Search is not available for this dataset
query
stringlengths
1
13.4k
pos
stringlengths
1
61k
neg
stringlengths
1
63.9k
query_lang
stringclasses
147 values
__index_level_0__
int64
0
3.11M
A heterotrimetallic Pd–Sm–Pd complex for asymmetric Friedel–Crafts alkylations of pyrroles with nitroalkenes
Catalytic asymmetric Friedel-Crafts alkylations of pyrroles and nitroalkenes were carried out by using a novel heterotrimetallic Pd-Sm-Pd catalyst based on a simple chiral ligand 1, to give the adducts with high yields and up to 93% ee.
The invention relates to a method for manufacturing series silver nano-sheets in a batch. The method includes dividing polyhydric alcohol, dimethyl formamide, high-polymer surfactant, metal salt adjuvant containing halogen and metal silver salt into three batches to be treated by the aid of the metal salt adjuvant containing the halogen; then uniformly mixing the materials; and obtaining the series silver nano-sheets by means of heating reaction. The silver nano-sheets are uniform in shape, high in purity, fine in monodispersity and low in cost, a reaction device is simple, large-scale preparation of the silver nano-sheets can be realized, and the method has an industrial prospect.
eng_Latn
17,700
Synthesis and Size Control of LiFePO_4 Nano-materials by a Solvothermal Method
Uniform lithium iron phosphate nano-particles were obtained by a solvothermal method,using ethylene glycol as the solvent,while lithium hydroxide,ferrous sulfate and phosphoric acid were used as Li+,Fe2+and PO3-4 sources,respectively.And effects of the reaction time and molar ratio among the reactants were also investigated.Meanwhile,LiFePO4 nano-particles with different sizes were synthesized with addition of heterologous seed crystals when the otherwise reaction conditions were same.The products were characterized by X-ray diffraction(XRD),Fourier transform infrared spectroscopy(FTIR)and transmission electron microscopy(TEM).Experiment results indicated that with the starting materials in a molar ratio(Li+∶Fe2+∶PO3-4)of 2.7∶1.0∶1.0,aging at 180 ℃for 12 h,the obtained flake like diamond nano-particles were orthorhombic phase LiFePO4(space group Pnma),while significant changes happened on the size of LiFePO4nano-particles obtained by adding heterologous seed crystals.
Abstract During the past two decades, the use of immobilized glucose isomerase for the production of high-fructose corn syrup has evolved into a highly optimized industrial process. The desire for higher process temperatures has stimulated the screening of extreme thermophilic organisms for more thermostable glucose isomerases; protein engineering techniques have also been successfully used to develop more thermostable enzymes.
eng_Latn
17,701
N-Heterocyclic carbene catalyzed dehydrogenative coupling of enals: synthesis of monobactams
The first NHC-catalyzed dehydrogenative coupling of enals is described. With a suitable combination of NHC precatalyst, base, and solvent, the reaction proceeded smoothly to yield a wide range of monobactams. These substituted monobactams have been synthesized for the first time, and they are versatile synthetic intermediates toward other useful complex molecules.
Vertically aligned carbon nanotubes (VACNTs) were grown on the inner wall of the pores of an anodic aluminum oxide template by using chemical vapor deposition. The versatile bipolar electrochemistry approach was applied to selectively modify the tubes at one end with an organic layer of 4-aminophenyl moieties. The presence of the template during the bipolar experiments intrinsically protects the outer surface of the tubes from the grafting of the organic layer. The layer is, thus, not only selectively grafted at the cathodic side of the tubes, but also exclusively onto the inner surface of the tubes. For longer deposition times, one end of the tubes was completely capped with a dense organic layer. Thus, bipolar electrochemistry can not only generate CNTs bearing organic functionalities on the tube surface for biosensing or bio-electrocatalytic applications, but can also create a dense organic layer as a cap at one end of the tubes, opening up applications in the fields of drug storage and delivery.
eng_Latn
17,702
Quartz crystal microbalance, an efficient tool to design supramolecular structure on solid substrate
Beyond interest of these step by step synthese of linear and branched DNA polymers, this work demonstrates that the quartz crystal microbalance is a sensitive tool to design supramolecular biostructures on solid substrate by following in situ thermodynamic and kinetics of successive reactions.
This study investigated the acute antioxidative effects of multiscale nano-SiO_2 in organ of specific pathogen free(SPF) mice of the ICR strain.The mice were randomly divided into five groups and were intravenously injected with a multiscale nano-SiO_2 suspension except for the control group.After 72 h observation,all the mice were killed and their liver,kidney and spleen extracts were measured for total protein(TP),superoxide dismutase(T-SOD),glutathione peroxidase(GSH-PX)and malondialdehyde(MDA).The results show that 20.3 nm SiO_2 has the most toxic effect to mice,followed by 49.8 nm and 80.0 nm SiO_2.The 800.0 nm SiO_2 has the weakest toxicity.This finding fully illustrates the scale effect of nano-scale particles.Statistical analysis shows that oxidative damage can possibly occur in liver(P(0.01).) MDA is the most sensitive indicators in antioxidant enzyme system.The difference is very obvious(P(0.01),)but other indexes don't perform their significant difference(P0.05).
eng_Latn
17,703
Efficient synthesis of the C/D rings of atisine-type C20-diterpenoid alkaloids
Abstract A bicyclo[2.2.2]octane C/D ring system, with a lactonic ring at C-8 and C-9, of the atisine-type C 20 -diterpenoid alkaloids, was successfully synthesized, using an oxidative dearomatization/intramolecular Diels–Alder reaction.
We report a unique approach in which living cells direct their integration into 3D solid-state nanostructures. Yeast cells deposited on a weakly condensed lipid/silica thin film mesophase actively reconstruct the surface to create a fully 3D bio/nano interface, composed of localized lipid bilayers enveloped by a lipid/silica mesophase, through a self-catalyzed silica condensation process. Remarkably, this integration process selects exclusively for living cells over the corresponding apoptotic cells (those undergoing programmed cell death), via the development of a pH gradient, which catalyzes silica deposition and the formation of a coherent interface between the cell and surrounding silica matrix. Added long-chain lipids or auxiliary nanocomponents are localized within the pH gradient, allowing the development of complex active and accessible bio/nano interfaces not achievable by other synthetic methods. Overall, this approach provides the first demonstration of active cell-directed integration into a n...
eng_Latn
17,704
CHIRAL SYNTHESIS OF (+)-8'-DEMETHYL ABSCISIC ACID
An enantioselective synthesis of (+)-8′-demethyl ABA (2) is described. The chiral intermediate 7 was prepared by yeast reduction of a substituted monoprotected cyclohexa-2,5-dien-1,4-dione (9) synthesized through a phenol oxidation. The scope and limitations of the phenol oxidation is described. 8′-Demethyl ABA shows ABA-like activity in wheat embryo germination inhibition, showing that the 8′-methyl group is not essential for biological activity. Key words: abscisic acid, phenol oxidation, yeast reduction.
We report a unique approach in which living cells direct their integration into 3D solid-state nanostructures. Yeast cells deposited on a weakly condensed lipid/silica thin film mesophase actively reconstruct the surface to create a fully 3D bio/nano interface, composed of localized lipid bilayers enveloped by a lipid/silica mesophase, through a self-catalyzed silica condensation process. Remarkably, this integration process selects exclusively for living cells over the corresponding apoptotic cells (those undergoing programmed cell death), via the development of a pH gradient, which catalyzes silica deposition and the formation of a coherent interface between the cell and surrounding silica matrix. Added long-chain lipids or auxiliary nanocomponents are localized within the pH gradient, allowing the development of complex active and accessible bio/nano interfaces not achievable by other synthetic methods. Overall, this approach provides the first demonstration of active cell-directed integration into a n...
yue_Hant
17,705
alpha3beta1-integrin regulates hair follicle but not interfollicular morphogenesis in adult epidermis.
α3β1-integrin is abundantly expressed in the epidermis, and in ::: mice, ablation of the α 3 gene results in embryonic defects and ::: perinatal lethality. To determine the role of α3-integrin in adult skin ::: development, we grafted skin from newborn α3-integrin-deficient mice on ::: to ICRF nu/nu recipients. We report that adult α3-integrin-deficient ::: skin has severe abnormalities restricted to hair follicle morphology, which ::: include stunted hair follicle growth, increased hair follicle fragility, ::: aberrant pigment accumulation and formation of hair follicle clusters. These ::: abnormalities are caused by a combination of defects in: (1) keratinocyte ::: cytoskeletal organisation, (2) outer root sheath architecture and (3) ::: integrity of the lamina densa. Our results indicate that α3β1 is ::: not essential for adult interfollicular epidermal differentiation, but it is ::: required to direct several processes important in hair follicle maintenance ::: and morphogenesis.
We report a unique approach in which living cells direct their integration into 3D solid-state nanostructures. Yeast cells deposited on a weakly condensed lipid/silica thin film mesophase actively reconstruct the surface to create a fully 3D bio/nano interface, composed of localized lipid bilayers enveloped by a lipid/silica mesophase, through a self-catalyzed silica condensation process. Remarkably, this integration process selects exclusively for living cells over the corresponding apoptotic cells (those undergoing programmed cell death), via the development of a pH gradient, which catalyzes silica deposition and the formation of a coherent interface between the cell and surrounding silica matrix. Added long-chain lipids or auxiliary nanocomponents are localized within the pH gradient, allowing the development of complex active and accessible bio/nano interfaces not achievable by other synthetic methods. Overall, this approach provides the first demonstration of active cell-directed integration into a n...
eng_Latn
17,706
The Research of De-foaming Methods of Bio-artificial Liver System
Objective: Search for the right de-foaming methods for bio-artificial liver system. Material and methods: Choose harmless material to animal's cell and physical de-foaming methods. Results and Conclusion: We have found out the effective and feasible methods through comparing some methods' results. This methods' merit is that it don't change the ingredient and physical condition of the medium.
