Academic literature on the topic 'PII leaks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'PII leaks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "PII leaks"

1

Carrell, David S., David J. Cronkite, Muqun (Rachel) Li, Steve Nyemba, Bradley A. Malin, John S. Aberdeen, and Lynette Hirschman. "The machine giveth and the machine taketh away: a parrot attack on clinical text deidentified with hiding in plain sight." Journal of the American Medical Informatics Association 26, no. 12 (August 7, 2019): 1536–44. http://dx.doi.org/10.1093/jamia/ocz114.

Full text
Abstract:
Abstract Objective Clinical corpora can be deidentified using a combination of machine-learned automated taggers and hiding in plain sight (HIPS) resynthesis. The latter replaces detected personally identifiable information (PII) with random surrogates, allowing leaked PII to blend in or “hide in plain sight.” We evaluated the extent to which a malicious attacker could expose leaked PII in such a corpus. Materials and Methods We modeled a scenario where an institution (the defender) externally shared an 800-note corpus of actual outpatient clinical encounter notes from a large, integrated health care delivery system in Washington State. These notes were deidentified by a machine-learned PII tagger and HIPS resynthesis. A malicious attacker obtained and performed a parrot attack intending to expose leaked PII in this corpus. Specifically, the attacker mimicked the defender’s process by manually annotating all PII-like content in half of the released corpus, training a PII tagger on these data, and using the trained model to tag the remaining encounter notes. The attacker hypothesized that untagged identifiers would be leaked PII, discoverable by manual review. We evaluated the attacker’s success using measures of leak-detection rate and accuracy. Results The attacker correctly hypothesized that 211 (68%) of 310 actual PII leaks in the corpus were leaks, and wrongly hypothesized that 191 resynthesized PII instances were also leaks. One-third of actual leaks remained undetected. Discussion and Conclusion A malicious parrot attack to reveal leaked PII in clinical text deidentified by machine-learned HIPS resynthesis can attenuate but not eliminate the protective effect of HIPS deidentification.
APA, Harvard, Vancouver, ISO, and other styles
2

Starov, Oleksii, Phillipa Gill, and Nick Nikiforakis. "Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms." Proceedings on Privacy Enhancing Technologies 2016, no. 1 (January 1, 2016): 20–33. http://dx.doi.org/10.1515/popets-2015-0028.

Full text
Abstract:
Abstract The majority of commercial websites provide users the ability to contact them via dedicated contact pages. In these pages, users are typically requested to provide their names, email addresses, and reason for contacting the website. This effectively makes contact pages a gateway from being anonymous or pseudonymous, i.e., identified via stateful and stateless identifiers, to being eponymous. As such, the environment where users provide their personally identifiable information (PII) has to be trusted and free from intentional and unintentional information leaks. In this paper, we report on the first large-scale study of PII leakage via contact pages of the 100,000 most popular sites of the web. We develop a reliable methodology for identifying and interacting with contact forms as well as techniques that allow us to discover the leakage of PII towards thirdparties, even when that information is obfuscated. Using these methods, we witness the leakage of PII towards third-parties in a wide range of ways, including the leakage through third-party form submissions, third-party scripts that collect PII information from a first-party page, and unintended leakage through a browser’s Referer header. To recover the lost control of users over their PII, we design and develop Formlock, a browser extension that warns the user when contact forms are using PII-leaking practices, and provides the ability to comprehensively lock-down a form so that a user’s details cannot be, neither accidentally, nor intentionally, leaked to third parties
APA, Harvard, Vancouver, ISO, and other styles
3

Valecha, Rohit, Shambhu Upadhyaya, and H. Raghav Rao. "An Activity Theory Approach to Leak Detection and Mitigation in Patient Health Information (PHI)." Journal of the Association for Information Systems 22, no. 4 (2021): 1007–36. http://dx.doi.org/10.17705/1jais.00687.

Full text
Abstract:
The migration to electronic health records (EHR) in the healthcare industry has raised issues with respect to security and privacy. One issue that has become a concern for healthcare providers, insurance companies, and pharmacies is patient health information (PHI) leaks because PHI leaks can lead to violation of privacy laws, which protect the privacy of individuals’ identifiable health information, potentially resulting in a healthcare crisis. This study explores the issue of PHI leaks from an access control viewpoint. We utilize access control policies and PHI leak scenarios derived from semi structured interviews with four healthcare practitioners and use the lens of activity theory to articulate the design of an access control model for detecting and mitigating PHI leaks. Subsequently, we follow up with a prototype as a proof of concept.
APA, Harvard, Vancouver, ISO, and other styles
4

Einhorn, Tom. "PHI leads the way." Hospital Aviation 4, no. 12 (December 1985): 12. http://dx.doi.org/10.1016/s0740-8315(85)80178-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ranganathan, Dwarakanathan, George T. John, Edward Yeoh, Nicola Williams, Barry O'Loughlin, Thin Han, Lakshmanan Jeyaseelan, Kavitha Ramanathan, and Helen Healy. "A Randomized Controlled Trial to Determine the Appropriate Time to Initiate Peritoneal Dialysis after Insertion of Catheter (Timely PD Study)." Peritoneal Dialysis International: Journal of the International Society for Peritoneal Dialysis 37, no. 4 (July 2017): 420–28. http://dx.doi.org/10.3747/pdi.2016.00066.

