Adaptive and Context-Aware Privacy Preservation Schemes Exploiting User Interactions in Pervasive Environments
|
|
- Alyson Hodges
- 5 years ago
- Views:
Transcription
1 Adaptive and Context-Awae Pivacy Pesevation Schemes Exploiting Use Inteactions in Pevasive Envionments Gautham Pallapa*, Maio Di Fancesco t *, and Sajal K. Das* *Cente fo Reseach in Wieless Mobility and Netwoking Univesity of Texas at Alington t Depatment of Compute Science and Engineeing Aalto Univesity School of Science maio.di.fancesco@aalto.fi Abstact-In a pevasive system, uses have vey dynamic and ich inteactions with the envionment and its elements, including othe uses. To efficiently suppot uses in such envionments, a high.level epesentation of the system (namely, context) is usually exploited. Howeve, since pevasive envion ments ae inheently people'centic, context might consist of sensitive infomation. As a consequence, pivacy concens aise, especially in tems of how to contol infomation disclosue to thid paties (e.g., othe uses). In this pape we popose context awae appoaches to pivacy pesevation in wieless and mobile pevasive envionments. Specifically, we design two schemes: (i) to educe the inteactions between the use and the system, and (ii) to exploit the inteactions between diffeent uses. Both of ou solutions ae adaptive, thus suitable fo dynamic scenaios. In addition, ou schemes equie limited computational and stoage esouces, so that they can be implemented on esouce constained pesonal and sensing devices. We apply ou solutions to a smat healthcae scenaio, and show that ou schemes not only effectively potect the use pivacy, but also significantly educe the inteactions with the system, thus impoving the use expeience. Keywods Pevasive systems, context awaeness, pivacy pesevation, use inteactions, smat envionments. I. INTRODUCTION Technological advances and the widespead adoption of both sensos and pesonal devices, such as smatphones and PDAs, ae making pevasive systems and the Intenetof-things a eality [1]. This plethoa of devices not only make possible infomation access "eveywhee at anytime", but, moe significantly, also suppot daily activities and occupations of people seamlessly [2]. Pevasive systems would not exist without people. Convesely, people would not use systems which ae obtusive, difficult to use, o which imply isks not popotionate to thei benefits [3]. Hence, it is impotant to conside use inteactions in the design of pevasive systems [4]. Smat envionments epesent a specific instance of pevasive systems whee people suoundings ae enhanced though sensing and actuation capabilities, thus impoving the use expeience [5]. One fundamental aspect hee is that these systems ae intelligent, so that they acquie and apply knowledge about the envionment and its actos autonomously [6]. This is needed due to a numbe of factos. Fist, the inteactions between diffeent devices and people need to be abstacted and intepeted in ode to obtain meaningful decisions and actions. In fact, the aw data themselves might be too many and complex. Second, since smat envionments ae centeed aound use needs, the inteaction with people is supposed to be so natual that it cannot even be noticed [7]. Howeve, these inteactions, which also involve diffeent infomation souces, ae usually vey dynamic and complex. Hence, some effot is equied to take autonomous decisions, as well as to adapt to uses as they inteact with the envionment [8]. One of the foundations of pevasive systems and smat envionments is the so called context, defined as the cicumstances o backgound elements which (help to) detemine the meaning of an event o the occuence of specific pattens. In most cases, context infomation is peoplecentic, hence it may consist of sensitive infomation which may lead to secuity and pivacy issues. In this pape, we focus on pivacy, defined as the claim of an individual to allow o deny, accoding to cetain constaints, disclosue of pesonal infomation to thid paties [9]. Note that thid paties ae not only othe people, but also entities (e.g., applications o povides) which could potentially exploit context infomation to povide sevices. This makes the poblem even moe challenging [5, Chapte 1]. Most of the appoaches to pivacy pesevation in pevasive envionments which have aleady poposed in the liteatue focus on eithe location pivacy [10] o anonymization [11, 12]. Hee, we athe quantify the pivacy associated with context infomation, as in [13], whee a pivacy value denotes how much the use is willing to shae the elated infomation with othe actos in the system. Howeve, in contast to [13], we specifically addess dynamic scenaios involving even multiple uses. To a cetain extent, ou appoach is simila to [14], whee an access-ights gaph stuctue was exploited to decide how specific context infomation could be accessed. Indeed, ou solution does not pefom access contol, but athe deive the pivacy of context infomation moe natually fom use inteactions. In this aticle, we popose two context-awae appoaches to pivacy pesevation in wieless and mobile pevasive envionments. Specifically, we intoduce a hybid scheme to educe the inteactions between the use and the system /12/$ IEEE
2 We also pesent an appoach based on use behavio which is capable to exploit the inteactions between diffeent uses and the envionment. Both of ou solutions ae adaptive, thus suitable fo dynamic scenaios. In addition, ou schemes equie limited computational and stoage esouces, so that they can be implemented on esouce-constained pesonal and sensing devices. We apply ou solutions to a smat healthcae scenaio, and show that ou schemes can effectively potect use pivacy. Futhemoe, we show by simulation that ou poposed appoaches also significantly impove the use expeience, in tems of educed numbe of explicit inteactions with the system. The est of the pape is oganized as follows. Section II intoduces the efeence system achitectue and the consideed pivacy model. Section III poposes two schemes fo pivacy pesevation, which ae then evaluated in Section IV. Finally, Section V concludes the pape. Context Rules Context States Figue I. Context Manage Pivacy Manage Rule Evaluation Engine Context Gathee Sensing Devices Remote Sevices Pivacy Detemination Access Contol Tansaction Log Components of a pivacy and context-awae pevasive system I II. PRELIMINARIES In this section we will fist pesent the fundamental concepts behind ou poposed adaptive pivacy pesevation schemes, then we will intoduce the system achitectue. A. System Model and Refeence Achitectue We denote a pevasive envionment E consisting of a set of n esouces as E = {Tl' T2,..., Tn}. Each esouce coesponds to eithe a sensing unit (e.g., a senso measuing tempeatue o a camea) o an attibute made available by a (emote) sevice (e.g., weathe foecast o taffic infomation). Resouces ae chaacteized by means of context elements ei fo i = 1,...,n, each containing the basic infomation needed by the system: a esouce ID, the associated data, and a timestamp. We define a context as a collection of context elements. To avoid ambiguity, and since the state of the system can be deived depending on the context infomation, we will efe to a specific context as context state. Moe in detail, a context state Cj is defined as a set of m context elements such that Cj = {el' e2,..., em}, whee m :::; n. Context states ae pocessed accoding to use o system-defined context ules. These fundamental elements ae managed by the system though to the components shown in Figue I. Specifically, a context manage is used to handle context infomation. The context manage is made of two diffeent subsystems: (i) a context gathee which etieves the esouces, builds the context elements, and associates them to context states; and (ii) a ule engine which evaluates the context ules and updates the state of the system accodingly. In ode to keep tack of the cuent state, the system stoes both the context ules and the context states in databases which ae made available to the diffeent components. Pivacy-pesevation is accomplished by means of a pivacy manage, which associates pivacy infomation with the diffeent context states and ensues pope access to sensitive infomation. The pivacy manage maintains a tansaction log, which is used to update the pivacy of the diffeent context states accoding to specific policies. The application component contains the diffeent use applications which can take advantage of the pivacy-pesevation sevice. In addition, it compises intefaces fo configuing the diffeent components of the system, including the pivacy settings and the context ules. In the following subsection, we will intoduce the pivacy model used in the est of the pape. We will assume that the context manage is aleady available - e.g., by using the solution in [15] - and focus on the pivacy manage instead. B. Pivacy Repesentation and Management In ou scheme we associate a pivacy value with each element in the system, epesenting the elated amount of pivacy [13]. The pivacy value w is chosen among the set L of the pivacy levels allowed by the system. Moe specifically, we assume that I levels ae defined, so that L = 0, f,, ll l, I} and 0 :::; w :::; 1 is used as the weight fo the diffeent elements. Pivacy values associated with context elements ei and context states Cj ae denoted as w(ei) and w(cj), espectively. In addition to those individual pivacy values, a global pivacy setting 7 is also defined. The global pivacy setting summaizes how context infomation is to be shaed o potected by the use. Pivacy management is pefomed as follows. Fist, pivacy values fo context elements and context states ae detemined. Second, those values ae evaluated with espect to the global pivacy setting each time a context infomation is equested. If the cuent global pivacy setting allows to disclose the context infomation, then the elated context elements ae shaed with the equesting paty. Othewise they ae denied, and eventually the use is pompted fo additional actions, e.g., allow a (tempoay) exception o change the cuent state so that such a equest can be satisfied.