In this issue of Chemistry & Biology, Alexander and Cravatt propose a model for the binding of carbamate inhibitors to fatty acid amide hydrolase (FAAH), the enzyme that breaks down signaling lipids. Using competitive activity-based protein profiling and click chemistry, they designed potent and selective FAAH inhibitors and characterized their off-target reactions.
eng_Latn
17,707
Kapitza conductance of silicon–amorphous polyethylene interfaces by molecular dynamics simulations
We use nonequilibrium molecular dynamics simulation to elucidate the interfacial thermal conductance between single-crystal silicon and amorphous polyethylene. In particular, we investigate the role of solid stiffness and the bonding strength across the interface on the interfacial thermal conductance. Simulations of interfacial scattering of individual phonon wave packets indicate that neither diffuse mismatch model nor acoustic mismatch model describes the interfacial scattering process quantitatively. In general, transmission coefficients for longitudinal phonons are significantly higher than those for transverse phonons. We also observe that anharmonic processes can be important for interfacial conductance.
Finding environmentally gentle methods to graft Lewis acid on the surface of mesoporous materials is a topic of current interest. Herein we describe the optimization of a preparation procedure of a mesoporous silica-supported ErIII catalyst using the microwave-assisted post-calcination functionalization of Mobil Composition of Matter-41 silica as the key step. The required time for functionalization was reduced from several hours to 10 min using sealed-vessel microwave technology. Control experiments using conventional heating at the same temperature demonstrated that the rate increase is owing to a simple thermal/kinetic effect as a result of the higher reaction temperature. The resulting ErIII catalyst was tested for the first time as a catalyst in the continuous flow deprotection of benzaldehyde dimethylacetal and a complete leaching study was performed.
eng_Latn
17,708
Efficient and one‐pot catalytic synthesis of 2‐imidazolines and bis‐imidazolines with p‐toluenesulfonic acid under solvent free conditions
A practical, efficient, and inexpensive method for the synthesis of 2-imidazoline from the reaction of nitriles with ethylenediamine or 1,2-propanediamine using p-toluenesulfonic acid or pyridinium p-toluenesulfonate under reflux conditions is reported. This catalyst can be successfully applied for the chemoselective conversion of dicyanobenzenes to corresponding mono- and bis-imidazolines. The applications of these catalysts are feasible because of easy preparation, easy handling, stability, inexpensive, good activity, and eco-friendly. J. Heterocyclic Chem., (2011).
We report a unique approach in which living cells direct their integration into 3D solid-state nanostructures. Yeast cells deposited on a weakly condensed lipid/silica thin film mesophase actively reconstruct the surface to create a fully 3D bio/nano interface, composed of localized lipid bilayers enveloped by a lipid/silica mesophase, through a self-catalyzed silica condensation process. Remarkably, this integration process selects exclusively for living cells over the corresponding apoptotic cells (those undergoing programmed cell death), via the development of a pH gradient, which catalyzes silica deposition and the formation of a coherent interface between the cell and surrounding silica matrix. Added long-chain lipids or auxiliary nanocomponents are localized within the pH gradient, allowing the development of complex active and accessible bio/nano interfaces not achievable by other synthetic methods. Overall, this approach provides the first demonstration of active cell-directed integration into a n...
eng_Latn
17,709
Samarium(II)-mediated reaction of allylic phosphate esters with carbonyl compounds: A new method for “Umpolung” of allylic phosphates
Abstract Allylic phosphates allylate ketones and aldehydes in the presence of samarium(II) iodide. The coupling proceeds with the preservation of the olefin geometry, however, regio- and stereoselectivity are not high.
Abstract For improvement of vanadium redox flow battery (VRB) performance, novel amphoteric semi-interpenetrating membranes (ASIPN) were prepared using poly(ether ether ketone) (PEEK) and polysulfone (PSf), the former bearing sulfonic groups and the latter imidazolium. These two groups form ionic crosslinks between PEEK and PSf; meanwhile, covalent cross links were built between PSf chains with addition of N-(3-aminopropyl)-imidazole. The amphoteric nature of the membrane allows facile proton and anion transport; the IPN structure and the presence of imidazolium cation effectively suppress vanadium ion crossover through the membrane. Therefore, the ASIPN based VRBs show higher Coulombic efficiency and energy efficiency than that assembled with pristine SPEEK and Nafion 212 membranes. Our work demonstrates that the ASIPN membranes are promising for VRB applications.
eng_Latn
17,710
Effect of a Purified Excreted Factor from Leishmania brasiliensis on Macrophage Activity
The effect of a purified glycoprotein excreted to the culture medium by Leishmania brasiliensis on the endocytic and degradative capacity of macrophages was studied. It was demonstrated that 125I-albumin incorporation as well as its intracellular fate by mouse peritoneal or tumor J774-G8 macrophages was greatly reduced when they were treated with excreted factor (EF). EF appears to alter also membrane properties in addition to its intracellular effect. The results are discussed in relation to the Leishmania survival mechanism inside the host macrophages and its pathogenicity.
The present invention was enhanced was produced by mechanical alloying with encapsulated metal (or valence of zero) nanoparticles and second metal components by the microorganism, it relates to a novel material having catalytic properties. Microbial biomass it is possible to prevent aggregation during mechanical alloying process, it is possible to maximize the contact area for molecular reconstructed by biological encapsulation. Thereby resulting product, at least 1% of the dry weight of the material is composed of microbial biomass, a metal alloy having enhanced catalytic properties.
eng_Latn
17,711
Study on Polymerization Dynamics of CSA Cracking Resin Emulsion
The CSA cracking resin emulsion has been prepared by emulsion copolymerization. The influence of the amounts of emulsifier and initiator, and the polymerization temperature on the transform ratio of monomer and the emulsion properties has been discussed in this paper. It has been calculated that the apparent activation energy of influence on stage polymerization ratio in the early about temperature is 107.88 kJ/mol.
We report a unique approach in which living cells direct their integration into 3D solid-state nanostructures. Yeast cells deposited on a weakly condensed lipid/silica thin film mesophase actively reconstruct the surface to create a fully 3D bio/nano interface, composed of localized lipid bilayers enveloped by a lipid/silica mesophase, through a self-catalyzed silica condensation process. Remarkably, this integration process selects exclusively for living cells over the corresponding apoptotic cells (those undergoing programmed cell death), via the development of a pH gradient, which catalyzes silica deposition and the formation of a coherent interface between the cell and surrounding silica matrix. Added long-chain lipids or auxiliary nanocomponents are localized within the pH gradient, allowing the development of complex active and accessible bio/nano interfaces not achievable by other synthetic methods. Overall, this approach provides the first demonstration of active cell-directed integration into a n...
kor_Hang
17,712
Polymer-assisted fabrication of gold nanoring arrays
In this paper, we report a new strategy for the fabrication of gold nanoring arrays via colloidal lithography and polymer-assisted self-assembly of gold nanoparticles (Au NPs). First, multi-segmented polymer nanorod arrays were fabricated via colloidal lithography. They were then used as templates for Au NP adsorption, which resulted in nanoparticles on the poly(4-vinyl pyridine) (P4VP) segments. Continuous gold nanorings were formed after electroless deposition of gold. The diameter, quantity, and spacing of the gold nanorings could be tuned. Three dimensional coaxial gold nanorings with varying diameters could be fabricated on a polymer nanorod by modifying the etch parameters. The nanorings exhibited optical plasmonic resonances at theoretically predicted wavelengths. In addition, the polymer-assisted gold nanorings were released from the substrate to generate a high yield of free-standing nanorings. This simple, versatile method was also used to prepare nanorings from other metals such as palladium.
Aryl groups bound to the meso positions of porphyrins often react with neighboring groups, in particular s-acyl groups to give highly diversified monomeric and dimeric new functionalized porphyrins. The products, whose meso-aryl ring approaches coplanarity with the porphyrin macrocycle, show large shifts of UV-visible absorption bands and various potentialities for building external chelating moieties and assembling oligoporphyrins.
eng_Latn
17,713
Spectroscopic studies of Fe(III) ion-exchanged ETS-10 and ETAS-10 molecular sieves
Two new titanium silicate molecular sieves, designated ETS-10 and ETAS-10, have been ion-exchanged with Fe(III). Both products exhibit prominent EPR signals, at g = 6.0 and 4.3, that are assigned to populations of ferric iron on the surface and in the interior cavities, respectively, of the molecular sieve microcrystals. Corollary XPS measurements on these samples indicate that a substantial fraction of the surface iron is present as Fe(II). Chemical modification procedures have been explored in an effort to produce ion-exchanged materials containing no exterior iron. Acid treatment (pH 1.0) proved to be an effective means of achieving this goal in the case of ETS-10-based materials. ETAS-10-based samples do not retain their crystallinity under these conditions. 35 refs., 4 figs., 2 tabs.
Single-cell encapsulation promises the cytoprotection of the encased cells against lethal stressors, reminiscent of the sporulation process in nature. However, the development of a cytocompatible method for chemically mimicking the germination process (i.e., shell degradation on-demand) has been elusive, despite the shell degradation being pivotal for the practical use of functional cells as well as for single cell-based biology. We report that an artificial shell, composed of tannic acid (TA) and FeIII, on individual Saccharomyces cerevisiae controllably degrades on-demand, while protecting the yeast from multiple external aggressors, including UV-C irradiation, lytic enzymes, and silver nanoparticles. Cell division is suppressed by the TA–FeIII shell, but restored fully upon shell degradation. The formation of a TA–FeIII shell would provide a versatile tool for achieving the chemical version of “sporulation and germination”.
eng_Latn
17,714
The effect of sintering on the grain boundary conductivity of lithium lanthanum titanates
Abstract The Li-ion conductivity is a sensitive function of the composition and the microstructure for the perovskite-type Li-ion conductor. In this study, the effect of sintering temperature and thus microstructure and Li loss on the grain boundary conductivity of Li-conducting La 0.57 Li x TiO 3 ( x =0.3 and 0.35) were studied. The grain and the grain boundary conductivity were obtained from the impedance patterns. As the sintering temperature increased from 1100°C to 1350°C, the Li content decreased due to the evaporation of Li during sintering. The samples were nearly fully dense after sintering at 1200°C or above. The grain boundary conductivity increased rapidly with sintering temperature due to the increasing grain size. When the grain conductivity was nearly independent on the sintering condition, the grain boundary conductivity change was mostly explained by the microstructural change. Some possible reasons for the low grain boundary conductivity was discussed.
