3,073 research outputs found

    Muscle synergies after stroke are correlated with perilesional high gamma.

    Get PDF
    Movements can be factored into modules termed "muscle synergies". After stroke, abnormal synergies are linked to impaired movements; however, their neural basis is not understood. In a single subject, we examined how electrocorticography signals from the perilesional cortex were associated with synergies. The measured synergies contained a mix of both normal and abnormal patterns and were remarkably similar to those described in past work. Interestingly, we found that both normal and abnormal synergies were correlated with perilesional high gamma. Given the link between high gamma and cortical spiking, our results suggest that perilesional spiking may organize synergies after stroke

    Privacy Preserving HIPAA-Compliant Access Control Model for Web Services

    Get PDF
    Most of the modern health-related information is collected, maintained, and accessed through computerized systems. However, the interaction with this information needs to comply with the US federal regulations such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Due to the complexity of healthcare regulations, it’s not easy to deploy a complaint system, especially for heterogeneous systems designed to allow data transfer and communication. Web services can be used to solve the problem of incompatible systems intercommunication; however, a generic model for HIPAA enforcement is required. In this paper we propose a generic HIPAA complaint privacy access control model for web services that can be easily applied to any existing covered entity web services

    Studying and Modeling the Connection between People's Preferences and Content Sharing

    Full text link
    People regularly share items using online social media. However, people's decisions around sharing---who shares what to whom and why---are not well understood. We present a user study involving 87 pairs of Facebook users to understand how people make their sharing decisions. We find that even when sharing to a specific individual, people's own preference for an item (individuation) dominates over the recipient's preferences (altruism). People's open-ended responses about how they share, however, indicate that they do try to personalize shares based on the recipient. To explain these contrasting results, we propose a novel process model of sharing that takes into account people's preferences and the salience of an item. We also present encouraging results for a sharing prediction model that incorporates both the senders' and the recipients' preferences. These results suggest improvements to both algorithms that support sharing in social media and to information diffusion models.Comment: CSCW 201

    Prologue: Diplomacy and Sport

    Get PDF

    QuateXelero : an accelerated exact network motif detection algorithm

    Get PDF
    Finding motifs in biological, social, technological, and other types of networks has become a widespread method to gain more knowledge about these networks’ structure and function. However, this task is very computationally demanding, because it is highly associated with the graph isomorphism which is an NP problem (not known to belong to P or NP-complete subsets yet). Accordingly, this research is endeavoring to decrease the need to call NAUTY isomorphism detection method, which is the most time-consuming step in many existing algorithms. The work provides an extremely fast motif detection algorithm called QuateXelero, which has a Quaternary Tree data structure in the heart. The proposed algorithm is based on the well-known ESU (FANMOD) motif detection algorithm. The results of experiments on some standard model networks approve the overal superiority of the proposed algorithm, namely QuateXelero, compared with two of the fastest existing algorithms, G-Tries and Kavosh. QuateXelero is especially fastest in constructing the central data structure of the algorithm from scratch based on the input network

    Security in Cloud Computing Based on Third Party Auditor: A Survey

    Get PDF
    This Paper surveys security in cloud computing based on Third Party Auditor (TPA) also known as Trusted Third Party (TTP). There are various security models for safeguarding the client’s data in cloud. TPA provides secure connections between the user and the cloud server. Cloud Service Provider (CSP) Provides the clients with cloud storage and service. TPA has access to the client’s cloud data and all the critical information. There are many security models for making the TPA more reliable so the clients can trust the third party for storing their data. In this paper, we survey mostly the types of security models based on Third Party Auditing in cloud. We also discuss how these security models enable the third parties to gain the clients trust. The classification has been based on the adopted security method as well as on the kind of threats they are addressing

    Secure and Strong Mobile cloud Authentication

    Get PDF
    Mobile cloud computing has dual benefits that include cloud computing and mobile computing. In mobile cloud computing data storage and data processing take place outside the mobile device. As a result, there is a high chance of a security attack. The attacker may easily get access to our sensitive data. Due to this the malicious user may see or modify our data. To overcome this problem, we need to store our data in the cloud where it will be secured. In this paper, we propose a secure and strong authentication (SSA) process that stores the key at different cloud servers. This process provides strong authentication. Greencloud is used to validate the process. The results confirm that our proposed SSA protects the mobile cloud computing from malicious activities
    corecore