865 resultados para Privacy Based Access Control
Resumo:
BACKGROUND A number of epidemiological studies indicate an inverse association between atopy and brain tumors in adults, particularly gliomas. We investigated the association between atopic disorders and intracranial brain tumors in children and adolescents, using international collaborative CEFALO data. PATIENTS AND METHODS CEFALO is a population-based case-control study conducted in Denmark, Norway, Sweden, and Switzerland, including all children and adolescents in the age range 7-19 years diagnosed with a primary brain tumor between 2004 and 2008. Two controls per case were randomly selected from population registers matched on age, sex, and geographic region. Information about atopic conditions and potential confounders was collected through personal interviews. RESULTS In total, 352 cases (83%) and 646 controls (71%) participated in the study. For all brain tumors combined, there was no association between ever having had an atopic disorder and brain tumor risk [odds ratio 1.03; 95% confidence interval (CI) 0.70-1.34]. The OR was 0.76 (95% CI 0.53-1.11) for a current atopic condition (in the year before diagnosis) and 1.22 (95% CI 0.86-1.74) for an atopic condition in the past. Similar results were observed for glioma. CONCLUSIONS There was no association between atopic conditions and risk of all brain tumors combined or of glioma in particular. Stratification on current or past atopic conditions suggested the possibility of reverse causality, but may also the result of random variation because of small numbers in subgroups. In addition, an ongoing tumor treatment may affect the manifestation of atopic conditions, which could possibly affect recall when reporting about a history of atopic diseases. Only a few studies on atopic conditions and pediatric brain tumors are currently available, and the evidence is conflicting.
Resumo:
Objective. The aim of this study was to assess the independent risk of hepatitis C virus (HCV) infection in the development of hepatocellular carcinoma (HCC). The independent risk of hepatitis B virus (HBV), its interaction with hepatitis C virus and the association with other risk factors were examined.^ Methods. A hospital-based case-control study was conducted between January 1994 and December 1995. We enrolled 115 pathologically confirmed HCC patients and 230 nonliver cancer controls, who were matched by age ($\pm$5 years), gender, and year of diagnosis. Both cases and controls were recruited from The University of Texas M. D. Anderson Cancer Center at Houston. The risk factors were collected through personal interviews and blood samples were tested for HCV and HBV markers. Univariate and multivariate analyses were performed through conditional logistic regression.^ The prevalence of anti-HCV positive is 25.2% in HCC cases compared to 3.0% in controls. The univariate analysis showed that anti-HCV, HBsAg, alcohol drinking and cigarette smoking were significantly associated with HCC, however, family history of cancer, occupational chemical exposure, and use of oral contraceptive were not. Multivariate analysis revealed a matched odds ratio (OR) of 10.1 (95% CI 3.7-27.4) for anti-HCV, and an OR of 11.9 (95% CI 2.5-57.5) for HBsAg. However, dual infection of HCV and HBV had only a thirteen times increase in the risk of HCC, OR = 13.9 (95% CI 1.3-150.6). The estimated population attributable risk percent was 23.4% for HCV, 12.6% for HBV, and 5.3% for both viruses. Ever alcohol drinkers was positively associated with HCC, especially among daily drinkers, matched OR was 5.7 (95% CI 2.1-15.6). However, there was no significant increase in the risk of HCC among smokers as compared to nonsmokers. The mean age of HCC patients was significantly younger among the HBV(+) group and among the HCV(+)/HBV(+) group, when compared to the group of HCC patients with no viral markers. The association between past histories of blood transfusion, acupuncture, tattoo and IVDU was highly significant among the HCV(+) group and the HBV(+)/HCV(+) group, as compared to HCC patients with no viral markers. Forty percent of the HCC patients were pathologically or clinically diagnosed with liver cirrhosis. Anti-HCV(+) (OR = 3.6 95% CI 1.5-8.9) and alcohol drinking (OR = 2.7 95% CI 1.1-6.7), but not HBsAg, are the major risk factors for liver cirrhosis in HCC patients.^ Conclusion. Both hepatitis B virus and hepatitis C virus were independent risk factors for HCC. There was not enough evidence to determine the interaction between both viruses. Only daily alcoholic drinkers showed increasing risk for HCC development, as compared to nondrinkers. ^
Resumo:
Disruption of function of left, but not right, lateral prefrontal cortex (LPFC) with low-frequency repetitive transcranial magnetic stimulation (rTMS) increased choices of immediate rewards over larger delayed rewards. rTMS did not change choices involving only delayed rewards or valuation judgments of immediate and delayed rewards, providing causal evidence for a neural lateral-prefrontal cortex-based self-control mechanism in intertemporal choice.