Full text
Abstract:
Background The optimal time for the commencement of peritoneal dialysis (PD) after PD catheter insertion is unclear. If dialysis is started too soon after insertion, dialysate leaks and infection could occur. However, by starting PD earlier, morbidity and costs can be reduced through lesser hemodialysis requirements. This is the first randomized controlled trial to determine the safest and shortest interval to commence PD after catheter insertion. Methods All consecutive patients undergoing PD catheter insertion at the Royal Brisbane and Women's Hospital and Rockhampton Hospital from 1 March 2008 to 31 May 2013 who met the inclusion and exclusion criteria were invited to participate in the trial. Participants were randomized to 1 of 3 groups. Group 1 (G1) commenced PD at 1 week, group 2 (G2) at 2 weeks and group 3 (G3) at 4 weeks after PD catheter insertion. These groups were stratified by hospital and the presence of diabetes. Primary outcomes were the incidence of peritoneal fluid leaks or PD-related infection during the 4 weeks after commencement of PD. Results In total 122 participants were recruited, 39, 42, and 41 randomized to G1, G2, and G3, respectively. The primary outcome catheter leak was significantly higher in G1 (28.2%) compared with G3 (2.4%, p = 0.001) but not compared with G2 (9.5%, p = 0.044), based on intention to treat analysis. These differences were even more marked when analyzed with per protocol method: G1 had a significantly higher percentage (32.4 %) compared with G3 (3.3%, p = 0.003) but not compared with G2 (10.5%, p = 0.040). Event percentages of leak were statistically higher in G1 and occurred significantly earlier compared with other groups ( p = 0.002). Amongst diabetics, technique failure was significantly higher (28.6%) in G3 compared with 0% in G1 and 7.1% in G2 ( p = 0.036) and earlier in G3 at 163.2 days vs 176.8 and 175.8 ( p = 0.037) for G1 and G2, respectively. Conclusion Leaks were higher in participants commencing PD at 1 week after catheter insertion compared with the other 2 groups, and technique failure was higher in diabetics starting PD at 4 weeks.
APA, Harvard, Vancouver, ISO, and other styles
6

Kloft, Nicole, and Karl Forchhammer. "Signal Transduction Protein PII Phosphatase PphA Is Required for Light-Dependent Control of Nitrate Utilization in Synechocystis sp. Strain PCC 6803." Journal of Bacteriology 187, no. 19 (October 1, 2005): 6683–90. http://dx.doi.org/10.1128/jb.187.19.6683-6690.2005.

Full text
Abstract:
ABSTRACT Signal transduction protein PII is dephosphorylated in Synechocystis sp. strain PCC 6803 by protein phosphatase PphA. To determine the impact of PphA-mediated PII dephosphorylation on physiology, the phenotype of a PphA-deficient mutant was analyzed. Mutants lacking either PphA or PII were impaired in efficient utilization of nitrate as the nitrogen source. Under conditions of limiting photosystem I (PSI)-reduced ferredoxin, excess reduction of nitrate along with impaired reduction of nitrite occurred in PII signaling mutants, resulting in excretion of nitrite to the medium. This effect could be reversed by increasing the level of PSI-reduced ferredoxin. We present evidence that nonphosphorylated PII controls the utilization of nitrate in response to low light intensity by tuning down nitrate uptake to meet the actual reduction capacity. This control mechanism can be bypassed by exposing cells to excess levels of nitrate. Uncontrolled nitrate uptake leads to light-dependent nitrite excretion even in wild-type cells, confirming that nitrate uptake controls nitrate utilization in response to limiting photon flux densities.
APA, Harvard, Vancouver, ISO, and other styles
7

Yu, H., and J. Ferrier. "Osteoclast ATP receptor activation leads to a transient decrease in intracellular pH." Journal of Cell Science 108, no. 9 (September 1, 1995): 3051–58. http://dx.doi.org/10.1242/jcs.108.9.3051.

Full text
Abstract:
Application of extracellular adenosine triphosphate (ATP) induces a pulsed decrease in osteoclast intracellular pH (pHi), as measured with seminaphthofluorescein (SNAFL)-calcein on a laser scanning confocal microscope. Adenosine diphosphate also produces a pHi decrease, but adenosine monophosphate, uridine triphosphate, 2-methylthio-ATP, and beta, gamma-methylene-ATP have little effect on pHi. The ATP-induced pHi decrease is largely inhibited by suramin, a P2 purinergic receptor blocker. Clamping intracellular free [Ca2+] ([Ca2+]i) with BAPTA/AM does not affect the ATP-induced pHi change, showing that this pHi decrease is not caused by the increased intracellular [Ca2+]i that is produced by activation of osteoclast purinergic receptors. We show that an increase in [Ca2+]i by itself will produce a pHi increase. The ATP effect is not blocked by inhibition of Na+/H+ exchange by either Na(+)-free bathing medium or amiloride. Two inhibitors of the osteoclast cell membrane proton pump, N-ethylmaleimide and vanadate, produce partial inhibition of the ATP-induced pHi decrease. Two other proton pump inhibitors, bafilomycin and N,N'-dicyclohexylcarbodiimide, have no influence on the ATP effect. None of the proton pump inhibitors but vanadate has a direct effect on pHi. Vanadate produces a transient pHi increase upon application to the bathing medium, possibly as a result of its known effect of stimulating the Na+/H+ exchanger. Inhibition of Cl-/HCO3- exchange by decreasing extracellular Cl- gives a pronounced long-term pHi increase, supporting the hypothesis that this exchange has an important role in osteoclast pHi homeostasis. In Cl(-)-free extracellular medium, there is a greatly reduced effect of extracellular ATP on pHi.(ABSTRACT TRUNCATED AT 250 WORDS)
APA, Harvard, Vancouver, ISO, and other styles
8

Berenson, James R., Alexa Cohen, Tanya M. Spektor, Jacob D. Bitran, Gigi Qiqi Chen, Mehdi M. Moezi, Alberto Bessudo, et al. "Replacement of ixazomib for relapsed/refractory multiple myeloma patients refractory to a bortezomib or carfilzomib-containing combination therapy." Journal of Clinical Oncology 35, no. 15_suppl (May 20, 2017): 8013. http://dx.doi.org/10.1200/jco.2017.35.15_suppl.8013.

