190 research outputs found
Spin polarization of Auger- and of photoelectrons from barium atoms exposed to circularly polarized radiation and their cross comparison
Kuntze R, Salzmann M, Böwering N, Heinzmann U. Spin polarization of Auger- and of photoelectrons from barium atoms exposed to circularly polarized radiation and their cross comparison. Zeitschrift für Physik D: Atoms, Molecules and Clusters. 1994;30(2-3):235-237.New results of spin polarization of both photoelectrons and Auger electrons are reported after 5[Rho] photoionization of free Ba atoms with circularly polarized light. A substantial polarization transfer from the spin polarized photons to the spin polarized photoelectrons and via the hole state orientation to the spin polarized Auger-electrons is observed. The cross comparison of the results for photoelectrons and Auger-electrons allows a quantitative test of the assumed two step model where both electron-emission processes occur in sequence
CHANGES IN STEP CHARACTERISTICS BETWEEN THE MAXIMUM VELOCITY AND DECELERATION PHASES OF THE 100 METRE SPRINT RUN
In a 100 m sprint race, athletes are unable to maintain their maximum velocity through the finish line. The aim of this study was to investigate the contributions of step length and step frequency to changes in velocity as athletes decelerate. Nine well-trained sprint athletes each performed between three and five maximal 100 m sprints. Velocity, step length and step frequency were measured for individual steps in the maximum velocity (30-40 m) and deceleration (70-80 m) phases. On a group level, velocity and step frequency reduced between the maximum velocity and deceleration phases (p < 0.05), whereas step length did not. Individual athlete analyses revealed that the fastest sprinters tended to maintain velocity in the deceleration phase by combining a significant reduction in step frequency with a significant increase in step length
Generation and Handling of Hard Drive Duplicates as Piece of Evidence
An important area in digital forensics is images of hard disks. The correct production of the images as well as the integrity and authenticity of each hard disk image is essential for the probative force of the image to be used at court. Integrity and authenticity are under suspicion as digital evidence is stored and used by software based systems. Modifications to digital objects are hard or even impossible to track and can occur even accidentally. Even worse, vulnerabilities occur for all current computing systems. Therefore, it is difficult to guarantee a secure environment for forensic investigations. But intended deletions of dedicated data of disk images are often required because of legal issues in many countries.
This article provides a technical framework on the protection of the probative force of hard disk images by ensuring the integrity and authenticity using state of the art technology. It combines hardware-based security, cryptographic hash functions and digital signatures to achieve a continuous protection of the image together with a reliable documentation of the status of the device that was used for image creation. The framework presented allows to detect modifications and to pinpoint the exact area of the modification to the digital evidence protecting the probative force of the evidence at a whole. In addition, it also supports the deletion of parts of images without invalidating the retained data blocks.
Keywords: digital evidence, probative force hard disk image, verifiable deletion of image data, trusted imaging softwar
Medicines adherence: Involving patients in decisions about prescribed medicines and supporting adherence
It is thought that between a third and a half of all medicines1
There are many causes of non-adherence but they fall into two overlapping categories: intentional and unintentional. Unintentional non-adherence occurs when the patient wants to follow the agreed treatment but is prevented from doing so by barriers that are beyond their control. Examples include poor recall or difficulties in understanding the instructions, problems with using the treatment, inability to pay for the treatment, or simply forgetting to take it. prescribed for long-term conditions are not taken as recommended. If the prescription is appropriate, then this may represent a loss to patients, the healthcare system and society. The costs are both personal and economic. Adherence presumes an agreement between prescriber and patient about the prescriber’s recommendations. Adherence to medicines is defined as the extent to which the patient’s action matches the agreed recommendations. Non-adherence may limit the benefits of medicines, resulting in lack of improvement, or deterioration, in health. The economic costs are not limited to wasted medicines but also include the knock-on costs arising from increased demands for healthcare if health deteriorates. Non-adherence should not be seen as the patient’s problem. It represents a fundamental limitation in the delivery of healthcare, often because of a failure to fully agree the prescription in the first place or to identify and provide the support that patients need later on. Addressing non-adherence is not about getting patients to take more medicines per se. Rather, it starts with an exploration of patients’ perspectives of medicines and the reasons why they may not want or are unable to use them. Healthcare professionals have a duty to help patients make informed decisions about treatment and use appropriately prescribed medicines to best effec
Phylogenetic Analysis of Seven WRKY Genes across the Palm Subtribe Attaleinae (Arecaceae) Identifies Syagrus as Sister Group of the Coconut
BACKGROUND:The Cocoseae is one of 13 tribes of Arecaceae subfam. Arecoideae, and contains a number of palms with significant economic importance, including the monotypic and pantropical Cocos nucifera L., the coconut, the origins of which have been one of the "abominable mysteries" of palm systematics for decades. Previous studies with predominantly plastid genes weakly supported American ancestry for the coconut but ambiguous sister relationships. In this paper, we use multiple single copy nuclear loci to address the phylogeny of the Cocoseae subtribe Attaleinae, and resolve the closest extant relative of the coconut. METHODOLOGY/PRINCIPAL FINDINGS:We present the results of combined analysis of DNA sequences of seven WRKY transcription factor loci across 72 samples of Arecaceae tribe Cocoseae subtribe Attaleinae, representing all genera classified within the subtribe, and three outgroup taxa with maximum parsimony, maximum likelihood, and Bayesian approaches, producing highly congruent and well-resolved trees that robustly identify the genus Syagrus as sister to Cocos and resolve novel and well-supported relationships among the other genera of the Attaleinae. We also address incongruence among the gene trees with gene tree reconciliation analysis, and assign estimated ages to the nodes of our tree. CONCLUSIONS/SIGNIFICANCE:This study represents the as yet most extensive phylogenetic analyses of Cocoseae subtribe Attaleinae. We present a well-resolved and supported phylogeny of the subtribe that robustly indicates a sister relationship between Cocos and Syagrus. This is not only of biogeographic interest, but will also open fruitful avenues of inquiry regarding evolution of functional genes useful for crop improvement. Establishment of two major clades of American Attaleinae occurred in the Oligocene (ca. 37 MYBP) in Eastern Brazil. The divergence of Cocos from Syagrus is estimated at 35 MYBP. The biogeographic and morphological congruence that we see for clades resolved in the Attaleinae suggests that WRKY loci are informative markers for investigating the phylogenetic relationships of the palm family
Distributed security management for the IoT
This paper proposes a concept of a distributed, hierarchical management structure for large interconnected, dynamic and heterogeneous infrastructures. This approach supporting has the potential to enable efficient security management as well as meta-data distribution is particularly relevant for applications relying on the so-called Internet of Things (IoT). The management structure is motivated by existing and successful approaches in peer-2-peer (P2P) networks for content distribution and it shares some of the characteristics. In contrast to P2P networks with clearly defined functional goals, the IoT can support various applications. Security management functionalities as well as other management tasks need to conform to the heterogeneity of applications and devices. Further, there is no single entity in control of the complete system and applications will definitely be cross-domain. Thus, a classical middle-ware is not suitable and a distributed approach as proposed in this paper can constitute the basis for a new management core for the IoT
Protection of DVB systems by trusted computing: Presentation held at IEEE International Symposium on Broadband Multimedia Systems and Broadcasting 2007, 28-29 March 2007 at the Orange County Convention Center, Orlando, FL, USA
We describe a concept to employ Trusted Computing technology to secure Conditional Access Systems (CAS) for DVB. Central is the embedding of a trusted platform module (TPM) into the set-top-box or residential home gateway. Various deployment scenarios exhibit possibilities of charging co-operation with mobile network operators (MNO), or other payment providers
- …