Resumo:
Location prediction has attracted a significant amount of research effort. Being able to predict users’ movement benefits a wide range of communication systems, including location-based service/applications, mobile access control, mobile QoS provision, and resource management for mobile computation and storage management. In this demo, we present MOBaaS, which is a cloudified Mobility and Bandwidth prediction services that can be instantiated, deployed, and disposed on-demand. Mobility prediction of MOBaaS provides location predictions of a single/group user equipments (UEs) in a future moment. This information can be used for self-adaptation procedures and optimal network function configuration during run-time operations. We demonstrate an example of real-time mobility prediction service deployment running on OpenStack platform, and the potential benefits it bring to other invoking services.
Resumo:
A population-based case-control study of risk factors for ectopic pregnancy has been conducted. The investigation includes 274 cases diagnosed in Rochester, Minnesota residents from 1935 through 1982, and 548 matched controls selected from live birth deliveries. Risk factor information documented prior to the last index menstrual period was obtained via medical record abstract for 22 potential risk factor variables.^ Univariate matched analyses revealed nine variables with significantly elevated odds ratios (ORs). Following conditional logistic regression for matched sets, four variables remained as significant risk factors for ectopic pregnancy. These risk factors with ORs and 95% confidence intervals (Cls) were: current intrauterine device use (OR = 13.7, Cl = 1.6 - 120.6), infertility (OR = 2.6, Cl = 1.6 - 4.2), pelvic inflammatory disease (OR = 3.3, Cl = 1.6 - 6.6), and tubal surgery (OR = 4.5, Cl = 1.5 - 13.9). After adjusting for these four major risk factors, the following variables did not have statistically significant ORs: abdominal/pelvic surgery (OR = 2.0), acute appendicitis (OR = 2.0), anovulation (OR = 1.2), clomiphene citrate use during the index conception (OR = 3.5), induced abortion (OR = 2.1), in utero exposure to diethylstilbestrol (OR = 1.6), myomas (OR = 0.7), ovarian cysts (OR = 1.0), and past intrauterine device use (OR = 1.2). ^
Resumo:
The incidence of OSCC in younger population and in those who never smoked or drank has increased since the last decade. This increase may be attributable to increase of infection with HPV. The pro-inflammatory cytokine TNF-&agr; has the role in the pathogenesis of chronic inflammatory diseases and was found to control HPV infection in cervical cancer studies. Our study aimed to investigate the association between the four polymorphisms located in TNF-&agr; promoter region, -308(rs1800629), -857(rs1799724), -863(rs1800630) and -1031(rs1799964), and the risk of HPV-related OSCC. In this hospital-based case-control study, 325 cases and 335 controls were included. We found that HPV 16 seropositivity was associated with an increased risk of oral cancer (OR = 3.1, 95% CI, 2.1–4.6). Each of the polymorphism showed to increase the risk of HPV-related OSCC. And after combining the risk genotypes and using the low-risk group (0–1 combined risk genotypes) and HPV16 seronegativity as the reference group, only the high-risk groups (3–4 combined risk genotypes) and HPV16 seronegativity were associated with a low OR of 1.8 (95% CI, 1.1–2.8), while the low-risk and high-risk groups and HPV16 seropositivity were significantly associated with a higher OR of 2.7 (95% CI, 1.3–5.8) and 8.5 (95% CI, 3.7–19.4), respectively. In addition, the joint effects were greater among the young subjects (aged<50), males, never smokers or never drinkers, and patients with oropharyngeal cancer. Overall, the four TNF-&agr; polymorphisms, individually or collectively, would result in a significantly increased risk for HPV16-associated oral cancer in a non-Hispanic white population. More large sized studies are needed for future investigation.^
Resumo:
Changes of sea surface temperature (SST) in the subarctic NE Pacific over the last 16,000 calendar years before present (16 kyr BP) have been inferred from the study of C37 alkenone unsaturation in a sediment core from the western Canadian continental slope. Between 16.0 and 11.0 kyr, three distinct cold phases (6-7°C) interrupt two warmer periods (9-10°C). Within the 2sigma range of the radiocarbon based time control, the observed SST oscillations correspond to the Oldest Dryas, the Bolling, the Older Dryas, the Allered, and the Younger Dryas periods in the GISP2 d180 record. These results represent the first high resolution marine paleotemperature estimates off the northern West coast of North America and imply that the climate of this region may be very strongly coupled to that of the North Atlantic. Given the fast rates of SST change (1°C/40-80 yr), such coupling must be controlled by atmospheric transmission of the climate signal.
Resumo:
The application of impedance control strategies to modern legged locomotion is analyzed, paying special attention to the concepts behind its implementation which is not straightforward. In order to implement a functional impedance controller for a walking mechanism, the concepts of contact, impact, friction, and impedance have to be merged together. A literature review and a comprehensive analysis are presented compiling all these concepts along with a discussion on position-based versus force-based impedance control approaches, and a theoretical model of a robotic leg in contact with its environment is introduced. A theoretical control scheme for the legs of a general legged robot is also introduced, and some simulations results are presented.
Resumo:
Las prestaciones y características de los dispositivos móviles actuales los sitúa a un nivel similar a los ordenadores de escritorio tradicionales en cuanto a funcionalidad y posibilidades de uso, añadiendo además la movilidad y la sensación de pertenencia al usuario que se deriva de ésta. Estas cualidades convierten a las plataformas móviles de computación en verdaderos ordenadores personales, y cada día es más popular su utilización en ámbitos distintos del ocio y las comunicaciones propiamente dichas, pasando a convertirse en herramientas de apoyo a la productividad también en el entorno profesional y corporativo. La utilización del dispositivo móvil como parte de una infraestructura de telecomunicaciones da lugar a nuevas expresiones de problemas clásicos de gestión y seguridad. Para tratar de abordarlos con la flexibilidad y la escalabilidad necesarias se plantean alternativas novedosas que parten de enfoques originales a estos problemas, como las ideas y conceptos que se engloban en la filosofía del Control de Acceso a la Red (Network Access Control, o NAC). La mayoría de los planteamientos de NAC se basan, en el ámbito de la seguridad, en comprobar ciertas características del dispositivo móvil para tratar de determinar hasta qué punto puede éste suponer una amenaza para los recursos de la red u otros usuarios de la misma. Obtener esta información de forma fiable resulta extremadamente difícil si se caracteriza el dispositivo mediante un modelo de caja blanca, muy adecuado dada la apertura propia de los sistemas operativos móviles actuales, muy diferentes de los de antaño, y la ausencia de un marco de seguridad efectivo en ellos. Este trabajo explora el Estado de la Técnica en este ámbito de investigación y plantea diferentes propuestas orientadas a cubrir las deficiencias de las soluciones propuestas hasta el momento y a satisfacer los estrictos requisitos de seguridad que se derivan de la aplicación del modelo de caja blanca, materializándose en última instancia en la definición de un mecanismo de evaluación de características arbitrarias de un cierto dispositivo móvil basado en Entornos Seguros de Ejecución (Trusted Execution Environments, o TEEs) con elevadas garantías de seguridad compatible con los planteamientos actuales de NAC. ABSTRACT The performance and features of today’s mobile devices make them able to compete with traditional desktop computers in terms of functionality and possible usages. In addition to this, they sport mobility and the stronger sense of ownership that derives from it. These attributes change mobile computation platforms into truly personal computers, allowing them to be used not only for leisure or as mere communications devices, but also as supports of productivity in professional and corporative environments. The utilization of