3 III. ADAPTIVE PRIVACY PRESERVATION In the pevious section we have (implicitly) chaacteized the status of the system at a specific instant. The esulting chaacteization can also be thought as a snapshot of the system at a given time. In ode to tack the dynamics of the system, we extend the basic model to time-vaying pocesses by intoducing the time vaiable t. As a esult, we will denote as w(ei, t), w(gj, t), and n(t) the context elements, context states, and the global pivacy setting of the system at time t, espectively. We define the state of the system at a given time t as a session, denoted as S(t). If context ules do not change with time, the state of the system is univocally identified by the set of context elements and context states, along with the coesponding pivacy levels and the global pivacy setting. If the pivacy value of context states can also be deived accoding to a cetain policy, then the state of the system is uniquely detemined just by the context elements and thei weights, which we denote as S(t) = {w(el, t), w(e2, t),..., w(em, tn. In the following, we will assume that the context ules ae statically defined, so that we can chaacteize a session only on the basis of the weighted context elements. A. A Hybid Appoach to Pivacy Pesevation In this section we will pesent a hybid appoach to pivacy pesevation, in the sense that the poposed scheme exploits both use inteactions and automatic detemination of pivacy values associated with context states, based on the context elements. Let us conside, without loss of geneality, a scenaio whee two! uses Us and U inteact within a session. Specifically, use Us is shaing some infomation accoding to some pivacy settings, and use U is equesting some infomation, descibed in tems of the set of context elements G(t) = {el(t), e2(t),..., e(tn. We now descibe how ou scheme, executed at the use Us, esults in shaing the elevant (context) infomation with the use U while peseving the desied level of pivacy. We assume that a global pivacy setting n(t) is available, fo instance as specified by the use Us. We also assume that the pivacy values (i.e., weights) of the context elements w (ei, t) ae available. In ode to detemine if the equest can be satisfied, the system compaes the pivacy of the context states to the global pivacy setting, i.e., w(g,t) = Lw(ei,t)::; n(t) (1) i=l whee is the numbe of context elements in the equest G(t). If Expession (1) is satisfied, then the use Us is 1 Session involving multiple uses can always be efeed to as a set of paiwise sessions between one use shaing infomation and anothe use equesting a context. Algoithm 1: Scheme based on a hybid appoach input: equest G(t) = {el(t), e2(t),..., e(tn 4l 3 else constuct the decision tee; 5 obtain Gs(t); 1 if L =l w(ei, t). Xi ::; n(t) then 2 L infom use of the session G(t); 6 infom use of the session Gs(t); 7 quey pemissions fo elements of G(t) \ Gs(t); notified of the coesponding session, and of which infomation has been shaed. Othewise, the use is pompted fo action, i.e., allow o deny the disclosue of the elated context infomation. Ou goal hee is to keep the system as autonomous as possible, thus educing the numbe of inteactions with the use to the minimum extent. To this end, we ty to maximize the numbe of context elements which can satisfy the equest, in tems of the constaint in Expession (1). It is easy to show that this can be mapped to a 0-1 knapsack poblem [16], which can be fomulated as follows: max L w(ei, t). Xi (2) i=l i=l Xi E {a,l} whee Xi is a binay value which denotes if the context element ei(t) is included in the context infomation which can be automatically shaed, accoding to the cuent global pivacy setting. The 0-1 knapsack poblem can be solved though linea pogamming [17]. Howeve, to educe the computational equiements, in ou scheme we used a geedy appoach based on a decision tee. Let Gs(t) be the set of shaeable context elements esulting fom Expession (2). Then the use Us is infomed of the coesponding session Gs(t), and asked fo pemission to shae the emaining context elements which do not belong to Gs(t), i.e., the elements in G(t) \ Gs(t). The hybid appoach is illustated by Algoithm 1. The poposed appoach has a numbe of advantages. In fact, if Expession (1) is satisfied, the use Us is just infomed of the session, and no futhe action is needed. Othewise, the use Us has to appove the shaing of a limited numbe of context elements. This oveall educes the numbe of both queies and use pompts, thus allowing a smoothe inteaction with the pevasive envionment. In addition, the use expeience is impoved since the system allows to know at a glance the context elements that have been shaed, as well as to modify the pivacy levels of the context elements.
4 B. Pivacy Pesevation Based on Use Behavio So fa we have chaacteized pivacy management by efeing to a session which occus between two uses. Howeve, inteactions within a pevasive envionment usually have ecuing pattens, mainly elated to locations, activities, and also social inteactions between uses. As a consequence, pivacy pesevation can be futhe enhanced by explicitly consideing these aspects in the design of pivacy management schemes. Specifically, the use behavio can be embedded in the pivacy pesevation scheme. The main idea behind ou appoach is to exploit the histoy of inteactions between uses and the envionment in ode to obtain the amount of pivacy associated with specific equests. Now, the histoy can be built on the basis of the individual context equests, so that thee is a diect mapping between the equesting use and the queied context state. Howeve, this would equie stoing a lage amount of data, since a single equest can consist of any subset of the context elements as they ae defined in the system. In ode to educe both implementation complexity and stoage equiements, we athe associate the histoy infomation with individual context elements, so that the coesponding solution is suitable to esouce-constained pesonal and sensing devices, and then extend it to context equests. Let us ecall that we ae consideing the scenaio whee a use Us is shaing context infomation with othes accoding to a cetain global pivacy setting. We also assume that the use Us eceives a equest of context infomation in the fom G(t) = {e1(t), e2(t),...,e(t)} by some othe use Uk. Let us also define as n(ei(t), Uk) the numbe of times the context element ei(t) has been shaed between Us and Uk, and n(uk) as the total numbe of sessions between Us and Uk. Thus, we can obtain the pobability that the context element Ci is shaed with use Uk as: - n(ei(t), Uk) P ( e,.( t ) I Uk ) - --'-N--'--'----'- Ln(Uj) j=l whee N is the total numbe of uses which have equested context infomation to (i.e., which have aleady had sessions with) Us in the past. A context element ei in G is shaed if the coesponding pobability is above the aveage shaing pobability fo all elements in the equest, i.e., 1 P(ei(t) I Uk) - L P(ej(t) I Uk) (4) j=l whee is the numbe of context elements in the equest. Expession (4) is evaluated fo all context elements in the equest. Those which satisfy the constaint ae added to the set of shaed context elements Gs(t). If all context elements can be disclosed, i.e., Gs(t) == G(t), then they ae automatically shaed and the use is just infomed of the session. Othewise, the use is pompted to allow o Algoithm l 2: Scheme based on use behavio 1 foeach element ei in G fom Uk do P ( (t)1 ) -'-- n(ei(t),uk). 2 e, Uk "--- L:f=l n(uj), 3 if P(ei(t) I Uk 2:;=1 P(ej(t) I Uk) then 4 L add ei to Gs, infom use of session Gs; s 6 if G(t) =f=. Gs(t) then 7 l quey pemissions fo elements in G(t) \ Gs(t); 8 update Gs with the new pemissions; 9 foeach element ei in Gs do if ei has been shaed then 10 l 11 L n(ei(t), Uk) n(ei(t), Uk) + 1; 12 n(uk) n(uk) + 1; disallow the shaing of the context elements in Gs(t) \ G(t), as aleady discussed in Section III-A. The appoach based on use behavio is illustated by Algoithm 2. IV. EVALUATION In this section we will evaluate the pefomance of the poposed appoaches to pivacy pesevation in pevasive envionments though simulation. In addition to the hybid and the use behavio schemes, we will also conside the system-centic appoach intoduced in [13] fo compaison puposes. In ode to evaluate the diffeent schemes, we will conside the following metics: Shaing efficiency, defined as the atio between the numbe of context elements automatically shaed (i.e., IGsi) to the total numbe of context elements in a equest (i.e., IGi). We conside the aveage value of the shaing efficiency fo diffeent equests duing a simulation. Numbe of queies, defined as the aveage numbe of pompts to the use (i.e., IGl-IGsi). Numbe of opeations, defined as the aveage numbe of opeations needed to evaluate whethe a context element can be shaed o not. Fo the system-centic appoach, they ae mapped to the numbe of opeations needed to update the Context-Pivacy Gaph (CPG) [13]. Clealy, the fist two metics quantify the use expeience. In fact, the moe the numbe context elements that can be automatically shaed, the fewe the numbe of inteactions with the use; the same applies to the numbe of queies. In the est of the section we will fist pesent the simulation setup, and then the expeimental esults.
