47 research outputs found

    Energy Momentum Pseudo-Tensor of Relic Gravitational Wave in Expanding Universe

    Full text link
    We study the energy-momentum pseudo-tensor of gravitational wave, and examine the one introduced by Landau-Lifshitz for a general gravitational field and the effective one recently used in literature. In short wavelength limit after Brill-Hartle average, both lead to the same gauge invariant stress tensor of gravitational wave. For relic gravitational waves in the expanding universe, we examine two forms of pressure, pgwp_{gw} and Pgw\mathcal{P}_{gw}, and trace the origin of their difference to a coupling between gravitational waves and the background matter. The difference is shown to be negligibly small for most of cosmic expansion stages starting from inflation. We demonstrate that the wave equation is equivalent to the energy conservation equation using the pressure Pgw\mathcal{P}_{gw} that includes the mentioned coupling.Comment: 15 pages, no figure, Accepted by PR

    Sequence and Expression Analysis of Interferon Regulatory Factor 10 (IRF10) in Three Diverse Teleost Fish Reveals Its Role in Antiviral Defense

    Get PDF
    Acknowledgments This research was supported financially by the National Natural Science Foundation of China (31101928), the National Science and Technology Support Program of China (2013BAD20B06), the State Key Laboratory of Freshwater Ecology and Biotechnology (2010FB02) and the MASTS pooling initiative (The Marine Alliance for Science and Technology for Scotland) funded by the Scottish Funding Council (grant reference HR09011). Q.X. and Y.J. were supported financially by the National Scholarship Council of China. Funding: This research was supported financially by the National Natural Science Foundation of China (31101928), the National Science and Technology Support Program of China (2013BAD20B06), the State Key Laboratory of Freshwater Ecology and Biotechnology (2010FB02) and the MASTS pooling initiative (The Marine Alliance for Science and Technology for Scotland) funded by the Scottish Funding Council (grant reference HR09011). Q.X. and Y.J. were supported financially by the National Scholarship Council of China. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.Peer reviewedPublisher PD

    Authorization control in collaborative healthcare systems

    No full text
    Modern healthcare systems require collaborations between individual social entities such as hospitals, medical centers, emergency services and community services. One of the most critical issues in this setting is security and privacy, i.e., who can access what and based on which condition(s). In the healthcare system that crosses different administrative domains, each business unit has its own security policies defined and enforced. Therefore the challenge is how security policies shall be specified, compared and integrated if necessary depending on the nature of the inter-domain collaboration. In this paper, we discuss the challenging access control issues in cross-domain healthcare systems. A framework is provided to support authorization control in such an environment, which takes collaboration semantics into account, as well as individual participant's authorization policies.22 page(s

    Group Lasso-Based Band Selection for Hyperspectral Image Classification

    No full text

    Identify authorization control requirement in business collaboration

    No full text
    Different types of business collaborations exist in terms of the way that the collaboration is carried out. In this paper, we will look into the characteristics of different collaborations and analyze their policy requirements accordingly. Various inconsistencies between authorization policies from different business units are identified and suggestions are made according to different types collaborations.2 page(s

    Transmission scheduling in single-hop and multi-hop wireless networks

    No full text
    abstractpublished_or_final_versionElectrical and Electronic EngineeringDoctoralDoctor of Philosoph

    Security policy specification and integration in business collaboration

    No full text
    Service oriented computing (SOC) has provided a promising architectural for business collaboration. However challenging security issues concerning business collaboration have arisen because of its dynamic and loosely coupling nature. An important problem is how to specify security policies that belong to different application domains and integrate them to satisfy the requirements of the collaboration. In this paper we will provide analysis on authorization policy requirements for business collaboration, collaboration patterns and various security comparability and integration issues. We believe it is a first step toward a framework for modeling, specifying and handling authorization control for business collaboration.8 page(s

    A Policy driven authorization control framework for business collaboration

    No full text
    Business collaboration is about coordinating the flow of information among organizations and linking their business processes. However unique and challenging security issues concerning business collaboration in the context of SOC have arisen because of its dynamic and loosely coupling nature. In this paper we firstly identify elements for security policy specification. We then discuss different types of collaboration patterns based on which rules for security policy integration can be developed. A framework is developed for handling authorization control for business collaboration. The discussion in the paper is based on the collaboration scenarios in health care.8 page(s

    Understand collaborative authorization policies : models and specifications

    No full text
    Modern distributed systems require collaborations between individual organizations. The collaborations consist of complex relationships and interactions among distinct administrative domains. Different forms of collaboration can be implemented. As a result, different security control requirements emerge. For example, service propagation requires all collaborating partners to have compatible authorization policies. On the other hand, integratable policies are required for organizations who intend to engage in service composition. Therefore, a thorough understanding of different collaboration patterns is a prerequisite for secure inter-organizational collaboration. In this paper, we define basic inter-organizational collaboration patterns and propose Collaboration Policies that outline requirements for collaboration partners in each collaboration pattern in terms of authorization policy consistency.8 page(s
    corecore