mobile devices as part of a telecommunications infrastructure brings new expressions of classic management and security problems with it. In order to tackle them with appropriate flexibility and scalability, new alternatives are proposed based on original approaches to these problems, such as the concepts and ideas behind the philosophy of Network Access Control (NAC). The vast majority of NAC proposals are based, security-wise, on checking certain mobile device’s properties in order to evaluate how probable it is for it to become a threat for network resources or even other users of the infrastructure. Obtaining this information in a reliable and trustworthy way is extremely difficult if the device is characterized using a white-box model, which is the most appropriate if the openness of today’s mobile operating systems, very different from former ones, and the absence of an effective security framework are taken into account. This work explores the State of the Art related with the aforementioned field of research and presents different proposals targeted to overcome the deficiencies of current solutions and satisfy the strict security requirements derived from the application of the white box model. These proposals are ultimately materialized in the definition of a high-security evaluation procedure of arbitrary properties of a given mobile device based on Trusted Execution Environments (TEEs) which is compatible with modern NAC approaches.
Resumo:
El presente PFC tiene como objetivo el desarrollo de un gestor domótico basado en el dictado de voz de la red social WhatsApp. Dicho gestor no solo sustituirá el concepto dañino de que la integración de la domótica hoy en día es cara e inservible sino que acercará a aquellas personas con una discapacidad a tener una mejora en la calidad de vida. Estas personas, con un simple comando de voz a su aplicación WhatsApp de su terminal móvil, podrán activar o desactivar todos los elementos domóticos que su vivienda tenga instalados, “activar lámpara”, “encender Horno”, “abrir Puerta”… Todo a un muy bajo precio y utilizando tecnologías OpenSource El objetivo principal de este PFC es ayudar a la gente con una discapacidad a tener mejor calidad de vida, haciéndose independiente en las labores del hogar, ya que será el hogar quien haga las labores. La accesibilidad de este servicio, es por tanto, la mayor de las metas. Para conseguir accesibilidad para todas las personas, se necesita un servicio barato y de fácil aprendizaje. Se elige la red social WhatsApp como interprete, ya que no necesita de formación al ser una aplicación usada mayoritariamente en España y por la capacidad del dictado de voz, y se eligen las tecnologías OpenSource por ser la gran mayoría de ellas gratuitas o de pago solo el hardware. La utilización de la Red social WhatsApp se justifica por sí sola, en septiembre de 2015 se registraron 900 millones de usuarios. Este dato es fruto, también, de la reciente adquisición por parte de Facebook y hace que cumpla el primer requisito de accesibilidad para el servicio domotico que se presenta. Desde hace casi 5 años existe una API liberada de WhatsApp, que la comunidad OpenSource ha utilizado, para crear sus propios clientes o aplicaciones de envío de mensajes, usando la infraestructura de la red social. La empresa no lo aprueba abiertamente, pero la liberación de la API fue legal y su uso también lo es. Por otra parte la empresa se reserva el derecho de bloquear cuentas por el uso fraudulento de su infraestructura. Las tecnologías OpenSource utilizadas han sido, distribuciones Linux (Raspbian) y lenguajes de programación PHP, Python y BASHSCRIPT, todo cubierto por la comunidad, ofreciendo soporte y escalabilidad. Es por ello que se utiliza, como matriz y gestor domotico central, una RaspberryPI. Los servicios que el gestor ofrece en su primera versión incluyen el control domotico de la iluminación eléctrica general o personal, el control de todo tipo de electrodomésticos, el control de accesos para la puerta principal de entrada y el control de medios audiovisuales. ABSTRACT. This final thesis aims to develop a domotic manager based on the speech recognition capacity implemented in the social network, WhatsApp. This Manager not only banish the wrong idea about how expensive