5 Table I DETAILED RESULTS FOR SPECIFIC USERS IN THE SIMULATION Use 7 Sessions lel Numbe of Queies Use behavio Hybid I U U u u.6 2u 11 I 4 U u U A. Simulation Setup We evaluated the diffeent schemes by using a custom simulato witten in Java. In detail, we ceated context elements and ules accoding to a smat healthcae scenaio [18]. We used the JBoss Entepise Business Rules Management System [19] to ceate and manage the context-awae ulesets. We vaied the numbe of pivacy levels fom 3 to 6, in ode to incopoate even complex pivacy settings. Futhemoe, we geneated 100 uses accoding to diffeent J2ME Mobile Infomation Device Pofiles (MIDP) [20]. The size of context equests is unifomly distibuted between 0 and 50 fo each session, and the global pivacy setting 71 is between 0.5 and 0.9. Unless othewise specified, the total numbe of context elements in the system is set to 100. B. Simulation Results We show in Figue 2a the shaing efficiency fo the hybid and the use behavio-based appoaches as a function of the equest size. In ode to make the compaison moe fai, we focused only on the esults fo 71 = 0.9. Fom the figue we can see that the use behavio-based appoach has a highe shaing efficiency than the hybid scheme. This happens because it is not actually constained by the global pivacy setting 71, but it athe depends on use inteactions. As a esult, the use behavio-based scheme can bette follow the pefeence of uses as it changes duing time, thus allowing moe elements to be shaed on the aveage. Also note that the hybid appoach obtains a good shaing efficiency (moe than 75% on the aveage), which tends to incease as the size of the equest inceases as well. We now focus on the numbe of queies as a function of the numbe of sessions (i.e., the numbe of context equests), as illustated in Figue 2b. In this case, we also conside diffeent values of the global pivacy setting. Clealy, both schemes ae affected by the global pivacy setting, and the use behavio-based appoach always esults in a lowe numbe of queies. This is patly elated to the shaing efficiency, as aleady shown above. It is wothwhile emphasizing that, when the context size is small, the numbe of queies is vey low fo both appoaches, thus esulting in an acceptable numbe of pompts to the use, even when the global pivacy setting is modeate (i.e., 71 = 0.5). We epot in Table I detailed esults fo 4 sample uses U2,.., U5 equesting contexts to use Ul (the uses wee andomly selected among all uses available in the system). Finally, we show in Figue 2c the numbe of opeations equied by the poposed schemes and the system-centic appoach in [13] as a function of the context equest size. Note that, fo the hybid and use behavio-based schemes, the numbe of opeations is measued on the basis of the numbe of queies. The hybid appoach needs to build and pase the decision tee, while the use behavio-based appoach needs to go though the histoy of use inteactions. Even though it is difficult to keep all vaiables into consideations when compaing the diffeent schemes, it clealy emeges that the ovehead of system-centic appoach is significant, especially when compaed to the two schemes poposed in this pape. This happens because the Context-Pivacy-Gaph has to be e-evaluated (i.e., the diffeent weights have to be eassigned) and its size inceases quickly with the size of the equested contexts. In conclusion, ou schemes ae quite efficient since they equest the low numbe of pompts to the use, and they also have limited ovehead due to the associated numbe of opeations. The appoach based on the use behavio pefoms bette than the hybid scheme, since it can exploit the histoy of use sessions. v. CONCLUSION In this pape we have poposed two context-awae schemes fo pivacy pesevation in pevasive envionments. In one case, we have exploited a hybid appoach to minimize use inteventions in shaing context infomation. In the othe case, we have leveaged use behavio to automate shaing of context elements to diffeent uses. Finally, we evaluated the pefomance of ou solutions in tems of the use expeience. Simulation esults have shown that ou schemes ae effective in educing the numbe of pompts and queies, especially when inteactions among diffeent uses ae taken into consideation. Futhemoe, ou solutions ae adaptive and have low esouce demands; as a consequence, they ae appopiate to dynamic envionments, and also suitable fo implementation on pesonal as well as sensing devices. We ae cuently woking on incopoating social pattens into ou pivacy pesevation appoach.