Full text
Abstract:
8013 Background: The proteasome inhibitor (PI) ixazomib (Ixz) is the first orally administered PI approved for treating multiple myeloma (MM). It has shown clinical activity as a single agent and when used in other combinations. In this phase 1/2 trial, we evaluated Ixz as a replacement therapy for bortezomib or carfilzomib for MM patients who were refractory to a bortezomib- or carfilzomib-containing combination regimen. Methods: This was a phase 1/2, intra-patient, multicenter, open-label trial evaluating the replacement of ixazomib for bortezomib or carfilzomib for MM patients who were refractory in combination with the other agents that the patients had received and failed. Patients received Ixz on days 1, 8 and 15 on a 28-day schedule and the other drugs were administered using the same doses and schedules as they were receiving during their prior regimen. If the Ixz maximum tolerated dose (MTD) for a particular combination regimen was previously determined, then patients were enrolled directly into Phase 2 (PhII). If not, MTD was determined during the Phase 1 (PhI) portion of the trial. Results: To date, a total of 40 patients have been enrolled; 37 patients (21 were enrolled in PhI and 16 in PhII) had completed at least one cycle of this treatment. Patients received a median of 5 prior treatments (range, 1-22). The median follow-up time for all patients was 1.6 months (range, 0.1-10.7 months), whereas that of PhII was 2.2 months (range, 0.2-10.7 months). There was no clinical benefit (CBR; 0%) nor any overall response rate (ORR; 0%) for patients receiving Ixz 3 mg (PhI). Nine patients (43%) showed stable disease (SD) while 12 (57%) exhibited disease progression (PD). In PhII (4mg Ixz) portion of the trial, ORR and CBR were both 18.7% with 16 (43.2%) patients showing SD, and 18 (48.6%) patients displaying PD. Common ≥ Gr3 adverse events were anemia (11%), thrombocytopenia (5.4%), hyponatremia (5.4%), dehydration (5.4%) and neutropenia (2.7%). Conclusions: Replacement of bortezomib or carfilzomib with Ixz infrequently leads to responses among RRMM patient who have progressed while on proteasome inhibitor -containing combination regimens. Clinical trial information: NCT02206425.
APA, Harvard, Vancouver, ISO, and other styles
9

Jafari, Raheleh, Sina Razvarz, Cristóbal Vargas-Jarillo, Alexander Gegov, and Farzad Arabikhan. "Pipeline Leak Detection and Estimation Using Fuzzy PID Observer." Electronics 11, no. 1 (January 4, 2022): 152. http://dx.doi.org/10.3390/electronics11010152.

Full text
Abstract:
A pipe is a ubiquitous product in the industries that is used to convey liquids, gases, or solids suspended in a liquid, e.g., a slurry, from one location to another. Both internal and external cracking can result in structural failure of the industrial piping system and possibly decrease the service life of the equipment. The chaos and complexity associated with the uncertain behaviour inherent in pipeline systems lead to difficulty in detection and localisation of leaks in real time. The timely detection of leakage is important in order to reduce the loss rate and serious environmental consequences. The objective of this paper is to propose a new leak detection method based on an autoregressive with exogenous input (ARX) Laguerre fuzzy proportional-integral-derivative (PID) observation system. The objective of this paper is to propose a new leak detection method based on an autoregressive with exogenous input (ARX) Laguerre fuzzy proportional-integral-derivative (PID) observation system. In this work, the ARX–Laguerre model has been used to generate better performance in the presence of uncertainty. According to the results, the proposed technique can detect leaks accurately and effectively.
APA, Harvard, Vancouver, ISO, and other styles
10

Gazaryan, Georgy A., Lyalya G. Tyurina, Galina A. Nefedova, Georgy G. Gazaryan, Igor V. Zakharov, Vasiliy V. Chestukhin, and Aleksandr S. Yermolov. "Optimizing the treatment approach for ST-segment elevation myocardial infarction in the chest leads." Medical Journal of the Russian Federation 27, no. 4 (July 15, 2021): 339–47. http://dx.doi.org/10.17816/0869-2106-2021-27-4-339-347.

Full text
Abstract:
BACKGROUND: The treatment of ST-segment elevation myocardial infarction (STEMI) in both chest and other leads chose a single course of mandatory use of percutaneous coronary interventions (PCI) in the first 12 h from the onset of pain. However, a significant proportion of patients, often older age groups, are hospitalized at later terms. Thus, studying the efficiency of primary PCIs in different age groups is of interest, considering the terms of hospitalization and characteristics of thanatogenesis in the absence of reperfusion therapy and with its use. AIM: This study aimed to optimize the treatment approach of patients with STEMI in the chest leads using the primary percutaneous coronary interventions (PCI) during hospitalization in the first 12 h and subsequent 1272 h, taking into account the initial risk of death at different ages groups. MATERIALS AND METHODS: The study included 804 patients with anterior STEMI, who were admitted to the institute from 2008 to 2017. Early PCI was performed in the first 12 h in 311 patients, whereas 272 patients underwent delayed interventions at hospitalization after 1272 h; additionally, 221 patients, including 124 cases with coronary angiography with late hospitalization, received drug therapy. In early PCI, the ratio of individuals under 65 years, 6575 years, and over 75 years were 176, 73, and 62, whereas 164, 66, and 42 in delayed PCI, and 126, 47, and 48 without intervention, respectively. In 26 deceased patients after PCI and 39 patients without interventions, the state of the coronary arteries (CA), the area of left ventricular (LV) lesion, and the cause of death were determined. RESULTS: The absence of reperfusion therapy in the form of PCI in anterior STEMI was established to lead to a progressive decreased myocardial contractile function and formation of an extensive LV aneurysm and high mortality rate, especially in older age groups. Early PCI preserves the contractile function, prevents the LV aneurysm, and significantly reduces mortality. The use of delayed PCI prevents LV dysfunction progression, limits the formation of LV aneurysm, and reduces mortality, which remains high in the absence of PCI. However, delayed PCI, contrary to early used interventions without age restrictions, is mainly performed for isolated lesions, much less often for multiple lesions that are more often present in elderly and senile people. Severe CA disease in these categories of patients increases the risk of intraprocedural complications. Nevertheless, without PCI, a lethal outcome is inevitable in many of them. Thanatogenesis in anterior STEMI is based on the proximal lesion of the anterior interventricular branch in combination with three-vessel CA disease, which causes an extensive infarction area with fatal complications. CONCLUSIONS: The delayed PCI, by analogy with early used procedures without limitations, optimizes the treatment approach of MI with ST-segment elevation in the chest leads and minimizes mortality in all age groups.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "PII leaks"

1

Batista Bretas, Maria Luiza. HOW WAY LEADS ON TO WAY: A NARRATIVE IN AN INTERACTIVE PROCESS. Editora IF Goiano, 2019. http://dx.doi.org/10.54879/978-85-65871-49-5.2019.01.003.