and useless is a domotic installation, this manager will give an opportunity to handicapped people to improve their quality of life. These people, with a simple voice command to their own WhatsApp, could enable or disable all the domotics devices installed in their living places. “On Lamp”, “ON Oven”, “Open Door”… This service reduce considerably the budgets because the use of OpenSource Technologies. The main achievement of this thesis is help handicapped people improving their quality of life, making independent from the housework. The house will do the work. The accessibility is, by the way, the goal to achieve. To get accessibility to a width range, we need a cheap, easy to learn and easy to use service. The social Network WhatsApp is one part of the answer, this app does not need explanation because is used all over the world, moreover, integrates the speech recognition capacity. The OpenSource technologies is the other part of the answer due to the low costs or, even, the free costs of their implementations. The use of the social network WhatsApp is explained by itself. In September 2015 were registered around 900 million users, of course, the recent acquisition by Facebook has helped in this astronomic number and match the first law of this service about the accessibility. Since five years exists, in the internet, a free WhatsApp API. The OpenSource community has used this API to develop their own messaging apps or desktop-clients, using the WhatsApp infrastructure. The company does not approve officially, however le API freedom is legal and the use of the API is legal too. On the other hand, the company can block accounts who makes a fraudulent use of his infrastructure. OpenSource technologies used in this thesis are: Linux distributions (Raspbian) and programming languages PHP, Python and BASHCSRIPT, all of these technologies are covered by the community offering support and scalability. Due to that, it is used a RaspberryPI as the Central Domotic Manager. The domotic services that currently this manager achieve are: Domotic lighting control, electronic devices control, access control to the main door and Media Control.
Resumo:
Online multimedia data needs to be encrypted for access control. To be capable of working on mobile devices such as pocket PC and mobile phones, lightweight video encryption algorithms should be proposed. The two major problems in these algorithms are that they are either not fast enough or unable to work on highly compressed data stream. In this paper, we proposed a new lightweight encryption algorithm based on Huffman error diffusion. It is a selective algorithm working on compressed data. By carefully choosing the most significant parts (MSP), high performance is achieved with proper security. Experimental results has proved the algorithm to be fast. secure: and compression-compatible.
Resumo:
Web transaction data between Web visitors and Web functionalities usually convey user task-oriented behavior pattern. Mining such type of click-stream data will lead to capture usage pattern information. Nowadays Web usage mining technique has become one of most widely used methods for Web recommendation, which customizes Web content to user-preferred style. Traditional techniques of Web usage mining, such as Web user session or Web page clustering, association rule and frequent navigational path mining can only discover usage pattern explicitly. They, however, cannot reveal the underlying navigational activities and identify the latent relationships that are associated with the patterns among Web users as well as Web pages. In this work, we propose a Web recommendation framework incorporating Web usage mining technique based on Probabilistic Latent Semantic Analysis (PLSA) model. The main advantages of this method are, not only to discover usage-based access pattern, but also to reveal the underlying latent factor as well. With the discovered user access pattern, we then present user more interested content via collaborative recommendation. To validate the effectiveness of proposed approach, we conduct experiments on real world datasets and make comparisons with some existing traditional techniques. The preliminary experimental results demonstrate the usability of the proposed approach.