6 1.0O----;:=====il 201 i= = = tl S O.90 ",,0.85 c:)?;' 5j ' co 070. ;jj 0.65 = 5 E ::> z G-() Use behavio (11'=0.9) l!t-6 Use behavio (:11"=0.7) [3- J Use behavio (:11"=0.5) G -0 Hybid (11'=0.9) b -(:j Hybid (11'=0.1) [3 oq Hybid (71"=0.5) U> , e! 80 o 60 Q).0 40 z Size of equested context (10,1) Numbe of sessions between uses Size of equested context (10,1) 25 (a) (b) (c) Figue 2. Shaing efficiency (a) and numbe of queies (b) as a function of ICl; numbe of opeations (c) as a function of ICl. ACKNOWLEDGEMENTS This wok has been patially suppoted by NSF Gants IIS-I and CNS-II The authos would like to thank Na Li fo he valuable feedback. BIBLIOGRAPHY [1] J. Buckley, "Fom RFID to the Intenet Of Things: Pevasive Netwoked Systems," Euopean Commission Diectoate "Netwok and Communication Technologies", Tech. Rep., [Online]. Available: ftp://ftp.codis.euopa.eu/pub/istldocs/ka4/ au_conf670306_buckley _en. pdf [2] U. Hansmann, L. Mek, M. S. Nicklous, and T. Stobe, Pevasive Computing: The Mobile Wold, 2nd ed. Spinge-Velag, August [3] D.-H. Shin, "Ubiquitous computing acceptance model & end use concen about secuity, pivacy and isk," Intenational Jounal of Mobile Communications, vol. 8, no. 2, pp , [4] S. Poslad, Ubiquitous Computing: Smat Devices, Envionments and Inteactions, 1st ed. Wiley, [5] D. 1. Cook and S. K. Das, Smat Envionments: Technology, Potocols and Applications. Wiley- Intescience, [6] --, "How smat ae ou envionments? an updated look at the state of the at," Pevasive and Mobile Computing, vol. 3, no. 2, pp , [7] M. Weise, "The compute fo the twenty-fist centuy," Scientific Ameican, pp , Septembe [8] G. M. Youngblood, D. J. Cook, and L. B. Holde, "Managing adaptive vesatile envionments," Pevasive and Mobile Computing, vol. 1, no. 4, pp , [9] A. Westin, Pivacy and Feedom, 5th ed. Atheneum, [10] A. R. Beesfod and F. Stajano, "Location pivacy in pevasive computing," IEEE Pevasive Computing, vol. 2, no. 1, pp , [11] 1. I. Hong, 1. D. Ng, S. Ledee, and J. A. Landay, "Pivacy isk models fo designing pivacy-sensitive ubiquitous computing systems," in DIS '04: Poceedings of the 5th confeence on Designing inteactive systems, 2004, pp [12] c. Conelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and N. Tiandopoulos, "AnonySense: Pivacyawae people-centic sensing," in Poc. of the 2008 Intenational Confeence on Mobile Systems, Applications, and Sevices (MobiSys), June 2008, pp [13] G. Pallapa, N. Roy, and S. K. Das, "A scheme fo quantizing pivacy in context-awae ubiquitous computing," in Intelligent Envionments 2008, let 4th Intenational Confeence on, July 2008, pp [14] U. Hengatne and P. Steenkiste, "Avoiding pivacy violations caused by context-sensitive sevices," Pevasive and Mobile Computing, vol. 2, no. 4, pp , 2006, special Issue on PeCom [15] N. Roy, G. Pallapa, and S. K. Das, "A middlewae famewok fo ambiguous context mediation in smat healthcae application," in WIMOB '07: Poc. of the Thid IEEE Confeence on Wieless and Mobile Computing, Netwoking and Communications, 2007, p. 72. [16] H. Kellee, U. Pfeschy, and D. Pisinge, Knapsack Poblems, 1st ed. Spinge, [17] S. Matello and P. Toth, Knapsack poblems: algoithms and compute implementations. New Yok, NY, USA: John Wiley & Sons, Inc., [18] G. V. Pallapa, "A pivacy enhanced situation-awae middlewae famewok fo ubiquitous computing envionments," Ph.D. dissetation, The Univesity of Texas at Alington, [Online]. Available: /4867 [19] The Dools Poject, "JBoss Entepise Business Rules Management System," [20] Sun Micosystems/Oacle, "Mobile Infomation Device Pofile," oveview.html, 2010.
Stochastic Extension of the Attention-Selection System for the icub
Stochastic Extension of the Attention-Selection System fo the icub Technical Repot (in pepaation) H. Matinez, M. Lungaella, and R. Pfeife Atificial Intelligence Laboatoy Depatment of Infomatics Univesity
More informationProtecting Location Privacy: Optimal Strategy against Localization Attacks
Potecting Location Pivacy: Optimal Stategy against Localization Attacks Reza Shoki, Geoge Theodoakopoulos, Camela Toncoso, Jean-Piee Hubaux, and Jean-Yves Le Boudec LCA, EPFL, Lausanne, Switzeland, ESAT/COSIC,
More informationTechnical and Economic Analyses of Poultry Production in the UAE: Utilizing an Evaluation of Poultry Industry Feeds and a Cross-Section Survey
Available online at www.sciencediect.com ScienceDiect APCBEE Pocedia 8 (2014 ) 266 271 2013 4th Intenational Confeence on Agicultue and Animal Science (CAAS 2013) 2013 3d Intenational Confeence on Asia
More informationSMARTPHONE-BASED USER ACTIVITY RECOGNITION METHOD FOR HEALTH REMOTE MONITORING APPLICATIONS
SMARTPHONE-BASED USER ACTIVITY RECOGNITION METHOD FOR HEALTH REMOTE MONITORING APPLICATIONS Igo Bisio Fabio Lavagetto Maio Machese Andea Sciaone Univesity of Genoa DYNATECH {igo.bisio fabio.lavagetto maio.machese
More informationInfluencing Factors on Fertility Intention of Women University Students: Based on the Theory of Planned Behavior
Vol.32 (Healthcae and Nusing 206), pp.37-42 http://dx.doi.og/0.4257/astl.206. Influencing Factos on Fetility Intention of Women Univesity Students: Based on the Theoy of Planned Behavio Myeong-Jeong Chae,
More informationINDIVIDUALIZATION FEATURE OF HEAD-RELATED TRANSFER FUNCTIONS BASED ON SUBJECTIVE EVALUATION. Satoshi Yairi, Yukio Iwaya and Yôiti Suzuki
INDIVIDUALIZATION FEATURE OF HEAD-RELATED TRANSFER FUNCTIONS BASED ON SUBJECTIVE EVALUATION Satoshi Yaii, Yukio Iwaya and Yôiti Suzuki Reseach Institute of Electical Communication / Gaduate School of Infomation
More informationAPPLICATION OF THE WALSH TRANSFORM IN AN INTEGRATED ALGORITHM FO R THE DETECTION OF INTERICTAL SPIKES
APPLICATIO OF THE WALSH TRASFORM I A ITEGRATED ALGORITHM FO R THE DETECTIO OF ITERICTAL SPIKES D. Sanchez, M. Adjouadi, A. Baeto, P. Jayaka, I. Yaylali Electical & Compute Engineeing, Floida Intenational
More informationInterpreting Effect Sizes in Contrast Analysis
UNDERSTANDING STATISTICS, 3(1), 1 5 Copyight 004, Lawence Elbaum Associates, Inc. TEACHING ARTICLES Intepeting Effect Sizes in Contast Analysis R. Michael Fu Depatment of Psychology Appalachian State Univesity
More informationAdvanced Placement Psychology Grades 11 or 12
Office of Cuiculum & Instuction Advanced Placement Psychology Gades 11 o 12 ABSTRACT The pupose of AP Psychology is to intoduce students to the systematic and scientific study of the behavio and mental
More informationThe Probability of Disease. William J. Long. Cambridge, MA hospital admitting door (or doctors oce, or appropriate
Repinted fom Poceedings of the Fifteenth Annual Symposium on Compute Applications in Medical Cae, pp 619-623, 1991 The Pobability of Disease William J. Long MIT Laboatoy fo Compute Science Cambidge, MA
More informationMultiscale Model of Oxygen transport in Diabetes
BENG 221: Poblem Solving Poject Multiscale Model of Oxygen tanspot in Diabetes Decembe 1, 2016 Austin Budick Nafeesa Khan Sihita Rudaaju Motivation Diabetes emains a significant health condition today,
More informationDistress is an unpleasant experience of an emotional,
Featue Aticle Distess Assessment: Pactice Change Though Guideline Implementation Cayl D. Fulche, MSN, APRN, BC, and Tacy K. Gosselin-Acomb, RN, MSN, AOCN Most nuses agee that incopoating evidence into
More informationTwo universal runoff yield models: SCS vs. LCM
J. Geog. Sci. 2015, 25(3): 311-318 DOI: 10.1007/s11442-015-1170-2 2015 Science Pess Spinge-Velag Two univesal unoff yield models: SCS vs. LCM LI Jun, * LIU Changming, WANG Zhonggen, LIANG Kang Key Laboatoy
More informationA copy can be downloaded for personal non-commercial research or study, without prior permission or charge
Cistani, M., Vinciaelli, A., Segalin, C., and Peina, A. (2013) Unveiling the multimedia unconscious: implicit cognitive pocesses and multimedia content analysis. In: 21st ACM intenational confeence on
More informationA Mathematical Model of The Effect of Immuno-Stimulants On The Immune Response To HIV Infection
Intenational Jounal of Latest Engineeing Reseach and Applications (IJLERA) ISSN: 455-7137 A Mathematical Model of The Effect of Immuno-Stimulants On The Immune Response To HIV Infection *iwa P. 1, Rotich
More informationSystolic and Pipelined. Processors
Gaduate Institute of Electonics Engineeing, NTU Systolic and Pipelined Why Systolic Pocessos Achitectue? Souces: VLSI Signal Pocessing ÜÜ Ande Hon, Jason Handube, Michelle Gunning, Beman, J. Kim, Heiko
More informationAnalysis on Retrospective Cardiac Disorder Using Statistical Analysis and Data Mining Techniques
Intenational Jounal of Applied Engineeing Reseach ISSN 0973-456 Volume 1, Numbe 17 (017) pp. 6778-6787 Analysis on Retospective Cadiac Disode Using Statistical Analysis and Data Mining Techniques Jyotismita
More informationShunting Inhibition Controls the Gain Modulation Mediated by Asynchronous Neurotransmitter Release in Early Development
Shunting Inhibition Contols the Gain Modulation Mediated by Asynchonous Neuotansmitte Release in Ealy Development Vladislav Volman 1,2,3 *, Hebet Levine 1, Teence J. Sejnowski 1,2,3,4 1 Cente fo Theoetical
More informationJournal of Applied Science and Agriculture
Jounal of Applied Science and Agicultue, 9(1) Januay 2014, Pages: 171-176 AENSI Jounals Jounal of Applied Science and Agicultue ISSN 1816-9112 Jounal home page: www.aensiweb.com/jasa/index.html The Relationship
More informationMeasurement uncertainty of ester number, acid number and patchouli alcohol of patchouli oil produced in Yogyakarta
Measuement uncetainty of este numbe, acid numbe and patchouli alcohol of patchouli oil poduced in Yogyakata Reni Banowati Istiningum, Azis Saepuloh, Widatul Jannah, and Didit Waskito Aji Citation: AIP
More informationCould changes in national tuberculosis vaccination policies be ill-informed?