We report a unique approach in which living cells direct their integration into 3D solid-state nanostructures. Yeast cells deposited on a weakly condensed lipid/silica thin film mesophase actively reconstruct the surface to create a fully 3D bio/nano interface, composed of localized lipid bilayers enveloped by a lipid/silica mesophase, through a self-catalyzed silica condensation process. Remarkably, this integration process selects exclusively for living cells over the corresponding apoptotic cells (those undergoing programmed cell death), via the development of a pH gradient, which catalyzes silica deposition and the formation of a coherent interface between the cell and surrounding silica matrix. Added long-chain lipids or auxiliary nanocomponents are localized within the pH gradient, allowing the development of complex active and accessible bio/nano interfaces not achievable by other synthetic methods. Overall, this approach provides the first demonstration of active cell-directed integration into a n...
eng_Latn
17,715
INVESTIGATION ON SELECTIVE DOPING OF POLYANILINE ENCAPSULATED IN THE CHANNELS OF ZEOLITE MOLECULAR-SIEVES
The aniline encapsulated in the channels of zeolite molecular sieves was polymerized electrochemically. The doping reaction of polyaniline was studied in 12-Molybdophosphoric acid and sulfuric acid solution. The results indicate the zeolite modified ele
RESPECT THE INVENTION COMPOSITION HAVING organopolysiloxane ORGANOPOLYSILOXANE HAVING AT LEAST ONE RADICAL VINYL A organohydropolysiloxane, CATALYST COMPLEX METAL PLATINUM GROUP AND AT LEAST ONE INHIBITORS WHICH IS ORGANIC COMPOUND allene WITH BOILING POINT OF AT LEAST 25C. THE COMPOSITIONS ACCORDING TO THE INVENTION ARE USED TO MAKE MATERIAL NOT aDHERE TO OTHER MATERIALS TO WHICH normally adhere.
yue_Hant
17,716
Observation of Effective Micro-Organisms Attached on Porous Ceramics
Effective micro-organisms (EM) increase the natural resistance of soil and plants, and it considerably improves the quality and fertility of soil as well as the growth and quality of crops. In this study, we prepared two types of porous ceramics with high and low porosity, and observed the attaching behavior of micro-organisms to the surface of ceramics. In the case of highly porous ceramics with large pore (80% in porosity), many of micro-organisms were observed in the pores of interior as well as on the ceramic surfaces. However, most of micro-organisms attached on the surface of the low porous ceramics with small pore (45% porosity), and only a few micro-organisms observed in pore inside.
It all clicks into place: A potent telomere-targeting small molecule has been identified by using the copper-free 1,3-dipolar cycloaddition of a series of alkyne and azide building blocks catalyzed by a non-Watson-Crick DNA secondary structure (see picture). This method rapidly identifies, otherwise unanticipated, potent small-molecule probes to selectively target a given RNA or DNA.
eng_Latn
17,717
Antioxidants, free radicals, storage proteins, puroindolines, and proteolytic activities in bread wheat (Triticum aestivum) seeds during accelerated aging.
Seeds of bread wheat were incubated at 40 degrees C and 100% relative humidity for 0, 3, 4, 6, and 10 days. The effects of accelerated aging on seed germinability and some biochemical properties of flour (carotenoid, free radical, and protein contents and proteolytic activity) and gluten (free radical content and flexibility) were investigated. Seed germinability decreased during aging, resulting in seed death after 10 days. A progressive decrease of carotenoid content, in particular, lutein, was observed, prolonging the incubation, whereas the free radical content increased in both flour and gluten. A degradation of soluble and storage proteins was found, associated with a marked increase of proteolytic activity and a loss of viscoelastic properties of gluten. On the contrary, puroindolines were quite resistant to the treatment. The results are discussed in comparison with those previously obtained during accelerated aging of durum wheat seeds.
We report a unique approach in which living cells direct their integration into 3D solid-state nanostructures. Yeast cells deposited on a weakly condensed lipid/silica thin film mesophase actively reconstruct the surface to create a fully 3D bio/nano interface, composed of localized lipid bilayers enveloped by a lipid/silica mesophase, through a self-catalyzed silica condensation process. Remarkably, this integration process selects exclusively for living cells over the corresponding apoptotic cells (those undergoing programmed cell death), via the development of a pH gradient, which catalyzes silica deposition and the formation of a coherent interface between the cell and surrounding silica matrix. Added long-chain lipids or auxiliary nanocomponents are localized within the pH gradient, allowing the development of complex active and accessible bio/nano interfaces not achievable by other synthetic methods. Overall, this approach provides the first demonstration of active cell-directed integration into a n...
eng_Latn
17,718
Effect of pericytes on epithelial-to-mesenchymal transition in melanoma.
84 Background: Melanoma-associated stroma cells play an important role in supporting cancer cell proliferation, invasion, and dissemination. Increased invasiveness has been observed in cancer cells undergoing epithelial-to-mesenchymal transition (EMT); however, it is unknown whether EMT is facilitated by stroma cells. We showed that pericytes constitute a predominant stroma subpopulation that promotes melanoma growth by interacting with cancer cells. This study investigates the mechanism by which pericytes facilitate melanoma development. Methods: GFP+ pericytes isolated from tumors and adipose tissue were co-cultured in vitro with B16 melanoma cells at a 3:1 ratio. After 4 days, proliferation of B16 cells and pericytes was assessed. Also, co-cultures were labeled for several markers and analyzed by flow cytometry (FC). Tumorigenicity was investigated by isolating B16 cells from co-cultures by FACS sorting and then injected into SCID mice to measure tumor growth. Results: B16 cells induced pericyte differ...
Abstract Literature sources on metal-organic materials encapsulating versatile porphyrinoids and heme enzymes have been discussed in this review. General fundamentals and structural and chemical requisites of these architectures are discussed in introduction followed by historical perspectives of the initial composites. We have categorized the structural aspects of this class of compounds according to the host and guest skeletons as well as encapsulating strategies in a sequential manner. Heme mimetic, as well as some novel applications of the materials including oxidation, electron transfer, carbene transfer and bio-molecule sensing, are then discussed and compared with each other and their homogeneous analogues based on mechanistic similarities, wherever possible.
eng_Latn
17,719
Monolayer WS2 Nanopores for DNA Translocation with Light-Adjustable Sizes
Bandgap Engineering of Strained Monolayer and Bilayer MoS2
Controlled Scalable Synthesis of Uniform, High-Quality Monolayer and Few-layer MoS2 Films
eng_Latn
17,720
Fabricating multi-material nanofabrics using rotary jet spinning
Engineering anisotropic biphasic Janus-type polymer nanofiber scaffold networks via centrifugal jet spinning
Human intelligence and brain networks
eng_Latn
17,721
Smart Polymeric Gels: Redefining the Limits of Biomedical Devices.
Synthetic biomaterials as instructive extracellular microenvironments for morphogenesis in tissue engineering
SWIM: synthesizing what i mean: code search and idiomatic snippet synthesis
eng_Latn
17,722
Nanotechnology for a Safe and Sustainable Water Supply: Enabling Integrated Water Treatment and Reuse
Designing biomimetic antifouling surfaces
Mathematical modeling of the capacity fade of Li-ion cells
eng_Latn
17,723
Applications and Challenges of Wearable Visual Lifeloggers
A head-mounted three dimensional display
Using DNA to program the self-assembly of colloidal nanoparticles and microparticles
eng_Latn
17,724
what is nanobiotechnology
Nanobiotechnology is biotechnology at the nano scale, and it has exciting applications in drug delivery systems, diagnostic medical tests and regenerative medicine. North Carolina universities and companies are developing many new nanobiotechnology applications. The goal of this chapter is to help students understand the science concepts on which nanobiotechnology is based and explore some of the many career possibilities in this exciting field. It also is intended to provide a snapshot of some of the leading nanobiotechology research and manufacturing efforts in
Nanotechnologies are technologies that use engineered materials or devices with the smallest functional organization on the nanometre scale (that is, one billionth of a metre) in at least one dimension, typically ranging from 1 to 100 nanometres.
eng_Latn
17,725
what do micelles help absorb?
Micelles are necessary because they transport the poorly soluble monoglycerides and fatty acids to the surface of the enterocyte where they can be absorbed. As well, micelles contain fat soluble vitamins and cholesterol. The figure at right illustrates that micelles are small enough to fall between the the microvilli.
Micellar solubilization. Micellar solubilization (solubilization) is the process of incorporating the solubilizate (the component that undergoes solublization) into or onto micelles. Solublization may occur in a system consisting of a solvent, an association colloid (a colloid that forms micelles), and at least one other solubilizate.
eng_Latn
17,726
what is activase
Activase ® (alteplase) is indicated for treating patients with acute ischemic stroke (AIS), which is caused by a blood clot in the brain’s blood vessels. Patients can receive Activase only if they begin treatment within 3 hours after their stroke symptoms start and only after bleeding in the brain has been ruled out.
activator - (biology) any agency bringing about activation; a molecule that increases the activity of an enzyme or a protein that increases the production of a gene product in DNA transcription. biocatalyst - a biochemical catalyst such as an enzyme. enzyme - any of several complex proteins that are produced by cells and act as catalysts in specific biochemical reactions. platinum black - a fine black powder of platinum; used as a catalyst in chemical reactions.
eng_Latn
17,727
Heterogeneity of human platelet density subpopulations in aggregation secretion of ATP and cytosolic-free calcium concentration
Toward the Relevance of Platelet Subpopulations for Transfusion Medicine
Inferring Ground Truth From Crowdsourced Data Under Local Attribute Differential Privacy
eng_Latn
17,728
Transient Reduction of the Drag Coefficient of Charged Droplets via the Convective Reversal of Stagnant Caps
A novel hypothesis for atherosclerosis as a cholesterol sulfate deficiency syndrome
Inferring Ground Truth From Crowdsourced Data Under Local Attribute Differential Privacy
eng_Latn
17,729
Also, much of the information maintained by federal agencies, although unclassified, is extremely sensitive, and many automated operations are attractive targets for individuals or organizations with malicious intentions, such as committing fraud for personal gain or sabotaging federal operations.
A lot of information is maintained by federal agencies and is sensitive.