Resumo:
A local area network that can support both voice and data packets offers economic advantages due to the use of only a single network for both types of traffic, greater flexibility to changing user demands, and it also enables efficient use to be made of the transmission capacity. The latter aspect is very important in local broadcast networks where the capacity is a scarce resource, for example mobile radio. This research has examined two types of local broadcast network, these being the Ethernet-type bus local area network and a mobile radio network with a central base station. With such contention networks, medium access control (MAC) protocols are required to gain access to the channel. MAC protocols must provide efficient scheduling on the channel between the distributed population of stations who want to transmit. No access scheme can exceed the performance of a single server queue, due to the spatial distribution of the stations. Stations cannot in general form a queue without using part of the channel capacity to exchange protocol information. In this research, several medium access protocols have been examined and developed in order to increase the channel throughput compared to existing protocols. However, the established performance measures of average packet time delay and throughput cannot adequately characterise protocol performance for packet voice. Rather, the percentage of bits delivered within a given time bound becomes the relevant performance measure. Performance evaluation of the protocols has been examined using discrete event simulation and in some cases also by mathematical modelling. All the protocols use either implicit or explicit reservation schemes, with their efficiency dependent on the fact that many voice packets are generated periodically within a talkspurt. Two of the protocols are based on the existing 'Reservation Virtual Time CSMA/CD' protocol, which forms a distributed queue through implicit reservations. This protocol has been improved firstly by utilising two channels, a packet transmission channel and a packet contention channel. Packet contention is then performed in parallel with a packet transmission to increase throughput. The second protocol uses variable length packets to reduce the contention time between transmissions on a single channel. A third protocol developed, is based on contention for explicit reservations. Once a station has achieved a reservation, it maintains this effective queue position for the remainder of the talkspurt and transmits after it has sensed the transmission from the preceeding station within the queue. In the mobile radio environment, adaptions to the protocols were necessary in order that their operation was robust to signal fading. This was achieved through centralised control at a base station, unlike the local area network versions where the control was distributed at the stations. The results show an improvement in throughput compared to some previous protocols. Further work includes subjective testing to validate the protocols' effectiveness.
Resumo:
Dedicated short range communications (DSRC) has been regarded as one of the most promising technologies to provide robust communications for large scale vehicle networks. It is designed to support both road safety and commercial applications. Road safety applications will require reliable and timely wireless communications. However, as the medium access control (MAC) layer of DSRC is based on the IEEE 802.11 distributed coordination function (DCF), it is well known that the random channel access based MAC cannot provide guaranteed quality of services (QoS). It is very important to understand the quantitative performance of DSRC, in order to make better decisions on its adoption, control, adaptation, and improvement. In this paper, we propose an analytic model to evaluate the DSRC-based inter-vehicle communication. We investigate the impacts of the channel access parameters associated with the different services including arbitration inter-frame space (AIFS) and contention window (CW). Based on the proposed model, we analyze the successful message delivery ratio and channel service delay for broadcast messages. The proposed analytical model can provide a convenient tool to evaluate the inter-vehicle safety applications and analyze the suitability of DSRC for road safety applications.
Resumo:
WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, large service coverage, and flexible quality of services (QoS). Due to the large number of connections and flexible QoS supported by WiMAX, the uplink access in WiMAX networks is very challenging since the medium access control (MAC) protocol must efficiently manage the bandwidth and related channel allocations. In this paper, we propose and investigate a cost-effective WiMAX bandwidth management scheme, named the WiMAX partial sharing scheme (WPSS), in order to provide good QoS while achieving better bandwidth utilization and network throughput. The proposed bandwidth management scheme is compared with a simple but inefficient scheme, named the WiMAX complete sharing scheme (WCPS). A maximum entropy (ME) based analytical model (MEAM) is proposed for the performance evaluation of the two bandwidth management schemes. The reason for using MEAM for the performance evaluation is that MEAM can efficiently model a large-scale system in which the number of stations or connections is generally very high, while the traditional simulation and analytical (e.g., Markov models) approaches cannot perform well due to the high computation complexity. We model the bandwidth management scheme as a queuing network model (QNM) that consists of interacting multiclass queues for different service classes. Closed form expressions for the state and blocking probability distributions are derived for those schemes. Simulation results verify the MEAM numerical results and show that WPSS can significantly improve the network's performance compared to WCPS.