Math. Model. Nat. Phenom. Vol. 7, No. 3, 2012, pp. 78 98 DOI: 10.1051/mmnp/20127307 Could changes in national tubeculosis vaccination policies be ill-infomed? D. J. Gebey 1, F. A. Milne 2 1 Depatment of
More informationMETHODS FOR DETERMINING THE TAKE-OFF SPEED OF LAUNCHERS FOR UNMANNED AERIAL VEHICLES
Jounal of KONES Powetain and Tanspot, Vol. 25, No. 1 2018 METHODS FOR DETERMINING THE TAKE-OFF SPEED OF LAUNCHERS FOR UNMANNED AERIAL VEHICLES Gzegoz Jastzębski, Leszek Ułanowicz Ai Foce Institute of Technology
More informationRadiation Protection Dosimetry, Volume II: Technical and Management System Requirements for Dosimetry Services. REGDOC-2.7.
Radiation Potection Dosimety, Volume II: Technical and Management System Requiements fo Dosimety Sevices REGDOC-2.7.2, Volume II Apil 2018 Dosimety, Volume II: Regulatoy document REGDOC-2.7.2, Volume II
More informationWord and tree-based similarities for textual entailment
Wod and tee-based similaities fo textual entailment Fank Schilde R&D Thomson Legal & Regulatoy 610 Oppeman Dive Eagan MN 55123, USA Fank.Schilde@Thomson.com Bidget Thomson McInnes Depatment of Compute
More informationQUEEN CONCH STOCK RESTORATION
QUEEN CONCH STOCK RESTORATION Robet Glaze Associate Reseach Scientist Floida Maine Reseach Institute South Floida Regional Laboatoy Maathon, Floida INTRODUCTION Queen conch ae found in pedominantly south
More informationStacy R. Tomas, David Scott and John L. Crompton. Department of Recreation, Park and Tourism Sciences, Texas A&M University, USA
Managing Leisue 7, 239 250 (2002) An investigation of the elationships between quality of sevice pefomance, benefits sought, satisfaction and futue intention to visit among visitos to a zoo Stacy R. Tomas,
More informationSEE DRAWING OF ROOM LAYOUT ATTACHMENT FOR SPEAKERS
2018 Emegency Symposium 2. Incident Numbe: 4. Map/Sketch (include sketch, showing the total aea of opeations, the incident site/aea, impacted and theatened aeas, oveflight esults, tajectoies, impacted
More informationlsokinetic Measurements of Trunk Extension and Flexion Performance Collected with the Biodex Clinical Data Station
lsokinetic Measuements of Tunk Extension and Flexion Pefomance Collected with the Biodex Clinical Data Station MARK D. GRABINER, PhD,' JOHN J. JEZIOROWSKI, MS, PT,' ARUNA D. DIVEKAR, MS, PT' Jounal of
More informationCausal Beliefs Influence the Perception of Temporal Order
ausal eliefs Influence the Peception of Tempoal Ode Philip M. Fenbach (philip_fenbach@bown.edu) Peston LinsonGenty (peston_linsongenty@bown.edu) Steven. Sloman (steven_sloman@bown.edu) own Univesity, Depatment
More informationpneumonia from the Pediatric Clinic of the University of Padua. Serological Methods
THE YALE JOURNAL OF BIOLOGY AND MEDICINE 56 (1983), 517-521 Seodiagnosis of M. pneumoniae Infections by Enzyme- Linked Immunosobent Assay (ELISA) FRANCO BUSOLO, M.D., AND GIOVANNI ANTONIO MELONI, M.D.
More informationAn Ethological and Emotional Basis for Human-Robot Interaction
An Ethological and Emotional Basis fo Human-Robot Inteaction Ronald C. Akin*, Masahio Fujita**, Tsuyoshi Takagi**, Rika Hasegawa** Abstact This pape pesents the ole of ethological and emotional models
More informationStructural Safety. Copula-based approaches for evaluating slope reliability under incomplete probability information
Stuctual Safety 52 (2015) 90 99 Contents lists available at ScienceDiect Stuctual Safety jounal homepage: www.elsevie.com/locate/stusafe Copula-based appoaches fo evaluating slope eliability unde incomplete
More informationSimulation of the Human Glucose Metabolism Using Fuzzy Arithmetic
Simulation of the uman Glucose Metabolism Using uy Aithmetic Michael anss live Nehls Institute A of Mechanics Univesity of Stuttgat Pfaffenwalding 9 755 Stuttgat Gemany ManssNehls @mechaunistuttgatde Abstact
More informationCHAPTER 1 BACKGROUND ON THE EPIDEMIOLOGY AND MODELING OF BIV/AIDS
CHAPTER 1 BACKGROUD O THE EPDEMOLOGY AD MODELG OF BV/ADS Befoe modeling any disease it is cucial to undestand the epidemiological featues of the disease. The fist fou sections of this chapte pesent epidemiological
More informationGLOBAL PARTNERSHIP FOR YOUTH EMPLOYMENT. Testing What Works. Evaluating Kenya s Ninaweza Program
GLOBAL PARTNERSHIP FOR YOUTH EMPLOYMENT Testing What Woks in Youth Employment: Evaluating Kenya s Ninaweza Pogam VOLUME 2: Appendices APRIL 2013 acknowledgements This epot was pepaed fo IYF by Thomaz Alvaes
More informationKuwait Chapter of Arabian Journal of Business and Management Review Vol. 3, No.1; Sep. 2013
Kuwait Chapte of Aabian Jounal of Business and Management Review Vol 3, o1; Sep 2013 Evaluating the elative impotance of al intelligence dimensions incidence of Exta-ole Behavio at Social Secuity Oganization
More informationInstructions For Living a Healthy Life
ARISE Homo Sapiens Opeato s Manual: Instuctions Fo Living a Healthy Life Table of Contents Tips fo Teaching ARISE Life Management Skills...3 ARISE Foundation, Ode Toll-Fee: 1-888-680-6100, Copyight 1996-2014
More informationCoach on Call. Thank you for your interest in When the Scale Does Not Budge. I hope you find this tip sheet helpful.