Full text
Abstract:
Este livro é o resultado de uma pesquisa realizada na Comunidade Quilombola do Cedro, de Mineiros, Goiás. Ele é destinado, principalmente, aos alunos do ensino médio. Trata-se de uma narrativa em processo interativo, construída por meio de uma amizade entre dois adolescentes, um de Mineiros e outro de Campinas, SP, que se conhecem em uma praia do litoral paulista. Os dois amigos trocam cartas e informações sobre a Comunidade do Cedro, deixando o paulista e o seu pai, biólogo, muito interessados em conhecer a comunidade que é famosa pelos remédios fitoterápicos que fabrica e comercializa. Nessa troca epistolar há muitas informações e impressões sobre os negros do Cedro e sua raça.
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Timothy C. Phenomenology and Epidemiology of Problematic Internet Use. Edited by Jon E. Grant and Marc N. Potenza. Oxford University Press, 2012. http://dx.doi.org/10.1093/oxfordhb/9780195389715.013.0065.

Full text
Abstract:
This chapter discusses the phenomenology and epidemiology of problematic Internet se (PIU). Interest in the addictive potential of Internet activities has grown in the past two decades. Problematic Internet use can be broadly defined as uncontrolled use of the Internet that leads to significant psychosocial and functional impairments. It is currently conceptualized as an impulse control disorder that may share features with substance dependence disorders. Reliable studies have estimated the prevalence in the general population to be about 1%, but higher proportions of individuals might be at risk. Comorbidities with other psychiatric disorders are common. Concerns exist regarding the appropriateness and implications of formally recognizing PIU as a distinct disorder in current diagnostic systems. Given the ever-growing exposure to the Internet, especially in younger generations, PIU might become an emerging public health problem. Further studies are greatly needed, especially those using valid measures and longitudinal designs. Neuroimaging and genetic studies should also be explored.
APA, Harvard, Vancouver, ISO, and other styles
3

Print, Marla Marla. Thanksgiving Dot Markers Activity Book Ages 2+: Coloring Book for Toddlers, Preschoolers, Kindergarten and Pre-K Color Turkeys, Pumpkin Pie, Pilgrims Hats, Gravy, Pumpkins, Apples, Leafs, Yams and More. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hodgkinson, Anna K. Technology and Urbanism in Late Bronze Age Egypt. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198803591.001.0001.

Full text
Abstract:
This book provides the first systematic and comprehensive discussion of the intra-urban distribution of high-status goods, and their production or role as a marker of the nature of the settlements known as royal cities of New Kingdom Egypt (c.1550-1069 BC). Using spatial analysis to detect patterns of artefact distribution, the study focuses on Amarna, Gurob, and Malqata, incorporating Qantir/Pi-Ramesse for comparison. Being royal cities, these three settlements had a great need for luxury goods. Such items were made of either highly valuable materials, or materials that were not easily produced and therefore required a certain set of skills. Specifically, the industries discussed are those of glass, faience, metal, sculpture, and textiles. Analysis of the evidence of high-status industrial processes throughout the urban settlements, has demonstrated that industrial activities took place in institutionalized buildings, in houses of the elite, and also in small domestic complexes. This leads to the conclusion that materials were processed at different levels throughout the settlements and were subject to a strict pattern of control. The methodological approach to each settlement necessarily varies, depending on the nature and quality of the available data. By examining the distribution of high-status or luxury materials, in addition to archaeological and artefactual evidence of their production, a deeper understanding has been achieved of how industries were organized and how they influenced urban life in New Kingdom Egypt.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "PII leaks"

1

Guillen, Guillermo. "Gas Leak Alarm." In Sensor Projects with Raspberry Pi, 63–78. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5299-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Junkai, Wenxue Gao, Xiangjun Hao, Zheng Wei, Xiaojun Zhang, and Zhaochen Liu. "Multilateral Boundary Blasting Theory of High and Steep Slope in Open Pit Mine and Its Application." In Lecture Notes in Civil Engineering, 347–57. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-1260-3_32.

Full text
Abstract:
AbstractAt present, the blasting theory of high and steep rock slope mainly focuses on flat terrain, ignoring the influence of micro-terrain boundary factors on blasting effect, which leads to excessive blasting energy and affects the stability of slope. Therefore, based on the theory of multilateral boundary rock blasting, this paper deduces the calculation formula of blasting charge for high and steep rock slope under multilateral boundary conditions, and verifies it with field test. The results show that: (1) The multilateral boundary charge calculation formula directly includes micro-topography boundary conditions and blasting effect, and the rock blasting theory is based on the interaction of blasting energy provided by explosives and potential energy in medium, which effectively improves the energy utilization rate of explosives. (2) The influence of surplus blasting energy on the surrounding environment under different boundary conditions is controlled, and the explosive explosion effect is effectively controlled, so that a stable high and steep slope of open pit mine is formed after blasting.
APA, Harvard, Vancouver, ISO, and other styles
3

Hickman, Zachary L., and Konstantinos Margetis. "Penetrating Brain Injuries." In Neurotrauma, 155–66. Oxford University Press, 2019. http://dx.doi.org/10.1093/med/9780190936259.003.0018.