None of the information maintained by federal agencies is sensitive.
eng_Latn
17,730
Preserving privacy between features in distributed estimation: Preserving Privacy Between Features in Distributed Estimation
Inferring Ground Truth From Crowdsourced Data Under Local Attribute Differential Privacy
No evidence for apparent extent between parallels as the basis of the Poggendorff effect
eng_Latn
17,731
Attribute-Based Data Dissemination for Internet Applications
Adapting to network and client variability via on-demand dynamic distillation
Lossless watermarking of categorical attributes for verifying medical data base integrity
kor_Hang
17,732
Privacy-enhanced Location-based Access Control
Protecting Privacy Against Location-Based Personal Identification
Plasma Plasminogen Activator Inhibitor-1 Is Associated with End-Stage Proliferative Diabetic Retinopathy in the Northern Chinese Han Population
eng_Latn
17,733
Private query on encrypted data in multi-user settings
Software protection and simulation on oblivious RAMs
High-affinity glucose uptake in Saccharomyces cerevisiae is not dependent on the presence of glucose-phosphorylating enzymes
eng_Latn
17,734
Survey on Privacy Preserving Scheme for Hotspots in
A Physical-Layer Location Privacy-Preserving Scheme for Mobile Public Hotspots in NEMO-Based VANETs
Oral spray wintertime vitamin D3 supplementation has no impact on inflammation in Gaelic footballers
eng_Latn
17,735
To be processed within a healthgrid environment, medical data goes through a complete lifecycle and several stages until it is finally used for the primary reason it has been collected for. This stage is not always the final occurrence of when the data would have been manipulated. The data could rather continue to be needed for secondary purposes of legitimate or non legitimate nature. Although other privacy issues are related to the processing of patient data while it is residing on a healthgrid environment, the control of data disclosure is our primary interest. When sharing medical data between different Healthcare and biomedical research organizations in Europe, it is important that the different parties involved in the sharing handle the data in the same way indicated by the legislation of the member state where the data was originally collected as the requirements might differ from one state to another. Privacy requirements, such as patient consent, may be subject to conflicting conditions between different national frameworks as well as between different legal and ethical frameworks within a single member state. These circumstances have made the compliance management process in European healthgrid very challenging. In this paper we are presenting an approach to tackle these issues by relying on several technologies contained in the semantic web stack. Our work suggests a direct mapping from high level legislation on privacy and data protection to operational level privacy aware controls. Additionally we suggest an architecture for the enforcement of these controls on access control models adopted by healthgrids security infrastructures.
From a patient’s perspective, the viewpoint of this paper, it may be easier to address at least one of such requirements: to inform patients about how secure their data are. This is a property usually referred as transparency, but a clear meaning of the word is still missing. According to [2] transparency ought to be regarded as an additional feature that qualifies security. So, security can be said to be transparent when is intelligible to human user. It opposes an opaque security, which holds technically but without the user’s being aware of it. Thus, transparency is a socio-technical security property.
Blunt trauma abdomen rarely leads to gastrointestinal injury in children and isolated gastric rupture is even rarer presentation. We are reporting a case of isolated gastric rupture after fall from height in a three year old male child.
eng_Latn
17,736
In various application domains, data can be represented as bags of vectors. Learning functions over such bags is a challenging problem. In this paper, a neural network approach, based on cascade-correlation networks, is proposed to handle this kind of data. By defining special aggregation units that are integrated in the network, a general framework to learn functions over bags is obtained. Results on both artificially created and real-world data sets are reported.
Given the very widespread use of multirelational databases, ILP systems are increasingly being used on data originating from such warehouses. Unfortunately, even though not complex in structure, such business data often contain highly non-determinate components, making them difficult for ILP learners geared towards structurally complex tasks. In this paper, we build on popular transformation-based approaches to ILP and describe how they can naturally be extended with relational aggregation. We experimentall y show that this results in a multirelational learner that outperforms a structurally-oriented ILP system both in speed and accuracy on this class of problems.
Server-based collaborative filtering systems have been very successful in e-commerce and in direct recommendation applications. In future, they have many potential applications in ubiquitous computing settings. But today's schemes have problems such as loss of privacy, favoring retail monopolies, and with hampering diffusion of innovations. We propose an alternative model in which users control all of their log data. We describe an algorithm whereby a community of users can compute a public "aggregate" of their data that does not expose individual users' data. The aggregate allows personalized recommendations to be computed by members of the community, or by outsiders. The numerical algorithm is fast, robust and accurate. Our method reduces the collaborative filtering task to an iterative calculation of the aggregate requiring only addition of vectors of user data. Then we use homomorphic encryption to allow sums of encrypted vectors to be computed and decrypted without exposing individual data. We give verification schemes for all parties in the computation. Our system can be implemented with untrusted servers, or with additional infrastructure, as a fully peer-to-peer (P2P) system.
eng_Latn
17,737
The Novel Location Privacy-Preserving CKD for Mobile Crowdsourcing Systems
Hybrid Blockchain Design for Privacy Preserving Crowdsourcing Platform
Oral spray wintertime vitamin D3 supplementation has no impact on inflammation in Gaelic footballers
eng_Latn
17,738
Social networking sites have experienced a steady and dramatic increase in the number of users over the past several years. Thousands of user accounts, each including a significant amount of private data, are created daily. As such, an almost countless amount of sensitive and private information is read and shared across the various accounts. This jeopardizes the privacy and safety of many social network users and mandates the need to increase the users' awareness about the potential hazards they are exposed to on these sites. We introduce Protect_ U, a privacy protection system for Facebook users. Protect_ U analyzes the content of user profiles and ranks them according to four risk levels: Low Risk, Medium Risk, Risky and Critical. The system then suggests personalized recommendations designed to allow users to increase the safety of their accounts. In order to achieve this, Protect_ U draws upon both the local and community-based protection models. The first model uses a Face book user's personal data in order to suggest recommendations, and the second seeks out the user's most trustworthy friends to encourage them to help improve the safety of his/her account.
To participate in meaningful privacy practice in the context of technical systems, people require opportunities to understand the extent of the systems’ alignment with relevant practice and to conduct discernible social action through intuitive or sensible engagement with the system. It is a significant challenge to design for such understanding and action through the feedback and control mechanisms of today’s devices. To help designers meet this challenge, we describe five pitfalls to beware when designing interactive systems—on or off the desktop—with personal privacy implications. These pitfalls are: (1) obscuring potential information flow, (2) obscuring actual information flow, (3) emphasizing configuration over action, (4) lacking coarse-grained control, and (5) inhibiting existing practice. They are based on a review of the literature, on analyses of existing privacy-affecting systems, and on our own experiences in designing a prototypical user interface for managing privacy in ubiquitous computing. We illustrate how some existing research and commercial systems—our prototype included—fall into these pitfalls and how some avoid them. We suggest that privacy-affecting systems that heed these pitfalls can help users appropriate and engage them in alignment with relevant privacy practice.
ABSTRACTUNC-45A is an ubiquitously expressed protein highly conserved throughout evolution. Most of what we currently know about UNC-45A pertains to its role as a regulator of the actomyosin system...
eng_Latn
17,739
In big data applications, data privacy is one of the most concerned issues because processing large-scale privacy-sensitive data sets often requires computation resources provisioned by public cloud services. Sub-tree data anonymization is a widely adopted scheme to anonymize data sets for privacy preservation. Top–Down Specialization (TDS) and Bottom–Up Generalization (BUG) are two ways to fulfill sub-tree anonymization. However, existing approaches for sub-tree anonymization fall short of parallelization capability, thereby lacking scalability in handling big data in cloud. Still, either TDS or BUG individually suffers from poor performance for certain valuing of k-anonymity parameter. In this paper, we propose a hybrid approach that combines TDS and BUG together for efficient sub-tree anonymization over big data. Further, we design MapReduce algorithms for the two components (TDS and BUG) to gain high scalability. Experiment evaluation demonstrates that the hybrid approach significantly improves the scalability and efficiency of sub-tree anonymization scheme over existing approaches.
We present an approach of limiting the confidence of inferring sensitive properties to protect against the threats caused by data mining abilities. The problem has dual goals: preserve the information for a wanted data analysis request and limit the usefulness of unwanted sensitive inferences that may be derived from the release of data. Sensitive inferences are specified by a set of “privacy templates". Each template specifies the sensitive property to be protected, the attributes identifying a group of individuals, and a maximum threshold for the confidence of inferring the sensitive property given the identifying attributes. We show that suppressing the domain values monotonically decreases the maximum confidence of such sensitive inferences. Hence, we propose a data transformation that minimally suppresses the domain values in the data to satisfy the set of privacy templates. The transformed data is free of sensitive inferences even in the presence of data mining algorithms. The prior k-anonymization k has been italicized consistently throughout this article. focuses on personal identities. This work focuses on the association between personal identities and sensitive properties.
We prove that groups acting geometrically on delta-quasiconvex spaces contain no essential Baumslag-Solitar quotients as subgroups. This implies that they are translation discrete, meaning that the translation numbers of their nontorsion elements are bounded away from zero.
eng_Latn
17,740
K-Nearest Neighbors search (KNNS) in high-dimensional feature spaces is an important paradigm in pattern recognition. Existing centralized KNNS does not scale up to large volume of data because the response time is linearly increasing with the size of the searched file. In this article, an adaptive distributed A-nearest neighbor search algorithm (P2PAKNNS) for high dimension data is proposed to further improve the scalability in P2P systems. The idea adopts the generalized hypersphere partitioning and the similarity measure function HDsim(x oarr, y oarr) , which can adaptively determines the size of the hypersphere and avoid the problems that it-norm leads to the non-contrasting behavior of distance in high dimensional space. By exploiting parallelism in a dynamic network of computers, the query execution scales up very well considering the number of distance computations. The experiments indicate the algorithm is effective.
Server-based collaborative filtering systems have been very successful in e-commerce and in direct recommendation applications. In future, they have many potential applications in ubiquitous computing settings. But today's schemes have problems such as loss of privacy, favoring retail monopolies, and with hampering diffusion of innovations. We propose an alternative model in which users control all of their log data. We describe an algorithm whereby a community of users can compute a public "aggregate" of their data that does not expose individual users' data. The aggregate allows personalized recommendations to be computed by members of the community, or by outsiders. The numerical algorithm is fast, robust and accurate. Our method reduces the collaborative filtering task to an iterative calculation of the aggregate requiring only addition of vectors of user data. Then we use homomorphic encryption to allow sums of encrypted vectors to be computed and decrypted without exposing individual data. We give verification schemes for all parties in the computation. Our system can be implemented with untrusted servers, or with additional infrastructure, as a fully peer-to-peer (P2P) system.
We consider the one-dimensional symmetric simple exclusion process with nearest neighbor jumps and we prove estimates on the decay of the correlation functions at long times.
eng_Latn
17,741
Intrauterine instillation of oil, but not saline, induced both a decidual cell reaction and a marked elevation in the uterine PGF-alpha content of suitably sensitized ovariectomized mice. Uterine PGF-alpha concentrations were elevated within 5 min of the oil instillation, reached maximal levels within 30-60 min and then declined to near baseline levels again by 3 h. A similar increase in uterine PGF-alpha content in response to oil instillation was seen in non-sensitized females, although no decidual cell reaction developed. No significant changes in PGE or 6-oxo-PGF-1 content were observed. These results suggest that although the increase in uterine PGF-alpha content is not solely due to the distension of the uterus after intrauterine injection, the increase is not necessarily sufficient to induce a decidual cell reaction.
The process of blastocyst implantation in mammals is remarkably variable, especially in the extent of trophoblast invasion of the endometrium. In most species studied, the earliest macroscopically identifiable sign of blastocyst implantation is an increase in endometrial vascular permeability in areas adjacent to the blastocysts. This is followed in species with invasive implantation by decidualization, again localized to areas adjacent to the blastocysts. In some species, the application of a stimulus to the endometrium can result in increased endometrial vascular permeability and decidualization. Based initially on studies utilizing inhibitors of prostaglandin (PG) synthesis and more recently on studies using the techniques of transgenics, considerable evidence has accumulated indicating that PGs have an important role in the early events of implantation and artificially induced decidualization. However, which PGs are involved remains controversial. There may be differences between species, and different PGs may be involved at different times. Reproduction (2007) 134 635–643
In the emerging cloud computing paradigm, data owners become increasingly motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. For the consideration of users' privacy, sensitive data have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. In this paper, for the first time, we define and solve the problem of privacy-preserving query over encrypted graph-structured data in cloud computing (PPGQ), and establish a set of strict privacy requirements for such a secure cloud data utilization system to become a reality. Our work utilizes the principle of "filtering-and-verification". We prebuild a feature-based index to provide feature-related information about each encrypted data graph, and then choose the efficient inner product as the pruning tool to carry out the filtering procedure. To meet the challenge of supporting graph query without privacy breaches, we propose a secure inner product computation technique, and then improve it to achieve various privacy requirements under the known-background threat model.
eng_Latn
17,742
Location-Based Services (LBS) are gaining importance due to the advances in mobile networks and positioning technologies. Nevertheless, the wide deployment of LBS can jeopardise the privacy of their users, so ensuring user privacy is paramount to the success of those services. This article surveys the most relevant techniques for guaranteeing location privacy to LBS users. The rigid dichotomy between schemes which rely on Trusted Third Parties (TTP-based) and those which do not (TTP-free) is emphasised. Also, the convenience of both approaches is discussed and some ideas on the future of location privacy in these services are sketched.
Location-based services (LBS) will be a keystone of the new information society that is founded on the information and communications technologies (ICTs). Mobile devices such as cell phones or laptops have become ubiquitous. They are equipped with a variety of localisation systems that make them proper for making use of the new LBS. Most of the times, these services are provided by a trusted company (e.g. a telecommunications company). However, the massive use of mobile devices pave the way for the creation of ad hoc wireless networks that can be used to exchange information based on locations. When the exchange of location information is done amongst untrusted parties, the privacy of the participants could be in jeopardy. In this paper we present a novel solution that guarantees the privacy of the users of LBS. Our technique is built up of several modules that progressively increase the privacy level of the users. Unlike the existing approaches, our proposal does not rely on a trusted third party (TTP) to anonymise the users and to guarantee their location privacy.
Berzelius failed to make use of Faraday's electrochemical laws in his laborious determination of equivalent weights.
eng_Latn
17,743
Maintained Individual Data Distributed Likelihood Estimation (MIDDLE)is a novel paradigm for research in the behavioral, social, and health sciences. The MIDDLE approach is based on the seemingly-impossible idea that data can be privately maintained by participants and never revealed to researchers, while still enabling statistical models to be fit and scientific hypotheses tested. MIDDLE rests on the assumption that participant data should belong to, be controlled by, and remain in the possession of the participants themselves. Distributed likelihood estimation refers to fitting statistical models by sending an objective function and vector of parameters to each participants’ personal device (e.g., smartphone, tablet, computer), where the likelihood of that individual’s data is calculated locally. Only the likelihood value is returned to the central optimizer. The optimizer aggregates likelihood values from responding participants and chooses new vectors of parameters until the model converges. A MIDDLE study provides significantly greater privacy for participants, automatic management of optinand opt-out consent, lower cost for the researcher and funding institute,and faster determination of results. Furthermore, if a participant opts into several studies simultaneously and opts into data sharing, these studies automatically have access to individual-level longitudinal data linked across all studies.
Mobile screen recordings are a rich data source to follow user interactions, but at the same time are highly privacy-invasive and manual analysis is time-consuming. This data source is mostly used in small, short-term user studies. Cloud-based approaches can automate the screen recording analysis but lack addressing that recordings contain sensitive private data. This makes ist hard to find participants for user studies involving long-term screen recording. In this paper, we present an approach to automatically analyzing mobile screen recordings on the user's mobile device that respects privacy and makes the approach scalable. We evaluate our privacy concept in a survey study of 35 participants, which indicates our concept increases the willingness of participants to participate in research studies using this method. For technical validation, we carry out test runs on several different devices and show that our approach can provide long-term results reliably in a pilot study.
We prove that groups acting geometrically on delta-quasiconvex spaces contain no essential Baumslag-Solitar quotients as subgroups. This implies that they are translation discrete, meaning that the translation numbers of their nontorsion elements are bounded away from zero.
eng_Latn
17,744
A perturbation analysis is used to determine the effect of small irregularities on electromagnetic scattering from an interface between two media. The interface irregularities are replaced by approximate equivalent surface currents, and the field in space can then be found using the dyadic Green's function of the unperturbed problem. The approach is valid when the irregularity has small slope and amplitude small compared to the wavelengths and local radii of curvature. To facilitate applications, the theory of dyadic Green's functions is developed, and the necessary functions are given for some important geometries.
We investigate analytically the fully polarimetric electromagnetic wave propagation through a 3-D layered structure. In the framework of the first-order limit of the perturbation theory, a transmission model for a layered structure with an arbitrary number of rough interfaces is developed and an elegant closed-form solution is obtained. The final expressions, in terms of generalized reflection/transmission coefficients, provide parametrically a direct characterization of the scattering properties of the layered structure in terms of the structure's (geometric and electromagnetic) parameters. In addition, we point out the complementary character of the obtained scattering solution with respect to the existing one. Finally, we demonstrate that our solution satisfies the reciprocity principle.
The privacy issue arising in data mining applications has attracted much attention in recent years. In the context of distributed data mining, the participant can employ data perturbation techniques to protect its privacy. Data perturbation generally causes a negative effect on the mining result, which means there is a trade-off between privacy and the mining result. In this paper, we study a distributed classification scenario where a number of users provide data to a mediator to train a classifier. Interactions among users are modeled as a game in satisfaction form. And an algorithm is proposed for users to learn the satisfaction equilibrium (SE) of the game. The basis idea is that the user gradually reduces the perturbation in data until it is satisfied with the classification accuracy. Experimental results based on real data demonstrate that, when the differences among users' expectations are not significant, the proposed learning algorithm can converge to an SE, at which every user achieves a balance between the classification accuracy and the preserved privacy.
eng_Latn
17,745
The proliferation of position identifying devices becomes increasing privacy threat in location-based services (LBSs). It is necessary to tackle the privacy threat of a user in processing his/her request because the user has to submit his/her exact location with a query to the LBS. In road networks, X-Star provides a star-graph based cloaking method that can protect a user's privacy from attack resilience as well as optimize a query processing cost. However, it incurs a low anonymization success rate and a high computation overhead. We propose the Hilbert-order based cloaking algorithm to resolve the problems. Our algorithm guarantees K-anonymity under the strict reciprocity condition and increases anonymization success rate by reducing computation overhead. Experimental evaluations show the effectiveness of our method in the field of spatial cloaking.
The increasing availability of location-aware mobile devices has given rise to a flurry of location-based services (LBSs). Due to the nature of spatial queries, an LBS needs the user position in order to process her requests. On the other hand, revealing exact user locations to a (potentially untrusted) LBS may pinpoint their identities and breach their privacy. To address this issue, spatial anonymity techniques obfuscate user locations, forwarding to the LBS a sufficiently large region instead. Existing methods explicitly target processing in the euclidean space and do not apply when proximity to the users is defined according to network distance (e.g., driving time through the roads of a city). In this paper, we propose a framework for anonymous query processing in road networks. We design location obfuscation techniques that: (1) provide anonymous LBS access to the users and (2) allow efficient query processing at the LBS side. Our techniques exploit existing network database infrastructure, requiring no specialized storage schemes or functionalities. We experimentally compare alternative designs in real road networks and demonstrate the effectiveness of our techniques.
We prove that groups acting geometrically on delta-quasiconvex spaces contain no essential Baumslag-Solitar quotients as subgroups. This implies that they are translation discrete, meaning that the translation numbers of their nontorsion elements are bounded away from zero.
eng_Latn
17,746
This note focuses on the use of utility monotonic perturbations as a means of modelling the mutation process in evolutionary models. We show that a game has a detailed balanced and utility monotonic perturbation if and only if it is an ordinal potential game. We also show that utility monotonicity is not strong enough to serve as an equilibrium refinement device for ordinal potential games. An equilibrium refinement device that is applicable to a general class of games must, therefore, satisfy a stronger utility monotonicity condition while the detailed balance condition can no longer hold. We believe that a tightening of the bounds on the magnitude of stationary distributions could substantially further research in this topic.
Recent evolutionary models have introduced "small mutation rates" as a way of refining predictions of long-run behavior. We show that this refinement effect can only be obtained by restrictions on how the magnitude of the effect of mutation on evolution varies across states of the system. In particular, given any model of the effect of mutations, any invariant distribution of the "mutationless" process is close to an invariant distribution of the process with appropriately chosen small mutation rates.
The privacy issue arising in data mining applications has attracted much attention in recent years. In the context of distributed data mining, the participant can employ data perturbation techniques to protect its privacy. Data perturbation generally causes a negative effect on the mining result, which means there is a trade-off between privacy and the mining result. In this paper, we study a distributed classification scenario where a number of users provide data to a mediator to train a classifier. Interactions among users are modeled as a game in satisfaction form. And an algorithm is proposed for users to learn the satisfaction equilibrium (SE) of the game. The basis idea is that the user gradually reduces the perturbation in data until it is satisfied with the classification accuracy. Experimental results based on real data demonstrate that, when the differences among users' expectations are not significant, the proposed learning algorithm can converge to an SE, at which every user achieves a balance between the classification accuracy and the preserved privacy.
eng_Latn
17,747
The growth of cloud computing has led to a corresponding growth of user data stored on third party servers, while, at the same time, U.S. privacy law has significant limitations in the protection of aggregated data—precisely the type of much of cloud computing data. This position paper provides an overview of cloud computing and current privacy law, policies and practices, presenting ideas for modernizing privacy protection for cloud computing users, with the goal of instilling trust in the use of cloud computing and fostering further development of innovations in cloud computing applications.
Online privacy notices are intended to promote consumer choice and reduce the risks of disclosing personal information online. However, these effects result only if consumers read and use the information contained in the notices. This study used an online survey of 2,468 U.S. adult Internet users to investigate why online consumers read privacy notices across a variety of situations. We found that reading is related to concern for privacy, positive perceptions about notice comprehension, and higher levels of trust in the notice. This suggests that effective privacy notices serve an important function in addressing risk issues related to e-commerce. We further found that reading privacy notices is only one element in an overall strategy consumers use to manage the risks of disclosing personal information online.
Berzelius failed to make use of Faraday's electrochemical laws in his laborious determination of equivalent weights.
eng_Latn
17,748
Index‐Aid: Computer‐assisted back‐of‐the‐book indexing
IndexAid is designed to assist in the production of professionally formatted indexes for publications where the indexer has page proofs or knows the page number references. The package is recommended to both novice and professional indexers for use with books, reports, technical documents and any other kinds of publications worthy of having an index.
As more and more data is outsourced to cloud which is assumed to be a semi-trusted server, it is necessary to encrypt the sensitive data stored in the cloud. However, it brings a series of problems, such as: How to search over the encrypted data efficiently and securely? How should a data owner grant search capabilities to the data users? To solve these problems, we propose two attribute-based keyword search and data access control schemes based on public-key searchable encryption and attribute based encryption. Our solutions allow a data owner to control the access policy and grant the search policy to any data user who wants to retrieve the encrypted data efficiently.
eng_Latn
17,749
An ontology based privacy protection model for third-party platform
A third-party trading platform is a web based system that provides services for sellers and buyers. On such platform, users are required to provide personal information to ensure the authenticity and undeniability of a transaction. In this paper, we propose an ontology based privacy protection model for third-party platform, which allows buyers and sellers to define privacy policies according to their preferences and converts policies into ontology based forms. We introduce the property of good sellers who require the minimal information from buyers while satisfying other trading requirements. The proposed policy matching algorithm finds such sellers as candidates for a buyer request. A practical example is given to illustrate our model.
Probabilistic version of the invariance of domain for contractive field and ::: Schauder invertibility theorem are proved. As an application, the stability of ::: probabilistic open embedding is established.
eng_Latn
17,750
[Morphological characteristics of various thyroid pathologies in the population living in a technogenically polluted area].
The impact of industrial pollutions on the thyroid is one of the main causes of thyroid diseases. Intraoperative thyroid samples from 144 patients residing in some technogenically polluted towns of the Saratov Region were the subject of the study. The morphological features of various thyroid abnormalities were directly correlated with the level of environmental pollution with heavy metal salts that might play a leading role in the occurrence of goiter transformation. The exception is diffuse toxic goiter wherein such relationship has not been revealed. The correlation of thyroid pathology groups with Saratov districts having a heavy metal salt-polluted snow cover enables one to identify risk areas for their inhabitants.
The EU Regulation 2016/679 (GDPR) is a landmark, and we describe the value of personal data as the main starting point to address any possible issue. Once clarified the meaning of that value as a top-level point from which it not possible prescind and the strict relationship with ethics, we present one of the risks, that is the 'synthetic human profile' and can be realised by the use of faces images available on the web. In conclusion, we propose a blockchain system to guarantee the data subjects identity.
eng_Latn
17,751
Research of the Distributed Remote Sensing Product Production Communication Technology Based on Web Service
The distributed remote sensing product production system is composed of multiple subsystems.It brought communication problems by the differences on the platform and the development language of each subsystem.The article designs a set of communication scheme based on Web Service technology.It shields the differences of each subsystem and the development language of the distributed remote sensing product production system effectively,and the seamless communication between each subsystem is realized.Therefore,it can enhance the availability and expandability of the distributed remote sensing product production system greatly.
In this paper we discuss the issue of privacy preserving data mining and present the technique that provide the privacy on data mining application. We provide an overview of the different techniques and how they relate to one another. We used the asymmetric encryption to provide the privacy and used the RSA encryption to encrypt the data. We also present a client server architecture that connects to the multiple clients. Server need to receive data from client .Connect server to a data base and enter the data received from the client into database with client id. Our proposed protocol is to encrypt the data so we used the encryption technique to encrypt the data, we also used homomorphic encryption to secure the information. Without security our data may stand compromised.
eng_Latn
17,752
A Privacy-Enhanced Microaggregation Method
Microaggregation is a statistical disclosure control technique for protecting microdata (i.e., individual records), which are important products of statistical offices. The basic idea of microaggregation is to cluster individual records in microdata into a number of mutually exclusive groups prior to publication, and then publish the average over each group instead of individual records. Previous methods require fixed or variable group size in clustering in order to reduce information loss. However, the security aspect of microaggregation has not been extensively studied. We argue that the group size requirement is not enough for protecting the privacy of microdata. We propose a new microaggregation method, which we call secure-k-Ward, to enhance the individual's privacy. Our method, which is optimization based, minimizes information loss and overall mean deviation while at the same time guarantees that the security requirement for protecting the microdata is satisfied.
This work compares Measure of Effectiveness (MOE) of different image fusion algorithms implemented on astronomical images and then compares them using different computing methods; sequential, parallel and cloud. Parallel computing compares two different methods implemented using Python while the Cloud computing was implemented using two different servers; Windows based and Linux based.
eng_Latn
17,753
Disclosure and Secrecy in Employee Monitoring
ABSTRACT: Disclosure and monitoring policy are studied, where disclosure relates to information about the monitoring system. A moral hazard model is presented where employee monitoring occurs with some exogenous probability and the owner privately learns whether he will be monitoring before the employee chooses his productive action. Disclosure policy is an owner choice between revealing to the employee whether he will be monitoring before the action (Disclosure) or remaining silent (Secrecy). The results rely on the joint presence of risk aversion and limited liability. Risk aversion creates an efficiency/risk tradeoff where secrecy obtains risk-sharing benefits. Limited liability reduces these benefits, allowing preference for disclosure. Lower monitoring probabilities increase the risk premium required to obtain effort with secrecy. For small monitoring probabilities, disclosure is preferred even though less efficient production is achieved, because disclosure provides a greater risk-sharing benefit. F...
B The article describes a hierarchically distributed way of storing and processing mobile subscribers location information. Proposed a method to determine the time of information search about the mobile subscriber location of a upon a call. The analysis is presented of time dependence of the location information search to the number of subscribers of the communication network changes.
eng_Latn
17,754
Testing of communication range in ZigBee technology
In the rapidly growing Internet of Things (loT) applications from personal electronics to industrial machines and sensors are getting wirelessly connected to the Internet. Many well-known communication technologies such as WiFi, ZigBee, Bluetooth and cellular are used for transfer data in IoT. The choice of corresponding technology or combination of technologies depends on application or other factors such as data requirements, communication range, security and power demands, battery life. In this paper we will focus on ZigBee wireless technology and testing ZigBee end devices in order to see how transmission range impacts on quality parameters.
In hospitals, offices and other settings, professionals face the challenge of accessing and sharing sensitive content in public areas. As tablets become increasingly adopted in work environments, it is important to explore ways to support privacy that are appropriate for tablet use in dynamic, mobile workflows. In this research we consider how spatial information can be utilized to support both individual and collaborative work in a natural way while respecting data privacy. We present a proof-of-concept implementation of a proximity-aware tablet, and a range of privacy notification and control mechanisms designed for such a tablet. Results from a user study support the idea that interpersonal distance and orientation can be used to mediate privacy management for tablet interfaces. Selecting a specific design for privacy threat notification and response is highly context-dependent-for example, in health care the first priority is to not impede the fluid exchange of information.
eng_Latn
17,755
Demo: Interactive Visual Privacy Control with Gestures
Built-in cameras of mobile and wearable devices enable a variety of applications such as augmented reality, continuous sensing, and life-logging systems, which bring joy and convenience to human lives. However, being recorded by unauthorized or unnoticed cameras have raised people's concerns about visual privacy. To address this problem, we propose a novel interactive method to control visual privacy. We allow individuals to interact with cameras using static tags and more flexible hand gestures for privacy control. By delivering privacy control messages via visual indicators, devices will automatically perform control operations according to privacy indicators detected and control rules.
Experience Michelangelo's Sistine ceiling in virtual reality. Move around the Chapel or take a guided tour and use a virtual scaffold to see the work up close as few have seen it before.
eng_Latn
17,756
But one would not do such a thing without permission.
No one would do that without asking the person first.
You don't need permission to do that.
eng_Latn
17,757
i guess if you're not doing anything it's no big deal people call it invasion of privacy not to me it's not because first of all if you're not doing anything they're not invading anything
People may call it a lack of respect for privacy.
Even if people aren't doing anything, they still deserve some amount of privacy.
eng_Latn
17,758
These meetings offered a generally secure environment to share information, while also encouraging broader member participation.
The meeting offered a secure way to share information.
The meeting offered an easy way to steal information.
eng_Latn
17,759
This access is subject to legal and privacy considerations, such as those concerning taxpayer return information, protected banking information, grand jury information, and credit card account information listed in travel vouchers.
The access must have privacy considerations taken into account.
The access does not have privacy considerations taken into account.
eng_Latn
17,760
that's that's been my impression yeah it's it's not they're not withholding information they just don't have that information they they haven't the foggiest idea
They're not keeping information to themselves.
They are keeping all the information to themselves.
eng_Latn
17,761
Bombardier suggested that in addition to evaluation, this research should develop ways to mitigate legal, privacy, and confidentiality problems associated with screening and treatment.
Bombardier wants to protect the legal and private rights of those who receive screening and treatment.
The screening poses no problems to those who participate in it.
eng_Latn
17,762
'My friend and I require some privacy.'
I need to be left alone.
I don't want to be left alone.
eng_Latn
17,763
with the public service i
With the civil service I
Private and anonymous
eng_Latn
17,764
like that and therefore i feel it's an invasion of privacy because i thought all these people share you know what they're doing even though it's none of the business
These people should not invade my privacy.
There are no privacy implications for their behavior.
eng_Latn
17,765
privacy right
Privacy right.
Privacy left.
eng_Latn
17,766
um i guess i'm not typically feeling invaded in my privacy relative to this second
My privacy does not feel invaded relative to this second.
I feel like my privacy is being invaded right this second.
eng_Latn
17,767
which i think is a is an invasion of privacy
In my opinion, this action compromises my privacy.
This action does not compromise my privacy.
eng_Latn
17,768
Certain information may be prohibited from general disclosure by federal, state, or local laws or regulations.
Some information may be protected under a non-disclosure regulation.
There are no regulations prohibiting the release of any information.
eng_Latn
17,769
Well, I think it is very unfair to keep back facts from me.
I don't think it's right that you hide things from me.
I can see that it's reasonable to keep secrets sometimes.
eng_Latn
17,770
Flytrap's only silver a new concern about the erosion of privacy.
The disintegration of the concept of privacy represents a matter of concern.
The privacy is important and therefore it is being strengthened.
eng_Latn
17,771
well on this subject of invasion of privacy yes it's very easy for anybody to find out about you your
It's easy for peopel to find out information.
People can't just find that information out.
eng_Latn
17,772
oh yeah i'm sure i would think they would talk about people who are already registered and and uh you know the ones that are on the rolls already you know
I would think they would talk about people who already recorded.
I would think they would talk about people who have never registered.
eng_Latn
17,773
Given a reporter's name, a Web-based information broker tracked down his base identifiers--Social Security number, birth date, and address--in five minutes.
A person found all the important information pertaining to a reporter.
A person couldn't find anything about the reporter.
eng_Latn
17,774
those who were watching it how easily obtainable information is on any single person and it was mostly it dealt with uh marketing companies these uh direct marketing
It is easy to get information on a single person.
It is impossible to get information on a single person.
eng_Latn
17,775
However, these requirements are not discussed here because this guide pertains to the protection of sensitive but unclassified data, which constitute the bulk of data supporting most federal operations.
Sensitive data is still protected and thus the requirements cannot be disclosed.
Classified data can openly be shared amongst individuals.
eng_Latn
17,776
These new agreements described how the sensitivity of information would be defined, how shared information would be protected from dissemination outside the group, and what information could be shared with nonmembers.
Sensitive information should not be shared outside the group.
Sensitive information can be shared with anyone in or out of the group.
eng_Latn
17,777
and uh of course there's another aspect of this too uh in terms of invasion of privacy i just thought about it being a professional and of course you probably belong to one or more professional organizations and that is that some of the organizations sell their mailing lists
Certain organizations that you are affiliated with sell their mailing lists, which is an invasion of privacy.
None of the organizations that you are affiliated with sell their mailing lists.
eng_Latn
17,778
Privacy is a concept that has evolved a lot in the past century. After a long delay in adopting data protection laws when compared to other countries, Italy put up a steep pace and introduced a novelty in the law currently in force, d.lgs. 196/03: the principle of necessity. This provision, significantly located among the three "top principles" in data protection, imposes on data controllers a limitation on the use of personal data. This work slowly zooms in on the principle of necessity: after a survey of the various approaches to a privacy law in the international scene, with a major attention to the European context, the focus is centered on art. 3 of the Italian law, containing the principle of necessity, from a general explanation to theoretical literature on the subject and the application performed so far by the Guarantor. The conclusive analysis tries to highlight the strengths and weaknesses of the provision by putting it in the perspective of its natural application field: a society where information, and even more the Internet, have dramatically changed the business models and favored the birth of new, opposing interests.
Recently, the Court of Justice of the European Union issued decision C-131/12, which was considered a major breakthrough in Internet data protection. The general public welcomed this decision as an actualization of the controversial “right to be forgotten”, which was introduced in the initial draft for a new regulation on data protection and repeatedly amended, due to objections by various Member States and major companies involved in massive processing of personal data. This paper attempts to delve into the content of that decision and examine if it indeed involves the right to be forgotten, if such a right exists at all, and to what extent it can be stated and enforced.
Berzelius failed to make use of Faraday's electrochemical laws in his laborious determination of equivalent weights.
eng_Latn
17,779
Introduction The evolution of medicine during the past few decades has resulted in electronic transformation of patient records which experienced multiple problems such as security, privacy and confidentiality of patient’s information. Security, privacy and confidentiality are potentially major problems in electronic health records and no system currently available in the world is 100% secure. The objectives of this study were to describe the major issues related to security, privacy and confidentiality of electronic health information systems and computer based patient record systems and to describe methods currently used to overcome those issues by reviewing published articles. Method These articles were identified by searching the PubMed online electronic bibliographic database [www.ncbi.nih.gov/pubmed] for articles published between January 2000 and January 2013 using the keywords security, privacy, confidentiality, electronic health information systems, and computer based patient record systems. 25 articles were selected for this review after a screening process from among 236 articles identified after the PubMed search. Results All 25 articles (100%) had identified that security, privacy, and confidentiality were major problems with Electronic Health Records. None of them were 100% secure and only two (8%) were Health Insurance Portability and Accountability Act (HIPAA) compliant. Conclusion Safeguarding the security, privacy and confidentiality is a major problem in electronic health records and a major challenge for governments. However, studies on the security, privacy and confidentiality issues were not conclusive. Alternative approaches considering social, cultural and governmental factors may be needed to be taken into account to deal with the security, privacy and confidentiality issues. Normal 0 false false false EN-US X-NONE X-NONE
Trust is defined in dictionaries as a firm belief in the reliability, truth, or ability of someone or something. The eHospital Dompe Project has been highlighted as a success story of ICT implementation in the Sri Lankan health care sector. In this issue of the Journal, the project manager of the eHospital Dompe Project describes how they have used Information and Communication Technology (ICT) to build trust in the health care delivered at the hospital by enhancing the hospital workflow and making the hospital work ‘smarter’ (2) . What has been achieved at District Hospital, Dompe should be an eye opener for the entire health care sector in Sri Lanka. One must recognise however that one can do more to build trust in health care. Without trust patients may not access health services at all, or disclose all medically relevant information. Trust in appropriate disclosure of information, referred to as communication trust, is an important attribute of all that goes into building trust in health care. It allows individuals and organisations to share information, to tell the truth, and to admit mistakes while at the same time maintaining the confidentiality of information disclosed. Two articles in this issue of the Journal deal with issues related to building communication trust. In the first article Jayawardena highlights security, privacy and confidentiality issues related to electronic health information systems. (Editorial truncated at 250 words)
Applications for mobile platforms are being developed at a tremendous rate, but often without proper security implementation. Insecure mobile applications can cause serious information security and data privacy issues and can have severe repercussions on users and organizations alike.
eng_Latn
17,780
Sealed-bid E-auction RHT encryption protocol
In sealed-bid E-auction,an E-auction system needs to provide adequately safe protections of the information in the submitted bids before they are opened so as to guarantee the competition fairness in the sealed biddings.So sealed-bid E-auction RHT encryption protocol was designed with information security techniques such as RSA,Hash and time-release cryptography.RHT is proposed to encrypt a bid message so that it can't be decrypted by anyone until a predetermined amount of time has passed.RHT not only can authenticate each bidder,but also guarantees confidentiality,integrality and undeniableness of the information.Thus RHT encryption protocol meets the security requirements of a sealed E-auction system effectively.
Abstract.We investigate high frequency price dynamics in foreign exchange market using data from Reuters information system (the dataset has been provided to us by Olsen and Associates). In our analysis we show that a naïve approach to the definition of price (for example using the spot mid price) may lead to wrong conclusions on price behavior as for example the presence of short term correlations for returns. For this purpose we introduce an algorithm which only uses the non arbitrage principle to estimate real prices from the spot ones. The new definition leads to returns which are not affected by spurious correlations. Furthermore, any apparent information (defined by using Shannon entropy) contained in the data disappears.
eng_Latn
17,781
Guidelines for making children’s online experience safer
The Internet is a valuable resource that enables families to keep up on current events, research information, listen to music, and e-mail friends and family. However, this helpful tool also can be a danger to children and teenagers. ::: ::: Identity theft, predators, “cyberbullies,” and offensive or
The EU Regulation 2016/679 (GDPR) is a landmark, and we describe the value of personal data as the main starting point to address any possible issue. Once clarified the meaning of that value as a top-level point from which it not possible prescind and the strict relationship with ethics, we present one of the risks, that is the 'synthetic human profile' and can be realised by the use of faces images available on the web. In conclusion, we propose a blockchain system to guarantee the data subjects identity.
eng_Latn
17,782
Curacao, off the Venezuelan coast, is a constituent country of which European kingdom ?
TrustCor | About | Curaçao About Curaçao TrustCor is a Panamanian registered company, with technical operations in Curaçao – one of the most secure, privacy oriented jurisdictions in the world. We spent significant time and money researching secure jurisdictions and determined traditional safe havens, such as Switzerland and Luxembourg, did not even come close to the privacy protection offered by Curaçao’s strict privacy laws. The Privacy Acts of Curaçao The Privacy Acts require compliance with the following four principles with regards to personal data: OBJECTIVE: Any storage and use of personal data must be in accordance with a clearly stated and justified objective. Personal data may not be stored and used for time periods that exceed meeting those specified objectives. ADEQUATE, PURPOSE ORIENTED, NOT EXESSIVE AND ACCURATE: Personal data is subject to the above requirements which shall be observed by the suppliers and the processors of the data. TRANSPARENCY AND RIGHT TO CORRECTION: Personal data is subject to transparency towards the consumers (data subjects). Consumers must be informed that their personal data is used with disclosure of the purpose. The consumer has the right to, and must be given possibilities to, object to the way in which the data is collected if he/she is of the opinion that the collection and use of his/her personal data is not in accordance with applicable laws. (article 13 EVRM). The expenses involved for the consumer to have is objections heard shall not be excessive, and he/she must be able to direct him/herself to the Data Protection Board (College Bescherming Persoonsgegevens). DUE CARE: Personal data shall be supplied, processed and used in accordance with the laws and shall at all time be subject to principles of fairness and due care (article 6 LvBP/ WBP BES). Curaçao's Privacy Act Personal Data Protection Act of Curaçao On October 1st, 2013 the regulation for the processing of personal data entered into force in Curaçao. The Personal Data Protection Act (PDPA) sets rules for the protection of personal data in relation to the recording and provision of personal data. Whereas Privacy Acts are currently becoming part of the local laws in Curaçao and the BES Islands (Bonaire, Sint Eustatius en Saba), and are largely based on the principles in the laws of the Netherlands, such laws have already been adopted in the Netherlands many years ago and generally follow the principles established in the EU Privacy Directive of 1995 (Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data). Personal data encompasses all information that (could) disclose information directly tied to a natural person (“consumer”, or “data subject”). Such as the person’s characteristics, opinions or (payment) behavior. To evaluate whether data is “Personal Data”, the extent to which such data could be a factor in the way the person would be judged or treated in the community must be considered. Because the data that is stored by private communication company, such as TrustCor, could cause certain judgments about the consumer, we must adhere to the local Privacy Acts while storing and processing personal data. In accordance with the Privacy Acts, the confidentiality and specified and limited distribution of the personal data must be ensured. The local Privacy Acts in Curaçao and the BES islands form the legal framework in which TrustCor operates. The Privacy Acts stipulate the boundaries within which the personal data which are submitted by the members are allowed to be stored, processed and shared. In addition, as part of the registration process, security protocols, the general terms and conditions and the credit application procedures, as well as requirements of the local banking laws (for the bank members) must be complied with. Privacy in Curaçao Article 12 of the constitution of Curaçao (Staatsregeling van het Land Curaçao, A.B. 2010, 86) describes the right of each indi
Castries | Article about Castries by The Free Dictionary Castries | Article about Castries by The Free Dictionary http://encyclopedia2.thefreedictionary.com/Castries Also found in: Dictionary , Thesaurus , Wikipedia . Castries (kästrē`, käs`trēs), town (1991 pop. 11,147; 1991 metropolitan area pop. 51,994), capital and commercial center of Saint Lucia Saint Lucia , island nation (2005 est. pop. 166,000), 238 sq mi (616 sq km), West Indies, one of the Windward Islands. The capital is Castries. Morne Gimie (3,145 ft/959 m high) and the twin pyramidal cones known as the Pitons are the most imposing landmarks. ..... Click the link for more information. . Its excellent landlocked harbor is one of the best in the West Indies. Castries was founded by the French in 1650. The secretariat for the Organization of Eastern Caribbean States is located there. Castries the capital and chief port of St Lucia. Pop.: 14 000 (2005 est.)
eng_Latn
17,783
My eHarmony Experiment
Now that a couple of hundred Lab readers have told their online matchmaking stories, let me tell you mine. After visiting the eHarmony Labs for my Findings column on matchmaking, I wondered if its algorithm would match me and my wife, Dana. So we each registered separately with eHarmony and answered the 258 questions. We [...].
Princeton is closing down its parapsychology unit but ESP researchers can continue their studies at a few reputable universities. In Bodyhack.
eng_Latn
17,784
Disney Warns of Data Leak
A subcontractor for the Disney Movie Club was caught selling customer credit card numbers and other data.
Want a computer that screams when a thief strikes? Or a personal tracking unit in case you get kidnapped?
kor_Hang
17,785
Cases: Homeless, With a New Loss: Identity
If your identity is being used by someone else, then his overdose is not your business.
A privacy advocate who is suing the government for allegedly forcing airlines to ID passengers is pressing to have his case aired publicly. Government attorneys, meanwhile, want the court to hear their arguments in secret. By Ryan Singel.
eng_Latn
17,786
Particular values .
For example : Particular values .
If they are not disruptive then personal information may just be removed and the user asked not to add the information back .
eng_Latn
17,787
Facebook bug dishes out notes designated private
Company reps keep the flaw secret Facebook users who type sensitive information into a site feature known as Notes may be interested in knowing that it is currently experiencing a bug that allows documents designated as private to be read anyway.…
Private rooms would be standard in new U.S. hospitals under recommendations from an influential architects' group that says building design can help curb infectious diseases and medical errors.
eng_Latn
17,788
Craig Venter: Google your date's DNA
Genetics pioneer Craig Venter has news from the frontiers of biology.
Google Checkout & Customer Ownership Brian Smith at ComparisonEngines has an interesting post (citing research from Piper Jaffray’s Safa Rashtchy) on retailer fear surrounding Google’s control of customer data and the customer relationship. (Eric Schmidt in his remarks at SES gave an unsatisfying implied “trust us” response regarding Google’s management of customer data and consumer privacy [...]
kor_Hang
17,789
Study Highlights Realites of Reputation 2.0
Nearly 50 percent of Internet users have searched for their own name online, but few regularly monitor their online presence with great regularity. Even more people -- 53 percent of Internet users to be exact -- have searched online for information about personal and business contacts.
Home Office research reveals all British people are maintaining steady levels of disbelief over goverment claims about ID cards, according to official Home Office research.…
eng_Latn
17,790
Feds order airlines to divulge passenger details
The requirement is part of a trial run of a computer system that's supposed to ID terrorists before they can board the plane.
Gossip website has started self-censoring pictures in the wake of concern over treatment of celebrities
eng_Latn
17,791
U.S. Wants Personal Data on Airline Passengers
The U.S. government wants airlines to turn over information on the millions of people who traveled in June to test a new system for identifying passengers who may pose a security risk, officials said on Tuesday.
Cheap computers, blazing fast networks and clever engineers are finding more ways to keep tabs on where you go and what you buy, even what you'll do next.-The Washington Post
kor_Hang
17,792
Airlines Told to Turn Over Passenger Data
WASHINGTON - The Transportation Security Administration announced on Tuesday that it will order domestic airlines to turn over personal information about passengers to test a system that will compare their names to those on terrorist watch lists. The system, called Secure Flight, replaces a previous plan that would have checked passenger names against commercial databases and assigned a risk level to each...
Gossip website has started self-censoring pictures in the wake of concern over treatment of celebrities
kor_Hang
17,793
Styled as `` an independent advocate for information privacy rights , and public understanding of privacy research in computer science '' , he was on the board of the Tor anonymity service .
Styled as `` an independent advocate for information privacy rights , and public understanding of privacy research in computer science '' , he was on the Tor anonymous service network board of directors .
It is one of the main entities in the Israeli Intelligence Community , along with Aman ( military intelligence ) and Shin Bet ( internal security ) , but its director reports directly to the Prime Minister .
eng_Latn
17,794
Anaesthesia in the fourth dimension. Is biological scaling relevant to veterinary anaesthesia
Fundamental laws, such as gravity and thermodynamics, are in common use in the physical sciences but are less applicable to biology. However, although there are fewer biological laws relative to other disciplines, the ones that exist are of great importance, e.g. natural selection. Another example may be a new law of biological network design which explains observations on how metabolic rate changes as organisms change size. It has been known for some time that as animal size increases its metabolic rate falls ( Rubner 1883; Kleiber 1932; Adolph 1949; Schmidt-Nielsen 1984; Calabrese 1991). This has developed from a physiological curiosity to a tool that is used extensively to predict drug effects across species ( Lave et al. 1999 ). The function of this article is to review the development of this concept, and to examine its application in veterinary anaesthesia.
Privacy preservation is a key issue that has to be addressed in biometric recognition systems. Template protection schemes are a suitable way to tackle this task. Various template protection approaches originally proposed for other biometric modalities have been adopted to the domain of vascular pattern recognition. Cancellable biometrics are one class of these schemes. In this chapter, several cancellable biometrics methods like block re-mapping and block warping are applied in the feature domain. The results are compared to previous results obtained by the use of the same methods in the image domain regarding recognition performance, unlinkability and the level of privacy protection. The experiments are conducted using several well-established finger vein recognition systems on two publicly available datasets. Furthermore, an analysis regarding subject- versus system-dependent keys in terms of security and recognition performance is done.
eng_Latn
17,795
The study on privacy preserving data mining for information security
Privacy preserving data mining have a rapid development in a short year. But it still faces many challenges in the future. Firstly, the level of privacy has different definitions in different filed. Therefore, the measure of privacy preserving data mining technology protecting private information is not the same. So, it's an urgent issue to present a unified privacy definition and measure. Secondly, the most of research in privacy preserving data mining is presently confined to the theory study.© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
The article introduces the teaching reformation focusing on course project of power engineering detection and control technology, and discusses the new reformation in the future.
eng_Latn
17,796
SMC: A Practical Schema for Privacy-Preserved Data Sharing over Distributed Data Streams
Privacy Preserving Data Mining
A Data-Clustering Algorithm On Distributed Memory Multiprocessors
eng_Latn
17,797
Privacy preserving visualization for social network data with ontology information
The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks
Trends in Digital Video Steganography: A Survey
eng_Latn
17,798
Privacy practices of Internet users: Self-reports versus observed behavior
Privacy policies as decision-making tools: an evaluation of online privacy notices
An Improved Algorithm for Reprojecting Rays through Pixel Images
eng_Latn
17,799