Coach on Call It was geat to talk with you. Thank you fo you inteest in. I hope you find this tip sheet helpful. Please give me a call if you have moe questions about this o othe topics. As you UPMC Health
More informationAbstract. Background and objectives
Poceedings - 7th Intenational Wokshop on Biological Effects of EMF - Octobe 01 (Malta) ISBN: 978-99957-0-361-5 MORPHOLOGICAL TRANSFORMATIONS OF HUMAN CANCER CELLS AND MICROTUBULES CAUSED BY FREQUENCY SPECIFIC
More informationHTGR simulations in PSI using MELCOR 2.2
WIR SCHAFFEN WISSEN HEUTE FÜR MORGEN Jamo Kalilainen :: Paul Schee Institut HTGR simulations in PSI using MELCOR 2.2 10 th Meeting of the Euopean MELCOR Use Goup (EMUG), 25 27 Apil, Zage, Coatia Intoduction
More informationF1 generation: The first set of offspring from the original parents being crossed. F2 generation: The second generation of offspring.
Padon the Punnett By: Nancy Volk The Punnett Squae This module stems fom the wok of the Austian Monk, Gego Mendel, the fathe of genetics. In the mid-1800s Mendel studied the pattens of inheitance of physical
More informationCOHESION OF COMPACTED UNSATURATED SANDY SOILS AND AN EQUATION FOR PREDICTING COHESION WITH RESPECT TO INITIAL DEGREE OF SATURATION
COHESION OF COMPACTED UNSATURATED SANDY SOILS AND AN EQUATION FOR PREDICTING COHESION WITH RESPECT TO INITIAL DEGREE OF SATURATION Md. Abdul Alim 1 and Makoto Nishigaki 2 1 Assistant Pofesso, Depatment
More informationJoint Iterative Equalization and Decoding for 2-D ISI Channels
Joint Iteative Equalization and Decoding fo 2-D ISI Channels Joseph A. O Sullivan, Naveen Singla, Yunxiang Wu, Ronald S. Indec Electonic Systems and Signals Reseach Laboatoy (ESSRL) Magnetics and Infomation
More informationI Can PresCribE A Drug: Mnemonic-based Teaching of Rational Prescribing
236 Apil 2007 Family Medicine Fo the Office-based Teache of Family Medicine William Huang, MD Featue Edito Edito s Note: In this month s column, Kal Igla, MD; Natalie Kennie, PhamD; and Jana Bajca, MScPham,
More informationThe Impact of College Experience on Future Job Seekers Diversity Readiness
Intenational Jounal of Humanities and Social Science Vol. 3 No. 3; Febuay 2013 The Impact of College Expeience on Futue Job Seekes Divesity Readiness FELICE A. WILLIAS Louisiana State Univesity - Shevepot
More informationEffect of Hydroxymethylated Experiment on Complexing Capacity of Sodium Lignosulfonate Ting Zhou
3d Intenational Confeence on Mateial, Mechanical and Manufactuing Engineeing (IC3ME 15) Effect of Hydoxymethylated Expeiment on Complexing Capacity of Sodium Lignosulfonate Ting Zhou School of Nuclea Technology
More informationThe Regional Economics Applications Laboratory (REAL) of the University of Illinois focuses on the development and use of analytical models for urban
The Regional Economics Applications Laboatoy (REAL) of the Univesity of Illinois focuses on the development and use of analytical models fo uban and egional economic development. The pupose of the Discussion
More informationThe Egyptian Journal of Hospital Medicine (January 2018) Vol. 70, Page
The Egyptian Jounal of Hospital Medicine (Januay 2018) Vol. 70, age 109-113 Coelation between Cental Coneal Thickness and Degee of Myopia Mostafa A, Mohamed M, Mohamed M. Al Hussein Univesity Hospital
More informationUncoordinated Checkpointing. Rollback-Recovery. The Domino Effect. The Domino Effect. Easy to understand No synchronization overhead Flexible p
Uncoodinated Checkpointing Rollback-Recovey Easy to undestand No synchonization ovehead Flexible p can choose when to checkpoint To ecove fom a cash: m4 m6 m7 m4 m6 m7 go back to last checkpoint estat
More informationMulti View Cluster Approach to Explore Multi Objective Attributes based on Similarity Measure for High Dimensional Data
Multi View Cluste Appoach to Exploe Multi Obective Attibutes based on Similaity Measue fo High Dimensional Data Deena Babu Mandu 1 and Y.K. Sundaa Kishna 2 1 Depatment of Compute Science, Kishna Univesity,
More informationA Construction Industry Blueprint: Suicide Prevention in the Workplace
A Constuction Industy Bluepint: Suicide Pevention in the Wokplace The Issue The Constuction Industy is at High Risk fo Suicide Hee is why the nation should make suicide pevention a pioity: National Statistics
More informationWhy do we remember some things and not others? Consider
Attention pomotes episodic encoding by stabilizing hippocampal epesentations Maiam Aly a,1 and Nicholas B. Tuk-Bowne a,b a Pinceton Neuoscience Institute, Pinceton Univesity, Pinceton, NJ 08544; and b
More informationOPRA: Optimal Relay Assignment for Capacity Maximization in Cooperative Networks
OPRA: Optimal Relay Assignment fo Capacity Maximization in Coopeative Netwoks Dejun Yang, Xi Fang an Guoliang Xue Aizona State Univesity Tempe, AZ 85287 {ejun.yang, xi.fang, xue}@asu.eu Abstact As pomising
More informationFUNCTIONAL MAGNETIC RESONANCE IMAGING OF LANGUAGE PROCESSING AND ITS PHARMACOLOGICAL MODULATION DISSERTATION
FUNCTIONAL MAGNETIC RESONANCE IMAGING OF LANGUAGE ROCESSING AND ITS HARMACOLOGICAL MODULATION DISSERTATION esented in atial Fulfillment of the Requiements fo the Degee Docto of hilosophy in the Gaduate
More informationOPTIMUM AUTOFRETTAGE PRESSURE IN THICK CYLINDERS
Junal Meanial Decembe 007, No. 4, - 4 OTIMUM AUTOFRETTAGE RESSURE IN THICK CLINDERS Aman Ayob *, M. Kabashi Elbashee Depatment of Applied Mechanics, Faculty of Mechanical Engineeing, Univesiti Tenologi
More informationAnalytical and Numerical Investigation of FGM Pressure Vessel Reinforced by Laminated Composite Materials
Jounal of Solid Mechanics Vol. 6, No. 1 (2014) pp. 43-53 Analytical and Numeical Investigation of FGM Pessue Vessel Reinfoced by Laminated Composite Mateials A.R Ghasemi *, A. Kazemian, M. Moadi Depatment
More informationApplication Of Fuzzy Logic Controller For Intensive Insulin Therapy In Tpye 1 Diabetic Mellitus Patient
COMPUTERS and SMULATON in MOERN SCENCE, Volume Application Of Fuzzy Logic Contolle Fo ntensive nsulin Theapy n Tpye iabetic Mellitus Patient LALEH KARAR *, AL FALLAH, Shahia Ghaibzadeh, Fatollah Moztazadeh
More informationCollaborative Evaluation of a Fluorometric Method for Measuring Alkaline Phosphatase Activity in Cow s, Sheep s, and Goat s Milk
Jounal of Food Potection, Vol., No., 00, Pages Copyight, Intenational Association fo Food Potection Collaboative Evaluation of a Fluoometic Method fo Measuing Alkaline Phosphatase Activity in Cow s, Sheep
More informationA Brain-Machine Interface Enables Bimanual Arm Movements in Monkeys
BRIN-MHINE INTERFES Bain-Machine Inteface Enables Bimanual m Movements in Monkeys Pete J. Ifft, 1,2 Solaiman Shoku, 2,3 Zheng Li, 2,4 Mikhail. Lebedev, 2,4 Miguel. L. Nicolelis 1,2,4,5,6 * Bain-machine
More informationIn addition to the threat of high morbidity
HEALTH SEVICES Hospital capacity and management pepaedness fo pandemic influenza in Victoia Ben Dewa, 1 Ian Ba, 2 Piscilla obinson 1 In addition to the theat of high mobidity and motality, influenza pandemics
More informationReliability and Validity of the Korean Version of the Cancer Stigma Scale
ORIGINAL ARTICLE ISSN (Pint) 2005-3673 ISSN (Online) 2093-758X J Koean Acad Nus Vol.47 No.1, 121 Reliability and Validity of the Koean Vesion of the Cance Stigma Scale So, Hyang Sook 1 Chae, Myeong Jeong
More informationNUMERICAL INVESTIGATION OF BVI MODELING EFFECTS ON HELICOPTER ROTOR FREE WAKE SIMULATIONS
4 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES NUMERICAL INVESTIGATION OF BVI MODELING EFFECTS ON HELICOPTER ROTOR FREE WAKE SIMULATIONS X. K. Zioutis, A. I. Spyopoulos, D. P. Magais, D. G. Papanikas
More informationAcademic Flow and Cyberloafing. Listyo Yuwanto. Universitas Surabaya (UBAYA), East Java, Indonesia
Psychology Reseach, Ail 2018, Vol. 8, No. 4, 173-177 doi:10.17265/2159-5542/2018.04.006 D DAVID PUBLISHING Academic Flow and Cybeloafing Listyo Yuwanto Univesitas Suabaya (UBAYA), East Java, Indonesia
More informationImperfect Vaccine Aggravates the Long-Standing Dilemma of Voluntary Vaccination
Impefect Vaccine Aggavates the Long-Standing Dilemma of Voluntay Vaccination Bin Wu 1 *, Feng Fu 2 *, Long Wang 1 1 State Key Laboatoy fo Tubulence and Complex Systems, Cente fo Systems and Contol, College
More informationThe Engagement of Mid-Ventrolateral Prefrontal Cortex and Posterior Brain Regions in Intentional Cognitive Activity
Human Bain Mapping 29:107 119 (2008) The Engagement of Mid-Ventolateal Pefontal Cotex and Posteio Bain Regions in Intentional Cognitive Activity Anja Dove, 1 Tom Manly, 1 Russell Epstein, 2 and Adian M.
More informationThe Effects of Rear-Wheel Camber on Maximal Effort Mobility Performance in Wheelchair Athletes
Taining & Testing 199 The Effects of Rea-Wheel Cambe on Maximal Effot Mobility Pefomance in Wheelchai Athletes Authos B. Mason 1, L. van de Woude 2, K. Tolfey 1, V. Goosey-Tolfey 1 Affiliations 1 Loughboough
More informationCoupling of Substructures for Dynamic Analyses
Coupling of Substuctues fo Dynamic Analyses Roy Caig, Mevyn Bampton To cite this vesion: Roy Caig, Mevyn Bampton. Coupling of Substuctues fo Dynamic Analyses. AAA Jounal, Ameican nstitute of Aeonautics
More informationChasing the AIDS Virus
doi:10.1145/1666420.1666440 With no HI vaccine in sight, viologists need to know how the vius will eact to a given combination dug theapy. by Thomas Lengaue, Andé Altmann, Alexande Thielen, and Rolf Kaise
More informationAlternative Methods of Insulin Sensitivity Assessment in Obese Children and Adolescents
Diabetes Cae Publish Ahead of Pint, published online Januay 17, 2008 Altenative Methods of Insulin Sensitivity Assessment in Obese Childen and Adolescents Sophia M Rössne, MD, (1); Matin Neovius, PhD,
More informationHaLoop: Efficient Iterative Data Processing On Large Clusters
HaLoop: Efficient Iteative Data Pocessing On Lage Clustes Yingyi Bu, UC Ivine Bill Howe, UW agda Balazinska, UW ichael D. Enst, UW Hoizon http://clue.cs.washington.edu/ QuickTime ᆰ and a decompesso ae
More informationRelationship of Mammographic Parenchymal Patterns with Breast Cancer Risk Factors and Risk of Breast Cancer in a Prospective Study
Intenational Jounal of Epidemiology Intenational Epidemiological Association 1990 Vol. 19, No. 2 Pinted in Geat Bitain Relationship of Mammogaphic Paenchymal Pattens with Beast Cance Risk Factos and Risk
More informationTest Retest and Between-Site Reliability in a Multicenter fmri Study
Human Bain Mapping 29:958 972 (2008) Test Retest and Between-Site Reliability in a Multicente fmri Study Lee Fiedman, 1 * Hal Sten, 2 Gegoy G. Bown, 3 Daniel H. Mathalon, 4 Jessica Tune, 1 Gay H. Glove,
More informationCH 11: Mendel / The Gene. Concept 11.1: Mendel used the scientific approach to identify two laws of inheritance
CH 11: Mendel / The Gene What genetic pinciples account fo the passing of taits fom paents to offsping? The blending hypothesis is the idea that genetic mateial fom the two paents blends togethe (the way
More informationBrain Activity During Visual Versus Kinesthetic Imagery: An fmri Study
Human Bain Mapping 30:2157 2172 (2009) Bain Activity Duing Visual Vesus Kinesthetic Imagey: An fmri Study Aymeic Guillot, 1,2 * Chistian Collet, 1 Vo An Nguyen, 3 Fancine Malouin, 4,2 Caol Richads, 4,2
More informationPrevalence and Correlates of Diabetes Mellitus Among Adult Obese Saudis in Al-Jouf Region
Wold Jounal of Public Health 2017; 2(2): 81-88 http://www.sciencepublishinggoup.com/j/wjph doi: 10.11648/j.wjph.20170202.14 Pevalence and Coelates of Diabetes Mellitus Among Adult Obese Saudis in Al-Jouf
More informationThe Relationship between Resiliency and Anxiety with Body Dysmorphic Concern among Adolescent Girls in Tehran
2016, TextRoad Publication ISSN: 2090-4274 Jounal of Applied Envionmental and Biological Sciences www.textoad.com The Relationship between Resiliency and Anxiety with Body Dysmophic Concen among Adolescent
More informationM.S.C.E., E.I.T, Staff geotechnical engineer at URS Corp.