Full text
Abstract:
Penetrating brain injury (PBI) may result from missiles (high velocity) or non-missiles (low velocity), with the latter having a better prognosis and more frequently resulting in favorable patient outcomes. Certain risks, complications, and management principles are common across all types of PBI. These include the potential for the development of mass lesions, cerebral edema, and neurological deterioration, as well as a high risk of concomitant cerebrovascular injury, CSF leak, infection, and posttraumatic seizures. In most cases, urgent surgical treatment is warranted to mitigate these associated risks. This chapter will focus primarily on the assessment, diagnostic workup, decision making, and management of non-missile and low-velocity PBI.
APA, Harvard, Vancouver, ISO, and other styles
4

Sharma, Shweta, Mymoona Akhter, and Rajesh Kumar Singh. "Understanding Promising Anticancer Targets for Heterocyclic Leads: An Introduction." In Key Heterocyclic Cores for Smart Anticancer Drug–Design Part II, 1–34. BENTHAM SCIENCE PUBLISHERS, 2022. http://dx.doi.org/10.2174/9789815040043122020004.

Full text
Abstract:
With the second-highest cause of mortality in the world, cancer becomes a major threat around the globe. In the last few decades, heterocyclic compounds, obtained naturally or synthetically, have been developed as a potential scaffold for developing many anticancer drugs. Heterocyclic compounds due to heteroatoms such as oxygen, nitrogen and sulphur can be employed as hydrogen bond donors as well as acceptors. Thus, they can bind suitably to pharmacological targets and receptors via intermolecular H-bonds more effectively, giving pharmacological effects. They can also alter liposolubility, hence the aqueous solubility of drug molecules to achieve remarkable pharmacotherapeutic properties. These heterocyclic leads exert the anticancer activity by a distinctive mechanism such as inhibiting Bcl-2, Mcl-1 proteins (induce apoptosis), inhibiting PIM proteins (hinder the cellular process and signal transduction in cells), inhibiting DNA topoisomerase, inhibiting aromatase (inhibit replication and transcription), modulating epigenetic mechanisms (inhibit histone deacetylase/HDAC) and inhibiting cellular mitosis (tubulin inhibitors).The current chapter aims to describe these promising anticancer targets. The novel targets are also illustrated with a pictorial presentation to understand heterocyclic drugs action on various cancer targets. This chapter will facilitate researchers, pharmacologists, and medicinal chemists in the understanding mechanism of heterocyclic drugs, which can help develop new anticancer agents.
APA, Harvard, Vancouver, ISO, and other styles
5

Osnabrugge, Ruben L. J., and A. Pieter Kappetein. "Cost-effectiveness." In ESC CardioMed, edited by William Wijns, 1395–99. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780198784906.003.0339.

Full text
Abstract:
Approximately 2% of the total healthcare expenditure in the European Union is spent on coronary artery disease and these expenditures are expected to increase. In order to make rational decisions on resource allocation, clinical and economic outcomes of treatment strategies need to be analysed together. Cost-effectiveness studies provide a framework for making such decisions. The early economic studies comparing balloon angioplasty with coronary artery bypass grafting (CABG) show that the early cost benefit of angioplasty is lost at long-term follow-up. CABG provides a clinically and economically attractive treatment option in patients with severe coronary artery disease. Later studies with bare-metal or drug eluting stents showed that the higher invasiveness of CABG leads to a longer hospital stay and higher upfront costs. However, at longer follow-up the cost difference is small and clinical outcomes with CABG are better than with percutaneous coronary intervention (PCI). This makes CABG superior to PCI at long-term follow-up, both clinically and economically in patients with extensive coronary disease. Nevertheless, in patients with less complex coronary artery disease, PCI with drug-eluting stents may be preferred on both clinical and economic grounds. Although reduction in stent price does not have a big impact, several other developments may impact future economic comparisons between PCI and CABG. Newer-generation stents will enhance the clinical and economic profile of PCI. Moreover, better clinical decision-making tools and fractional flow reserve will impact the cost-effectiveness equation.
APA, Harvard, Vancouver, ISO, and other styles
6

"The Consequences of Watching." In Advances in Information Security, Privacy, and Ethics, 141–62. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-3847-0.ch008.

Full text
Abstract:
The discussion of surveillance invariably leads to an assessment of the idea of privacy. This is a construct that has been widely debated over time, with some of the early aspects of privacy taking shape in Britain. Later, a Supreme Court judge in America argued for privacy as the right to be “left alone.” Over time, the concept has seen transformations with the focus on defining what aspects of the narrative can be considered to be protected. Eventually, every context of surveillance such as I2P and P2I has slightly different considerations of privacy.
APA, Harvard, Vancouver, ISO, and other styles
7

Kotaridis, Ioannis, and Maria Lazaridou. "Delineation of Open-Pit Mining Boundaries on Multispectral Imagery." In Remote Sensing [Working Title]. IntechOpen, 2020. http://dx.doi.org/10.5772/intechopen.94120.

Full text
Abstract:
During the last decades, monitoring the spatial growth of open-pit mining areas has become a common procedure in an effort to comprehend the influence that mining activities have on the adjacent land-use/land-cover types. Various case studies have been presented, focusing on land-cover mapping of complex mining landscapes. They highlight that a rapid as well as accurate approach is critical. This paper presents a methodological framework for a rapid delineation of open-pit mining area boundaries. For that purpose an Object-Based Image Analysis (OBIA) methodology is implemented. Sentinel-2 data were obtained and the Mean-Shift segmentation algorithm was employed. Among the many methods that have been presented in literature in order to evaluate the performance of an image segmentation, an unsupervised approach is carried out. A quantitative evaluation of segmentation accuracy leads to a more targeted selection of segmentation parameter values and as a consequence is of utmost importance. The proposed methodology was mainly conducted through python scripts and may constitute a guide for relevant studies.
APA, Harvard, Vancouver, ISO, and other styles
8

Chernysheva, Margarita I. "Rare and not Described in Dictionaries Lexemes in the Old Slavonic and Old Russian Literature." In Slavic and Balkan linguistics, 306–18. Institute of Slavic Studies, Russian Academy of Sciences, 2020. http://dx.doi.org/10.31168/2658-3372.2020.1.15.

