Luo, Ching-Hsing
2013-03-04
This work describes a bio-potential acquisition system for portable ubiquitous healthcare applications using flexible polydimethylsiloxane dry electrodes (FPDEs) and a low-power recording circuit. This novel FPDE used Au as the skin contact layer, which was made using a CO2 laser and replica method technology. The FPDE was revised from a commercial bio-potential electrode with a conductive snap using dry electrodes rather than wet electrodes that proposed reliable and robust attachment for the purpose of measurement, and attaching velcro made it wearable on the forearm for bio-potential applications. Furthermore, this study proposes a recording device to store bio-potential signal data and provides portability and low-power consumption for the proposed acquisition system. To acquire differential bio-potentials, such as electrocardiogram (ECG) signals, the proposed recording device includes a low-power front-end acquisition chip fabricated using a complementary metal-oxide-semiconductor (CMOS) process, a commercial microcontroller (MSP430F149), and a secure digital (SD) card for portable healthcare applications. The proposed system can obtain ECG signals efficiently and are comfortable to the skin. The power consumption of the system is about 85 mW for continuous working over a 3 day period with two AA batteries. It can also be used as a compact Holter ECG system.
Random digital encryption secure communication system
NASA Technical Reports Server (NTRS)
Doland, G. D. (Inventor)
1982-01-01
The design of a secure communication system is described. A product code, formed from two pseudorandom sequences of digital bits, is used to encipher or scramble data prior to transmission. The two pseudorandom sequences are periodically changed at intervals before they have had time to repeat. One of the two sequences is transmitted continuously with the scrambled data for synchronization. In the receiver portion of the system, the incoming signal is compared with one of two locally generated pseudorandom sequences until correspondence between the sequences is obtained. At this time, the two locally generated sequences are formed into a product code which deciphers the data from the incoming signal. Provision is made to ensure synchronization of the transmitting and receiving portions of the system.
Low photon count based digital holography for quadratic phase cryptography.
Muniraj, Inbarasan; Guo, Changliang; Malallah, Ra'ed; Ryle, James P; Healy, John J; Lee, Byung-Geun; Sheridan, John T
2017-07-15
Recently, the vulnerability of the linear canonical transform-based double random phase encryption system to attack has been demonstrated. To alleviate this, we present for the first time, to the best of our knowledge, a method for securing a two-dimensional scene using a quadratic phase encoding system operating in the photon-counted imaging (PCI) regime. Position-phase-shifting digital holography is applied to record the photon-limited encrypted complex samples. The reconstruction of the complex wavefront involves four sparse (undersampled) dataset intensity measurements (interferograms) at two different positions. Computer simulations validate that the photon-limited sparse-encrypted data has adequate information to authenticate the original data set. Finally, security analysis, employing iterative phase retrieval attacks, has been performed.
Standardized access, display, and retrieval of medical video
NASA Astrophysics Data System (ADS)
Bellaire, Gunter; Steines, Daniel; Graschew, Georgi; Thiel, Andreas; Bernarding, Johannes; Tolxdorff, Thomas; Schlag, Peter M.
1999-05-01
The system presented here enhances documentation and data- secured, second-opinion facilities by integrating video sequences into DICOM 3.0. We present an implementation for a medical video server extended by a DICOM interface. Security mechanisms conforming with DICOM are integrated to enable secure internet access. Digital video documents of diagnostic and therapeutic procedures should be examined regarding the clip length and size necessary for second opinion and manageable with today's hardware. Image sources relevant for this paper include 3D laparoscope, 3D surgical microscope, 3D open surgery camera, synthetic video, and monoscopic endoscopes, etc. The global DICOM video concept and three special workplaces of distinct applications are described. Additionally, an approach is presented to analyze the motion of the endoscopic camera for future automatic video-cutting. Digital stereoscopic video sequences are especially in demand for surgery . Therefore DSVS are also integrated into the DICOM video concept. Results are presented describing the suitability of stereoscopic display techniques for the operating room.
Falcão-Reis, Filipa; Correia, Manuel E
2010-01-01
With the advent of more sophisticated and comprehensive healthcare information systems, system builders are becoming more interested in patient interaction and what he can do to help to improve his own health care. Information systems play nowadays a crucial and fundamental role in hospital work-flows, thus providing great opportunities to introduce and improve upon "patient empowerment" processes for the personalization and management of Electronic Health Records (EHRs). In this paper, we present a patient's privacy generic control mechanisms scenarios based on the Extended OpenID (eOID), a user centric digital identity provider previously developed by our group, which leverages a secured OpenID 2.0 infrastructure with the recently released Portuguese Citizen Card (CC) for secure authentication in a distributed health information environment. eOID also takes advantage of Oauth assertion based mechanisms to implement patient controlled secure qualified role based access to his EHR, by third parties.
Restoration of hot pixels in digital imagers using lossless approximation techniques
NASA Astrophysics Data System (ADS)
Hadar, O.; Shleifer, A.; Cohen, E.; Dotan, Y.
2015-09-01
During the last twenty years, digital imagers have spread into industrial and everyday devices, such as satellites, security cameras, cell phones, laptops and more. "Hot pixels" are the main defects in remote digital cameras. In this paper we prove an improvement of existing restoration methods that use (solely or as an auxiliary tool) some average of the surrounding single pixel, such as the method of the Chapman-Koren study 1,2. The proposed method uses the CALIC algorithm and adapts it to a full use of the surrounding pixels.
Food insecurity and cognitive function in Puerto Rican adults.
Gao, Xiang; Scott, Tammy; Falcon, Luis M; Wilde, Parke E; Tucker, Katherine L
2009-04-01
Food insecurity is associated with nutrient inadequacy and a variety of unfavorable health outcomes. However, little is known about whether food security is associated with lower cognitive function in the elderly. We investigated the prevalence of food insecurity in a representative sample of 1358 Puerto Ricans aged 45-75 y living in Massachusetts in relation to cognitive function performances. Food security was assessed with the US Household Food Security Scale. Cognitive function was measured to capture general cognition with a battery of 7 tests: Mini-Mental State Examination (MMSE), word list learning (verbal memory), digit span (attention), clock drawing and figure copying (visual-spatial ability), and Stroop and verbal fluency tests (fluency executive functioning). The overall prevalence of food insecurity during the past 12 mo was 12.1%; 6.1% of the subjects reported very low food security. Food insecurity was inversely associated with global cognitive performance, as assessed by the MMSE score. The adjusted difference in the MMSE score was -0.90 (95% CI: -1.6, -0.19; P for trend = 0.003) for a comparison of participants with very low food security with those who were food secure, after adjustment for age, smoking, education, poverty status, income, acculturation, plasma homocysteine, alcohol, diabetes, and hypertension. Food insecurity was significantly associated with lower scores for word-list learning, percentage retention, letter fluency, and digit span backward tests. Very low food security was prevalent among the study subjects and was associated with lower cognitive performance. Further studies, both observational and experimental, are warranted to clarify the direction of causality in this association.
Austin, Robert D; Darby, Christopher A
2003-06-01
Few senior executives pay a whole lot of attention to computer security. They either hand off responsibility to their technical people or bring in consultants. But given the stakes involved, an arm's-length approach is extremely unwise. According to industry estimates, security breaches affect 90% of all businesses every year and cost some $17 billion. Fortunately, the authors say, senior executives don't need to learn about the more arcane aspects of their company's IT systems in order to take a hands-on approach. Instead, they should focus on the familiar task of managing risk. Their role should be to assess the business value of their information assets, determine the likelihood that those assets will be compromised, and then tailor a set of risk abatement processes to their company's particular vulnerabilities. This approach, which views computer security as an operational rather than a technical challenge, is akin to a classic quality assurance program in that it attempts to avoid problems rather than fix them and involves all employees, not just IT staffers. The goal is not to make computer systems completely secure--that's impossible--but to reduce the business risk to an acceptable level. This article looks at the types of threats a company is apt to face. It also examines the processes a general manager should spearhead to lessen the likelihood of a successful attack. The authors recommend eight processes in all, ranging from deciding how much protection each digital asset deserves to insisting on secure software to rehearsing a response to a security breach. The important thing to realize, they emphasize, is that decisions about digital security are not much different from other cost-benefit decisions. The tools general managers bring to bear on other areas of the business are good models for what they need to do in this technical space.
Food security in South Africa: a review of national surveys.
Labadarios, Demetre; McHiza, Zandile June-Rose; Steyn, Nelia Patricia; Gericke, Gerda; Maunder, Eleni Maria Winifred; Davids, Yul Derek; Parker, Whadi-ah
2011-12-01
To assess the status of food security--i.e., access to food, food availability and food utilization--in South Africa. A systematic search of national surveys that used the Community Childhood Hunger Identification Project (CCHIP) index to measure food security in South Africa over a period of 10 years (1999-2008) was conducted. Anthropometric data for children aged 1-9 years were used to assess food utilization, and household food inventory data were used to assess food availability. Only three national surveys had used the CCHIP index, namely, the 1999 and 2005 National Food Consumption Surveys (NFCS) and the 2008 South African Social Attitudes Survey. These surveys showed a relatively large decrease in food insecurity between 1999 and 2008. However, the consistent emerging trend indicated that in poorer households women were either feeding their children a poor diet or skipping meals so their children could eat. In terms of food access and availability, the 1999 NFCS showed that households that enjoyed food security consumed an average of 16 different food items over 24 hours, whereas poorer households spent less money on food and consumed fewer than 8 different food items. Moreover, children had low mean scores for dietary diversity (3.58; standard deviation, SD: ± 1.37) and dietary variety (5.52; SD: ± 2.54) scores. In terms of food utilization, the NFCS showed that stunting in children decreased from 21.6% in 1999 to 18% in 2005. The South African government must implement measures to improve the undesirably high level of food insecurity in poorer households.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-05
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70067; File No. SR-NYSEARCA-2013-74] Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Modifying the Content of the NYSE Arca Trades Digital Media Data Feed July 30, 2013. Pursuant to Section 19(b)(1) \\1\\ of the Securities...
Levine, Betty A; Ingeholm, Mary Lou; Prior, Fred; Mun, Seong K; Freedman, Matthew; Weissman, David; Attfield, Michael; Wolfe, Anita; Petsonk, Edward
2009-01-01
To protect the health of active U.S. underground coal miners, the National Institute for Occupational Safety and Health (NIOSH) has a mandate to carry out surveillance for coal workers' pneumoconiosis, commonly known as Black Lung (PHS 2001). This is accomplished by reviewing chest x-ray films obtained from miners at approximately 5-year intervals in approved x-ray acquisition facilities around the country. Currently, digital chest images are not accepted. Because most chest x-rays are now obtained in digital format, NIOSH is redesigning the surveillance program to accept and manage digital x-rays. This paper highlights the functional and security requirements for a digital image management system for a surveillance program. It also identifies the operational differences between a digital imaging surveillance network and a clinical Picture Archiving Communication Systems (PACS) or teleradiology system.
Juffer, Femmie; Struis, Estelle; Werner, Claudia; Bakermans-Kranenburg, Marian J
2017-01-01
Secure attachment relationships are essential for children's current and later development. From attachment theory and research, it can be derived that sensitive parenting is the key to positive parent-child relationships. Is it possible to design effective interventions to enhance sensitive parenting? In this article, we review elements that are crucial for effective attachment-based interventions, and we proceed with illustrations from the Video-feedback Intervention to promote Positive Parenting and Sensitive Discipline (VIPP-SD). We describe how this intervention program was developed, how it has been implemented in practice in different types of families and in daycare settings, and how effective the program is. We conclude that intervention programs like the VIPP-SD could play an important role in the community by serving families in need of parenting support.
Juffer, Femmie; Bakermans-Kranenburg, Marian J; van IJzendoorn, Marinus H
2017-06-01
Video-feedback Intervention to promote Positive Parenting and Sensitive Discipline (VIPP-SD) is a social-learning and attachment-based intervention using video feedback to support sensitive parenting and at the same time setting firm limits. Empirical studies and meta-analyses have shown that sensitive parenting is the key determinant to promote secure child-parent attachment relationships and that adequate parental discipline contributes to fewer behavior problems in children. Building on this evidence, VIPP-SD has been tested in various populations of at-risk parents and vulnerable children (in the age range of zero to six years), as well as in the context of child care. In twelve randomized controlled trials including 1116 parents and caregivers, VIPP-SD proved to be effective in promoting sensitive caregiving, while positive social-emotional child outcomes were also found. Copyright © 2017 Elsevier Ltd. All rights reserved.
ERIC Educational Resources Information Center
Szczerba, Peter
2000-01-01
Explains how integrating information technology can extend the capabilities of school security systems far beyond traditional card access. Use of biometric identification technologies and digitized event recording are explored. (GR)
Steganography and Steganalysis in Digital Images
2012-01-01
Nonetheless, to hide a message in a BMP using this algorithm it would require a large image used as a cover. STEGANOGRAPHY TOOLS There were eight tools in...REPORT Steganography and Steganalysis in Digital Images 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Steganography (from the Greek for "covered writing...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Least Significant Bit ( LSB ), steganography , steganalysis, stegogramme. Dr. Jeff Duffany
Computer Aided Detection of Breast Masses in Digital Tomosynthesis
2008-06-01
the suspicious CAD location were extracted. For the second set, 256x256 ROIs representing the - 8 - summed slab of 5 slices (5 mm) were extracted...region hotelling observer, digital tomosynthesis, multi-slice CAD algorithms, biopsy 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...developing computer-aided detection ( CAD ) tools for mammography. Although these tools have shown promise in identifying calcifications, detecting
1993-06-01
3.2.15.3 ISDN Services over the Telephone Network 3 Integrated Services Digital Network (ISDN) services are subject to the same restrictions as router...to be audited: [SYS$SYSTEM]SYS.EXE, LOGINOUT.EXE, STARTUP.COM, RIGHTSLIST.DAT [SYS$ LIBARY ] I SECURESHR.EXE [SYS$ROOT] SYSEXE.DIR, SYSLIB.DIR...quantification) of the encoded value; ASCII is normally used for asynchronous transmission. compare with digital . ASYNCHRONOUS-Data transmission that is
2009-09-01
Review, 39:962, 1964. [8] D. Chaum . Secret ballot receipts: True voter-verifiable elections. IEEE J. Security and Privacy, pages 38–47, 2004. [9...TCC 2005), pages 363–385, 2005. [10] David Clark, Sebastian Hunt, and Pasquale Malacaria. A static analysis for quantifying in- formation flow in a... David Buckingham, editor, MacArthur Foundation Series on Digital Learning– Youth, Identity, Digital Media Volume, Cambridge, MA, 2007. MIT Press. 11
Distributed Pheromone-Based Swarming Control of Unmanned Air and Ground Vehicles for RSTA
2008-03-20
Forthcoming in Proceedings of SPIE Defense & Security Conference, March 2008, Orlando, FL Distributed Pheromone -Based Swarming Control of Unmanned...describes recent advances in a fully distributed digital pheromone algorithm that has demonstrated its effectiveness in managing the complexity of...onboard digital pheromone responding to the needs of the automatic target recognition algorithms. UAVs and UGVs controlled by the same pheromone algorithm
Biophysics of cochlear implant/MRI interactions emphasizing bone biomechanical properties.
Sonnenburg, Robert E; Wackym, Phillip A; Yoganandan, Narayan; Firszt, Jill B; Prost, Robert W; Pintar, Frank A
2002-10-01
The forces exerted during a 1.5-Tesla MRI evaluation on the internal magnet of a cochlear implant (CI) raise concern about the safety for CI recipients. This study determines the magnitude of force required to fracture the floor of a CI receiver bed. Recessed CI beds were drilled to maximum uniform thinness into formalin-fixed and fresh-frozen human calvaria specimens. A Med-El stainless steel CI template mounted to the piston of an electrohydraulic testing device was used to fracture the floor of the implant beds. Force and displacement were measured as a function of time using a digital data acquisition system. Mean force to first failure, displacement to first failure, and minimum thickness, respectively, were: group 1 (formalin-fixed, 0.3-0.4-mm thick [n = 22]), 34.08 N (8.21-59.64 N, standard deviation [SD] 15.41 N), 1.09 mm (0.40-2.16 mm, SD 0.51 mm), 0.36 mm (0.3-0.4 mm, SD 0.05 mm); group 2 (formalin-fixed, 0.5-0.9 mm thick [n = 21]), 52.82 N (20.28-135.53 N, SD 25.29 N), 1.08 mm (0.50-2.28 mm, SD 0.47 mm), 0.58 mm (0.5-0.9 mm, SD 0.12 mm); group 3 (fresh-frozen [n = 9]), 134.13 N (86.44-190.70 N, SD 34.92 N), 1.96 mm (1.47-2.46 mm, SD 0.35 mm), 0.42 mm (0.3-0.6 mm, SD 0.11 mm). The mean magnitude of force required to fracture the floor of a CI bed is significantly greater than those that are generated when a Med-El Combi 40+, CII Bionic Ear CI, or Nucleus Contour CI is placed into a 1.5-Tesla MRI unit.
Sub-pixel analysis to support graphic security after scanning at low resolution
NASA Astrophysics Data System (ADS)
Haas, Bertrand; Cordery, Robert; Gou, Hongmei; Decker, Steve
2006-02-01
Whether in the domain of audio, video or finance, our world tends to become increasingly digital. However, for diverse reasons, the transition from analog to digital is often much extended in time, and proceeds by long steps (and sometimes never completes). One such step is the conversion of information on analog media to digital information. We focus in this paper on the conversion (scanning) of printed documents to digital images. Analog media have the advantage over digital channels that they can harbor much imperceptible information that can be used for fraud detection and forensic purposes. But this secondary information usually fails to be retrieved during the conversion step. This is particularly relevant since the Check-21 act (Check Clearing for the 21st Century act) became effective in 2004 and allows images of checks to be handled by banks as usual paper checks. We use here this situation of check scanning as our primary benchmark for graphic security features after scanning. We will first present a quick review of the most common graphic security features currently found on checks, with their specific purpose, qualities and disadvantages, and we demonstrate their poor survivability after scanning in the average scanning conditions expected from the Check-21 Act. We will then present a novel method of measurement of distances between and rotations of line elements in a scanned image: Based on an appropriate print model, we refine direct measurements to an accuracy beyond the size of a scanning pixel, so we can then determine expected distances, periodicity, sharpness and print quality of known characters, symbols and other graphic elements in a document image. Finally we will apply our method to fraud detection of documents after gray-scale scanning at 300dpi resolution. We show in particular that alterations on legitimate checks or copies of checks can be successfully detected by measuring with sub-pixel accuracy the irregularities inherently introduced by the illegitimate process.
DOE Office of Scientific and Technical Information (OSTI.GOV)
AISL-CRYPTO is a library of cryptography functions supporting other AISL software. It provides various crypto functions for Common Lisp, including Digital Signature Algorithm, Data Encryption Standard, Secure Hash Algorithm, and public-key cryptography.
18. Interior view of large unoccupied meeting/gathering room looking towards ...
18. Interior view of large unoccupied meeting/gathering room looking towards small stage and opened doorway to exterior vestibule; showing through wall air conditioning unit; north end of east wing on main floor; view to southwest. - Ellsworth Air Force Base, Group Administration & Secure Storage Building, 2372 Westover Avenue, Blackhawk, Meade County, SD
24. Interior view of entrance corridor looking down east corridor; ...
24. Interior view of entrance corridor looking down east corridor; showing unoccupied corner office space and stairs going down to lower floor; center of main section of building on main floor; view to northeast. - Ellsworth Air Force Base, Group Administration & Secure Storage Building, 2372 Westover Avenue, Blackhawk, Meade County, SD
34. Photographic copy of photograph (ca. 1962, original print in ...
34. Photographic copy of photograph (ca. 1962, original print in possession of Army Corps of Engineers, Ft. Belvoir, Virginia) Photographer unknown. View of launch control facility under construction, security gate at left - Ellsworth Air Force Base, Delta Flight, 10 mile radius around Exit 127 off Interstate 90, Interior, Jackson County, SD
Pandemic Influenza: An Analysis of State Preparedness and Response Plans
2007-09-24
RL32752, Continuity of Operations (COOP) in the Executive Branch: Issues in the 109th Congress, by R. Eric Petersen, and White House Homeland Security...23 Holmberg, S.D., Layton , C.M., Ghneim, G.S., and Wagener, D.K., “State Plans for Containment of Pandemic Influenza,” Emerging Infectious Diseases
Work ability and health of security guards at a public University: a cross-sectional study.
Godinho, Marluce Rodrigues; Ferreira, Aldo Pacheco; Greco, Rosangela Maria; Teixeira, Liliane Reis; Teixeira, Maria Teresa Bustamante
2016-01-01
to evaluate the work ability and health status of security guards at a public University. a cross-sectional, descriptive, and analytical study was carried with 119 security guards. The following instruments were used: Work Ability Index (WAI), Patient Health Questionnaire (PHQ-9), International Physical Activity Questionnaire (IPAQ, short), Alcohol Use Disorders Identification Test (AUDIT), Medical Outcomes Study (MOS), and Demand-Control-Support (DCS). Descriptive statistics were used to describe the study samples and the Spearman's coefficient correlation was performed to assess the WAI. Significance level was set at 5%. samples were composed by men; the mean age was 54.9 years (SD=5.7); 80% had partners, and 75% had basic education. The majority (95%) had only one job, the average length of service was 24.8 years (SD=11), ranging from 3 to 43 years. 88.9% worked ≤40 hours and 75% did not work at night shift or rotating shifts. The average score given to work ability was good (40.7 points), with significant correlation to social support at work (p-value=0.002), health conditions (p-value=0.094), and depression symptoms (p-value=0.054). this study showed that many characteristics might affect the work ability scores. Considering the results, we note that healthy life habits and a reorganization of work environments should be encouraged.
Work ability and health of security guards at a public University: a cross-sectional study 1
Godinho, Marluce Rodrigues; Ferreira, Aldo Pacheco; Greco, Rosangela Maria; Teixeira, Liliane Reis; Teixeira, Maria Teresa Bustamante
2016-01-01
Abstract Objective: to evaluate the work ability and health status of security guards at a public University. Methods: a cross-sectional, descriptive, and analytical study was carried with 119 security guards. The following instruments were used: Work Ability Index (WAI), Patient Health Questionnaire (PHQ-9), International Physical Activity Questionnaire (IPAQ, short), Alcohol Use Disorders Identification Test (AUDIT), Medical Outcomes Study (MOS), and Demand-Control-Support (DCS). Descriptive statistics were used to describe the study samples and the Spearman's coefficient correlation was performed to assess the WAI. Significance level was set at 5%. Results: samples were composed by men; the mean age was 54.9 years (SD=5.7); 80% had partners, and 75% had basic education. The majority (95%) had only one job, the average length of service was 24.8 years (SD=11), ranging from 3 to 43 years. 88.9% worked ≤40 hours and 75% did not work at night shift or rotating shifts. The average score given to work ability was good (40.7 points), with significant correlation to social support at work (p-value=0.002), health conditions (p-value=0.094), and depression symptoms (p-value=0.054). Conclusion: this study showed that many characteristics might affect the work ability scores. Considering the results, we note that healthy life habits and a reorganization of work environments should be encouraged. PMID:27463107
Analysis of VIIRS TEB noise using solar diffuser measurements
NASA Astrophysics Data System (ADS)
Choi, Taeyoung; Cao, Changyong; Weng, Fuzhong
2015-09-01
The Soumi-NPP Visible Infrared Imaging Radiometer Suite (VIIRS) was launched on October 28th, 2011 and its Sensor Data Record (SDR) product reached maturity status in March of 2014. Although the VIIRS SDR products are declared at the validated maturity level, there remain issues such as residual stripings in some thermal bands along with the scan direction. These horizontal striping issues in the Thermal Emissive Bands (TEB) were reflected in the sea surface temperature (SST) products. The observed striping magnitude can reach to 0.2 K, especially at the band M14 and M15. As an independent source of calibration, the Solar Diffuser (SD) is utilized in this study. The SD is originally designed for the Reflective Solar Band (RSB), however, it is assumed to be thermally stable at the time of SD observation. For each detector, a linear slope is developed by Integrated Calibration and Validation System (ICVS), which is applied on converting digital number (DN) to radiance unit. After the conversion, detector based noise analyses in VIIRS band M15 and M16 are performed on in-scan and scan-by-scan SD responses. Since SD radiance varies within an orbit, the noise calculation must be derived from the neighborhood Allan deviation. The noise derived Allan deviation shows that detector 1 and 2 in band M15 and detector 9 in band M16 have higher noise content compared to other detectors.
Digital Dimension Disruption: A National Security Enterprise Response
2017-12-21
societal institutions, methods of business, and fundamental ideas about national security. This realignment will, of necessity, change the frameworks...humans did calculations and searched for information. In the past quarter century, human use of computers has changed fundamentally , but com- mon...the nature of data is, itself, undergoing a fundamental change. The terms “bespoke data” (from the British term for cus- tom-tailored) and “by
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-05
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70065; File No. SR-NYSEMKT-2013-64] Self-Regulatory Organizations; NYSE MKT LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Modifying the Content of the NYSE MKT Trades Digital Media Data Feed July 30, 2013. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Ac...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-05
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70066; File No. SR-NYSE-2013-53] Self-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Modifying the Content of the NYSE Trades Digital Media Data Feed July 30, 2013. Pursuant to Section 19(b)(1) \\1\\ of the Securities...
About machine-readable travel documents
NASA Astrophysics Data System (ADS)
Vaudenay, S.; Vuagnoux, M.
2007-07-01
Passports are documents that help immigration officers to identify people. In order to strongly authenticate their data and to automatically identify people, they are now equipped with RFID chips. These contain private information, biometrics, and a digital signature by issuing authorities. Although they substantially increase security at the border controls, they also come with new security and privacy issues. In this paper, we survey existing protocols and their weaknesses.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Hsien-Hsin S
The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniquesmore » and system software for achieving a robust, secure, and reliable computing system toward our goal.« less
[Assessment on ecological security spatial differences of west areas of Liaohe River based on GIS].
Wang, Geng; Wu, Wei
2005-09-01
Ecological security assessment and early warning research have spatiality; non-linearity; randomicity, it is needed to deal with much spatial information. Spatial analysis and data management are advantages of GIS, it can define distribution trend and spatial relations of environmental factors, and show ecological security pattern graphically. The paper discusses the method of ecological security spatial differences of west areas of Liaohe River based on GIS and ecosystem non-health. First, studying on pressure-state-response (P-S-R) assessment indicators system, investigating in person and gathering information; Second, digitizing the river, applying fuzzy AHP to put weight, quantizing and calculating by fuzzy comparing; Last, establishing grid data-base; expounding spatial differences of ecological security by GIS Interpolate and Assembly.
A Chaos MIMO-OFDM Scheme for Mobile Communication with Physical-Layer Security
NASA Astrophysics Data System (ADS)
Okamoto, Eiji
Chaos communications enable a physical-layer security, which can enhance the transmission security in combining with upper-layer encryption techniques, or can omit the upper-layer secure protocol and enlarges the transmission efficiency. However, the chaos communication usually degrades the error rate performance compared to unencrypted digital modulations. To achieve both physical-layer security and channel coding gain, we have proposed a chaos multiple-input multiple-output (MIMO) scheme in which a rate-one chaos convolution is applied to MIMO multiplexing. However, in the conventional study only flat fading is considered. To apply this scheme to practical mobile environments, i.e., multipath fading channels, we propose a chaos MIMO-orthogonal frequency division multi-plexing (OFDM) scheme and show its effectiveness through computer simulations.
SSC San Diego Command History Calendar Year 2006
2007-03-01
Year: Dr. Visarath In, Yong Kho, Dr. Adi Bulsara, Dr. Joseph Neff, Dr. Brian Meadows, “Self-Induced Oscillations in Coupled Fluxgate Magnetometer : A... digital assistant. The USCG’s Underwater Port Security Working Group reviews ongoing efforts and provides direction to the USCG and the Department...provides the data link gateway as the JDN communications equipment that is used in MDSE to exchange Tactical Digital Information Link (TADIL) J, Satellite
The U.S. Combat and Tactical Wheeled Vehicle Fleets: Issues and Suggestions for Congress
2011-01-01
nonlinear, irregular distribution of brigade and battalion formations means that there is no longer a relatively more secure rear area, an...enhancement package, according to civilian sources, included depleted- uranium armor, digital command- and-control architecture, digital color terrain maps...system robustness and flexibility, and (3) more often than not, the preparation of the analysis (e.g., terrain formatting , laydown of forces, timing of
Paris, J K; Bennett, A D; Dodkin, S J; Gunn-Moore, D A
2012-05-05
Urine specific gravity (USG) is used clinically as a measure of urine concentration, and is routinely assessed by refractometry. A comparison between optical analogue and digital refractometers for evaluation of canine urine has not been reported. The aim of this study was to compare a digital and an optical analogue hand-held refractometer for the measurement of canine USG, and to assess correlation with urine osmolality. Prospective study. Free-catch urine samples were collected from 285 hospitalised adult dogs, and paired USG readings were obtained with a digital and an optical analogue refractometer. In 50 dogs, urine osmolality was also measured using a freezing point depression osmometer. There was a small but statistically significant difference between the two refractometers (P<0.001), with the optical analogue refractometer reading higher than the digital refractometer (mean difference 0.0006, sd 0.0012). Paired refractometer measurements varied by <0.002 in 91.5 per cent of cases. The optical analogue and digital refractometer readings showed excellent correlation with osmolality (r=0.980 and r=0.977, respectively, P<0.001 in both cases). Despite statistical significance, the difference between the two refractometers is unlikely to be clinically significant. Both instruments provide an accurate assessment of USG in dogs.
Is There a Rationale behind Pharmacotherapy in Idiopathic Gynecomastia?
Kasielska-Trojan, Anna; Danilewicz, Marian; Antoszewski, Bogusław
2018-05-17
The aim of this research was to analyze digit ratio in relation to estrogen receptor (ER) and progesterone receptor (PR) expression and to verify digit ratio (2D: 4D) as a marker of ER and PR overexpression in the male breast. This study included 35 patients who underwent breast reduction due to the idiopathic form of gynecomastia. The average age of the studied individuals was 25.7 years (SD = 7.8). ER and PR expression was detected in breasts, and digit ratios were calculated in patients with idiopathic gynecomastia. ER expression did not correlate with the right (p = 0.51) and left 2D: 4D (p = 0.97). Also, there was no correlation between PR expression and 2D: 4D. A lack of correlation between these variables may result from the fact that the analyzed group of men with idiopathic gynecomastia was small in number, but at the same time, it appeared to be homogenous in these aspects (positive ER and/or PR expression and high digit ratio). High digit ratio in men with gynecomastia may tend to be a marker of overexpression of ER and PR. This may justify an early use of tamoxifen in men with gynecomastia and a high digit ratio. © 2018 S. Karger AG, Basel.
M'Kaibi, Florence K; Steyn, Nelia P; Ochola, Sophie; Du Plessis, Lisanne
2015-04-25
Kenya has a high prevalence of underweight and stunting in children. It is believed that both agricultural biodiversity and seasonal rainfall influences household food security and dietary intake. In the present study we aimed to study the effects of agricultural biodiversity and seasonal rains on dietary adequacy and household food security of preschool Kenyan children, and to identify significant relationships between these variables. Two cross-sectional studies were undertaken in resource-poor households in rural Kenya approximately 6 months apart. Interviews were done with mothers/caregivers to collect data from randomly selected households (N = 525). A repeated 24-hour recall was used to calculate dietary intake in each phase while household food security was measured using the Household Food Insecurity Access Scale (HFIAS). A nutrient adequacy ratio (NAR) was calculated for each nutrient as the percent of the nutrient meeting the recommended nutrient intake (RNI) for that nutrient. A mean adequacy ratio (MAR) was calculated as the mean of the NARs. Agricultural biodiversity was calculated for each household by counting the number of different crops and animals eaten either from domestic sources or from the wild. Dietary intake was low with the majority of households not meeting the RNIs for many nutrients. However intake of energy (p < 0.001), protein (p < 0.01), iron (p < 0.01), zinc (p < 0.05), calcium (p < 0.05), and folate (p < 0.01) improved significantly from the dry to the rainy season. Household food security also increased significantly (p < 0.001) from the dry (13.1 SD 6.91) to the rainy season (10.9 SD 7.42). Agricultural biodiversity was low with a total of 26 items; 23 domesticated and 3 from the natural habitat. Agricultural biodiversity was positively and significantly related to all NARs (Spearman, p < 0.05) and MAR (Spearman, p < 0.001) indicating a significant positive relationship between agricultural biodiversity of the household with dietary adequacy of the child's diet. Important significant relationships were found in this study: between agricultural biodiversity and dietary adequacy; between agricultural biodiversity and household food security and between dietary adequacy and household food security. Furthermore, the effect of seasonality on household food security and nutrient intake was illustrated.
Secure voice for mobile satellite applications
NASA Technical Reports Server (NTRS)
Vaisnys, Arvydas; Berner, Jeff
1990-01-01
The initial system studies are described which were performed at JPL on secure voice for mobile satellite applications. Some options are examined for adapting existing Secure Telephone Unit III (STU-III) secure telephone equipment for use over a digital mobile satellite link, as well as for the evolution of a dedicated secure voice mobile earth terminal (MET). The work has included some lab and field testing of prototype equipment. The work is part of an ongoing study at JPL for the National Communications System (NCS) on the use of mobile satellites for emergency communications. The purpose of the overall task is to identify and enable the technologies which will allow the NCS to use mobile satellite services for its National Security Emergency Preparedness (NSEP) communications needs. Various other government agencies will also contribute to a mobile satellite user base, and for some of these, secure communications will be an essential feature.
DOE Office of Scientific and Technical Information (OSTI.GOV)
McDonald, K; Curran, B
I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less
Food insecurity and cognitive function in Puerto Rican adults123
Gao, Xiang; Scott, Tammy; Falcon, Luis M; Wilde, Parke E; Tucker, Katherine L
2009-01-01
Background: Food insecurity is associated with nutrient inadequacy and a variety of unfavorable health outcomes. However, little is known about whether food security is associated with lower cognitive function in the elderly. Objective: We investigated the prevalence of food insecurity in a representative sample of 1358 Puerto Ricans aged 45–75 y living in Massachusetts in relation to cognitive function performances. Design: Food security was assessed with the US Household Food Security Scale. Cognitive function was measured to capture general cognition with a battery of 7 tests: Mini-Mental State Examination (MMSE), word list learning (verbal memory), digit span (attention), clock drawing and figure copying (visual-spatial ability), and Stroop and verbal fluency tests (fluency executive functioning). Results: The overall prevalence of food insecurity during the past 12 mo was 12.1%; 6.1% of the subjects reported very low food security. Food insecurity was inversely associated with global cognitive performance, as assessed by the MMSE score. The adjusted difference in the MMSE score was −0.90 (95% CI: −1.6, −0.19; P for trend = 0.003) for a comparison of participants with very low food security with those who were food secure, after adjustment for age, smoking, education, poverty status, income, acculturation, plasma homocysteine, alcohol, diabetes, and hypertension. Food insecurity was significantly associated with lower scores for word-list learning, percentage retention, letter fluency, and digit span backward tests. Conclusions: Very low food security was prevalent among the study subjects and was associated with lower cognitive performance. Further studies, both observational and experimental, are warranted to clarify the direction of causality in this association. PMID:19225117
ERIC Educational Resources Information Center
Padilla-Walker, Laura M.; Coyne, Sarah M.; Fraser, Ashley M.; Dyer, W. Justin; Yorgason, Jeremy B.
2012-01-01
The current study examined how parents' use of restrictive and active monitoring and deference changed over three years, and examined both adolescent and parent characteristics as predictors of initial levels of media monitoring, as well as change in media monitoring. Participants included 276 mother-child dyads (M age of child = 12.08, SD = 0.63,…
Clinical evaluation of watermarked medical images.
Zain, Jasni M; Fauzi, Abdul M; Aziz, Azian A
2006-01-01
Digital watermarking medical images provides security to the images. The purpose of this study was to see whether digitally watermarked images changed clinical diagnoses when assessed by radiologists. We embedded 256 bits watermark to various medical images in the region of non-interest (RONI) and 480K bits in both region of interest (ROI) and RONI. Our results showed that watermarking medical images did not alter clinical diagnoses. In addition, there was no difference in image quality when visually assessed by the medical radiologists. We therefore concluded that digital watermarking medical images were safe in terms of preserving image quality for clinical purposes.
Wiegratz, Inka; Elliesen, Jörg; Paoletti, Anna Maria; Walzer, Anja; Kirsch, Bodo
2015-01-01
Objective To evaluate the effect of a digital dispenser’s acoustic alarm function on adherence to ethinylestradiol (EE) 20 μg/drospirenone 3 mg in a flexible extended regimen (EE/drospirenoneFlex) among women in five European countries (France, Germany, Italy, Spain, UK) seeking oral contraception. Study design Randomized, parallel-group open-label study. Methods Women aged 18–35 years received EE/drospirenoneFlex administered in a regimen with cycle lengths of their choice with the aid of a digital pill dispenser over 1 year. In group A (N=250), the dispenser’s acoustic alarm was activated (ie, acoustic alarm + visual reminder). In group B (N=249), the acoustic alarm was deactivated (ie, visual reminder only). In addition, the women recorded pill intake daily in diary cards. The primary efficacy variable was the mean delay of daily pill release after the dispenser reminded the woman to take a pill (reference time). Secondary efficacy variables included number of missed pills, contraceptive efficacy, bleeding pattern, tolerability, and user satisfaction. Results Dispenser data showed a mean (standard deviation [SD]) daily delay in pill release of 88 (126) minutes in group A vs 178 (140) minutes in group B (P<0.0001). Median (lower quartile, Q1; upper quartile, Q3) number of missed pills was 0 (0; 1) in group A vs 4 (1; 9) in group B (P<0.0001). Diary card results revealed similar trends; however, underreporting of missed pills was evident in both groups. No pregnancies were reported during 424 women-years of exposure. Across the two groups, the mean (SD) EE/drospirenoneFlex cycle length was 51.0 (31.8) days with strong regional differences, and the mean (SD) number of bleeding/spotting days was 50.4 (33.0) days. EE/drospirenoneFlex was well tolerated, and 80% of women were satisfied with treatment. Conclusion The dispenser’s activated acoustic alarm improved adherence with daily tablet intake of EE/drospirenoneFlex, reducing missed pills. EE/drospirenoneFlex provided effective contraception and a good tolerability profile. PMID:25609999
NASA Astrophysics Data System (ADS)
Asal, F. F.
2012-07-01
Digital elevation data obtained from different Engineering Surveying techniques is utilized in generating Digital Elevation Model (DEM), which is employed in many Engineering and Environmental applications. This data is usually in discrete point format making it necessary to utilize an interpolation approach for the creation of DEM. Quality assessment of the DEM is a vital issue controlling its use in different applications; however this assessment relies heavily on statistical methods with neglecting the visual methods. The research applies visual analysis investigation on DEMs generated using IDW interpolator of varying powers in order to examine their potential in the assessment of the effects of the variation of the IDW power on the quality of the DEMs. Real elevation data has been collected from field using total station instrument in a corrugated terrain. DEMs have been generated from the data at a unified cell size using IDW interpolator with power values ranging from one to ten. Visual analysis has been undertaken using 2D and 3D views of the DEM; in addition, statistical analysis has been performed for assessment of the validity of the visual techniques in doing such analysis. Visual analysis has shown that smoothing of the DEM decreases with the increase in the power value till the power of four; however, increasing the power more than four does not leave noticeable changes on 2D and 3D views of the DEM. The statistical analysis has supported these results where the value of the Standard Deviation (SD) of the DEM has increased with increasing the power. More specifically, changing the power from one to two has produced 36% of the total increase (the increase in SD due to changing the power from one to ten) in SD and changing to the powers of three and four has given 60% and 75% respectively. This refers to decrease in DEM smoothing with the increase in the power of the IDW. The study also has shown that applying visual methods supported by statistical analysis has proven good potential in the DEM quality assessment.
Ruhl, Holly; Dolan, Elaine A.; Buhrmester, Duane
2014-01-01
This longitudinal study investigated how attachment with mothers and fathers changes during adolescence, and how gender and parent-child relationship experiences are associated with attachment trajectories. The relative importance of specific positive and negative relationship experiences on attachment trajectories was also examined. An initial sample of 223 adolescents reported on relationship experiences and attachment avoidance and anxiety with mothers and fathers in grades 6, 8, 10, and 12 (final N=110; Mage=11.90 years at onset, SD=.43). Mothers and fathers reported on relationship experiences with adolescents. Hierarchical linear modeling showed that security with parents increased during adolescence. Positive relationship experiences (companionship, satisfaction, approval, support) predicted increases in security and negative experiences (pressure, criticism) predicted decreases in security. Females reported less avoidance than males. PMID:26347590
Realising the Potential of Serenity in Emerging AmI Ecosystems:Implications and Challenges
NASA Astrophysics Data System (ADS)
Armenteros, Álvaro; García, Laura; Muñoz, Antonio; Maña, Antonio
In this chapter we describe the potential of SERENITY in Ambient Intelligence (AmI) Ecosystems. As a proof of concept, we describe the implementation of a prototype based on the application of the SERENITY model (including processes, artefacts and tools) to an industrial AmI scenario. A complete description of this prototype, along with all Security and Dependability (S&D) artefacts used is provided in this chapter. Besides, the chapter also provides a complete description of one of the S&D Patterns used in the prototype, in order both, to give a global view of SERENITY and to provide useful details about the realization of this scenario.
SERENITY in e-Business and Smart Item Scenarios
NASA Astrophysics Data System (ADS)
Benameur, Azzedine; Khoury, Paul El; Seguran, Magali; Sinha, Smriti Kumar
SERENITY Artefacts, like Class, Patterns, Implementations and Executable Components for Security & Dependability (S&D) in addition to Serenity Runtime Framework (SRF) are discussed in previous chapters. How to integrate these artefacts with applications in Serenity approach is discussed here with two scenarios. The e-Business scenario is a standard loan origination process in a bank. The Smart Item scenario is an Ambient intelligence case study where we take advantage of Smart Items to provide an electronic healthcare infrastructure for remote healthcare assistance. In both cases, we detail how the prototype implementations of the scenarios select proper executable components through Serenity Runtime Framework and then demonstrate how these executable components of the S&D Patterns are deployed.
Security and Dependability Solutions for Networks and Devices
NASA Astrophysics Data System (ADS)
Gücrgens, Sigrid; Fuchs, Andreas
In this chapter we give an overview over the denotation of the SERENITY artefacts S&D Classes, Patterns and Implementations in the context of networks and devices. In order to demonstrate their necessity we sketch an example for confidential and authentic communication and storage that utilizes a trusted platform module, and model the relevant pattern. We then dissociate solutions for network and device related S&D requirements from those targeting the context of organizational or workflow and web services based solutions. Then we give a summary of the broad field of application for network and device solutions. Finally we clarify the meaning and interaction between classes, patterns and implementations by giving some concrete examples.
Security Assessment of Cyberphysical Digital Microfluidic Biochips.
Ali, Sk Subidh; Ibrahim, Mohamed; Sinanoglu, Ozgur; Chakrabarty, Krishnendu; Karri, Ramesh
2016-01-01
A digital microfluidic biochip (DMFB) is an emerging technology that enables miniaturized analysis systems for point-of-care clinical diagnostics, DNA sequencing, and environmental monitoring. A DMFB reduces the rate of sample and reagent consumption, and automates the analysis of assays. In this paper, we provide the first assessment of the security vulnerabilities of DMFBs. We identify result-manipulation attacks on a DMFB that maliciously alter the assay outcomes. Two practical result-manipulation attacks are shown on a DMFB platform performing enzymatic glucose assay on serum. In the first attack, the attacker adjusts the concentration of the glucose sample and thereby modifies the final result. In the second attack, the attacker tampers with the calibration curve of the assay operation. We then identify denial-of-service attacks, where the attacker can disrupt the assay operation by tampering either with the droplet-routing algorithm or with the actuation sequence. We demonstrate these attacks using a digital microfluidic synthesis simulator. The results show that the attacks are easy to implement and hard to detect. Therefore, this work highlights the need for effective protections against malicious modifications in DMFBs.
A three-dimensional evaluation of a laser scanner and a touch-probe scanner.
Persson, Anna; Andersson, Matts; Oden, Agneta; Sandborgh-Englund, Gunilla
2006-03-01
The fit of a dental restoration depends on quality throughout the entire manufacturing process. There is difficulty in assessing the surface topography of an object with a complex form, such as teeth, since there is no exact reference form. The purpose of this study was to determine the repeatability and relative accuracy of 2 dental surface digitization devices. A computer-aided design (CAD) technique was used for evaluation to calculate and present the deviations 3-dimensionally. Ten dies of teeth prepared for complete crowns were fabricated in presintered yttria-stabilized tetragonal zirconia (Y-TZP). The surfaces were digitized 3 times each with an optical or mechanical digitizer. The number of points in the point clouds from each reading were calculated and used as the CAD reference model (CRM). Alignments were performed by registration software that works by minimizing a distance criterion. In color-difference maps, the distribution of the discrepancies between the surfaces in the CRM and the 3-dimensional surface models was identified and located. The repeatability of both scanners was within 10 microm, based on SD and absolute mean values. The qualitative evaluation resulted in an even distribution of the deviations in the optical digitizer, whereas the dominating part of the surfaces in the mechanical digitizer showed no deviations. The relative accuracy of the 2 surface digitization devices was within +/- 6 microm, based on median values. The repeatability of the optical digitizer was comparable with the mechanical digitization device, and the relative accuracy was similar.
2016-10-01
Program (ATP) Quality MS2 coat protein (MS2CP) Enzyme-linked immunosorbent assay ( ELISA ) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...3 2.6 Thermal Stress Test............................................................................................4 2.7 ELISA ...7 3.4 DSC Results .....................................................................................................10 3.5 ELISA
Food security in South Africa: a review of national surveys
Labadarios, Demetre; Steyn, Nelia Patricia; Gericke, Gerda; Maunder, Eleni Maria Winifred; Davids, Yul Derek; Parker, Whadi-ah
2011-01-01
Abstract Objective To assess the status of food security – i.e. access to food, food availability and food utilization – in South Africa. Methods A systematic search of national surveys that used the Community Childhood Hunger Identification Project (CCHIP) index to measure food security in South Africa over a period of 10 years (1999–2008) was conducted. Anthropometric data for children aged 1–9 years were used to assess food utilization, and household food inventory data were used to assess food availability. Findings Only three national surveys had used the CCHIP index, namely, the 1999 and 2005 National Food Consumption Surveys (NFCS) and the 2008 South African Social Attitudes Survey. These surveys showed a relatively large decrease in food insecurity between 1999 and 2008. However, the consistent emerging trend indicated that in poorer households women were either feeding their children a poor diet or skipping meals so their children could eat. In terms of food access and availability, the 1999 NFCS showed that households that enjoyed food security consumed an average of 16 different food items over 24 hours, whereas poorer households spent less money on food and consumed fewer than 8 different food items. Moreover, children had low mean scores for dietary diversity (3.58; standard deviation, SD: ± 1.37) and dietary variety (5.52; SD: ± 2.54) scores. In terms of food utilization, the NFCS showed that stunting in children decreased from 21.6% in 1999 to 18% in 2005. Conclusion The South African government must implement measures to improve the undesirably high level of food insecurity in poorer households. PMID:22271946
32 CFR 236.5 - Cyber security information sharing.
Code of Federal Regulations, 2014 CFR
2014-07-01
... forensics laboratory at DC3, which implements specialized handling procedures to maintain its accreditation as a digital and multimedia forensics laboratory. DC3 will maintain, control, and dispose of all...
Multiprime Blum-Blum-Shub Pseudorandom Number Generator
2016-09-01
Cryptography , National Institute of Standards and Technology Tests 15. NUMBER OF PAGES 83 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18...1: Introduction Cryptography is a part of our daily lives. Many digital communications require secrecy and authentication over open channels such as...security, of which cryptography is an intrinsic part. Encryption is the process of transforming data, in the form of plaintext, into ciphertext using a
Election Verifiability: Cryptographic Definitions and an Analysis of Helios and JCJ
2015-04-01
anonymous credentials. In CSF’14: 27th Computer Security Foundations Symposium. IEEE Computer Society, 2014. To appear. [22] David Chaum . Untraceable...electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84–88, 1981. [23] David Chaum . Secret-ballot receipts...True voter-verifiable elections. IEEE Security and Privacy, 2(1):38–47, 2004. [24] David Chaum , Richard Carback, Jeremy Clark, Aleksander Essex, Stefan
Lincoln Laboratory Journal. Volume 22, Number 1, 2016
2016-06-09
needs cyber ranges and other infrastructure to conduct scal- able, repeatable, scientific, realistic and inexpensive testing, training, and mission...support this mission, infrastructure is being upgraded to make it more efficient and secure. In “Secur- ing the U.S. Transportation Command,” Jeff...using the Electronic Key Management System (EKMS) or over a digital network by using the Key Manage- ment Infrastructure (KMI). The units must then
Balancing Social Media with Operations Security (OPSEC) in the 21st Century
2010-05-03
anticipated since the inception of digital media and the World Wide Web. Military personnel are equally influenced by social media and social ...FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Balancing Social Media with Operations Security (OPSEC) in the...necessarily endorsed by the NWC or the Department of the Navy. 14. ABSTRACT The use of social media and networking sites like Facebook, MySpace, and
Acquisition of a High Performance Computing Instrument for Big Data Research and Education
2015-12-03
Security and Privacy , University of Texas at Dallas, TX, September 16-17, 2014. • Chopade, P., Zhan, J., Community Detection in Large Scale Big Data...Security and Privacy in Communication Networks, Beijing, China, September 24-26, 2014. • Pravin Chopade, Kenneth Flurchick, Justin Zhan and Marwan...Balkirat Kaur, Malcolm Blow, and Justin Zhan, Digital Image Authentication in Social Media, The Sixth ASE International Conference on Privacy
DOE Office of Scientific and Technical Information (OSTI.GOV)
McIntosh, Alyson; Shoushtari, Asal N.; Benedict, Stanley H.
Purpose: Voluntary deep inhalation breath hold (VDIBH) reduces heart dose during left breast irradiation. We present results of the first study performed to quantify reproducibility of breath hold using bony anatomy, heart position, and heart dose for VDIBH patients at treatment table. Methods and Materials: Data from 10 left breast cancer patients undergoing VDIBH whole-breast irradiation were analyzed. Two computed tomography (CT) scans, free breathing (FB) and VDIBH, were acquired to compare dose to critical structures. Pretreatment weekly kV orthogonal images and tangential ports were acquired. The displacement difference from spinal cord to sternum across the isocenter between coregistered planningmore » Digitally Reconstructed Radiographs (DRRs) and kV imaging of bony thorax is a measure of breath hold reproducibility. The difference between bony coregistration and heart coregistration was the measured heart shift if the patient is aligned to bony anatomy. Results: Percentage of dose reductions from FB to VDIBH: mean heart dose (48%, SD 19%, p = 0.002), mean LAD dose (43%, SD 19%, p = 0.008), and maximum left anterior descending (LAD) dose (60%, SD 22%, p = 0.008). Average breath hold reproducibility using bony anatomy across the isocenter along the anteroposterior (AP) plane from planning to treatment is 1 (range, 0-3; SD, 1) mm. Average heart shifts with respect to bony anatomy between different breath holds are 2 {+-} 3 mm inferior, 1 {+-} 2 mm right, and 1 {+-} 3 mm posterior. Percentage dose changes from planning to delivery: mean heart dose (7%, SD 6%); mean LAD dose, ((9%, SD 7%)S, and maximum LAD dose, (11%, SD 11%) SD 11%, p = 0.008). Conclusion: We observed excellent three-dimensional bony registration between planning and pretreatment imaging. Reduced delivered dose to heart and LAD is maintained throughout VDIBH treatment.« less
Digital cinema video compression
NASA Astrophysics Data System (ADS)
Husak, Walter
2003-05-01
The Motion Picture Industry began a transition from film based distribution and projection to digital distribution and projection several years ago. Digital delivery and presentation offers the prospect to increase the quality of the theatrical experience for the audience, reduce distribution costs to the distributors, and create new business opportunities for the theater owners and the studios. Digital Cinema also presents an opportunity to provide increased flexibility and security of the movies for the content owners and the theater operators. Distribution of content via electronic means to theaters is unlike any of the traditional applications for video compression. The transition from film-based media to electronic media represents a paradigm shift in video compression techniques and applications that will be discussed in this paper.
A model for the distribution of watermarked digital content on mobile networks
NASA Astrophysics Data System (ADS)
Frattolillo, Franco; D'Onofrio, Salvatore
2006-10-01
Although digital watermarking can be considered one of the key technologies to implement the copyright protection of digital contents distributed on the Internet, most of the content distribution models based on watermarking protocols proposed in literature have been purposely designed for fixed networks and cannot be easily adapted to mobile networks. On the contrary, the use of mobile devices currently enables new types of services and business models, and this makes the development of new content distribution models for mobile environments strategic in the current scenario of the Internet. This paper presents and discusses a distribution model of watermarked digital contents for such environments able to achieve a trade-off between the needs of efficiency and security.
Digital Mental Health - Innovations in Consumer Driven Care.
Ackerman, Mary Lou; Virani, Tazim; Billings, Barry
2017-01-01
Barriers such as stigma and access issues prevent 60% of Canadians with mental health issues from seeking help. Saint Elizabeth Health Care's IntelligentCare™ Platform supports a range of digital health solutions for holistic health including three specific innovations: a secure social networking tool, an artificial intelligence-driven assistant that uses conversational cognitive behaviour therapy techniques, and a mobile mindfulness meditation application that generates personalized meditation suggestions. People use these self-help tools to cope with their mental health challenges. Healthcare providers are encouraged to explore the benefits and drawbacks of digital solutions for mental health, and consider the new skills, ethical implications and research opportunities that are needed when supporting patients who use these digital tools. © 2017 Longwoods Publishing.
NASA Astrophysics Data System (ADS)
Ribeiro, Luís S.; Costa, Carlos; Oliveira, José Luís
2010-03-01
Diagnostic tools supported by digital medical images have increasingly become an essential aid to medical decisions. However, despite its growing importance, Picture Archiving and Communication Systems (PACS) are typically oriented to support a single healthcare institution, and the sharing of medical data across institutions is still a difficult process. This paper describes a proposal to publish and control Digital Imaging Communications in Medicine (DICOM) services in a wide domain composed of several healthcare institutions. The system creates virtual bridges between intranets enabling the exchange, search and store of the medical data within the wide domain. The service provider publishes the DICOM services following a token-based strategy. The token advertisements are public and known by all system users. However, access to the DICOM service is controlled through a role association between an access key and the service. Furthermore, in medical diagnoses, time is a crucial factor. Therefore, our system is a turnkey solution, capable of exchanging medical data across firewalls and Network Address Translation (NAT), avoiding bureaucratic issues with local network security. Security is also an important concern - in any transmission across different domains, data is encrypted by Transport Layer Security (TLS).
New approach for segmentation and recognition of handwritten numeral strings
NASA Astrophysics Data System (ADS)
Sadri, Javad; Suen, Ching Y.; Bui, Tien D.
2004-12-01
In this paper, we propose a new system for segmentation and recognition of unconstrained handwritten numeral strings. The system uses a combination of foreground and background features for segmentation of touching digits. The method introduces new algorithms for traversing the top/bottom-foreground-skeletons of the touched digits, and for finding feature points on these skeletons, and matching them to build all the segmentation paths. For the first time a genetic representation is used to show all the segmentation hypotheses. Our genetic algorithm tries to search and evolve the population of candidate segmentations and finds the one with the highest confidence for its segmentation and recognition. We have also used a new method for feature extraction which lowers the variations in the shapes of the digits, and then a MLP neural network is utilized to produce the labels and confidence values for those digits. The NIST SD19 and CENPARMI databases are used for evaluating the system. Our system can get a correct segmentation-recognition rate of 96.07% with rejection rate of 2.61% which compares favorably with those that exist in the literature.
New approach for segmentation and recognition of handwritten numeral strings
NASA Astrophysics Data System (ADS)
Sadri, Javad; Suen, Ching Y.; Bui, Tien D.
2005-01-01
In this paper, we propose a new system for segmentation and recognition of unconstrained handwritten numeral strings. The system uses a combination of foreground and background features for segmentation of touching digits. The method introduces new algorithms for traversing the top/bottom-foreground-skeletons of the touched digits, and for finding feature points on these skeletons, and matching them to build all the segmentation paths. For the first time a genetic representation is used to show all the segmentation hypotheses. Our genetic algorithm tries to search and evolve the population of candidate segmentations and finds the one with the highest confidence for its segmentation and recognition. We have also used a new method for feature extraction which lowers the variations in the shapes of the digits, and then a MLP neural network is utilized to produce the labels and confidence values for those digits. The NIST SD19 and CENPARMI databases are used for evaluating the system. Our system can get a correct segmentation-recognition rate of 96.07% with rejection rate of 2.61% which compares favorably with those that exist in the literature.
An image encryption algorithm based on 3D cellular automata and chaotic maps
NASA Astrophysics Data System (ADS)
Del Rey, A. Martín; Sánchez, G. Rodríguez
2015-05-01
A novel encryption algorithm to cipher digital images is presented in this work. The digital image is rendering into a three-dimensional (3D) lattice and the protocol consists of two phases: the confusion phase where 24 chaotic Cat maps are applied and the diffusion phase where a 3D cellular automata is evolved. The encryption method is shown to be secure against the most important cryptanalytic attacks.
2016-12-01
digital media , art, multiculturalism, communication flow theory 15. NUMBER OF PAGES 143 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT...and Chad as a Case Study,” 59. 41 methods), and mass communication ( communication to a large audience via mass media ).91 According to a 2007...proliferation of digital technology for at least the foreseeable future. Early communication theorists considered mass- media communication flow to be a
32 CFR 236.5 - Cyber security information sharing.
Code of Federal Regulations, 2013 CFR
2013-07-01
... multimedia forensics laboratory at DC3, which implements specialized handling procedures to maintain its accreditation as a digital and multimedia forensics laboratory. DC3 will maintain, control, and dispose of all...
32 CFR 236.5 - Cyber security information sharing.
Code of Federal Regulations, 2012 CFR
2012-07-01
... multimedia forensics laboratory at DC3, which implements specialized handling procedures to maintain its accreditation as a digital and multimedia forensics laboratory. DC3 will maintain, control, and dispose of all...
[Security aspects on the Internet].
Seibel, R M; Kocher, K; Landsberg, P
2000-04-01
Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet.
Martinez, R; Cole, C; Rozenblit, J; Cook, J F; Chacko, A K
2000-05-01
The US Army Great Plains Regional Medical Command (GPRMC) has a requirement to conform to Department of Defense (DoD) and Army security policies for the Virtual Radiology Environment (VRE) Project. Within the DoD, security policy is defined as the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. Security policy in the DoD is described by the Trusted Computer System Evaluation Criteria (TCSEC), Army Regulation (AR) 380-19, Defense Information Infrastructure Common Operating Environment (DII COE), Military Health Services System Automated Information Systems Security Policy Manual, and National Computer Security Center-TG-005, "Trusted Network Interpretation." These documents were used to develop a security policy that defines information protection requirements that are made with respect to those laws, rules, and practices that are required to protect the information stored and processed in the VRE Project. The goal of the security policy is to provide for a C2-level of information protection while also satisfying the functional needs of the GPRMC's user community. This report summarizes the security policy for the VRE and defines the CORBA security services that satisfy the policy. In the VRE, the information to be protected is embedded into three major information components: (1) Patient information consists of Digital Imaging and Communications in Medicine (DICOM)-formatted fields. The patient information resides in the digital imaging network picture archiving and communication system (DIN-PACS) networks in the database archive systems and includes (a) patient demographics; (b) patient images from x-ray, computed tomography (CT), magnetic resonance imaging (MRI), and ultrasound (US); and (c) prior patient images and related patient history. (2) Meta-Manager information to be protected consists of several data objects. This information is distributed to the Meta-Manager nodes and includes (a) radiologist schedules; (b) modality worklists; (c) routed case information; (d) DIN-PACS and Composite Health Care system (CHCS) messages, and Meta-Manager administrative and security information; and (e) patient case information. (3) Access control and communications security is required in the VRE to control who uses the VRE and Meta-Manager facilities and to secure the messages between VRE components. The CORBA Security Service Specification version 1.5 is designed to allow up to TCSEC's B2-level security for distributed objects. The CORBA Security Service Specification defines the functionality of several security features: identification and authentication, authorization and access control, security auditing, communication security, nonrepudiation, and security administration. This report describes the enhanced security features for the VRE and their implementation using commercial CORBA Security Service software products.
Prioritizing Measures of Digital Patient Engagement: A Delphi Expert Panel Study
2017-01-01
Background Establishing a validated scale of patient engagement through use of information technology (ie, digital patient engagement) is the first step to understanding its role in health and health care quality, outcomes, and efficient implementation by health care providers and systems. Objective The aim of this study was to develop and prioritize measures of digital patient engagement based on patients’ use of the US Department of Veterans Affairs (VA)’s MyHealtheVet (MHV) portal, focusing on the MHV/Blue Button and Secure Messaging functions. Methods We aligned two models from the information systems and organizational behavior literatures to create a theory-based model of digital patient engagement. On the basis of this model, we conducted ten key informant interviews to identify potential measures from existing VA studies and consolidated the measures. We then conducted three rounds of modified Delphi rating by 12 national eHealth experts via Web-based surveys to prioritize the measures. Results All 12 experts completed the study’s three rounds of modified Delphi ratings, resulting in two sets of final candidate measures representing digital patient engagement for Secure Messaging (58 measures) and MHV/Blue Button (71 measures). These measure sets map to Donabedian’s three types of quality measures: (1) antecedents (eg, patient demographics); (2) processes (eg, a novel measure of Web-based care quality); and (3) outcomes (eg, patient engagement). Conclusions This national expert panel study using a modified Delphi technique prioritized candidate measures to assess digital patient engagement through patients’ use of VA’s My HealtheVet portal. The process yielded two robust measures sets prepared for future piloting and validation in surveys among Veterans. PMID:28550008
Prioritizing Measures of Digital Patient Engagement: A Delphi Expert Panel Study.
Garvin, Lynn A; Simon, Steven R
2017-05-26
Establishing a validated scale of patient engagement through use of information technology (ie, digital patient engagement) is the first step to understanding its role in health and health care quality, outcomes, and efficient implementation by health care providers and systems. The aim of this study was to develop and prioritize measures of digital patient engagement based on patients' use of the US Department of Veterans Affairs (VA)'s MyHealtheVet (MHV) portal, focusing on the MHV/Blue Button and Secure Messaging functions. We aligned two models from the information systems and organizational behavior literatures to create a theory-based model of digital patient engagement. On the basis of this model, we conducted ten key informant interviews to identify potential measures from existing VA studies and consolidated the measures. We then conducted three rounds of modified Delphi rating by 12 national eHealth experts via Web-based surveys to prioritize the measures. All 12 experts completed the study's three rounds of modified Delphi ratings, resulting in two sets of final candidate measures representing digital patient engagement for Secure Messaging (58 measures) and MHV/Blue Button (71 measures). These measure sets map to Donabedian's three types of quality measures: (1) antecedents (eg, patient demographics); (2) processes (eg, a novel measure of Web-based care quality); and (3) outcomes (eg, patient engagement). This national expert panel study using a modified Delphi technique prioritized candidate measures to assess digital patient engagement through patients' use of VA's My HealtheVet portal. The process yielded two robust measures sets prepared for future piloting and validation in surveys among Veterans. ©Lynn A Garvin, Steven R Simon. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 26.05.2017.
The evaluation the magnitude radiation exposure dose rate in digital radiography room design
NASA Astrophysics Data System (ADS)
Dwiyanto, Agung; Setia Budi, Wahyu; Hardiman, Gagoek
2017-12-01
This study discusses the dose rate in digital radiography room, buit according to meet the provisions of KEMENKES No.1014 / Menkes / SK / XI / 2008 and Regulation of BAPETEN No. 8 / 2011. The provisions primary concern of radiation safety, not comfort, by considering the space design. There are five aspects to consider in designing the space: functionality, comfort, security, movement activities and aesthetics. However provisions only met three aspects of the design, which are a function, security and movement activity. Therefore, it is necessary to evaluate digital radiography room in terms of its ability to control external radiation exposure to be safe and comfortable The dose rate is measured by the range of primary and secondary radiation in the observation points by using Surveymeter. All data are obtained by the preliminary survey prior to the study. Furthermore, the review of digital radiography room is done based on architectural design theory. The dose rate for recommended improvement room is recalculated using the same method as the actual room with the help of computer modeling. The result of dose rate calculation at the inner and outer part of digital radiography observation room shows that in-room dose for a week at each measuring point exceeds the allowable dose limit both for staff and public. During a week of observation, the outdoor dose at some measuring points exceeds the dose limit set by the KEMENKES No.1014 / Menkes / SK / XI / 2008 and Regulation BEPETEN No 8/2011. Meanwhile, the result of dose rate calculation in the inner and outer part of the improved digital radiography room can meet the applicable regulations better.
The use of digital infrared thermal imaging to detect estrus in gilts.
Sykes, D J; Couvillion, J S; Cromiak, A; Bowers, S; Schenck, E; Crenshaw, M; Ryan, P L
2012-07-01
Yorkshire/Landrace crossbred gilts (N = 32) were evaluated using digital infrared thermal imaging (DITI) to discriminate between estrus and diestrus phases of the porcine estrous cycle. Gilts (N = 32) were part of an ongoing reproductive efficiency study involving the use of raw soybean (RSB; N = 15) versus soybean meal (SBM; N = 17) as a source of dietary protein. Gilts were monitored daily for signs of estrus using a teaser boar. Thermal images of vulva surface temperatures (TEMP) were recorded at standing estrus and diestrus. Measurements for analysis included minimum (MIN), maximum (MAX), mean (AVG), and standard deviation (SD) of temperature gradients. At imaging, ambient (AMB) and rectal temperatures (RT) were recorded, and blood samples taken for serum progesterone (P(4)) concentration analysis (by RIA) to confirm stage of cycle. Mean serum progesterone values at estrus and diestrus were (mean ± SD) 1.0 ± 0.1 and 10.9 ± 0.8 ng/mL, respectively. Vulva MIN, MAX, and AVG thermal images were positively correlated with one another (P < 0.01), and were positively correlated with ambient temperature (P < 0.01). Vulva MAX and AVG thermal temperatures were greater (P < 0.05) at estrus than at diestrus (36.6 ± 0.2 °C and 33.4 ± 0.3 °C vs. 35.6 ± 0.3 °C and 31.8 ± 0.6 °C, respectively), whereas MIN and SD had no differences (P > 0.05) between stages of the cycle. No differences (P > 0.05) in RT were detected between stages and RT was not significantly correlated with vulva thermal images. Diet had no significant effect on RT or vulva temperature. Copyright © 2012. Published by Elsevier Inc.
NASA Astrophysics Data System (ADS)
Cabral, Alexandre; Rebordão, José M.
2011-05-01
In optical security (protection against forgery and counterfeit of products and documents) the problem is not exact reproduction but the production of something sufficiently similar to the original. Currently, Diffractive Optically Variable Image Devices (DOVID), that create dynamic chromatic effects which may be easily recognized but are difficult to reproduce, are often used to protect important products and documents. Well known examples of DOVID for security are 3D or 2D/3D holograms in identity documents and credit cards. Others are composed of shapes with different types of microstructures yielding by diffraction to chromatic dynamic effects. A maskless interferometric lithography technique to generate DOVIDs for optical security is presented and compared to traditional techniques. The approach can be considered as a self-masking focused holography on planes tilted with respect to the reference optical axes of the system, and is based on the Scheimpflug and Hinge rules. No physical masks are needed to ensure optimum exposure of the photosensitive film. The system built to demonstrate the technique relies on the digital mirrors device MOEMS technology from Texas Instruments' Digital Light Processing. The technique is linear on the number of specified colors and does not depend either on the area of the device or the number of pixels, factors that drive the complexity of dot-matrix based systems. The results confirmed the technique innovation and capabilities in the creation of diffractive optical elements for security against counterfeiting and forgery.
Digital watermarking in telemedicine applications--towards enhanced data security and accessibility.
Giakoumaki, Aggeliki L; Perakis, Konstantinos; Tagaris, Anastassios; Koutsouris, Dimitris
2006-01-01
Implementing telemedical solutions has become a trend amongst the various research teams at an international level. Yet, contemporary information access and distribution technologies raise critical issues that urgently need to be addressed, especially those related to security. The paper suggests the use of watermarking in telemedical applications in order to enhance security of the transmitted sensitive medical data, familiarizes the users with a telemedical system and a watermarking module that have already been developed, and proposes an architecture that will enable the integration of the two systems, taking into account a variety of use cases and application scenarios.
Evaluation of IT security – genesis and its state-of-art
NASA Astrophysics Data System (ADS)
Livshitz, I. I.; Neklyudov, A. V.; Lontsikh, P. A.
2018-05-01
It is topical to evolve processes of an evaluation of the IT security nowadays. Formation and application of common evaluation approaches to the IT component, which are processed by the governmental and civil organizations, are still not solving problem. Successful processing of the independent evaluation for conformity with a security standard is supposed to be the main criteria of a suitability of any IT component to be used in a trusted computer system. The solution of the mentioned-above problem is suggested through the localization of all research, development and producing processes in a national trusted area (digital sovereignty).
Code of Federal Regulations, 2011 CFR
2011-07-01
... shall be in the manner specified by the Commission's Web site (http://www.OSHRC.gov). (2) A document...: (i) If Social Security numbers must be included in a document, only the last four digits of that...
American Digital Security and Commerce Act of 2014
Sen. Walsh, John E. [D-MT
2014-06-19
Senate - 06/19/2014 Read twice and referred to the Committee on Commerce, Science, and Transportation. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Digital Accountability and Transparency Act of 2012
Sen. Warner, Mark R. [D-VA
2012-09-20
Senate - 09/20/2012 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Lin, Chao; Shen, Xueju; Li, Baochen
2014-08-25
We demonstrate that all parameters of optical lightwave can be simultaneously designed as keys in security system. This multi-dimensional property of key can significantly enlarge the key space and further enhance the security level of the system. The single-shot off-axis digital holography with orthogonal polarized reference waves is employed to perform polarization state recording on object wave. Two pieces of polarization holograms are calculated and fabricated to be arranged in reference arms to generate random amplitude and phase distribution respectively. When reconstruction, original information which is represented with QR code can be retrieved using Fresnel diffraction with decryption keys and read out noise-free. Numerical simulation results for this cryptosystem are presented. An analysis on the key sensitivity and fault tolerance properties are also provided.
Community archiving of imaging studies
NASA Astrophysics Data System (ADS)
Fritz, Steven L.; Roys, Steven R.; Munjal, Sunita
1996-05-01
The quantity of image data created in a large radiology practice has long been a challenge for available archiving technology. Traditional methods ofarchiving the large quantity of films generated in radiology have relied on warehousing in remote sites, with courier delivery of film files for historical comparisons. A digital community archive, accessible via a wide area network, represents a feasible solution to the problem of archiving digital images from a busy practice. In addition, it affords a physician caring for a patient access to imaging studies performed at a variety ofhealthcare institutions without the need to repeat studies. Security problems include both network security issues in the WAN environment and access control for patient, physician and imaging center. The key obstacle to developing a community archive is currently political. Reluctance to participate in a community archive can be reduced by appropriate design of the access mechanisms.
Filkins, Barbara L; Kim, Ju Young; Roberts, Bruce; Armstrong, Winston; Miller, Mark A; Hultner, Michael L; Castillo, Anthony P; Ducom, Jean-Christophe; Topol, Eric J; Steinhubl, Steven R
2016-01-01
The rapid growth in the availability and incorporation of digital technologies in almost every aspect of our lives creates extraordinary opportunities but brings with it unique challenges. This is especially true for the translational researcher, whose work has been markedly enhanced through the capabilities of big data aggregation and analytics, wireless sensors, online study enrollment, mobile engagement, and much more. At the same time each of these tools brings distinctive security and privacy issues that most translational researchers are inadequately prepared to deal with despite accepting overall responsibility for them. For the researcher, the solution for addressing these challenges is both simple and complex. Cyber-situational awareness is no longer a luxury-it is fundamental in combating both the elite and highly organized adversaries on the Internet as well as taking proactive steps to avoid a careless turn down the wrong digital dark alley. The researcher, now responsible for elements that may/may not be beyond his or her direct control, needs an additional level of cyber literacy to understand the responsibilities imposed on them as data owner. Responsibility lies with knowing what you can do about the things you can control and those you can’t. The objective of this paper is to describe the data privacy and security concerns that translational researchers need to be aware of, and discuss the tools and techniques available to them to help minimize that risk. PMID:27186282
Filkins, Barbara L; Kim, Ju Young; Roberts, Bruce; Armstrong, Winston; Miller, Mark A; Hultner, Michael L; Castillo, Anthony P; Ducom, Jean-Christophe; Topol, Eric J; Steinhubl, Steven R
2016-01-01
The rapid growth in the availability and incorporation of digital technologies in almost every aspect of our lives creates extraordinary opportunities but brings with it unique challenges. This is especially true for the translational researcher, whose work has been markedly enhanced through the capabilities of big data aggregation and analytics, wireless sensors, online study enrollment, mobile engagement, and much more. At the same time each of these tools brings distinctive security and privacy issues that most translational researchers are inadequately prepared to deal with despite accepting overall responsibility for them. For the researcher, the solution for addressing these challenges is both simple and complex. Cyber-situational awareness is no longer a luxury-it is fundamental in combating both the elite and highly organized adversaries on the Internet as well as taking proactive steps to avoid a careless turn down the wrong digital dark alley. The researcher, now responsible for elements that may/may not be beyond his or her direct control, needs an additional level of cyber literacy to understand the responsibilities imposed on them as data owner. Responsibility lies with knowing what you can do about the things you can control and those you can't. The objective of this paper is to describe the data privacy and security concerns that translational researchers need to be aware of, and discuss the tools and techniques available to them to help minimize that risk.
Application of visual cryptography for learning in optics and photonics
NASA Astrophysics Data System (ADS)
Mandal, Avikarsha; Wozniak, Peter; Vauderwange, Oliver; Curticapean, Dan
2016-09-01
In the age data digitalization, important applications of optics and photonics based sensors and technology lie in the field of biometrics and image processing. Protecting user data in a safe and secure way is an essential task in this area. However, traditional cryptographic protocols rely heavily on computer aided computation. Secure protocols which rely only on human interactions are usually simpler to understand. In many scenarios development of such protocols are also important for ease of implementation and deployment. Visual cryptography (VC) is an encryption technique on images (or text) in which decryption is done by human visual system. In this technique, an image is encrypted into number of pieces (known as shares). When the printed shares are physically superimposed together, the image can be decrypted with human vision. Modern digital watermarking technologies can be combined with VC for image copyright protection where the shares can be watermarks (small identification) embedded in the image. Similarly, VC can be used for improving security of biometric authentication. This paper presents about design and implementation of a practical laboratory experiment based on the concept of VC for a course in media engineering. Specifically, our contribution deals with integration of VC in different schemes for applications like digital watermarking and biometric authentication in the field of optics and photonics. We describe theoretical concepts and propose our infrastructure for the experiment. Finally, we will evaluate the learning outcome of the experiment, performed by the students.
Integrated wetland management: an analysis with group model building based on system dynamics model.
Chen, Hsin; Chang, Yang-Chi; Chen, Kung-Chen
2014-12-15
The wetland system possesses diverse functions such as preserving water sources, mediating flooding, providing habitats for wildlife and stabilizing coastlines. Nonetheless, rapid economic growth and the increasing population have significantly deteriorated the wetland environment. To secure the sustainability of the wetland, it is essential to introduce integrated and systematic management. This paper examines the resource management of the Jiading Wetland by applying group model building (GMB) and system dynamics (SD). We systematically identify local stakeholders' mental model regarding the impact brought by the yacht industry, and further establish a SD model to simulate the dynamic wetland environment. The GMB process improves the stakeholders' understanding about the interaction between the wetland environment and management policies. Differences between the stakeholders' perceptions and the behaviors shown by the SD model also suggest that our analysis would facilitate the stakeholders to broaden their horizons and achieve consensus on the wetland resource management. Copyright © 2014 Elsevier Ltd. All rights reserved.
The SERENITY Runtime Monitoring Framework
NASA Astrophysics Data System (ADS)
Spanoudakis, George; Kloukinas, Christos; Mahbub, Khaled
This chapter describes SERENITY’s approach to runtime monitoring and the framework that has been developed to support it. Runtime monitoring is required in SERENITY in order to check for violations of security and dependability properties which are necessary for the correct operation of the security and dependability solutions that are available from the SERENITY framework. This chapter discusses how such properties are specified and monitored. The chapter focuses on the activation and execution of monitoring activities using S&D Patterns and the actions that may be undertaken following the detection of property violations. The approach is demonstrated in reference to one of the industrial case studies of the SERENITY project.
Ahmmed, Ansar U; Ahmmed, Afsara A
2016-05-01
This paper explores the pass or fail cut-off criteria, the number of test fails, and the nature of tests that are most appropriate in predicting listening difficulties (LiD) in children with suspected APD (SusAPD). One hundred and nine English-speaking children (67 males, 42 females) aged between 6 and 11 years with SusAPD were assessed. The Children's Auditory Performance Scale (CHAPS) scores 2 SD below the mean were taken as markers of LiD in different listening conditions. Binary logistic regression analyses were carried out to evaluate the cut-off criterion (2 SD or 1.5 SD or 1 SD below the mean) of failing at least two tests, from the SCAN-C and IMAP test batteries, which significantly predicted LiD. Analyses were also carried out to assess if the group of auditory processing (AP) or cognitive or combination of AP plus cognitive tests were significant in predicting LiD. Receiver Operative Characteristic (ROC) curves were also explored to evaluate how the sensitivity and specificity in confirming LiD varied with the number of test fails. Filtered Words, Competing Words, Competing Sentences, VCV in ICRA noise, Digit Span, Sight Word Reading and the Cued Auditory Attention tests correlated with one or more of the CHAPS domains. Failing at least two of these tests 1.5 SD below the mean significantly predicted (p<.05) CHAPS Ideal scores 2 SD below the mean, and failing at least two of the tests 1 SD below the mean significantly predicted (p<.05) CHAPS Memory and CHAPS Attention scores 2 SD below the mean. The combination of AP plus cognitive tests had significantly higher ability to predict CHAPS Ideal, Memory and Attention scores, compared to the group of AP or cognitive tests separately. ROC curves showed that failing at least two of the tests was associated with the best sensitivity and specificity in predicting LiD. Of the different CHAPS domains only the CHAPS Ideal, Memory and Attention correlated with the APD tests. Failing at least two APD tests from a combination of AP and cognitive tests 1 SD and 1.5 SD below the mean, but not 2 SD, is more appropriate in confirming LiD. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
2004-05-01
Army Soldier System Command: http://www.natick.armv.mil Role Name Facial Recognition Program Manager, Army Technical Lead Mark Chandler...security force with a facial recognition system. Mike Holloran, technology officer with the 6 Fleet, directed LCDR Hoa Ho and CAPT(s) Todd Morgan to...USN 6th Fleet was accomplished with the admiral expressing his support for continuing the evaluation of the a facial recognition system. This went
17. Interior view of courtroom looking towards judge's bench; showing ...
17. Interior view of courtroom looking towards judge's bench; showing built in linear seating on both ends of room, clerical desk and equipment, through wall air conditioning units, exterior windows and door; north end of west wing on top floor; view to northwest. - Ellsworth Air Force Base, Group Administration & Secure Storage Building, 2372 Westover Avenue, Blackhawk, Meade County, SD
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-03
..., e.g., Http://Www.Cftc.Gov/Lawregulation/Otcderivatives/OTC_2_Definitions.Html . Section 724(c) of... payments.'' Section 724(c) of the Dodd-Frank Act does not set forth a definition for such term. The Commission has proposed such a definition below. An SD or MSP must notify each counterparty at the beginning...
Consumer protection act for digital products
NASA Astrophysics Data System (ADS)
Hampel, Viktor E.
1996-03-01
This report proposes a `Consumer Protection Act for Digital Products' to support electronic commerce and to control the increasing abuse and lack of security on the national information highways. Patterned after the `Food and Drug Act of 1906 (21 USC)' and subsequent legislation, a new agency similar to that of the FDA would have the authority `to develop administrative policy with regard to the safety, effectiveness, and labeling of digital products and their communications for human use, and to review and evaluate new applications of such products.' Specifically, it is proposed that standards, originally developed by the defense industry for the labeling, enveloping, and authentication of digital products delivered to the Government, be extended to promote global electronic commerce by protecting the intellectual property rights of producers, establishing their liability for the end-use of digital products, and give consumers means for informed decision making and purchase.
Chen, Chih-Yuan; Chang, Chia-Lin; Chang, Chih-Wei; Lai, Shin-Chi; Chien, Tsung-Fu; Huang, Hong-Yi; Chiou, Jin-Chern; Luo, Ching-Hsing
2013-01-01
This work describes a bio-potential acquisition system for portable ubiquitous healthcare applications using flexible polydimethylsiloxane dry electrodes (FPDEs) and a low-power recording circuit. This novel FPDE used Au as the skin contact layer, which was made using a CO2 laser and replica method technology. The FPDE was revised from a commercial bio-potential electrode with a conductive snap using dry electrodes rather than wet electrodes that proposed reliable and robust attachment for the purpose of measurement, and attaching velcro made it wearable on the forearm for bio-potential applications. Furthermore, this study proposes a recording device to store bio-potential signal data and provides portability and low-power consumption for the proposed acquisition system. To acquire differential bio-potentials, such as electrocardiogram (ECG) signals, the proposed recording device includes a low-power front-end acquisition chip fabricated using a complementary metal-oxide-semiconductor (CMOS) process, a commercial microcontroller (MSP430F149), and a secure digital (SD) card for portable healthcare applications. The proposed system can obtain ECG signals efficiently and are comfortable to the skin. The power consumption of the system is about 85 mW for continuous working over a 3 day period with two AA batteries. It can also be used as a compact Holter ECG system. PMID:23459390
Integrated Services Digital Network (ISDN).
1985-06-01
U.S. Digital Networks," Telephony, February 6, 1984. Gerla, Mario and Pazos -Rangel, Rodolfo A ., "Bandwidth Allocation and Routing in ISDN’s," IEEE...111116o 1312. jf IL5 11111.4 MICROCOPY RESOLUTION TEST CHART NATIONAL BUREAU OF STANDARDS-1963 A • .4 i U-~ U. NAVAL POSTGRADUATE SCHOOL G ,.Monterey...Thesis Advisor: C. R. Jones P: A -nroved for nublic release; distribution unlimited 85o 09 s0 082 1--- S **. -: -* *.- -. ..-. * SECURITY CLASSIFICATION
Source Fingerprinting in Adobe PDF Files
2013-12-01
targeted, opportunistic attacks [2]. Figures from F -Secure for 2008–2010 indicate that anywhere from 28–61% of targeted attacks involved PDF exploits...digit byte offset into the file, a five-digit generation number, and either the character ‘ f ’ or ‘n’, indicating whether the object defined on that line...Walk through a path, extracting n-grams from files and associating # them with the directory that contains them. E.g., the file # ./my_docs/ foo
Secure Hierarchical Multicast Routing and Multicast Internet Anonymity
1998-06-01
Multimedia, Summer 94, pages 76{79, 94. [15] David Chaum . Blind signatures for untraceable payments. In Proc. Crypto, pages 199{203, 1982. [16] David L...use of digital signatures , which consist of a cryptographic hash of the message encrypted with the private key of the signer. Digitally-signed messages... signature on the request and on the certi cate it contains. Notice that the location service need not retrieve the initiator’s public key as it is contained
Materiel Readiness Support Activity Automation Plan
1986-09-01
Hardwire leased lines Sytek RF broadband cable modems Digital phone switched service Medium Speed - up to 56k baud RF modems Digital phone service High...dialing 121 I iI Medium Speed - up to 56k baud RF modems - up to 56k baud sync modem $2070 plus installation - $25 per month maintenance - $1200 per...security is to disconnect net- work, modem , and hardwire access (that is, all external access to the machine) after 5 p.m. (normal business hours
A digital rat atlas of sectional anatomy
NASA Astrophysics Data System (ADS)
Yu, Li; Liu, Qian; Bai, Xueling; Liao, Yinping; Luo, Qingming; Gong, Hui
2006-09-01
This paper describes a digital rat alias of sectional anatomy made by milling. Two healthy Sprague-Dawley (SD) rat weighing 160-180 g were used for the generation of this atlas. The rats were depilated completely, then euthanized by Co II. One was via vascular perfusion, the other was directly frozen at -85 °C over 24 hour. After that, the frozen specimens were transferred into iron molds for embedding. A 3% gelatin solution colored blue was used to fill the molds and then frozen at -85 °C for one or two days. The frozen specimen-blocks were subsequently sectioned on the cryosection-milling machine in a plane oriented approximately transverse to the long axis of the body. The surface of specimen-blocks were imaged by a scanner and digitalized into 4,600 x2,580 x 24 bit array through a computer. Finally 9,475 sectional images (arterial vessel were not perfused) and 1,646 sectional images (arterial vessel were perfused) were captured, which made the volume of the digital atlas up to 369.35 Gbyte. This digital rat atlas is aimed at the whole rat and the rat arterial vessels are also presented. We have reconstructed this atlas. The information from the two-dimensional (2-D) images of serial sections and three-dimensional (3-D) surface model all shows that the digital rat atlas we constructed is high quality. This work lays the foundation for a deeper study of digital rat.
76 FR 63612 - National Committee on Foreign Medical Education and Accreditation Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-13
..., 550 Twelfth Street, SW., Washington, DC 20202. Due to security restrictions, all attendees must pre... the Federal Register and the Code of Federal Regulations is available via the Federal Digital System...
Accuracy and consistency of weights provided by home bathroom scales.
Yorkin, Meredith; Spaccarotella, Kim; Martin-Biggers, Jennifer; Quick, Virginia; Byrd-Bredbenner, Carol
2013-12-17
Self-reported body weight is often used for calculation of Body Mass Index because it is easy to collect. Little is known about sources of error introduced by using bathroom scales to measure weight at home. The objective of this study was to evaluate the accuracy and consistency of digital versus dial-type bathroom scales commonly used for self-reported weight. Participants brought functioning bathroom scales (n=18 dial-type, n=43 digital-type) to a central location. Trained researchers assessed accuracy and consistency using certified calibration weights at 10 kg, 25 kg, 50 kg, 75 kg, 100 kg, and 110 kg. Data also were collected on frequency of calibration, age and floor surface beneath the scale. All participants reported using their scale on hard surface flooring. Before calibration, all digital scales displayed 0, but dial scales displayed a mean absolute initial weight of 0.95 (1.9 SD) kg. Digital scales accurately weighed test loads whereas dial-type scale weights differed significantly (p<0.05). Imprecision of dial scales was significantly greater than that of digital scales at all weights (p<0.05). Accuracy and precision did not vary by scale age. Digital home bathroom scales provide sufficiently accurate and consistent weights for public health research. Reminders to zero scales before each use may further improve accuracy of self-reported weight.
NASA Astrophysics Data System (ADS)
Haneda, Kiyofumi; Koyama, Tadashi
2005-04-01
We developed a secure system that minimizes staff workload and secures safety of a medical information system. In this study, we assess the legal security requirements and risks occurring from the use of digitized data. We then analyze the security measures for ways of reducing these risks. In the analysis, not only safety, but also costs of security measures and ease of operability are taken into consideration. Finally, we assess the effectiveness of security measures by employing our system in small-sized medical institution. As a result of the current study, we developed and implemented several security measures, such as authentications, cryptography, data back-up, and secure sockets layer protocol (SSL) in our system. In conclusion, the cost for the introduction and maintenance of a system is one of the primary difficulties with its employment by a small-sized institution. However, with recent reductions in the price of computers, and certain advantages of small-sized medical institutions, the development of an efficient system configuration has become possible.
A Double Perturbation Method for Reducing Dynamical Degradation of the Digital Baker Map
NASA Astrophysics Data System (ADS)
Liu, Lingfeng; Lin, Jun; Miao, Suoxia; Liu, Bocheng
2017-06-01
The digital Baker map is widely used in different kinds of cryptosystems, especially for image encryption. However, any chaotic map which is realized on the finite precision device (e.g. computer) will suffer from dynamical degradation, which refers to short cycle lengths, low complexity and strong correlations. In this paper, a novel double perturbation method is proposed for reducing the dynamical degradation of the digital Baker map. Both state variables and system parameters are perturbed by the digital logistic map. Numerical experiments show that the perturbed Baker map can achieve good statistical and cryptographic properties. Furthermore, a new image encryption algorithm is provided as a simple application. With a rather simple algorithm, the encrypted image can achieve high security, which is competitive to the recently proposed image encryption algorithms.
Modeling, Simulation and Analysis of Public Key Infrastructure
NASA Technical Reports Server (NTRS)
Liu, Yuan-Kwei; Tuey, Richard; Ma, Paul (Technical Monitor)
1998-01-01
Security is an essential part of network communication. The advances in cryptography have provided solutions to many of the network security requirements. Public Key Infrastructure (PKI) is the foundation of the cryptography applications. The main objective of this research is to design a model to simulate a reliable, scalable, manageable, and high-performance public key infrastructure. We build a model to simulate the NASA public key infrastructure by using SimProcess and MatLab Software. The simulation is from top level all the way down to the computation needed for encryption, decryption, digital signature, and secure web server. The application of secure web server could be utilized in wireless communications. The results of the simulation are analyzed and confirmed by using queueing theory.
Lu, Xiaoqi; Wang, Lei; Zhao, Jianfeng
2012-02-01
With the development of medical information, Picture Archiving and Communications System (PACS), Hospital Information System/Radiology Information System(HIS/RIS) and other medical information management system become popular and developed, and interoperability between these systems becomes more frequent. So, these enclosed systems will be open and regionalized by means of network, and this is inevitable. If the trend becomes true, the security of information transmission may be the first problem to be solved. Based on the need for network security, we investigated the Digital Imaging and Communications in Medicine (DICOM) Standard and Transport Layer Security (TLS) Protocol, and implemented the TLS transmission of the DICOM medical information with OpenSSL toolkit and DCMTK toolkit.
NASA Astrophysics Data System (ADS)
Chao, Luo
2015-11-01
In this paper, a novel digital secure communication scheme is firstly proposed. Different from the usual secure communication schemes based on chaotic synchronization, the proposed scheme employs asynchronous communication which avoids the weakness of synchronous systems and is susceptible to environmental interference. Moreover, as to the transmission errors and data loss in the process of communication, the proposed scheme has the ability to be error-checking and error-correcting in real time. In order to guarantee security, the fractional-order complex chaotic system with the shifting of order is utilized to modulate the transmitted signal, which has high nonlinearity and complexity in both frequency and time domains. The corresponding numerical simulations demonstrate the effectiveness and feasibility of the scheme.
Brüllmann, D D; d'Hoedt, B
2011-05-01
The aim of this study was to illustrate the influence of digital filters on the signal-to-noise ratio (SNR) and modulation transfer function (MTF) of digital images. The article will address image pre-processing that may be beneficial for the production of clinically useful digital radiographs with lower radiation dose. Three filters, an arithmetic mean filter, a median filter and a Gaussian filter (standard deviation (SD) = 0.4), with kernel sizes of 3 × 3 pixels and 5 × 5 pixels were tested. Synthetic images with exactly increasing amounts of Gaussian noise were created to gather linear regression of SNR before and after application of digital filters. Artificial stripe patterns with defined amounts of line pairs per millimetre were used to calculate MTF before and after the application of the digital filters. The Gaussian filter with a 5 × 5 kernel size caused the highest noise suppression (SNR increased from 2.22, measured in the synthetic image, to 11.31 in the filtered image). The smallest noise reduction was found with the 3 × 3 median filter. The application of the median filters resulted in no changes in MTF at the different resolutions but did result in the deletion of smaller structures. The 5 × 5 Gaussian filter and the 5 × 5 arithmetic mean filter showed the strongest changes of MTF. The application of digital filters can improve the SNR of a digital sensor; however, MTF can be adversely affected. As such, imaging systems should not be judged solely on their quoted spatial resolutions because pre-processing may influence image quality.
Image-based electronic patient records for secured collaborative medical applications.
Zhang, Jianguo; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen; Yao, Yihong; Cai, Weihua; Jin, Jin; Zhang, Guozhen; Sun, Kun
2005-01-01
We developed a Web-based system to interactively display image-based electronic patient records (EPR) for secured intranet and Internet collaborative medical applications. The system consists of four major components: EPR DICOM gateway (EPR-GW), Image-based EPR repository server (EPR-Server), Web Server and EPR DICOM viewer (EPR-Viewer). In the EPR-GW and EPR-Viewer, the security modules of Digital Signature and Authentication are integrated to perform the security processing on the EPR data with integrity and authenticity. The privacy of EPR in data communication and exchanging is provided by SSL/TLS-based secure communication. This presentation gave a new approach to create and manage image-based EPR from actual patient records, and also presented a way to use Web technology and DICOM standard to build an open architecture for collaborative medical applications.
Smart security and securing data through watermarking
NASA Astrophysics Data System (ADS)
Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.
2017-11-01
The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.
A Study on the Security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework.
Wang, Yuan-Gen; Zhu, Guopu; Kwong, Sam; Shi, Yun-Qing
2017-08-23
Security analysis is a very important issue for digital watermarking. Several years ago, according to Kerckhoffs' principle, the famous four security levels, namely insecurity, key security, subspace security, and stego-security, were defined for spread-spectrum (SS) embedding schemes in the framework of watermarked-only attack. However, up to now there has been little application of the definition of these security levels to the theoretical analysis of the security of SS embedding schemes, due to the difficulty of the theoretical analysis. In this paper, based on the security definition, we present a theoretical analysis to evaluate the security levels of five typical SS embedding schemes, which are the classical SS, the improved SS (ISS), the circular extension of ISS, the nonrobust and robust natural watermarking, respectively. The theoretical analysis of these typical SS schemes are successfully performed by taking advantage of the convolution of probability distributions to derive the probabilistic models of watermarked signals. Moreover, simulations are conducted to illustrate and validate our theoretical analysis. We believe that the theoretical and practical analysis presented in this paper can bridge the gap between the definition of the four security levels and its application to the theoretical analysis of SS embedding schemes.
Yang, X; Liu, H; Li, D; Zhou, X; Jung, W C; Deans, A E; Cui, Y; Cheng, L
2001-04-01
To investigate the feasibility of using a sensitive digital optical imaging technique to detect green fluorescent protein (GFP) expressed in rabbit vasculature and human arterial smooth muscle cells. A GFP plasmid was transfected into human arterial smooth muscle cells to obtain a GFP-smooth muscle cell solution. This solution was imaged in cell phantoms by using a prototype digital optical imaging system. For in vivo validation, a GFP-lentivirus vector was transfected during surgery into the carotid arteries of two rabbits, and GFP-targeted vessels were harvested for digital optical imaging ex vivo. Optical imaging of cell phantoms resulted in a spatial resolution of 25 microm/pixel. Fluorescent signals were detected as diffusely distributed bright spots. At ex vivo optical imaging of arterial tissues, the average fluorescent signal was significantly higher (P <.05) in GFP-targeted tissues (mean +/- SD, 9,357.3 absolute units of density +/- 1,001.3) than in control tissues (5,633.7 absolute units of density +/- 985.2). Both fluorescence microscopic and immunohistochemical findings confirmed these differences between GFP-targeted and control vessels. The digital optical imaging system was sensitive to GFPs and may potentially provide an in vivo imaging tool to monitor and track vascular gene transfer and expression in experimental investigations.
Digital Health Services and Digital Identity in Alberta.
McEachern, Aiden; Cholewa, David
2017-01-01
The Government of Alberta continues to improve delivery of healthcare by allowing Albertans to access their health information online. Alberta is the only province in Canada with provincial electronic health records for all its citizens. These records are currently made available to medical practitioners, but Alberta Health believes that providing Albertans access to their health records will transform the delivery of healthcare in Alberta. It is important to have a high level of assurance that the health records are provided to the correct Albertan. Alberta Health requires a way for Albertans to obtain a digital identity with a high level of identity assurance prior to releasing health records via the Personal Health Portal. Service Alberta developed the MyAlberta Digital ID program to provide a digital identity verification service. The Ministry of Health is leveraging MyAlberta Digital ID to enable Albertans to access their personal health records through the Personal Health Portal. The Government of Alberta is advancing its vision of patient-centred healthcare by enabling Albertans to access a trusted source for health information and their electronic health records using a secure digital identity.
Roh, Sungwon; Hoeppner, Susanne S.; Schoenfeld, David; Fullerton, Catherine A.; Stoeckel, Luke E.; Evins, A. Eden
2013-01-01
Rationale Nicotinic acetylcholine receptors (nAChRs) have been implicated in the pathophysiology of cognitive deficits in the domains of attention and memory in schizophrenia. While nicotinic agonists and antagonists have been proposed as smoking cessation aids, few comparisons have been made of these agents on cognitive performance in individuals with schizophrenia. Objectives This study investigated the acute effects of a nAChR antagonist, mecamylamine, and partial agonist, varenicline, on cognitive function in non-smokers with and without schizophrenia. Methods Single oral doses of mecamylamine, 10 mg, varenicline, 1 mg, and placebo were administered, one week apart, in random order to adults with schizophrenia (n=30) and to healthy volunteers (n=41) in a double-blind, crossover design. The primary outcome of interest was sustained attention as assessed with hit reaction time variability (HRT-SD) on the identical pairs continuous performance test (CPT-IP). Results Mecamylamine worsened performance on CPT-IP HRT-SD, a measure of attention, compared to varenicline in both groups. Performance on mecamylamine was worse than performance on both placebo and varenicline on several additional measures of attention, including CPT-IP hit reaction time (HRT) and random errors at various levels of task difficulty. There was a treatment by diagnosis interaction, such that mecamylamine worsened performance on CPT-IP 2-digit HRT, 3-digit random errors, and 4-digit hit rate compared to placebo and varenicline in participants with schizophrenia, effects not observed in controls. Conclusions These findings support a role for nAChR’s in attention and suggest that those with schizophrenia may be particularly sensitive to nAChR blockade. PMID:24114425
Establishing CAD/CAM in Preclinical Dental Education: Evaluation of a Hands-On Module.
Schwindling, Franz Sebastian; Deisenhofer, Ulrich Karl; Porsche, Monika; Rammelsberg, Peter; Kappel, Stefanie; Stober, Thomas
2015-10-01
The aim of this study was to evaluate a hands-on computer-assisted design/computer-assisted manufacture (CAD/CAM) module in a preclinical dental course in restorative dentistry. A controlled trial was conducted by dividing a class of 56 third-year dental students in Germany into study and control groups; allocation to the two groups depended on student schedules. Prior information about CAD/CAM-based restorations was provided for all students by means of lectures, preparation exercises, and production of gypsum casts of prepared resin teeth. The study group (32 students) then participated in a hands-on CAD/CAM module in small groups, digitizing their casts and designing zirconia frameworks for single crowns. The digitization process was introduced to the control group (24 students) solely by means of a video-supported lecture. To assess the knowledge gained, a 20-question written examination was administered; 48 students took the exam. The results were analyzed with Student's t-tests at a significance level of 0.05. The results on the examination showed a significant difference between the two groups: the mean scores were 16.8 (SD 1.7, range 13-19) for the study group and 12.5 (SD 3, range 4-18) for the control group. After the control group had also experienced the hands-on module, a total of 48 students from both groups completed a questionnaire with 13 rating-scale and three open-ended questions evaluating the module. Those results showed that the module was highly regarded by the students. This study supports the idea that small-group hands-on courses are helpful for instruction in digital restoration design. These students' knowledge gained and satisfaction seemed to justify the time, effort, and equipment needed.
Establishing a gold standard for manual cough counting: video versus digital audio recordings
Smith, Jaclyn A; Earis, John E; Woodcock, Ashley A
2006-01-01
Background Manual cough counting is time-consuming and laborious; however it is the standard to which automated cough monitoring devices must be compared. We have compared manual cough counting from video recordings with manual cough counting from digital audio recordings. Methods We studied 8 patients with chronic cough, overnight in laboratory conditions (diagnoses were 5 asthma, 1 rhinitis, 1 gastro-oesophageal reflux disease and 1 idiopathic cough). Coughs were recorded simultaneously using a video camera with infrared lighting and digital sound recording. The numbers of coughs in each 8 hour recording were counted manually, by a trained observer, in real time from the video recordings and using audio-editing software from the digital sound recordings. Results The median cough frequency was 17.8 (IQR 5.9–28.7) cough sounds per hour in the video recordings and 17.7 (6.0–29.4) coughs per hour in the digital sound recordings. There was excellent agreement between the video and digital audio cough rates; mean difference of -0.3 coughs per hour (SD ± 0.6), 95% limits of agreement -1.5 to +0.9 coughs per hour. Video recordings had poorer sound quality even in controlled conditions and can only be analysed in real time (8 hours per recording). Digital sound recordings required 2–4 hours of analysis per recording. Conclusion Manual counting of cough sounds from digital audio recordings has excellent agreement with simultaneous video recordings in laboratory conditions. We suggest that ambulatory digital audio recording is therefore ideal for validating future cough monitoring devices, as this as this can be performed in the patients own environment. PMID:16887019
NASA Astrophysics Data System (ADS)
Ivancic, W. D.; Paulsen, P. E.; Miller, E. M.; Sage, S. P.
This report describes a Secure, Autonomous, and Intelligent Controller for Integrating Distributed Emergency Response Satellite Operations. It includes a description of current improvements to existing Virtual Mission Operations Center technology being used by US Department of Defense and originally developed under NASA funding. The report also highlights a technology demonstration performed in partnership with the United States Geological Service for Earth Resources Observation and Science using DigitalGlobe® satellites to obtain space-based sensor data.
IT-security challenges in IoT environments and autonomous systems
NASA Astrophysics Data System (ADS)
Heun, Ulrich
2017-05-01
Internet of Things will open the digital world for future services working across company borders. Together with autonomous systems intelligent things will communicate and work together without direct influence of human technicians or service managers. IT-security will become one of the most important challenges to ensure a stable service performance and to provide a trustful environment to let people use such service without any concerns regarding data privacy and eligibility of the outcomes.
15 CFR 740.19 - Consumer Communications Devices (CCD).
Code of Federal Regulations, 2010 CFR
2010-01-01
...; (11) Memory devices classified under ECCN 5A992 or designated EAR99; (12) “Information security... 5D992 or designated EAR99; (13) Digital cameras and memory cards classified under ECCN 5A992 or...
A secure steganography for privacy protection in healthcare system.
Liu, Jing; Tang, Guangming; Sun, Yifeng
2013-04-01
Private data in healthcare system require confidentiality protection while transmitting. Steganography is the art of concealing data into a cover media for conveying messages confidentially. In this paper, we propose a steganographic method which can provide private data in medical system with very secure protection. In our method, a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then divided into non-overlapping embedding units with three consecutive pixels. We use adaptive pixel pair match (APPM) method to embed digits in the pixel value differences (PVD) of the three pixels and the base of embedded digits is dependent on the differences among the three pixels. By solving an optimization problem, minimal distortion of the pixel ternaries caused by data embedding can be obtained. The experimental results show our method is more suitable to privacy protection of healthcare system than prior steganographic works.
A digital memories based user authentication scheme with privacy preservation.
Liu, JunLiang; Lyu, Qiuyun; Wang, Qiuhua; Yu, Xiangxiang
2017-01-01
The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users' privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results.
Mitchell, Claudia; Chege, Fatuma; Maina, Lucy; Rothman, Margot
2016-01-01
This article studies the ways in which researchers working in the area of health and social research and using participatory visual methods might extend the reach of participant-generated creations such as photos and drawings to engage community leaders and policy-makers. Framed as going 'beyond engagement', the article explores the idea of the production of researcher-led digital dialogue tools, focusing on one example, based on a series of visual arts-based workshops with children from eight slums in Nairobi addressing issues of safety, security, and well-being in relation to housing. The authors conclude that there is a need for researchers to embark upon the use of visual tools to expand the life and use of visual productions, and in particular to ensure meaningful participation of communities in social change.
A Secure Content Delivery System Based on a Partially Reconfigurable FPGA
NASA Astrophysics Data System (ADS)
Hori, Yohei; Yokoyama, Hiroyuki; Sakane, Hirofumi; Toda, Kenji
We developed a content delivery system using a partially reconfigurable FPGA to securely distribute digital content on the Internet. With partial reconfigurability of a Xilinx Virtex-II Pro FPGA, the system provides an innovative single-chip solution for protecting digital content. In the system, a partial circuit must be downloaded from a server to the client terminal to play content. Content will be played only when the downloaded circuit is correctly combined (=interlocked) with the circuit built in the terminal. Since each circuit has a unique I/O configuration, the downloaded circuit interlocks with the corresponding built-in circuit designed for a particular terminal. Thus, the interface of the circuit itself provides a novel authentication mechanism. This paper describes the detailed architecture of the system and clarify the feasibility and effectiveness of the system. In addition, we discuss a fail-safe mechanism and future work necessary for the practical application of the system.
A digital memories based user authentication scheme with privacy preservation
Liu, JunLiang; Lyu, Qiuyun; Wang, Qiuhua; Yu, Xiangxiang
2017-01-01
The traditional username/password or PIN based authentication scheme, which still remains the most popular form of authentication, has been proved insecure, unmemorable and vulnerable to guessing, dictionary attack, key-logger, shoulder-surfing and social engineering. Based on this, a large number of new alternative methods have recently been proposed. However, most of them rely on users being able to accurately recall complex and unmemorable information or using extra hardware (such as a USB Key), which makes authentication more difficult and confusing. In this paper, we propose a Digital Memories based user authentication scheme adopting homomorphic encryption and a public key encryption design which can protect users’ privacy effectively, prevent tracking and provide multi-level security in an Internet & IoT environment. Also, we prove the superior reliability and security of our scheme compared to other schemes and present a performance analysis and promising evaluation results. PMID:29190659
Creating a virtual community of learning predicated on medical student learning styles.
McGowan, Julie; Abrams, Matthew; Frank, Mark; Bangert, Michael
2003-01-01
To create a virtual community of learning within the Indiana University School of Medicine, learning tools were developed within ANGEL to meet the learning needs and habits of the medical students. Determined by student feedback, the integration of digital audio recordings of class lectures into the course management content with several possible outputs was paramount. The other components included electronic enhancement of old exams and providing case-based tutorials within the ANGEL framework. Students are using the curriculum management system more. Faculty feel more secure about their intellectual property because of the authentication and security offered through the ANGEL system. The technology applications were comparatively easy to create and manage. The return on investment, particularly for the digital audio recording component, has been substantial. By considering student learning styles, extant curriculum management systems can be enhanced to facilitate student learning within an electronic environment.
Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth
2016-11-29
Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.
The EGS Data Collaboration Platform: Enabling Scientific Discovery
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weers, Jonathan D; Johnston, Henry; Huggins, Jay V
Collaboration in the digital age has been stifled in recent years. Reasonable responses to legitimate security concerns have created a virtual landscape of silos and fortified castles incapable of sharing information efficiently. This trend is unfortunately opposed to the geothermal scientific community's migration toward larger, more collaborative projects. To facilitate efficient sharing of information between team members from multiple national labs, universities, and private organizations, the 'EGS Collab' team has developed a universally accessible, secure data collaboration platform and has fully integrated it with the U.S. Department of Energy's (DOE) Geothermal Data Repository (GDR) and the National Geothermal Data Systemmore » (NGDS). This paper will explore some of the challenges of collaboration in the modern digital age, highlight strategies for active data management, and discuss the integration of the EGS Collab data management platform with the GDR to enable scientific discovery through the timely dissemination of information.« less
Experimental measurement-device-independent quantum digital signatures.
Roberts, G L; Lucamarini, M; Yuan, Z L; Dynes, J F; Comandar, L C; Sharpe, A W; Shields, A J; Curty, M; Puthoor, I V; Andersson, E
2017-10-23
The development of quantum networks will be paramount towards practical and secure telecommunications. These networks will need to sign and distribute information between many parties with information-theoretic security, requiring both quantum digital signatures (QDS) and quantum key distribution (QKD). Here, we introduce and experimentally realise a quantum network architecture, where the nodes are fully connected using a minimum amount of physical links. The central node of the network can act either as a totally untrusted relay, connecting the end users via the recently introduced measurement-device-independent (MDI)-QKD, or as a trusted recipient directly communicating with the end users via QKD. Using this network, we perform a proof-of-principle demonstration of QDS mediated by MDI-QKD. For that, we devised an efficient protocol to distil multiple signatures from the same block of data, thus reducing the statistical fluctuations in the sample and greatly enhancing the final QDS rate in the finite-size scenario.
Quickbird Geometry Report for Summer 2003
NASA Technical Reports Server (NTRS)
Darbha, Ravikanth; Helder, Dennis; Choi, Taeyoung
2005-01-01
Digital Globe provides for general use 2.4 m multi-spectral and 0.7 m panchromatic imagery acquired by the Quickbird satellite. This geometrically corrected imagery was obtained as standard and orthorectified products; the difference between the two products is primarily in the degree of geometric accuracy that Digital Globe claims. For both products, every image pixel contains estimated sets of Northing/Easting and lat/long coordinates accessible through an image display application such as ENVI. Ground processing was performed by Digital Globe using the ADP 2.1 version of their system. Analysis conducted at South Dakota State University attempted to verify the geometric accuracy of standard and orthorectified Quickbird imagery to determine if specifications for the NASA Science Data Purchase (SDP) were met. These specifications are in Table 1 of Appendix 1. In this analysis, we had approximately 90 Ground Control Points (varies depending on scene size on each date), uniformly distributed over the Brookings, SD, area, from 4 Quickbird scenes acquired August 23, September 15, and October 21 of 2003.
NASA Astrophysics Data System (ADS)
McGibbney, L. J.; Armstrong, E. M.
2016-12-01
Figuratively speaking, Scientific Datasets (SD) are shared by data producers in a multitude of shapes, sizes and flavors. Primarily however they exist as machine-independent manifestations supporting the creation, access, and sharing of array-oriented SD that can on occasion be spread across multiple files. Within the Earth Sciences, the most notable general examples include the HDF family, NetCDF, etc. with other formats such as GRIB being used pervasively within specific domains such as the Oceanographic, Atmospheric and Meteorological sciences. Such file formats contain Coverage Data e.g. a digital representation of some spatio-temporal phenomenon. A challenge for large data producers such as NASA and NOAA as well as consumers of coverage datasets (particularly surrounding visualization and interactive use within web clients) is that this is still not a straight-forward issue due to size, serialization and inherent complexity. Additionally existing data formats are either unsuitable for the Web (like netCDF files) or hard to interpret independently due to missing standard structures and metadata (e.g. the OPeNDAP protocol). Therefore alternative, Web friendly manifestations of such datasets are required.CoverageJSON is an emerging data format for publishing coverage data to the web in a web-friendly, way which fits in with the linked data publication paradigm hence lowering the barrier for interpretation by consumers via mobile devices and client applications, etc. as well as data producers who can build next generation Web friendly Web services around datasets. This work will detail how CoverageJSON is being evaluated at NASA JPL's PO.DAAC as an enabling data representation format for publishing SD as Linked Open Data embedded within SD landing pages as well as via semantic data repositories. We are currently evaluating how utilization of CoverageJSON within SD landing pages addresses the long-standing acknowledgement that SD producers are not currently addressing content-based optimization within their SD landing pages for better crawlability by commercial search engines.
Monroe, James I; Boparai, Karan; Xiao, Ying; Followill, David; Galvin, James M; Klein, Eric E; Low, Daniel A; Moran, Jean M; Zhong, Haoyu; Sohn, Jason W
2018-02-04
A survey was created by NRG to assess a medical physicists' percent full time equivalent (FTE) contribution to multi-institutional clinical trials. A 2012 American Society for Radiation Oncology report, "Safety Is No Accident," quantified medical physics staffing contributions in FTE factors for clinical departments. No quantification of FTE effort associated with clinical trials was included. To address this lack of information, the NRG Medical Physics Subcommittee decided to obtain manpower data from the medical physics community to quantify the amount of time medical physicists spent supporting clinical trials. A survey, consisting of 16 questions, was designed to obtain information regarding physicists' time spent supporting clinical trials. The survey was distributed to medical physicists at 1996 radiation therapy institutions included on the membership rosters of the 5 National Clinical Trials Network clinical trial groups. Of the 451 institutions who responded, 50% (226) reported currently participating in radiation therapy trials. On average, the designated physicist at each institution spent 2.4 hours (standard deviation [SD], 5.5) per week supervising or interacting with clinical trial staff. On average, 1.2 hours (SD, 3.1), 1.8 hours (SD, 3.9), and 0.6 hours (SD, 1.1) per week were spent on trial patient simulations, treatment plan reviews, and maintaining a Digital Imaging and Communications in Medicine server, respectively. For all trial credentialing activities, physicists spent an average of 32 hours (SD, 57.2) yearly. Reading protocols and supporting dosimetrists, clinicians, and therapists took an average of 2.1 hours (SD, 3.4) per week. Physicists also attended clinical trial meetings, on average, 1.2 hours (SD, 1.9) per month. On average, physicist spent a nontrivial total of 9 hours per week (0.21 FTE) supporting an average of 10 active clinical trials. This time commitment indicates the complexity of radiation therapy clinical trials and should be taken into account when staffing radiation therapy institutions. Copyright © 2018 Elsevier Inc. All rights reserved.
Varghese, Mathew P; Manuel, Suvy; Kumar L K, Surej
2017-07-01
This study investigated the potential of platelet-rich fibrin (PRF) for osseous regeneration and soft tissue healing in mandibular third molar impaction sockets. A prospective in vivo study was performed. Randomization was performed after extraction. On one side, the socket was sutured primarily (control site); on the other side, autologous PRF gel was placed and then the socket was sutured (test site). Postoperatively, grid periapical radiographs were obtained at periodic intervals (weeks 1, 4, and 16) and digitalized. Gray-level values were measured at 3 different regions of the socket (for regions of newly formed bone) compared with the natural bone area using HL Image++ software, and the percentage bone fill was measured. Clinical evaluation of soft tissue healing was performed using the healing index of Landry et al (J Periodontol 60:212, 1994) at the specific intervals. Thirty healthy men and women (age range, 18 to 35 yr) with bilaterally impacted mandibular third molars were enrolled in this study. In general, there was markedly greater bone formation in sockets treated with PRF (P < .05). In the PRF group, the average gray-level values at the cervical, middle, and apical regions were 61.85 (standard deviation [SD], ±25.186), 64.54 (SD, ±24.831), and 67.80 (SD, ±23.946), respectively, with a mean value of 64.73 (SD, ±24.411). In the control group, these values were 51.58 (SD, ±15.286), 54.30 (SD, ±16.274), and 57.53 (SD, ±16.187), respectively, with a mean of 53.67 (SD, ±16.528). The average percentage of bone fill in the PRF group was 57.90 (SD, ±26.789) and that of the non-PRF group was 46.74 (SD, ±17.713; P < .05). Soft tissue healing as evaluated by the healing index of Landry et al also was found to be better at the PRF test site and it was statistically significant (P < .05). There was evidence for better osseous regeneration and soft tissue healing in response to PRF. Further investigations to evaluate the application of PRF in other areas of oral and maxillofacial surgery are imperative. Copyright © 2017 American Association of Oral and Maxillofacial Surgeons. Published by Elsevier Inc. All rights reserved.
Internet Protocol Security (IPSEC): Testing and Implications on IPv4 and IPv6 Networks
2008-08-27
Message Authentication Code-Message Digest 5-96). Due to the processing power consumption and slowness of public key authentication methods, RSA ...MODP) group with a 768 -bit modulus 2. a MODP group with a 1024-bit modulus 3. an Elliptic Curve Group over GF[ 2n ] (EC2N) group with a 155-bit...nonces, digital signatures using the Digital Signature Algorithm, and the Rivest-Shamir- Adelman ( RSA ) algorithm. For more information about the
Security in the CernVM File System and the Frontier Distributed Database Caching System
NASA Astrophysics Data System (ADS)
Dykstra, D.; Blomer, J.
2014-06-01
Both the CernVM File System (CVMFS) and the Frontier Distributed Database Caching System (Frontier) distribute centrally updated data worldwide for LHC experiments using http proxy caches. Neither system provides privacy or access control on reading the data, but both control access to updates of the data and can guarantee the authenticity and integrity of the data transferred to clients over the internet. CVMFS has since its early days required digital signatures and secure hashes on all distributed data, and recently Frontier has added X.509-based authenticity and integrity checking. In this paper we detail and compare the security models of CVMFS and Frontier.
The new color of money: safer, smarter, more secure
NASA Astrophysics Data System (ADS)
DiNunzio, Lisa A.; Clarke, Lenore
2004-06-01
Approximately 60% of U.S. currency notes circulate abroad. As the most widely used currency in the world, U.S. notes are the most likely to be counterfeited. Since 1996, the United States has been issuing currency with new security features. These features make U.S. currency easier to recognize as genuine and more secure against advancing computer technology that could be used for counterfeiting. Currency counterfeiters are increasingly turning to digital methods, as advances in technology make digital counterfeiting of currency easier and cheaper. In 1995, for example, less than one percent of counterfeit notes detected in the U.S. were digitally produced. By 2002, that number had grown to nearly 40 percent, according to the Secret Service. Yet despite the efforts of counterfeiters, U.S. currency counterfeiting has been kept at low levels. According to current estimates, between 0.01 and 0.02 percent of notes in circulation are counterfeit, or about 1-2 notes in every 10,000 genuine notes. The strategy for maintaining the security of Federal Reserve notes is to enhance the design of U.S. currency every seven to ten years. One objective of introducing the new currency is to emphasize the number of features available to the public for authenticating bills. The most-talked-about aspect of the redesigned currency is the subtle introduction of background colors to the bills. While color itself is not a security feature, the use of color provides the opportunity to add features that could assist in deterring counterfeiting. Color will also help people to better distinguish their notes. Security features for the newly designed currency include a security thread, a watermark, and a more distinct color-shifting ink. The new 20 note was issued in fall 2003, with the 50 and 100 notes scheduled to follow 12 to 18 months later. Plans to redesign the 10 and 5 are still under consideration, but there are no plans to redesign the 2 and 1 notes. As was the case with the redesigned 20 note issued in 1998, the new design will co-circulate with the current design. As notes return to the Federal Reserve from depository institutions, the Federal Reserve will only destroy the unfit notes introduced since 1998. Designs older than the Series 1996 are destroyed when returned to the Federal Reserve regardless of condition. To ensure a smooth introduction of the new currency, a five-year international public education effort was launched in 2002 to inform the public and target audiences, including financial institutions, law enforcement, and the vending industry of the transition to the new design. The public is the first line of defense against counterfeiting. So, it's important the public has the tools to recognize the new and modified security features in the redesigned notes.
Patient-generated Digital Images after Pediatric Ambulatory Surgery.
Miller, Matthew W; Ross, Rachael K; Voight, Christina; Brouwer, Heather; Karavite, Dean J; Gerber, Jeffrey S; Grundmeier, Robert W; Coffin, Susan E
2016-07-06
To describe the use of digital images captured by parents or guardians and sent to clinicians for assessment of wounds after pediatric ambulatory surgery. Subjects with digital images of post-operative wounds were identified as part of an on-going cohort study of infections after ambulatory surgery within a large pediatric healthcare system. We performed a structured review of the electronic health record (EHR) to determine how digital images were documented in the EHR and used in clinical care. We identified 166 patients whose parent or guardian reported sending a digital image of the wound to the clinician after surgery. A corresponding digital image was located in the EHR in only 121 of these encounters. A change in clinical management was documented in 20% of these encounters, including referral for in-person evaluation of the wound and antibiotic prescription. Clinical teams have developed ad hoc workflows to use digital images to evaluate post-operative pediatric surgical patients. Because the use of digital images to support follow-up care after ambulatory surgery is likely to increase, it is important that high-quality images are captured and documented appropriately in the EHR to ensure privacy, security, and a high-level of care.
Patient-Generated Digital Images after Pediatric Ambulatory Surgery
Ross, Rachael K.; Voight, Christina; Brouwer, Heather; Karavite, Dean J.; Gerber, Jeffrey S.; Grundmeier, Robert W.; Coffin, Susan E.
2016-01-01
Summary Objective To describe the use of digital images captured by parents or guardians and sent to clinicians for assessment of wounds after pediatric ambulatory surgery. Methods Subjects with digital images of post-operative wounds were identified as part of an ongoing cohort study of infections after ambulatory surgery within a large pediatric healthcare system. We performed a structured review of the electronic health record (EHR) to determine how digital images were documented in the EHR and used in clinical care. Results We identified 166 patients whose parent or guardian reported sending a digital image of the wound to the clinician after surgery. A corresponding digital image was located in the EHR in only 121 of these encounters. A change in clinical management was documented in 20% of these encounters, including referral for in-person evaluation of the wound and antibiotic prescription. Conclusion Clinical teams have developed ad hoc workflows to use digital images to evaluate post-operative pediatric surgical patients. Because the use of digital images to support follow-up care after ambulatory surgery is likely to increase, it is important that high-quality images are captured and documented appropriately in the EHR to ensure privacy, security, and a high-level of care. PMID:27452477
NASA Astrophysics Data System (ADS)
Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.
2017-10-01
The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system - a set of information security services, and security software and hardware.
Optical security features for plastic card documents
NASA Astrophysics Data System (ADS)
Hossick Schott, Joachim
1998-04-01
Print-on-demand is currently a major trend in the production of paper based documents. This fully digital production philosophy will likely have ramifications also for the secure identification document market. Here, plastic cards increasingly replace traditionally paper based security sensitive documents such as drivers licenses and passports. The information content of plastic cards can be made highly secure by using chip cards. However, printed and other optical security features will continue to play an important role, both for machine readable and visual inspection. Therefore, on-demand high resolution print technologies, laser engraving, luminescent pigments and laminated features such as holograms, kinegrams or phase gratings will have to be considered for the production of secure identification documents. Very important are also basic optical, surface and material durability properties of the laminates as well as the strength and nature of the adhesion between the layers. This presentation will address some of the specific problems encountered when optical security features such as high resolution printing and laser engraving are to be integrated in the on-demand production of secure plastic card identification documents.
Secure Automated Microgrid Energy System (SAMES)
2016-12-01
with embedded algorithm to share power between each other; • Wind Turbine (WT) Simulator, max 80 kW (4×20 kW), 480 V, Running Wind Generation...Temp, Rain, Wind ........................ 39 Figure 22. Point Loma, Box and Whisker Plot, Hourly Sum of Consumption ............................ 40...Figure 27. Coronado, Consumption vs Average Daily SD Temp, Rainfall, Wind ....................... 44 Figure 28. Naval Base Point Loma, One Line, Solar
Grid-supported Medical Digital Library.
Kosiedowski, Michal; Mazurek, Cezary; Stroinski, Maciej; Weglarz, Jan
2007-01-01
Secure, flexible and efficient storing and accessing digital medical data is one of the key elements for delivering successful telemedical systems. To this end grid technologies designed and developed over the recent years and grid infrastructures deployed with their use seem to provide an excellent opportunity for the creation of a powerful environment capable of delivering tools and services for medical data storage, access and processing. In this paper we present the early results of our work towards establishing a Medical Digital Library supported by grid technologies and discuss future directions of its development. These works are part of the "Telemedycyna Wielkopolska" project aiming to develop a telemedical system for the support of the regional healthcare.
Sandia National Laboratories: Sandia Digital Media
Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios
Haidar, Ali N; Zasada, Stefan J; Coveney, Peter V; Abdallah, Ali E; Beckles, Bruce; Jones, Mike A S
2011-06-06
We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username-password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale.
Practical Computer Security through Cryptography
NASA Technical Reports Server (NTRS)
McNab, David; Twetev, David (Technical Monitor)
1998-01-01
The core protocols upon which the Internet was built are insecure. Weak authentication and the lack of low level encryption services introduce vulnerabilities that propagate upwards in the network stack. Using statistics based on CERT/CC Internet security incident reports, the relative likelihood of attacks via these vulnerabilities is analyzed. The primary conclusion is that the standard UNIX BSD-based authentication system is by far the most commonly exploited weakness. Encryption of Sensitive password data and the adoption of cryptographically-based authentication protocols can greatly reduce these vulnerabilities. Basic cryptographic terminology and techniques are presented, with attention focused on the ways in which technology such as encryption and digital signatures can be used to protect against the most commonly exploited vulnerabilities. A survey of contemporary security software demonstrates that tools based on cryptographic techniques, such as Kerberos, ssh, and PGP, are readily available and effectively close many of the most serious security holes. Nine practical recommendations for improving security are described.
Haidar, Ali N.; Zasada, Stefan J.; Coveney, Peter V.; Abdallah, Ali E.; Beckles, Bruce; Jones, Mike A. S.
2011-01-01
We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username–password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale. PMID:22670214
A review of video security training and assessment-systems and their applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cellucci, J.; Hall, R.J.
1991-01-01
This paper reports that during the last 10 years computer-aided video data collection and playback systems have been used as nuclear facility security training and assessment tools with varying degrees of success. These mobile systems have been used by trained security personnel for response force training, vulnerability assessment, force-on-force exercises and crisis management. Typically, synchronous recordings from multiple video cameras, communications audio, and digital sensor inputs; are played back to the exercise participants and then edited for training and briefing. Factors that have influence user acceptance include: frequency of use, the demands placed on security personnel, fear of punishment, usermore » training requirements and equipment cost. The introduction of S-VHS video and new software for scenario planning, video editing and data reduction; should bring about a wider range of security applications and supply the opportunity for significant cost sharing with other user groups.« less
Yehoshua, Zohar; Gregori, Giovanni; Sadda, SriniVas R; Penha, Fernando M; Goldhardt, Raquel; Nittala, Muneeswar G; Konduru, Ranjith K; Feuer, William J; Gupta, Pooja; Li, Ying; Rosenfeld, Philip J
2013-04-03
To compare the measurements of drusen area from manual segmentation of color fundus photographs with those generated by an automated algorithm designed to detect elevations of the retinal pigment epithelium (RPE) on spectral domain optical coherence tomography (SD-OCT) images. Fifty eyes with drusen secondary to nonexudative age-related macular degeneration were enrolled. All eyes were imaged with a high-definition OCT instrument using a 200 × 200 A-scan raster pattern covering a 6 mm × 6 mm area centered on the fovea. Digital color fundus images were taken on the same day. Drusen were traced manually on the fundus photos by graders at the Doheny Image Reading Center, whereas quantitative OCT measurements of drusen were obtained by using a fully automated algorithm. The color fundus images were registered to the OCT data set and measurements within corresponding 3- and 5-mm circles centered at the fovea were compared. The mean areas (± SD [range]) for the 3-mm circles were SD-OCT = 1.57 (± 1.08 [0.03-4.44]); 3-mm color fundus = 1.92 (± 1.08 [0.20-3.95]); 5-mm SD-OCT = 2.12 (± 1.55 [0.03-5.40]); and 5-mm color fundus = 3.38 (± 1.90 [0.39-7.49]). The mean differences between color images and the SD-OCT (color - SD-OCT) were 0.36 (± 0.93) (P = 0.008) for the 3-mm circle and 1.26 (± 1.38) (P < 0.001) for the 5-mm circle measurements. Intraclass correlation coefficients of agreements for 3- and 5-mm measurements were 0.599 and 0.540, respectively. There was only fair agreement between drusen area measurements obtained from SD-OCT images and color fundus photos. Drusen area measurements on color fundus images were larger than those with SD-OCT scans. This difference can be attributed to the fact that the OCT algorithm defines drusen in terms of RPE deformations above a certain threshold, and will not include small, flat drusen and subretinal drusenoid deposits. The two approaches provide complementary information about drusen.
Context aware adaptive security service model
NASA Astrophysics Data System (ADS)
Tunia, Marcin A.
2015-09-01
Present systems and devices are usually protected against different threats concerning digital data processing. The protection mechanisms consume resources, which are either highly limited or intensively utilized by many entities. The optimization of these resources usage is advantageous. The resources that are saved performing optimization may be utilized by other mechanisms or may be sufficient for longer time. It is usually assumed that protection has to provide specific quality and attack resistance. By interpreting context situation of business services - users and services themselves, it is possible to adapt security services parameters to countermeasure threats associated with current situation. This approach leads to optimization of used resources and maintains sufficient security level. This paper presents architecture of adaptive security service, which is context-aware and exploits quality of context data issue.
Ramifications of DARPA’s Programming Computation on Encrypted Data Program
2014-01-01
use quasi-cryptographic channels to move the information—e.g., Tor for moving data and some digital currency to pay for data services. the Decision...October 14, 2013: http://www.cybersecurity.ru/ crypto /173218.html Damgård, Ivan, and Tomas Toft, “Trading Sugar Beet Quotas—Secure Multiparty...will Double in 5 Years”], CyberSecurity.ru, 2013. As of June 4, 2013: http://www.cybersecurity.ru/ crypto /173218.html People’s Liberty Army Daily, “广州
Ghost imaging for three-dimensional optical security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Wen, E-mail: elechenw@nus.edu.sg; Chen, Xudong
2013-11-25
Ghost imaging has become increasingly popular in quantum and optical application fields. Here, we report three-dimensional (3D) optical security using ghost imaging. The series of random phase-only masks are sparsified, which are further converted into particle-like distributions placed in 3D space. We show that either an optical or digital approach can be employed for the encoding. The results illustrate that a larger key space can be generated due to the application of 3D space compared with previous works.
1983-12-01
Initializes the data tables shared by both the Local and Netowrk Operating Systems. 3. Invint: Written in Assembly Language. Initializes the Input/Output...connection with an appropriate type and grade of transport service and appropriate security authentication (Ref 6:38). Data Transfer within a session...V.; Kent, S. Security in oihr Level Protocolst Anorgaches. Alternatives and Recommendations, Draft Report ICST/HLNP-81-19, Wash ingt on,,D.C.: Dept
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Paulsen, Phillip E.; Miller, Eric M.; Sage, Steen P.
2013-01-01
This report describes a Secure, Autonomous, and Intelligent Controller for Integrating Distributed Emergency Response Satellite Operations. It includes a description of current improvements to existing Virtual Mission Operations Center technology being used by US Department of Defense and originally developed under NASA funding. The report also highlights a technology demonstration performed in partnership with the United States Geological Service for Earth Resources Observation and Science using DigitalGlobe(Registered TradeMark) satellites to obtain space-based sensor data.
Security of electronic mental health communication and record-keeping in the digital age.
Elhai, Jon D; Frueh, B Christopher
2016-02-01
The mental health field has seen a trend in recent years of the increased use of information technology, including mobile phones, tablets, and laptop computers, to facilitate clinical treatment delivery to individual patients and for record keeping. However, little attention has been paid to ensuring that electronic communication with patients is private and secure. This is despite potentially deleterious consequences of a data breach, which are reported in the news media very frequently in modern times. In this article, we present typical security concerns associated with using technology in clinical services or research. We also discuss enhancing the privacy and security of electronic communication with clinical patients and research participants. We offer practical, easy-to-use software application solutions for clinicians and researchers to secure patient communication and records. We discuss such issues as using encrypted wireless networks, secure e-mail, encrypted messaging and videoconferencing, privacy on social networks, and others. © Copyright 2015 Physicians Postgraduate Press, Inc.
Andretta, James R; Ramirez, Aaron M; Barnes, Michael E; Odom, Terri; Roberson-Adams, Shelia; Woodland, Malcolm H
2015-12-01
Many researchers have shown the importance of parent attachment in childhood and adolescence. The present study extends the attachment literature to African Americans involved in the juvenile justice system (N = 213), and provides an initial inquiry using person-oriented methods. The average age was 16.17 years (SD = 1.44), and the sample was predominantly male (71%). Results of a confirmatory factor analysis of Inventory of Parent and Peer Attachment-Short Form (IPPA-S) scores supported a 3-factor model: (a) Communication, (b) Trust, and (c) Alienation. Model-based clustering was applied to IPPA-S scores, and results pointed to 4 perceived parental security profiles: high security, moderately high security, moderately low security, and low security. In keeping with our hypotheses, IPPA-S profiles were associated with prosocial behaviors, depression, anxiety, and oppositional defiance. Contrary to hypotheses, IPPA-S profiles were not associated with perspective taking, emotional concern, or behaviors characteristic of a conduct disorder. Results also showed that gender, age, family member with whom the participant resides, charge severity, and offense history did not have an effect on IPPA-S clustering. Implications for therapeutic jurisprudence in African Americans involved with the juvenile justice system are provided. (c) 2015 APA, all rights reserved).
Aguilar, Frank G; Selvaraj, Senthil; Martinez, Eva E; Katz, Daniel H; Beussink, Lauren; Kim, Kwang-Youn A; Ping, Jie; Rasmussen-Torvik, Laura; Goyal, Amita; Sha, Jin; Irvin, Marguerite R; Arnett, Donna K; Shah, Sanjiv J
2016-03-01
Several large epidemiologic studies and clinical trials have included echocardiography, but images were stored in analog format and these studies predated tissue Doppler imaging (TDI) and speckle tracking echocardiography (STE). We hypothesized that digitization of analog echocardiograms, with subsequent quantification of cardiac mechanics using STE, is feasible, reproducible, accurate, and produces clinically valid results. In the NHLBI HyperGEN study (N = 2234), archived analog echocardiograms were digitized and subsequently analyzed using STE to obtain tissue velocities/strain. Echocardiograms were assigned quality scores and inter-/intra-observer agreement was calculated. Accuracy was evaluated in: (1) a separate second study (N = 50) comparing prospective digital strain versus post hoc analog-to-digital strain, and (2) in a third study (N = 95) comparing prospectively obtained TDI e' velocities with post hoc STE e' velocities. Finally, we replicated previously known associations between tissue velocities/strain, conventional echocardiographic measurements, and clinical data. Of the 2234 HyperGEN echocardiograms, 2150 (96.2%) underwent successful digitization and STE analysis. Inter/intra-observer agreement was high for all STE parameters, especially longitudinal strain (LS). In accuracy studies, LS performed best when comparing post hoc STE to prospective digital STE for strain analysis. STE-derived e' velocities correlated with, but systematically underestimated, TDI e' velocity. Several known associations between clinical variables and cardiac mechanics were replicated in HyperGEN. We also found a novel independent inverse association between fasting glucose and LS (adjusted β = -2.4 [95% CI -3.6, -1.2]% per 1-SD increase in fasting glucose; P < 0.001). Archeological echocardiography, the digitization and speckle tracking analysis of archival echocardiograms, is feasible and generates indices of cardiac mechanics similar to contemporary studies. © 2015, Wiley Periodicals, Inc.
Aguilar, Frank G.; Selvaraj, Senthil; Martinez, Eva E.; Katz, Daniel H.; Beussink, Lauren; Kim, Kwang-Youn A.; Ping, Jie; Rasmussen-Torvik, Laura; Goyal, Amita; Sha, Jin; Irvin, Marguerite R.; Arnett, Donna K.; Shah, Sanjiv J.
2015-01-01
Background Several large epidemiologic studies and clinical trials have included echocardiography, but images were stored in analog format and these studies predated tissue Doppler imaging (TDI) and speckle-tracking echocardiography (STE). We hypothesized that digitization of analog echocardiograms, with subsequent quantification of cardiac mechanics using STE, is feasible, reproducible, accurate, and produces clinically valid results. Methods In the NHLBI HyperGEN study (N=2234), archived analog echocardiograms were digitized and subsequently analyzed using STE to obtain tissue velocities/strain. Echocardiograms were assigned quality scores and inter/intraobserver agreement was calculated. Accuracy was evaluated in (1) a separate second study (N=50) comparing prospective digital strain vs. post-hoc analog-to-digital strain; and (2) in a third study (N=95) comparing prospectively-obtained TDI e′ velocities with post-hoc STE e′ velocities. Finally, we replicated previously known associations between tissue velocities/strain, conventional echocardiographic measurements, and clinical data. Results Of the 2234 HyperGEN echocardiograms, 2150 (96.2%) underwent successful digitization and STE analysis. Inter/intraobserver agreement was high for all STE parameters, especially longitudinal strain (LS). In accuracy studies, LS performed best when comparing post-hoc STE to prospective digital STE for strain analysis. STE-derived e′ velocities correlated with, but systematically underestimated, TDI e′ velocity. Several known associations between clinical variables and cardiac mechanics were replicated in HyperGEN. We also found a novel independent inverse association between fasting glucose and LS (adjusted β =−2.4 [95% CI −3.6,−1.2]% per 1-SD increase in fasting glucose; P<0.001). Conclusions Archeological echocardiography, the digitization and speckle-tracking analysis of archival echocardiograms, is feasible and generates parameters of cardiac mechanics similar to contemporary studies. PMID:26525308
Simpson, V; Hughes, M; Wilkinson, J; Herrick, A L; Dinsdale, G
2018-03-01
Digital ulcers are a major problem in patients with systemic sclerosis (SSc), causing severe pain and impairment of hand function. In addition, digital ulcers heal slowly and sometimes become infected, which can lead to gangrene and necessitate amputation if appropriate intervention is not taken. A reliable, objective method for assessing digital ulcer healing or progression is needed in both the clinical and research arenas. This study was undertaken to compare 2 computer-assisted planimetry methods of measurement of digital ulcer area on photographs (ellipse and freehand regions of interest [ROIs]), and to assess the reliability of photographic calibration and the 2 methods of area measurement. Photographs were taken of 107 digital ulcers in 36 patients with SSc spectrum disease. Three raters assessed the photographs. Custom software allowed raters to calibrate photograph dimensions and draw ellipse or freehand ROIs. The shapes and dimensions of the ROIs were saved for further analysis. Calibration (by a single rater performing 5 repeats per image) produced an intraclass correlation coefficient (intrarater reliability) of 0.99. The mean ± SD areas of digital ulcers assessed using ellipse and freehand ROIs were 18.7 ± 20.2 mm 2 and 17.6 ± 19.3 mm 2 , respectively. Intrarater and interrater reliability of the ellipse ROI were 0.97 and 0.77, respectively. For the freehand ROI, the intrarater and interrater reliability were 0.98 and 0.76, respectively. Our findings indicate that computer-assisted planimetry methods applied to SSc-related digital ulcers can be extremely reliable. Further work is needed to move toward applying these methods as outcome measures for clinical trials and in clinical settings. © 2017, American College of Rheumatology.
Comparison of White and Chinese perception of esthetic Chinese lip position.
Chong, Hui Theng; Thea, Kim Wei; Descallar, Joseph; Chen, Yong; Dalci, Oyku; Wong, Ricky; Darendeliler, M Ali
2014-03-01
To compare the esthetic preference of White and Chinese judges with regard to Chinese lip position. The profile images of a dental and skeletal Class I Chinese adult male and female were digitally adjusted to Chinese mean values. The lip profile was adjusted with the upper and lower lip at the mean distance from the Ricketts' E-line. These images were used as baseline images and were further digitally manipulated to generate six additional images with the upper and lower lip such that they lay 0.5, 1.0, and 2.0 standard deviations (SDs) in front of or behind the E-line. An additional image was modified based on a White mean value. The images were viewed and ranked by 251 White and Chinese judges (dentists and laypersons) in Australia and China. Significantly more Chinese judges ranked the retrusive profiles higher than the White judges. The White judges also ranked the profile image adjusted to -0.5 SD as the most esthetic for both the female and male, while the Chinese judges ranked the -1.0 SD profile as the most esthetic. The ethnicity of the judges is a significant factor influencing the perception of esthetic lip position. The Chinese judges prefer a more retrusive profile and are more likely to rate a protrusive profile as unacceptable, compared with the White judges.
Accuracy and consistency of weights provided by home bathroom scales
2013-01-01
Background Self-reported body weight is often used for calculation of Body Mass Index because it is easy to collect. Little is known about sources of error introduced by using bathroom scales to measure weight at home. The objective of this study was to evaluate the accuracy and consistency of digital versus dial-type bathroom scales commonly used for self-reported weight. Methods Participants brought functioning bathroom scales (n = 18 dial-type, n = 43 digital-type) to a central location. Trained researchers assessed accuracy and consistency using certified calibration weights at 10 kg, 25 kg, 50 kg, 75 kg, 100 kg, and 110 kg. Data also were collected on frequency of calibration, age and floor surface beneath the scale. Results All participants reported using their scale on hard surface flooring. Before calibration, all digital scales displayed 0, but dial scales displayed a mean absolute initial weight of 0.95 (1.9 SD) kg. Digital scales accurately weighed test loads whereas dial-type scale weights differed significantly (p < 0.05). Imprecision of dial scales was significantly greater than that of digital scales at all weights (p < 0.05). Accuracy and precision did not vary by scale age. Conclusions Digital home bathroom scales provide sufficiently accurate and consistent weights for public health research. Reminders to zero scales before each use may further improve accuracy of self-reported weight. PMID:24341761
Code of Federal Regulations, 2013 CFR
2013-10-01
..., the following definitions apply to this subchapter: Act means the Social Security Act. Administrative..., statements, and other required documents. Electronic media means: (1) Electronic storage material on which...) and any removable/transportable digital memory medium, such as magnetic tape or disk, optical disk, or...
Code of Federal Regulations, 2014 CFR
2014-10-01
..., the following definitions apply to this subchapter: Act means the Social Security Act. Administrative..., statements, and other required documents. Electronic media means: (1) Electronic storage material on which...) and any removable/transportable digital memory medium, such as magnetic tape or disk, optical disk, or...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-15
...'s as an identifier and may be shared with the Department); Citizenship; Contact information... facilities in a locked drawer behind a locked door. The records are stored on magnetic disc, tape, digital...
78 FR 60250 - Order Denying Export Privileges
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-01
... DEPARTMENT OF COMMERCE Bureau of Industry and Security Order Denying Export Privileges In the... knowingly and willfully causing and attempting to cause the export of digital microwave radios to Iran.... Section 766.25 of the Export Administration Regulations (``EAR'' or [[Page 60251
Code of Federal Regulations, 2014 CFR
2014-01-01
... (including security plans, procedures, and equipment) for the physical protection of source, byproduct, or... computer that contains the participant's name, e-mail address, and participant's digital signature, proves... inspection. It is also the place where NRC makes computer terminals available to access the Publicly...
Code of Federal Regulations, 2013 CFR
2013-01-01
... (including security plans, procedures, and equipment) for the physical protection of source, byproduct, or... computer that contains the participant's name, e-mail address, and participant's digital signature, proves... inspection. It is also the place where NRC makes computer terminals available to access the Publicly...
[Validation of a questionnaire for measurement of beliefs about the climacteric].
Chávez-Ayala, Rubén; Andrade-Palos, Patricia; Rivera-Rivera, Leonor
2002-01-01
To design an instrument for measuring beliefs about the social, psychological, and physiological consequences of women's climacteric stage. The study included 340 women affiliated to Instituto de Seguridad y Servicios Sociales para los Trabajadores del Estado (Institute for Social Services and Security for State Workers, ISSSTE) (age mean = 49.46, (SD 7.92). The mean number of pregnancies in the sample was 3.75 (SD 2.57), and the mean number of born children was 3.21 (SD 2.19); 48% of women were premenopausal, 10.9% perimenopausal, and 40.6% postmenopausal. The instrument consisted of 25 items. A factorial analysis with Varimax rotation was carried out. Four factors were confirmed: disadvantages (alpha = 0.769), advantages (alpha = 0.839), physiological (alpha = 0.659), and psychological (alpha = 0.711). This instrument shows good internal consistency, and measures four climacteric belief groups: a) beliefs on disadvantages, b) beliefs on advantages, c) beliefs on physiological ailments, and d) beliefs on psychological symptoms. All three confirmed dimensions of the climacteric phase have been proposed in other studies.
Development of a digital method for neutron/gamma-ray discrimination based on matched filtering
NASA Astrophysics Data System (ADS)
Korolczuk, S.; Linczuk, M.; Romaniuk, R.; Zychor, I.
2016-09-01
Neutron/gamma-ray discrimination is crucial for measurements with detectors sensitive to both neutron and gamma-ray radiation. Different techniques to discriminate between neutrons and gamma-rays based on pulse shape analysis are widely used in many applications, e.g., homeland security, radiation dosimetry, environmental monitoring, fusion experiments, nuclear spectroscopy. A common requirement is to improve a radiation detection level with a high detection reliability. Modern electronic components, such as high speed analog to digital converters and powerful programmable digital circuits for signal processing, allow us to develop a fully digital measurement system. With this solution it is possible to optimize digital signal processing algorithms without changing any electronic components in an acquisition signal path. We report on results obtained with a digital acquisition system DNG@NCBJ designed at the National Centre for Nuclear Research. A 2'' × 2'' EJ309 liquid scintillator was used to register mixed neutron and gamma-ray radiation from PuBe sources. A dedicated algorithm for pulse shape discrimination, based on real-time filtering, was developed and implemented in hardware.
ERIC Educational Resources Information Center
Laible, Deborah
2011-01-01
The purpose of the study was to examine the differential relations between mother-child reminiscing about a positive emotional event vs. a negative emotional event and attachment security, family climate, and young children's socioemotional development. Fifty preschool children (M age = 50.69 months, SD = 4.64) and their mothers completed two…
ERIC Educational Resources Information Center
Gasperini, Lavinia
Reducing the number of undernourished people in all countries to half its present level no later than 2015 is the commitment undertaken by the international community during the World Food Summit of 1996. In order to accomplish this goal, a common vision to work for sustainable growth that favors the poor and provides more resources for health,…
NASA Astrophysics Data System (ADS)
Swartz, Charles S.
2003-05-01
The process of distributing and exhibiting a motion picture has changed little since the Lumière brothers presented the first motion picture to an audience in 1895. While this analog photochemical process is capable of producing screen images of great beauty and expressive power, more often the consumer experience is diminished by third generation prints and by the wear and tear of the mechanical process. Furthermore, the film industry globally spends approximately $1B annually manufacturing and shipping prints. Alternatively, distributing digital files would theoretically yield great benefits in terms of image clarity and quality, lower cost, greater security, and more flexibility in the cinema (e.g., multiple language versions). In order to understand the components of the digital cinema chain and evaluate the proposed technical solutions, the Entertainment Technology Center at USC in 2000 established the Digital Cinema Laboratory as a critical viewing environment, with the highest quality film and digital projection equipment. The presentation describes the infrastructure of the Lab, test materials, and testing methodologies developed for compression evaluation, and lessons learned up to the present. In addition to compression, the Digital Cinema Laboratory plans to evaluate other components of the digital cinema process as well.
NASA Astrophysics Data System (ADS)
Lendzioch, Theodora; Langhammer, Jakub; Jenicek, Michal
2017-04-01
A rapid and robust approach using Unmanned Aerial Vehicle (UAV) digital photogrammetry was performed for evaluating snow accumulation over different small localities (e.g. disturbed forest and open area) and for indirect field measurements of Leaf Area Index (LAI) of coniferous forest within the Šumava National Park, Czech Republic. The approach was used to reveal impacts related to changes in forest and snowpack and to determine winter effective LAI for monitoring the impact of forest canopy metrics on snow accumulation. Due to the advancement of the technique, snow depth and volumetric changes of snow depth over these selected study areas were estimated at high spatial resolution (1 cm) by subtracting a snow-free digital elevation model (DEM) from a snow-covered DEM. Both, downward-looking UAV images and upward-looking digital hemispherical photography (DHP), and additional widely used LAI-2200 canopy analyser measurements were applied to determine the winter LAI, controlling interception and transmitting radiation. For the performance of downward-looking UAV images the snow background instead of the sky fraction was used. The reliability of UAV-based LAI retrieval was tested by taking an independent data set during the snow cover mapping campaigns. The results showed the potential of digital photogrammetry for snow depth mapping and LAI determination by UAV techniques. The average difference obtained between ground-based and UAV-based measurements of snow depth was 7.1 cm with higher values obtained by UAV. The SD of 22 cm for the open area seemed competitive with the typical precision of point measurements. In contrast, the average difference in disturbed forest area was 25 cm with lower values obtained by UAV and a SD of 36 cm, which is in agreement with other studies. The UAV-based LAI measurements revealed the lowest effective LAI values and the plant canopy analyser LAI-2200 the highest effective LAI values. The biggest bias of effective LAI was observed between LAI-2200 and UAV-based analyses. Since the LAI parameter is important for snowpack modelling, this method presents the potential of simplifying LAI retrieval and mapping of snow dynamics while reducing running costs and time.
Secure Image Transmission over DFT-precoded OFDM-VLC systems based on Chebyshev Chaos scrambling
NASA Astrophysics Data System (ADS)
Wang, Zhongpeng; Qiu, Weiwei
2017-08-01
This paper proposes a physical layer image secure transmission scheme for discrete Fourier transform (DFT) precoded OFDM-based visible light communication systems by using Chebyshev chaos maps. In the proposed scheme, 256 subcarriers and QPSK modulation are employed. The transmitted digital signal of the image is encrypted with a Chebyshev chaos sequence. The encrypted signal is then transformed by a DFT precoding matrix to reduce the PAPR of the OFDM signal. After that, the encrypted and DFT-precoded OFDM are transmitted over a VLC channel. The simulation results show that the proposed image security transmission scheme can not only protect the DFT-precoded OFDM-based VLC from eavesdroppers but also improve BER performance.
NASA Astrophysics Data System (ADS)
Pelisoli, Ingrid; Kepler, S. O.; Koester, Detlev
2017-12-01
Evolved stars with a helium core can be formed by non-conservative mass exchange interaction with a companion or by strong mass loss. Their masses are smaller than 0.5 M⊙. In the database of the Sloan Digital Sky Survey (SDSS), there are several thousand stars which were classified by the pipeline as dwarf O, B and A stars. Considering the lifetimes of these classes on the main sequence, and their distance modulus at the SDSS bright saturation, if these were common main sequence stars, there would be a considerable population of young stars very far from the galactic disk. Their spectra are dominated by Balmer lines which suggest effective temperatures around 8 000-10 000 K. Several thousand have significant proper motions, indicative of distances smaller than 1 kpc. Many show surface gravity in intermediate values between main sequence and white dwarf, 4.75 < log g < 6.5, hence they have been called sdA stars. Their physical nature and evolutionary history remains a puzzle. We propose they are not H-core main sequence stars, but helium core stars and the outcomes of binary evolution. We report the discovery of two new extremely-low mass white dwarfs among the sdAs to support this statement.
Access control and confidentiality in radiology
NASA Astrophysics Data System (ADS)
Noumeir, Rita; Chafik, Adil
2005-04-01
A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.
Digital Signal Processing Methods for Safety Systems Employed in Nuclear Power Industry
NASA Astrophysics Data System (ADS)
Popescu, George
Some of the major safety concerns in the nuclear power industry focus on the readiness of nuclear power plant safety systems to respond to an abnormal event, the security of special nuclear materials in used nuclear fuels, and the need for physical security to protect personnel and reactor safety systems from an act of terror. Routine maintenance and tests of all nuclear reactor safety systems are performed on a regular basis to confirm the ability of these systems to operate as expected. However, these tests do not determine the reliability of these safety systems and whether the systems will perform for the duration of an accident and whether they will perform their tasks without failure after being engaged. This research has investigated the progression of spindle asynchronous error motion determined from spindle accelerations to predict bearings failure onset. This method could be applied to coolant pumps that are essential components of emergency core cooling systems at all nuclear power plants. Recent security upgrades mandated by the Nuclear Regulatory Commission and the Department of Homeland Security have resulted in implementation of multiple physical security barriers around all of the commercial and research nuclear reactors in the United States. A second part of this research attempts to address an increased concern about illegal trafficking of Special Nuclear Materials (SNM). This research describes a multi element scintillation detector system designed for non - invasive (passive) gamma ray surveillance for concealed SNM that may be within an area or sealed in a package, vehicle or shipping container. Detection capabilities of the system were greatly enhanced through digital signal processing, which allows the combination of two very powerful techniques: 1) Compton Suppression (CS) and 2) Pulse Shape Discrimination (PSD) with less reliance on complicated analog instrumentation.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., the following definitions apply to this subchapter: Act means the Social Security Act. ANSI stands for... required documents. Electronic media means: (1) Electronic storage media including memory devices in computers (hard drives) and any removable/transportable digital memory medium, such as magnetic tape or disk...
Code of Federal Regulations, 2011 CFR
2011-10-01
..., the following definitions apply to this subchapter: Act means the Social Security Act. ANSI stands for... required documents. Electronic media means: (1) Electronic storage media including memory devices in computers (hard drives) and any removable/transportable digital memory medium, such as magnetic tape or disk...
Code of Federal Regulations, 2010 CFR
2010-10-01
..., the following definitions apply to this subchapter: Act means the Social Security Act. ANSI stands for... required documents. Electronic media means: (1) Electronic storage media including memory devices in computers (hard drives) and any removable/transportable digital memory medium, such as magnetic tape or disk...
2015-10-01
28 Magnetometer Applied Physics Model 1540-digital 3-axis fluxgate 5 Amplifiers Alligator Technologies USBPGF-S1 programmable instrumentation...Acoustic, Seismic, magnetic, footstep, vehicle, magnetometer , geophone, unattended ground sensor (UGS) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION
Upgrading a CD-ROM Network for Multimedia Applications.
ERIC Educational Resources Information Center
Sylvia, Margaret
1995-01-01
Addresses issues to consider when upgrading library CD-ROM networks for multimedia applications. Topics includes security issues; workstation requirements such as soundboards and monitors; local area network configurations that avoid bottlenecks: Asynchronous Transfer Mode, Ethernet, and Integrated Services Digital Network; server performance…
Code of Federal Regulations, 2010 CFR
2010-07-01
... withdrawal order issued under section 104, 30 U.S.C. 814; an answer to a notice of contest of an order issued... digits of social security numbers, financial account numbers, driver's license numbers, or other personal...
Studzinski, J
2017-06-01
The Digital Imaging Adoption Model (DIAM) has been jointly developed by HIMSS Analytics and the European Society of Radiology (ESR). It helps evaluate the maturity of IT-supported processes in medical imaging, particularly in radiology. This eight-stage maturity model drives your organisational, strategic and tactical alignment towards imaging-IT planning. The key audience for the model comprises hospitals with imaging centers, as well as external imaging centers that collaborate with hospitals. The assessment focuses on different dimensions relevant to digital imaging, such as software infrastructure and usage, workflow security, clinical documentation and decision support, data exchange and analytical capabilities. With its standardised approach, it enables regional, national and international benchmarking. All DIAM participants receive a structured report that can be used as a basis for presenting, e.g. budget planning and investment decisions at management level.
Telehealth for "the digital illiterate"--elderly heart failure patients experiences.
Lind, Leili; Karlsson, Daniel
2014-01-01
Telehealth solutions should be available also for elderly patients with no interest in using, or capacity to use, computers and smartphones. Fourteen elderly, severely ill heart failure patients in home care participated in a telehealth study and used digital pens for daily reporting of their health state--a technology never used before by this patient group. After the study seven patients and two spouses were interviewed face-to-face. A qualitative content analysis of the interview material was performed. The informants had no experience of computers or the Internet and no interest in learning. Still, patients found the digital pen and the health diary form easy to use, thus effortlessly adopting to changes in care provision. They experienced an improved contact with the caregivers and had a sense of increased security despite a multimorbid state. Our study shows that, given that technologies are tailored to specific patient groups, even "the digital illiterate" may use the Internet.
Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice.
Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim
2016-06-15
Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.
Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo
2013-01-01
Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231
Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo
2013-09-02
Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.
Wearable knee health rehabilitation assessment using acoustical emissions
NASA Astrophysics Data System (ADS)
Teague, Caitlin N.; Hersek, Sinan; Conant, Jordan L.; Gilliland, Scott M.; Inan, Omer T.
2017-02-01
We have developed a novel, wearable sensing system based on miniature piezoelectric contact microphones for measuring the acoustical emissions from the knee during movement. The system consists of two contact microphones, positioned on the medial and lateral sides of the patella, connected to custom, analog pre-amplifier circuits and a microcontroller for digitization and data storage on a secure digital card. Tn addition to the acoustical sensing, the system includes two integrated inertial measurement sensors including accelerometer and gyroscope modalities to enable joint angle calculations; these sensors, with digital outputs, are connected directly to the same microcontroller. The system provides low noise, accurate joint acoustical emission and angle measurements in a wearable form factor and has several hours of battery life.
Digital Sound Encryption with Logistic Map and Number Theoretic Transform
NASA Astrophysics Data System (ADS)
Satria, Yudi; Gabe Rizky, P. H.; Suryadi, MT
2018-03-01
Digital sound security has limits on encrypting in Frequency Domain. Number Theoretic Transform based on field (GF 2521 – 1) improve and solve that problem. The algorithm for this sound encryption is based on combination of Chaos function and Number Theoretic Transform. The Chaos function that used in this paper is Logistic Map. The trials and the simulations are conducted by using 5 different digital sound files data tester in Wave File Extension Format and simulated at least 100 times each. The key stream resulted is random with verified by 15 NIST’s randomness test. The key space formed is very big which more than 10469. The processing speed of algorithm for encryption is slightly affected by Number Theoretic Transform.
Research on models of Digital City geo-information sharing platform
NASA Astrophysics Data System (ADS)
Xu, Hanwei; Liu, Zhihui; Badawi, Rami; Liu, Haiwang
2009-10-01
The data related to Digital City has the property of large quantity, isomerous and multiple dimensions. In the original copy method of data sharing, the application departments can not solve the problem of data updating and data security in real-time. This paper firstly analyzes various patterns of sharing Digital City information and on this basis the author provides a new shared mechanism of GIS Services, with which the data producers provide Geographic Information Services to the application users through Web API, so as to the data producers and the data users can do their best respectively. Then the author takes the application system in supermarket management as an example to explain the correctness and effectiveness of the method provided in this paper.
Selective encryption for H.264/AVC video coding
NASA Astrophysics Data System (ADS)
Shi, Tuo; King, Brian; Salama, Paul
2006-02-01
Due to the ease with which digital data can be manipulated and due to the ongoing advancements that have brought us closer to pervasive computing, the secure delivery of video and images has become a challenging problem. Despite the advantages and opportunities that digital video provide, illegal copying and distribution as well as plagiarism of digital audio, images, and video is still ongoing. In this paper we describe two techniques for securing H.264 coded video streams. The first technique, SEH264Algorithm1, groups the data into the following blocks of data: (1) a block that contains the sequence parameter set and the picture parameter set, (2) a block containing a compressed intra coded frame, (3) a block containing the slice header of a P slice, all the headers of the macroblock within the same P slice, and all the luma and chroma DC coefficients belonging to the all the macroblocks within the same slice, (4) a block containing all the ac coefficients, and (5) a block containing all the motion vectors. The first three are encrypted whereas the last two are not. The second method, SEH264Algorithm2, relies on the use of multiple slices per coded frame. The algorithm searches the compressed video sequence for start codes (0x000001) and then encrypts the next N bits of data.
In Internet-Based Visualization System Study about Breakthrough Applet Security Restrictions
NASA Astrophysics Data System (ADS)
Chen, Jie; Huang, Yan
In the process of realization Internet-based visualization system of the protein molecules, system needs to allow users to use the system to observe the molecular structure of the local computer, that is, customers can generate the three-dimensional graphics from PDB file on the client computer. This requires Applet access to local file, related to the Applet security restrictions question. In this paper include two realization methods: 1.Use such as signature tools, key management tools and Policy Editor tools provided by the JDK to digital signature and authentication for Java Applet, breakthrough certain security restrictions in the browser. 2. Through the use of Servlet agent implement indirect access data methods, breakthrough the traditional Java Virtual Machine sandbox model restriction of Applet ability. The two ways can break through the Applet's security restrictions, but each has its own strengths.
NASA Astrophysics Data System (ADS)
Peng, Xiang; Zhang, Peng; Cai, Lilong
In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.
NASA Astrophysics Data System (ADS)
El-Saba, Aed; Alsharif, Salim; Jagapathi, Rajendarreddy
2011-04-01
Fingerprint recognition is one of the first techniques used for automatically identifying people and today it is still one of the most popular and effective biometric techniques. With this increase in fingerprint biometric uses, issues related to accuracy, security and processing time are major challenges facing the fingerprint recognition systems. Previous work has shown that polarization enhancementencoding of fingerprint patterns increase the accuracy and security of fingerprint systems without burdening the processing time. This is mainly due to the fact that polarization enhancementencoding is inherently a hardware process and does not have detrimental time delay effect on the overall process. Unpolarized images, however, posses a high visual contrast and when fused (without digital enhancement) properly with polarized ones, is shown to increase the recognition accuracy and security of the biometric system without any significant processing time delay.
Al-Omiri, Mahmoud K; Harb, Rousan; Abu Hammad, Osama A; Lamey, Philip-John; Lynch, Edward; Clifford, Thomas J
2010-07-01
This study aimed to evaluate the reliability of a new CAD-CAM Laser scanning machine in detection of incisal tooth wear through a 6-month period and to compare the accuracy of using this new machine against measuring tooth wear using tool maker microscope and conventional tooth wear index. Twenty participants (11 males and 9 females, mean age=22.7 years, SD=2.0) were assessed for incisal tooth wear of lower anterior teeth using Smith and Knight clinical tooth wear index (TWI) on two occasions, the study baseline and 6 months later. Stone dies for each tooth were prepared and scanned using the CAD-CAM Laser Cercon System (Cercon Smart Ceramics, DeguDent, Germany). Scanned images were printed and examined under a toolmaker microscope (Stedall-Dowding Machine Tool Company, Optique et Mecanique de Precision, Marcel Aubert SA, Switzerland) to quantify tooth wear and then the dies were directly assessed under the microscope to measure tooth wear. The Wilcoxon Signed Ranks Test was used to analyse the data. TWI scores for incisal edges were 0, 1, and 2 and were similar at both occasions. Scores 3 and 4 were not detected. Wear values measured by directly assessing the dies under the tool maker microscope (range=517-656microm, mean=582microm, and SD=50) were significantly more than those measured from the Cercon digital machine images (range=132-193microm, mean =165microm, and SD=27) and both showed significant differences between the two occasions. Measuring images obtained with Cercon digital machine under tool maker microscope allowed detection of wear progression over the 6-month period. However, measuring the dies of worn dentition directly under the tool maker microscope enabled detection of wear progression more accurately. Conventional method was the least sensitive for tooth wear quantification and was unable to identify wear progression in most cases. Copyright 2010 Elsevier Ltd. All rights reserved.
1992-12-30
Encl 5) Cayman Islands CJ Central African Republic CT Chad CD Chile CI China CH Christmas Island KT Clipperton Islands IP Cocos (Keeling) Islands CK...PA Puerto Rico PR Rhode Island RI South Carolina SC South Dakota SD Tennessee TN Federated States of Marshall Islands , Palau TT Texas TX Utah UT...Vermont VT Virginia VA Virgin Islands VI Washington WA West Virginia WV Wisconsin WI Wyoming WY Block 17. ZIP Code. Enter the correct nine-digit ZIP Code
Microscale Convective Heat Transfer for Thermal Management of Compact Systems
2012-03-12
pages 641–645, 1997. [9] S.V. Garimella and C.B. Sobhan. Transport in microchannels -a critical review. Annual Review of Heat Transfer , 13, 2003. [10] A... heat transfer for thermal management of compact systems Sb. GRANT NUMBER F A9550-08-l-0057 Sc. PROGRAM ELEMENT NUMBER 61102F 6. AUTHOR(S) Sd...improve the performance of many components. The e ects of digitized heat transfer using electrowetting on a dielectric were investigated in this paper
An Analysis of the Applicability of Federal Law Regarding Hash-Based Searches of Digital Media
2014-06-01
that connect the SD card to the crime. • The second scenario involves a border crossing search by Customs and Border Pro - tection (CBP). In this... marijuana was being grown in the home of Danny Lee Kyllo due to circumstances involving another investiga- tion. Knowing that the indoor growth of marijuana ...requested and was issued a warrant to search the home for drugs. Upon execution of the warrant, more than 100 marijuana plants were found and Kyllo was
Lusch, Achim; Liss, Michael A; Greene, Peter; Abdelshehid, Corollos; Menhadji, Ashleigh; Bucur, Philip; Alipanah, Reza; McDougall, Elspeth; Landman, Jaime
2013-12-01
To evaluate performance characteristics and optics of a new generation high-definition distal sensor (HD-DS) flexible cystoscope, a standard-definition distal sensor (SD-DS) cystoscope, and a standard fiberoptic (FO) cystoscope. Three new cystoscopes (HD-DS, SD-DS, and FO) were compared for active deflection, irrigation flow, and optical characteristics. Each cystoscope was evaluated with an empty working channel and with various accessories. Optical characteristics (resolution, grayscale imaging, color representation, depth of field, and image brightness) were measured using United States Air Force (USAF)/Edmund Optics test targets and illumination meter. We digitally recorded a porcine cystoscopy in both clear and blood fields, with subsequent video analysis by 8 surgeons via questionnaire. The HD-DS had a higher resolution than the SD-DS and the FO at both 20 mm (6.35 vs 4.00 vs 2.24 line pairs/mm) and 10 mm (14.3 vs 7.13 vs 4.00 line pairs/mm) evaluations, respectively (P <.001 and P <.001). Color representation and depth of field (P = .001 and P <.001) were better in the HD-DS. When compared to the FO, the HD-DS and SD-DS demonstrated superior deflection up and irrigant flow with and without accessory present in the working channel, whereas image brightness was superior in the FO (P <.001, P = .001, and P <.001, respectively). Observers deemed the HD-DS cystoscope superior in visualization in clear and bloody fields, as well as for illumination. The new HD-DS provided significantly improved visualization in a clear and a bloody field, resolution, color representation, and depth of field compared to SD-DS and FO. Clinical correlation of these findings is pending. Copyright © 2013 Elsevier Inc. All rights reserved.
Implementing an electronic medication overview in Belgium.
Storms, Hannelore; Marquet, Kristel; Nelissen, Katherine; Hulshagen, Leen; Lenie, Jan; Remmen, Roy; Claes, Neree
2014-12-16
An accurate medication overview is essential to reduce medication errors. Therefore, it is essential to keep the medication overview up-to-date and to exchange healthcare information between healthcare professionals and patients. Digitally shared information yields possibilities to improve communication. However, implementing a digitally shared medication overview is challenging. This articles describes the development process of a secured, electronic platform designed for exchanging medication information as executed in a pilot study in Belgium, called "Vitalink". The goal of "Vitalink" is to improve the exchange of medication information between professionals working in healthcare and patients in order to achieve a more efficient cooperation and better quality of care. Healthcare professionals of primary and secondary health care and patients of four Belgian regions participated in the project. In each region project groups coordinated implementation and reported back to the steering committee supervising the pilot study. The electronic medication overview was developed based on consensus in the project groups. The steering committee agreed to establish secured and authorized access through the use of electronic identity documents (eID) and a secured, eHealth-platform conform prior governmental regulations regarding privacy and security of healthcare information. A successful implementation of an electronic medication overview strongly depends on the accessibility and usability of the tool for healthcare professionals. Coordinating teams of the project groups concluded, based on their own observations and on problems reported to them, that secured and quick access to medical data needed to be pursued. According to their observations, the identification process using the eHealth platform, crucial to ensure secured data, was very time consuming. Secondly, software packages should meet the needs of their users, thus be adapted to daily activities of healthcare professionals. Moreover, software should be easy to install and run properly. The project would have benefited from a cost analysis executed by the national bodies prior to implementation.
Aerospace Communications Security Technologies Demonstrated
NASA Technical Reports Server (NTRS)
Griner, James H.; Martzaklis, Konstantinos S.
2003-01-01
In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to the intercom system for audio surveillance. Audio, video, and "black box" data were simultaneously streamed to the ground, where they were displayed to a Glenn audience of senior management and aviation security team members.
ICT and the future of health care: aspects of doctor-patient communication.
Haluza, Daniela; Jungwirth, David
2014-07-01
The current digital revolution is particularly relevant for interactions of healthcare providers with patients and the community as a whole. The growing public acceptance and distribution of new communication tools such as smart mobile phones provide the prerequisite for information and communication technology (ICT) -assisted healthcare applications. The present study aimed at identifying specifications and perceptions of different interest groups regarding future demands of ICT-supported doctor-patient communication in Austria. German-speaking Austrian healthcare experts (n = 73; 74 percent males; mean age, 43.9 years; SD 9.4) representing medical professionals, patient advocates, and administrative personnel participated in a 2-round online Delphi process. Participants evaluated scenario-based benefits and obstacles for possible prospect introduction as well as degree of innovation, desirability, and estimated implementation dates of two medical care-related future set ups. Panelists expected the future ICT-supported doctor-patient dialogue to especially improve the three factors doctors-patient relationship, patients' knowledge, and quality of social health care. However, lack of acceptance by doctors, data security, and monetary aspects were considered as the three most relevant barriers for ICT implementation. Furthermore, inter-group comparison regarding desirability of future scenarios showed that medical professionals tended to be more skeptical about health-related technological innovations (p < .001). The findings of this survey revealed different expectations among interest groups. Thus, we suggest building taskforces and using workshops for establishing a dialogue between stakeholders to positively shape the future of ICT-supported collaboration and communication between doctors and patients.
Kim, Tae Yong; Hong, Sung A; Yang, Sung
2015-03-17
In this study, we describe a novel solid-state thin-film Ag/AgCl reference electrode (SSRE) that was coated with a protective layer of graphene oxide (GO). This layer was prepared by drop casting a solution of GO on the Ag/AgCl thin film. The potential differences exhibited by the SSRE were less than 2 mV for 26 days. The cyclic voltammograms of the SSRE were almost similar to those of a commercial reference electrode, while the diffusion coefficient of Fe(CN)63- as calculated from the cathodic peaks of the SSRE was 6.48 × 10-6 cm2/s. The SSRE was used in conjunction with a laboratory-made working electrode to determine its suitability for practical use. The average pH sensitivity of this combined sensor was 58.5 mV/pH in the acid-to-base direction; the correlation coefficient was greater than 0.99. In addition, an integrated pH sensor that included the SSRE was packaged in a secure digital (SD) card and tested. The average sensitivity of the chip was 56.8 mV/pH, with the correlation coefficient being greater than 0.99. In addition, a pH sensing test was also performed by using a laboratory-made potentiometer, which showed a sensitivity of 55.4 mV/pH, with the correlation coefficient being greater than 0.99.
Miao, Fen; Cheng, Yayu; He, Yi; He, Qingyun; Li, Ye
2015-05-19
Continuously monitoring the ECG signals over hours combined with activity status is very important for preventing cardiovascular diseases. A traditional ECG holter is often inconvenient to carry because it has many electrodes attached to the chest and because it is heavy. This work proposes a wearable, low power context-aware ECG monitoring system integrated built-in kinetic sensors of the smartphone with a self-designed ECG sensor. The wearable ECG sensor is comprised of a fully integrated analog front-end (AFE), a commercial micro control unit (MCU), a secure digital (SD) card, and a Bluetooth module. The whole sensor is very small with a size of only 58 × 50 × 10 mm for wearable monitoring application due to the AFE design, and the total power dissipation in a full round of ECG acquisition is only 12.5 mW. With the help of built-in kinetic sensors of the smartphone, the proposed system can compute and recognize user's physical activity, and thus provide context-aware information for the continuous ECG monitoring. The experimental results demonstrated the performance of proposed system in improving diagnosis accuracy for arrhythmias and identifying the most common abnormal ECG patterns in different activities. In conclusion, we provide a wearable, accurate and energy-efficient system for long-term and context-aware ECG monitoring without any extra cost on kinetic sensor design but with the help of the widespread smartphone.
NASA Astrophysics Data System (ADS)
Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam
2016-08-01
Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.