TWO DIMENSIONAL MODEL STUDY ON INFILTRATION CONTROL AT A LATERAL PIPE JOINT USING ACRYLAMIDE GROUT H. Gukan Ozguel 1, H. A. González 2 and C. Vipulanandan 3, Membe, ASCE ABSTRACT One of te callenges faced
More informationVIII. FOOD AND llutrielfl' COMPOSITION OF SBP MEALS
VIII. FOOD AND llutrielfl' COMPOSITION OF SBP MEALS This chapte pesents esults of the analysis of data gatheed in the on-site meal obsevations. The analysis examines the food and nutient composition of
More informationPredictors of Maternal Identity of Korean Primiparas
J Koean Acad Nus Vol.4 No.6, 733-74 http://dx.doi.og/0.4040/jkan.20.4.6.733 Pedictos of Matenal Identity of Koean Pimipaas Chae, Hyun-Ju Song, Ju-Eun 2 Kim, Sue 3 Pat-time Lectue, College of Nusing, Sungshin
More informationLifespan Psychology. Chapter 3 Biology of Development. Outline. Infertility. Infertility/Reproductive technologies. Heredity/DNA/Genes
Lifespan Psychology Chapte 3 Biology of Development 1 Outline Infetility/Repoductive technologies Pobabilities Fetility ypoblems and teatments Legal and ethical issues Adoption Heedity/DNA/Genes 2 Infetility
More informationBy: Charlene K. Baker, Fran H. Norris, Eric C. Jones and Arthur D. Murphy
Childhood Tauma and Adulthood Physical Health in Mexico. By: Chalene K. Bake, Fan H. Nois, Eic C. Jones and Athu D. Muphy C.K. Bake, F.H. Nois, E.C. Jones and A.D. Muphy. Childhood Tauma and Adulthood
More informationOsteoarthritis and Cartilage 19 (2011) 58e64
Osteoathitis and Catilage 19 (2011) 58e64 Does measuement of the anatomic axis consistently pedict hip-knee-ankle angle (HKA) fo knee alignment studies in osteoathitis? Analysis of long limb adiogaphs
More informationIRPPS Working Papers. The regional distribution of in-hospital fatality among Acute Myocardial Infarction events in Italy
IRPPS Woking Papes Istituto di Riceche sulla Popolazione e le Politiche Sociali - CNR ISSN 2240-7332 The egional distibution of in-hospital fatality among Acute Myocadial Infaction events in Italy Anna
More informationBEFORE PRACTICE BE PROACTIVE
EMERGENCY ACTION PLAN BEFORE PRACTICE BE PROACTIVE Equipment Field Conditions Roste Weathe Conditions Fist Aid Kit fo Supplies Athletes (if applicable) that they have thei inhale o EpiPen Emegency Action
More informationAnnual General Meeting of Shareholders of Roche Holding Ltd 27 February 2006
Annual Geneal Meeting of Shaeholdes of Roche Holding Ltd 27 Febuay 2006 Addess by Jan van Koeveinge Head Phama Global Technical Opeations (The addess as deliveed is definitive.) Addess by Jan van Koeveinge
More informationFAST KINETIC MODELS FOR SIMULATING AMPA, NMDA, Zachary F. Mainen and Terrence J. Sejnowski*
2 FAST KINETIC MODELS FOR SIMULATING AMPA, NMDA, GABA A AND GABA B RECEPTORS Alain Destexhe, Zachay F. Mainen and Teence J. Sejnowski* The Salk Institute fo Biological Studies and The Howad Hughes Medical
More informationDietary Assessment in Epidemiology: Comparison of a Food Frequency and a Diet History Questionnaire with a 7-Day Food Record
Ameican Jounal of Epidemiology Copyight O 996 by The Johns Hopkins Univesity School of Hygiene and Public Health All ights eseved Vol. 4, No. 9 Pinted In U.SJU. Dietay Assessment in Epidemiology: Compaison
More informationM isfolding and aggregation of peptides and proteins into fibrils are the hallmarks of around 40 human
OPEN SUBJECT AREAS: KINETICS PROTEINS COMPUTATIONAL BIOPHYSICS CONFOCAL MICROSCOPY Received 20 Octobe 204 Accepted 9 Januay 205 Published Mach 205 A monome-time model suppots intemittent glucagon fibil
More informationInternally-headed relative clauses in sign languages
a jounal of Glossa geneal linguistics Wilbu, Ronnie. 2017. Intenally-headed elative clauses in sign languages. Glossa: a jounal of geneal linguistics 2(1): 25. 1 34, DOI: https://doi.og/10.5334/gjgl.183
More informationReal-Time fmri Using Brain-State Classification
Human Bain Mapping 28:1033 1044 (2007) Real-Time fmri Using Bain-State Classification Stephen M. LaConte,* Scott J. Peltie, and Xiaoping P. Hu Depatment of Biomedical Engineeing, Geogia Institute of Technology,
More informationSexual arousal and the quality of semen produced by masturbation
Human Repoduction vol.11 no.l pp.147-151, 1996 Sexual aousal and the quality of semen poduced by mastubation J.H.van Roijen 14 ' 5, A.K.Slob 4, W.L.Gianotten 2, G.R.Dohle 1 ' 3, A.T.M.van de Zon 2, J.T.M.Veebug
More informationTHE BURDEN OF CO-OCCUPANCY: INTRASPECIFIC RESOURCE COMPETITION AND SPACING PATTERNS IN AMERICAN MINK, MUSTELA VISON
Jounal of Mammalogy, 84(4):1341 1355, 2003 THE BURDEN OF CO-OCCUPANCY: INTRASPECIFIC RESOURCE COMPETITION AND SPACING PATTERNS IN AMERICAN MINK, MUSTELA VISON NOBUYUKI YAMAGUCHI AND DAVID W. MACDONALD*
More informationPOLINA EIDELMAN 1, LISA S. TALBOT 1, JUNE GRUBER 1, ILANA
J. Sleep Res. (2010) 19, 516 524 Sleep and bipola disode doi: 10.1111/j.1365-2869.2010.00826.x Sleep achitectue as coelate and pedicto of symptoms and impaiment in inte-episode bipola disode: taking on
More informationNumerical Investigations of Open-water Performance of Contra-Rotating Propellers
Poceedings of the Twenty-seventh (2017) Intenational Ocean and Pola Engineeing Confeence San Fancisco, CA, USA, June 25-30, 2017 Copyight 2017 by the Intenational Society of Offshoe and Pola Enginees (ISOPE)
More informationDesign of a Fully Differential Current Mode Operational Amplifier with Improved Input-Output Impedances and Its Filter Applications
Desin of a Fully Diffeential uent Mode Opeational Amplifie with Impoved Input-Output Impedances and Its Filte Applications Mustafa Altun a, *, Hakan Kuntmanb a Istanbul Technical Univesity, Faculty of
More informationAppendix 1. Post - Chernobyl Thyroid Cancer in Ukraine
Appendix 1 Post - Chenobyl Thyoid Cance in Ukaine POST- CHERNOBYL THYROID CANCER IN UKRAINE. REPORT 1: Estimation of thyoid doses. 1 I. Likhtaov, 1 L. Kovgan, 1 S. Vavilov, 1 M. Chepuny, 2 A. Bouville,
More informationQuantitative NDI Integration with Probabilistic Fracture Mechanics for the Assessment of Fracture Risk in Pipelines
4th Euopean-Ameican Wokshop on Reliability of NDE - F.1.A.3 Quantitative NDI Integation with Pobabilistic Factue Mechanics fo the Assessment of Factue Risk in Pipelines Jochen H. Kuz, Dagos Cioclov, Ged
More informationRealizing Undelayed n-step TD Prediction with Neural Networks
ealizing Undelayed n-step TD Pediction with eual etwok Jani Zute Faculty of Computing, Univeity of Latvia aina bulvai 9-44, LV-586 iga, Latvia jani.zute@lu.lv Abtact Thee exit vaiou technique to extend
More informationElectronic Supplementary Information
Electonic upplementay Mateial (EI) fo Geen Chemisty. This jounal is The Royal ociety of Chemisty Electonic upplementay Infomation Cack healing and eclaiming of vulcanized ubbe by tiggeing eaangement of
More informationEvaluation of the accuracy of Lachman and Anterior Drawer Tests with KT1000 ın the follow-up of anterior cruciate ligament surgery
Oiginal Aticle Jounal of Execise Rehabilitation 2016;12(4):363-367 Evaluation of the accuacy of Lachman and Anteio Dawe Tests with KT1000 ın the follow-up of anteio cuciate ligament sugey Beki Eay Kilinc
More information