Full text
Abstract:
The information presented in the major works on Paleo-Slavonic, Media-Slavonic, Old Russian and Middle Russian historical lexicography needs constant revision, additions, and updating. The replenishment of the source database of historical dictionaries leads to the accumulation of information regarding lexicographically not described lexemes, aging of quotation material, a reinterpretation of the semantics of rare words. The section contains the linguistic, historical, cultural and symbolic description of some rare names of shells in the Church-Slavonic-Russian script: skol(ь)ka, ostreosъ, konьkha, matica zhemchuzhnaya, omidi sъsoudъ, shivada, chashulya, pin(n)a, kokhlь, kolikhiya, kolьkhiya, kon(ь)khilь, konьkhila, bagryanica etc.
APA, Harvard, Vancouver, ISO, and other styles
9

O’Mahony, Denis. "Optimizing pharmacotherapy for older patients." In Oxford Textbook of Geriatric Medicine, 183–88. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780198701590.003.0025.

Full text
Abstract:
The prevalence of complex multimorbidity is increasing steadily in tandem with global population ageing. Complex multimorbidity is in turn intimately associated with polypharmacy, the relationship being one of cause-and-effect. Polypharmacy commonly leads to prescription of inappropriate drugs, resulting in a substantially higher risk of drug-related problems, principally adverse drug–drug and drug–disease interactions. These problems become manifest in the form of common geriatric symptoms such as falls, acute confusion, and incontinence and commonly result in increased healthcare utilization, including hospitalization, with obvious economic consequences. In addition, adverse drug reactions and adverse drug events lead to death in older people. The challenge of optimization of pharmacotherapy in older people with complex multimorbidity is a major one. There is increasing evidence that avoidance of potentially inappropriate medications (PIMs) and potential prescribing omissions (PPOs) using validated PIM and PPO criteria lists leads to better and safer pharmacotherapy in this high-risk population.
APA, Harvard, Vancouver, ISO, and other styles
10

Ahmed, Furqan, Alexis A. Dowhuszko, and Olav Tirkkonen. "Network Optimization Methods for Self-Organization of Future Cellular Networks." In Advances in Wireless Technologies and Telecommunication, 35–65. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0239-5.ch002.

Full text
Abstract:
This chapter discusses network optimization methods for enabling self-organization in current cellular networks such as Long Term Evolution (LTE)/LTE-Advanced (LTE-A), and the upcoming 5G networks. Discrete and continuous optimization models are discussed for developing distributed algorithms for self-configuration and self-optimization. The focus is on Self-Organized Networking (SON) problems, which are relevant to small cell networks. Examples include Physical Cell-ID (PCI) assignment, Primary Component Carrier (PCC) selection, Inter-Cell Interference Coordination (ICIC), and network synchronization. A conflict-graph model is considered for PCI assignment and PCC selection problems, which paves the way for different graph coloring algorithms with self-organizing properties. Algorithms for self-organized ICIC and network synchronization are also developed in a principled manner, through a network utility maximization framework. This systematic approach leads to a variety of algorithms which adhere to self-organization principles, but have varying requirements in terms of inter-cell coordination and computation complexity. Fully distributed self-organizing algorithms do not involve any inter-cell dedicated message-passing, and thus are faster and more scalable than the ones that are distributed but require local coordination via exchange of messages between cells. However, local coordination enables higher network utility and better convergence properties.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "PII leaks"

1

Ren, Jingjing, Martina Lindorfer, Daniel J. Dubois, Ashwin Rao, David Choffnes, and Narseo Vallina-Rodriguez. "Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2018. http://dx.doi.org/10.14722/ndss.2018.23143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Michalopoulos, Dimitrios, and Ioannis Mavridis. "Surveying Privacy Leaks Through Online Social Network." In 2010 14th Panhellenic Conference on Informatics (PCI). IEEE, 2010. http://dx.doi.org/10.1109/pci.2010.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Camerini, Daniel Almeida, Jean Pierre von der Weid, Cla´udio Soligo Camerini, and Carlos Eduardo Maia. "Leak Detector Pig for Oil Pipelines." In 2004 International Pipeline Conference. ASMEDC, 2004. http://dx.doi.org/10.1115/ipc2004-0095.

Full text
Abstract:
The leakage detector pig was created with the purpose of detect and locate leakages in a preventive way. The fast detection of small leakages decreases the probability of larger leakages. By means of a differential pressure system based on pressure data acquired through the pig’s running, using pressure sensors installed on the pig’s vessel, small leakages are identified and its positions registered. This allows a quick intervention at the identified location. The working principle is based on the pressure difference caused by the leakage, which is read by the sensors. The polyurethane cups responsible by the pig’s propulsion are of a special kind capable of sealing a constant volume of product among them. So, when the pig passes through a leakage, the pressure in the middle drops compared to those in front and hear, generating a characteristic signal thus permiting identification. The first prototype was tested intensively at laboratory facilities, and in a test pipeline showing excellent results locating precisely all the simulated leakages. Defects from different sizes with different flow where simulated and measured. This work has the objective to present the tool, its potential, the test results, to discuss its efficiency in detect and locate leakages and the possibilities for the future.
APA, Harvard, Vancouver, ISO, and other styles
4

Borda, Carlos, Dana DuToit, Harry Duncan, and Marc Niklès. "External Pipeline Leak Detection Based on Fiber Optic Sensing for the Kinosis 12″–16″ and 16″–20″ Pipe-in-Pipe System." In 2014 10th International Pipeline Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/ipc2014-33375.

