For a finite set D⊂Z and an integer b≥2, we say that (b,D) is compatible with C⊂Z if e−2πidc/bd∈D,c∈C is a Hadamard matrix. Let δE=1#E∑a∈Eδa denote the uniformly discrete probability measure on E. We ...prove that the class of infinite convolution (Moran measure) μb,{Dk}=δb−1D1⁎δb−2D2⁎⋯ is a spectral measure provided that there is a common C⊂Z+ compatible to all the (b,Dk) and C+C⊆{0,1,…,b−1}. We also give some examples to illustrate the hypotheses and results, in particular, the last condition on C is essential.
There were 3 influenza pandemics in the 20th century, and there has been 1 so far in the 21st century. Local, national, and international health authorities regularly update their plans for ...mitigating the next influenza pandemic in light of the latest available evidence on the effectiveness of various control measures in reducing transmission. Here, we review the evidence base on the effectiveness of nonpharmaceutical personal protective measures and environmental hygiene measures in nonhealthcare settings and discuss their potential inclusion in pandemic plans. Although mechanistic studies support the potential effect of hand hygiene or face masks, evidence from 14 randomized controlled trials of these measures did not support a substantial effect on transmission of laboratory-confirmed influenza. We similarly found limited evidence on the effectiveness of improved hygiene and environmental cleaning. We identified several major knowledge gaps requiring further research, most fundamentally an improved characterization of the modes of person-to-person transmission.
As the complexity and criticality of software increase and projects are pressed to develop software faster and more cheaply, it becomes even more important to ensure that software-intensive systems ...are reliable and safe. This book helps you develop, manage, and approve safety-critical software more efficiently and effectively. Although the focus is on aviation software and compliance with RTCA/DO-178C and its supplements, the principles also apply to other safety-critical software. Written by an international authority on the subject, this book brings you a wealth of best practices, real-world examples, and concrete recommendations.
The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on ...the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy.
Cyberattacks-actions intended to damage adversary computer systems or networks-can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues.
Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores important characteristics of cyberattack. It describes the current international and domestic legal structure as it might apply to cyberattack, and considers analogies to other domains of conflict to develop relevant insights. Of special interest to the military, intelligence, law enforcement, and homeland security communities, this report is also an essential point of departure for nongovernmental researchers interested in this rarely discussed topic.
Continuous advancements in computing technology and artificial intelligence in the past decade have led to improvements in driver monitoring systems. Numerous experimental studies have collected real ...driver drowsiness data and applied various artificial intelligence algorithms and feature combinations with the goal of significantly enhancing the performance of these systems in real-time. This paper presents an up-to-date review of the driver drowsiness detection systems implemented over the last decade. The paper illustrates and reviews recent systems using different measures to track and detect drowsiness. Each system falls under one of four possible categories, based on the information used. Each system presented in this paper is associated with a detailed description of the features, classification algorithms, and used datasets. In addition, an evaluation of these systems is presented, in terms of the final classification accuracy, sensitivity, and precision. Furthermore, the paper highlights the recent challenges in the area of driver drowsiness detection, discusses the practicality and reliability of each of the four system types, and presents some of the future trends in the field.
We study a family of mean field games with a state variable evolving as a multivariate jump–diffusion process. The jump component is driven by a Poisson process with a time-dependent intensity ...function. All coefficients, i.e. drift, volatility and jump size, are controlled. Under fairly general conditions, we establish existence of a solution in a relaxed version of the mean field game and give conditions under which the optimal strategies are in fact Markovian, hence extending to a jump–diffusion setting previous results established in Lacker (2015). The proofs rely upon the notions of relaxed controls and martingale problems. Finally, to complement the abstract existence results, we study a simple illiquid inter-bank market model, where the banks can change their reserves only at the jump times of some exogenous Poisson processes with a common constant intensity, and provide some numerical results.
How best to manage risk involving multi-valued human biological materials is the overarching theme of this book, which draws on the sourcing and supply of blood as a case study. Blood has ethical, ...social, scientific and commercial value. This multi-valuing process presents challenges in terms of managing risk, therefore making it ultimately a matter for political responsibility. This is highlighted through an examination of the circumstances that led to HIV blood contamination episodes in the US, England and France, as well as their consequences. The roles of scientific expertise and innovation in managing risks to the blood system are also analysed, as is the increased use of precautionary and legal strategies in the post-HIV blood contamination era. Finally, consideration is given to a range of policy and legal strategies that should underpin effective risk governance involving multi-valued human biological materials.
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by ...author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: SQL Injection Cross Site Scripting Logic Attacks Server Misconfigurations Predictable Pages Web of Distrust Breaking Authentication Schemes HTML5 Security Breaches Attacks on Mobile Apps Even if you don't develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked-as well as the best way to defend against these attacks. Plus, Hacking Web Apps gives you detailed steps to make the web browser - sometimes your last line of defense - more secure. More and more data, from finances to photos, is moving into web applications. How much can you trust that data to be accessible from a web browser anywhere and safe at the same time? Some of the most damaging hacks to a web site can be executed with nothing more than a web browser and a little knowledge of HTML. Learn about the most common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and many more.