3,073 research outputs found
Muscle synergies after stroke are correlated with perilesional high gamma.
Movements can be factored into modules termed "muscle synergies". After stroke, abnormal synergies are linked to impaired movements; however, their neural basis is not understood. In a single subject, we examined how electrocorticography signals from the perilesional cortex were associated with synergies. The measured synergies contained a mix of both normal and abnormal patterns and were remarkably similar to those described in past work. Interestingly, we found that both normal and abnormal synergies were correlated with perilesional high gamma. Given the link between high gamma and cortical spiking, our results suggest that perilesional spiking may organize synergies after stroke
Privacy Preserving HIPAA-Compliant Access Control Model for Web Services
Most of the modern health-related information is collected, maintained, and accessed through computerized systems. However, the interaction with this information needs to comply with the US federal regulations such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Due to the complexity of healthcare regulations, it’s not easy to deploy a complaint system, especially for heterogeneous systems designed to allow data transfer and communication. Web services can be used to solve the problem of incompatible systems intercommunication; however, a generic model for HIPAA enforcement is required. In this paper we propose a generic HIPAA complaint privacy access control model for web services that can be easily applied to any existing covered entity web services
Studying and Modeling the Connection between People's Preferences and Content Sharing
People regularly share items using online social media. However, people's
decisions around sharing---who shares what to whom and why---are not well
understood. We present a user study involving 87 pairs of Facebook users to
understand how people make their sharing decisions. We find that even when
sharing to a specific individual, people's own preference for an item
(individuation) dominates over the recipient's preferences (altruism). People's
open-ended responses about how they share, however, indicate that they do try
to personalize shares based on the recipient. To explain these contrasting
results, we propose a novel process model of sharing that takes into account
people's preferences and the salience of an item. We also present encouraging
results for a sharing prediction model that incorporates both the senders' and
the recipients' preferences. These results suggest improvements to both
algorithms that support sharing in social media and to information diffusion
models.Comment: CSCW 201
QuateXelero : an accelerated exact network motif detection algorithm
Finding motifs in biological, social, technological, and other types of networks has become a widespread method to gain more knowledge about these networks’ structure and function. However, this task is very computationally demanding, because it is highly associated with the graph isomorphism which is an NP problem (not known to belong to P or NP-complete subsets yet). Accordingly, this research is endeavoring to decrease the need to call NAUTY isomorphism detection method, which is the most time-consuming step in many existing algorithms. The work provides an extremely fast motif detection algorithm called QuateXelero, which has a Quaternary Tree data structure in the heart. The proposed algorithm is based on the well-known ESU (FANMOD) motif detection algorithm. The results of experiments on some standard model networks approve the overal superiority of the proposed algorithm, namely QuateXelero, compared with two of the fastest existing algorithms, G-Tries and Kavosh. QuateXelero is especially fastest in constructing the central data structure of the algorithm from scratch based on the input network
Security in Cloud Computing Based on Third Party Auditor: A Survey
This Paper surveys security in cloud computing based on Third Party Auditor (TPA) also known as Trusted Third Party (TTP). There are various security models for safeguarding the client’s data in cloud. TPA provides secure connections between the user and the cloud server. Cloud Service Provider (CSP) Provides the clients with cloud storage and service. TPA has access to the client’s cloud data and all the critical information. There are many security models for making the TPA more reliable so the clients can trust the third party for storing their data. In this paper, we survey mostly the types of security models based on Third Party Auditing in cloud. We also discuss how these security models enable the third parties to gain the clients trust. The classification has been based on the adopted security method as well as on the kind of threats they are addressing
Secure and Strong Mobile cloud Authentication
Mobile cloud computing has dual benefits that include cloud computing and mobile computing. In mobile cloud computing data storage and data processing take place outside the mobile device. As a result, there is a high chance of a security attack. The attacker may easily get access to our sensitive data. Due to this the malicious user may see or modify our data. To overcome this problem, we need to store our data in the cloud where it will be secured. In this paper, we propose a secure and strong authentication (SSA) process that stores the key at different cloud servers. This process provides strong authentication. Greencloud is used to validate the process. The results confirm that our proposed SSA protects the mobile cloud computing from malicious activities
- …