Full text
Abstract:
The concern of the pipeline industry and general population for a safe and green environment is higher than ever. This highlights the need for efficient leak detection to prevent environmental catastrophes and operational disruption. Therefore, accurate techniques to detect and locate very small leaks that could develop into larger leaks are a valuable asset for the construction of key pipelines. External pipeline leak detection systems based on distributed fiber optic sensing emerge as the most appropriate solution for automatic detection and localization of very small leaks. In the case of the Kinosis pipeline system, two 11km Electrically Heat Traced Pipe-In-Pipe (EHTPIP) pipelines have been built between the Nexen Long lake upgrader and Nexen Kinosis SAGD facilities. The fiber optic sensing cable is directly in contact with the EHTPIP external surface. These pipelines carry Produced Emulsion and Boiler Feed Water at temperatures as high as 120°C and 150°C respectively. The fiber optic distributed sensing system provides temperature feedback information to the operator, not only in operation and in case of a leak but also when the Electrical Heat Trace system is turned on; in this case, the monitoring system can detect and locate overheating problems and/or signs of heating failures. In the case of a leak, the outer temperature of the pipeline will increase; this will automatically be detected and monitored by the DITEST temperature monitoring system and will trigger an alarm to the Nexen LONG LAKE upgrader SCADA system for that specific location. Furthermore, the combination of fiber optic distributed monitoring with the PIP technology enables to detect and locate a leak in the inner pipeline at a very early stage, therefore avoiding any environmental damage (the leak is still contained by the outer PIP tube) and giving time to the pipeline operator to plan a sectional replacement.
APA, Harvard, Vancouver, ISO, and other styles
5

Glentis, George Othon, and Kostas Angelopoulos. "Leakage detection using leak noise correlation techniques." In PCI '19: 23rd Pan-Hellenic Conference on Informatics. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3368640.3368646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alexander, Chris, and Harbi Pordal. "Modeling Leakage in a Fuel Transfer Pipeline Using Computational Fluid Dynamics Techniques." In ASME 2005 Pressure Vessels and Piping Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/pvp2005-71708.

Full text
Abstract:
Stress Engineering Services, Inc. (SES) performed an assessment of leaks for an insurance company that occurred in a fuel transfer pipeline at a tank storage facility. Of specific interest were the duration and timing of the leaks, which occurred from a 30 foot section that entered an earthen containment berm. It was originally estimated that 28,900 gallons of gasoline and ethanol leaked periodically from two (2) pin holes in the pipeline during a two month period. Early analysis efforts were not able to estimate the conditions that were necessary to cause the leaking fluid to break through the surface of the earthen berm (a phenomenon known as daylighting). Consequently, SES performed a more rigorous investigation to determine what conditions were required to produce daylighting, the significance of which involved quantifying the estimates of leak duration and the petroleum volumes. This effort integrated assumptions and data from prior analyses to assess the effects of time-dependency using computational fluid dynamics (CFD) modeling techniques. The intent was to take the existing calculations and provide a more technically-defensible model to predict the timing and volume released using reasonable conditions. SES used soil permeability and actual pipe pressure data to simulate the pipeline leak and soil conditions. The results of the CFD analysis showed that it is possible for daylighting to occur within a two-month period. However, a specific combination of conditions associated with leak rates, leak duration, and soil permeability are required to generate daylighting in a relatively short period of time. The predominant observation is that there must be extended periods of continuous leaking involving leak rates of sufficient magnitude. The significance of this work is that it presents a proven analytical method for modeling leaks in pipelines and addressing the effects of specific variables on the amount of released products and the time required to achieve specific leak volumes.
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Sen, Jingwen Zhu, Ao Liu, Weijing Wang, Chenkai Guo, and Jing Xu. "A Novel Memory Leak Classification for Evaluating the Applicability of Static Analysis Tools." In 2018 IEEE International Conference on Progress in Informatics and Computing (PIC). IEEE, 2018. http://dx.doi.org/10.1109/pic.2018.8706142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hagar, Kevin, Bruce Young, and Ross Mactaggart. "Integrity Monitoring: Not Just Leak Detection." In 2000 3rd International Pipeline Conference. American Society of Mechanical Engineers, 2000. http://dx.doi.org/10.1115/ipc2000-243.

Full text
Abstract:
There are many uses for a software based, real time leak detection system other than just leak detection. Leak detection systems, based on a real time model, have many uses, including instrument analysis, slack line flow detection, batch, scraper and DRA tracking. Hydraulic profiles, trends and Imbalance Signature Plots provide operational tools to augment SCADA displays. When abnormal imbalance is reported, the operator has tools to pin point the problem. These results can also be made available enterprise-wide for use by higher level processes such as accounting, scheduling, planning, and marketing.
APA, Harvard, Vancouver, ISO, and other styles
9

Angelopoulos, Kostas, and George-Othon Glentis. "Test and measurement assisted leak vibration signal analysis for leakages in metallic pipelines." In PCI 2020: 24th Pan-Hellenic Conference on Informatics. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3437120.3437309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fletcher, Richard, and Muthu Chandrasekaran. "SmartBall™: A New Approach in Pipeline Leak Detection." In 2008 7th International Pipeline Conference. ASMEDC, 2008. http://dx.doi.org/10.1115/ipc2008-64065.

Full text
Abstract:
Early detection of leaks in hazardous materials pipelines is essential to reduce product loss and damage to the environment. Small undetected leaks can result in very high clean-up costs and have the potential to grow to more serious failures. There are a variety of methods that can detect leaks in pipelines, ranging from manual inspection to advanced satellite based imaging. Typically, most operators opt for a combination of CPM where available, and direct observation methodologies including aerial patrols, ground patrols and public awareness programs that are designed to encourage and facilitate the reporting of suspected leaks. Permanent monitoring sensors based on acoustic or other technologies are also available. These methods can be costly, and none can reliably detect small leaks regardless of their location in the line. SmartBall is a radical new approach that combines the sensitivity of acoustic leak detection with the 100% coverage capability of in-line inspection. The free-swimming device is spherical and smaller than the pipe bore allowing it to roll silently through the line and achieve the highest responsiveness to small leaks. It can be launched and retrieved using conventional pig traps, but its size and shape allow it to negotiate obstacles that could otherwise render a pipeline unpiggable. The SmartBall technology was originally developed and successfully implemented for the water industry, and now refined for oil and gas pipelines over 4-inches in diameter. SmartBall has been proven capable of detecting leaks in liquid lines of less than 0.1 gallons per minute where conventional CPM methods can detect leaks no smaller than 1% of throughput. Development work is continuing to reduce the detection threshold still further. Whereas traditional acoustic monitoring techniques have focused on longitudinal deployment and spacing of acoustic sensors, the SmartBall uses only a single acoustic sensor that is deployed inside the pipeline. Propelled by the flow of product in the pipeline, the device will record all noise events as it traverses the length of the pipeline. This allows the acoustic sensor to pass in very close proximity to any leak whereby the sensor can detect very small leaks, whose noise signature can be clearly distinguished from any background noise.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "PII leaks"

1

Boomer, Kayle D., Jason K. Engeman, Jason R. Gunter, Cameron C. Joslyn, Brandon J. Vazquez, Theodore J. Venetz, and John S. Garfield. 241-AY-102 Leak Detection Pit Drain Line Inspection Report. Office of Scientific and Technical Information (OSTI), January 2014. http://dx.doi.org/10.2172/1119692.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

VANDYKE, D. W. 241-AN-B pit leak detection ANA-WT-LDSTA-231 acceptance test procedure. Office of Scientific and Technical Information (OSTI), August 1999. http://dx.doi.org/10.2172/797717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

VANDYKE, D. W. 241-AN-A pit leak detection ANA-WT-LDSTA-331 acceptance test procedure. Office of Scientific and Technical Information (OSTI), August 1999. http://dx.doi.org/10.2172/797718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kirchhoff, Helmut, and Ziv Reich. Protection of the photosynthetic apparatus during desiccation in resurrection plants. United States Department of Agriculture, February 2014. http://dx.doi.org/10.32747/2014.7699861.bard.

Full text
Abstract:
In this project, we studied the photosynthetic apparatus during dehydration and rehydration of the homoiochlorophyllous resurrection plant Craterostigmapumilum (retains most of the photosynthetic components during desiccation). Resurrection plants have the remarkable capability to withstand desiccation, being able to revive after prolonged severe water deficit in a few days upon rehydration. Homoiochlorophyllous resurrection plants are very efficient in protecting the photosynthetic machinery against damage by reactive oxygen production under drought. The main purpose of this BARD project was to unravel these largely unknown protection strategies for C. pumilum. In detail, the specific objectives were: (1) To determine the distribution and local organization of photosynthetic protein complexes and formation of inverted hexagonal phases within the thylakoid membranes at different dehydration/rehydration states. (2) To determine the 3D structure and characterize the geometry, topology, and mechanics of the thylakoid network at the different states. (3) Generation of molecular models for thylakoids at the different states and study the implications for diffusion within the thylakoid lumen. (4) Characterization of inter-system electron transport, quantum efficiencies, photosystem antenna sizes and distribution, NPQ, and photoinhibition at different hydration states. (5) Measuring the partition of photosynthetic reducing equivalents between the Calvin cycle, photorespiration, and the water-water cycle. At the beginning of the project, we decided to use C. pumilum instead of C. wilmsii because the former species was available from our collaborator Dr. Farrant. In addition to the original two dehydration states (40 relative water content=RWC and 5% RWC), we characterized a third state (15-20%) because some interesting changes occurs at this RWC. Furthermore, it was not possible to detect D1 protein levels by Western blot analysis because antibodies against other higher plants failed to detect D1 in C. pumilum. We developed growth conditions that allow reproducible generation of different dehydration and rehydration states for C. pumilum. Furthermore, advanced spectroscopy and microscopy for C. pumilum were established to obtain a detailed picture of structural and functional changes of the photosynthetic apparatus in different hydrated states. Main findings of our study are: 1. Anthocyan accumulation during desiccation alleviates the light pressure within the leaves (Fig. 1). 2. During desiccation, stomatal closure leads to drastic reductions in CO2 fixation and photorespiration. We could not identify alternative electron sinks as a solution to reduce ROS production. 3. On the supramolecular level, semicrystalline protein arrays were identified in thylakoid membranes in the desiccated state (see Fig. 3). On the electron transport level, a specific series of shut downs occur (summarized in Fig. 2). The main events include: Early shutdown of the ATPase activity, cessation of electron transport between cyt. bf complex and PSI (can reduce ROS formation at PSI); at higher dehydration levels uncoupling of LHCII from PSII and cessation of electron flow from PSII accompanied by crystal formation. The later could severe as a swift PSII reservoir during rehydration. The specific order of events in the course of dehydration and rehydration discovered in this project is indicative for regulated structural transitions specifically realized in resurrection plants. This detailed knowledge can serve as an interesting starting point for rationale genetic engineering of drought-tolerant crops.
APA, Harvard, Vancouver, ISO, and other styles
5

EWER, K. L. Acceptance test report for the AN valve pit leak detection and low point drain assembly mock up test procedure. Office of Scientific and Technical Information (OSTI), July 1999. http://dx.doi.org/10.2172/797546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

HAMMERS, J. S. Project W-314 acceptance test report HNF-4647 for HNF-4646 241-B pit leak detection ANB-WT-LDSTA-231 for project W-314. Office of Scientific and Technical Information (OSTI), September 1999. http://dx.doi.org/10.2172/798031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

HAMMERS, J. S. Project W-314 updated acceptance test report HNF-4649 for HNF-4648 241-AN-A pit leak detection ANA-WT-LDSTA-331 for project W-314. Office of Scientific and Technical Information (OSTI), September 1999. http://dx.doi.org/10.2172/798032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography