Synopsis: Security:


newsoffice 00614.txt

Such a system could be used to monitor patients who are at high risk for blood clots says Sangeeta Bhatia senior author of the paper and the John and Dorothy Wilson Professor of Health Sciences and Technology and Electrical engineering and Computer science.

Some patients are at more risk for clotting but existing blood tests are not consistently able to detect the formation of new clots says Bhatia who is also a senior associate member of the Broad Institute and a member of MIT s Koch Institute for Integrative Cancer Research

Another application is monitoring patients who are at high risk for a clot for example people who have to spend a lot of time in bed recovering from surgery.

If a patient is at risk for thrombosis you could send them home with a 10-pack of these sticks


newsoffice 00623.txt

In other words, when the two sides of a cracked material are pulled apart, instead of cracking further, it can heal. he stress from the disclinations is leading to this unexpected behavior,


newsoffice 00628.txt

Armies of mobile cubes could temporarily repair bridges or buildings during emergencies, or raise and reconfigure scaffolding for building projects.


newsoffice.mit.edu 2015 000041.txt

making it hard to predict the risk of a vaso-occlusive crisis, Dao says. He and his colleagues designed their microfluidic device to mimic the conditions inside a blood vessel as oxygen leaves the Blood cells flow through a narrow channel that wraps around a compartment containing oxygen.

Analyzing risk Using this device to measure blood samples from 25 sickle cell disease patients, the researchers were able to determine how deoxygenation affects red blood cellssickling rates;


newsoffice.mit.edu 2015 00822.txt.txt

minimizing the risks of leaving toxic secondary products to persist in, say, a body of water. nce they switch to this macro situation where theye big clumps,


phys.org 2015 000031.txt

This enhanced resolution at the diffraction limit of light is critical for data storage digital imaging and security applications.


phys.org 2015 000034.txt

but it does not contain toxic metals such as cadmium that are known to pose potential risks


phys.org 2015 000057.txt

The new tool could be used as a high-throughput screening platform to identify patients at risk of developing the urologic condition.


phys.org 2015 000069.txt

risk for consumers as well. In this study researchers exposed cultured laboratory mouse cells resembling the arterial wall cells to NPS of silicon dioxide

The aims of our study were to gain additional insight into the cardiovascular risk associated with silicon dioxide nanoparticle exposure

A recent update from the American Heart Association also suggested that fine particles in air pollution leads to elevated risk for cardiovascular diseases.

However more research was needed to examine the role of ultrafine particles (which are much smaller than fine particles) on atherosclerosis development and cardiovascular risk.


phys_org 00041.txt

and there is a risk that some of this heritage will be lost within the next 100 years if effective solutions are not found.


phys_org 00061.txt

or holography Yang said. 3d security elements that are difficult to replicate and which offer different levels of authentication could also be generated for anti-counterfeiting and anti-forgery technologies.


phys_org 00070.txt

which pose the risk of flowing to other parts of the body and forming unintended and potentially harmful clot formations,


phys_org 00083.txt

and have a longer shelf life than do human platelets a benefit in times of widespread emergency


phys_org 00098.txt

The way traditional science works is to map out all the possible risks demonstrate you've accounted for them


phys_org 00120.txt

or airport scanners used to sense explosives or chemical threats. Zang says scanners with the new technology"could be used by the military police,


phys_org 00140.txt

This excess oxygen leached at faster and faster rates over time actually contributes to the risk of failure and acts as fuel for a potential fire.

But that temperature threshold dropped for a highly charged battery suggesting that operating at full energy capacity accelerates structural degradation and vulnerability.

even though pristine and uncharged NCA samples remained stable up to 400 degrees Celsius charging introduced the usual decomposition and vulnerabilities.


phys_org 00143.txt

while minimizing the risk of complications, "Masson said. Another benefit, and a considerable one:""While traditional equipment requires an investment of around $100, 000,


phys_org 00158.txt

and dedication in their fields and are meant to encourage beneficiaries to freely explore their interests without fear of risk-taking.

This will allow us to take more risks in our research since there are no'milestones'we have to meet he says referring to a frequent requirement of many funders.


phys_org 00195.txt

because other patterning techniques have the risk of damaging the crystal structure and orientation and thus influence the properties of the material.


phys_org 00202.txt

The results indicate little risk to humans ingesting the particles through drinking water say scientists at Duke's Center for the Environmental Implications of Nanotechnology (CEINT.


phys_org 00209.txt

and national security since an electron beam is a critical component in generating X-rays. While carbon nanotube cathodes have been studied extensively in academia Fermilab is the first facility to test the technology within a full-scale setting.


phys_org 00237.txt

The researchers said their invention could serve as a full-thickness patch to repair defects due to Tetralogy of fallot atrial and ventricular septal defects and other defects without the risk of inducing abnormal cardiac rhythms.


phys_org 00245.txt

#Graphene sensor tracks down cancer biomarkers An ultrasensitive biosensor made from the wonder material graphene has been used to detect molecules that indicate an increased risk of developing cancer.

and in elevated levels has been linked to an increased risk of developing several cancers. However 8-OHDG is typically present at very low concentrations in urine so is very difficult to detect using conventional detection assays known as enzyme-linked immunobsorbant assays (ELISAS.

Generic epitaxial graphene biosensors of ultrasensitive detection of cancer risk biomarker Z Tehrani et al 2014 2d Mater. 1 025004. iopscience. iop. org/2053


phys_org 00287.txt

Gold conducts and thus creates a short-circuit that sabotages the appealing semiconducting properties of the graphene ribbon.


phys_org 00289.txt

night vision and security. The light we see illuminating everyday objects is actually only a very narrow band of wavelengths and frequencies.


phys_org 00293.txt

and security industries since they are cost-effective compared to optical detection procedures. Such biosensors allow for scalability


phys_org 00297.txt

carefully constructed cluster that the immune system perceives as a threat, prompting it to release large amounts of antibodies that can attack


phys_org 00335.txt

"Besides the evident application in replacing the typical'rainbow holograms'of credit cards and other security items,


phys_org 00406.txt

and telecommunications medical devices and security he says. If these could be made flexible they could be integrated in clothes rolled up


phys_org 00416.txt

They noted that it could potentially be used to sniff out a hard-to-detect explosive popular among terrorists.

or PETN, an explosive compound considered a favorite of terrorists. Small amounts of it pack a powerful punch,


phys_org 00570.txt

robust and reusable will allow for simple monitoring of high-risk individuals in any environment, particularly in the developing world.


phys_org 00616.txt

thus providing a direct assessment of the risk for the patient to develop a cancer.


phys_org 00634.txt

but if those nanoparticles cannot be digested effectively they can accumulate in the liver creating a risk of secondary poisoning especially among patients who are already at risk of liver failure.


popsci_2013 00037.txt

Since 2006 to protect against the threat of those explosives people traveling by air in America have been limited to one#quart-sized bag for liquids each#in a container no larger than 3. 4 ounces.

The research is supported by the Department of Homeland security and it's easy to see how an airport security checkpoint in the future could employ a#liquid-scanning device like the Magray.

The device has been in development since#at least 2007 but#it still may be a few years before Magrays can scan Thanksgiving travelers'homemade gravy


popsci_2013 00048.txt

The Open source Beehives project is a collaborative response to the threat faced by bee populations in industrialised nations around the world.


popsci_2013 00091.txt

When did the shuttle program become relevant to anyone but the US Department of Espionage?


popsci_2013 00212.txt

It's possible enhancing the biochemical events that lead to growth in the brain would cause issues elsewhere in the body like potentially raising the risk of cancer.


popsci_2013 00225.txt

and be prepared to monitor radioactivity in an emergency although they probably (hopefully) wouldn't get much of a chance to use it.


popsci_2013 01265.txt

and putting the animal at a higher risk of being detected. We know that sharks hunt using their extremely sensitive sense of smell as well â


popsci_2013 01538.txt

When health-care providers in the developing world can afford only drugs that don't have a built-in security network,


popsci_2013 02168.txt

and nullify the risks associated with smoking. Stole this from yahoo answers By the truth...


Popsci_2014 00023.txt

The Washington monument and New orleans are not knock on wood under threat in the same way as the Bamiyan Buddhas

Lee told Popular Science that an international panel helps us set up criteria for evaluation sites looking at risk facing the sites significance of the sites and technical benefits of the sites.


Popsci_2014 00038.txt

In the demonstration the Navy boats first escorted a high value unit simulating a ring of robotic bodyguards around a vessel in a narrow part of the sea.

They can perform more patrols since unmanned swarms of up to 20 boats can be controlled by one sailor at a time.

round-the-clock patrols only require one new sailor at the controls every few hours instead of 50 sailors out in the water every time.

More patrols with small ships surrounding big ones will make larger vessels safer as well. Multiple times during the media call Klunder and Brizzolara mentioned Al qaeda s suicide bombing attack on the destroyer USS Cole in October 2000.

As the Cole refueled at a Yemeni port a small foreign craft approached the side of the destroyer


Popsci_2014 00093.txt

For lenders interested in making sure loan repayments happen on schedule moving collateral can present an investment risk.

Recently Popular Science reported on how in an effort to mitigate this risk repo men are scanning billions of license plates putting drivers'privacy at risk

In turn lenders are installing fake devices to outwit hacking attempts. From the story: These devices are distinct from previous attempts in car hacking not in function but in initiation.


Popsci_2014 00131.txt

In addition to seeking out threats like that the LRV as requested will go farther than current Humvees protect against some blasts work in all weather and with degraded visibility and defeat outdated tanks.


Popsci_2014 00192.txt

If the hit put the player at risk of a concussion the information is sent to a handheld device that alerts the trainer on the sidelines.#


Popsci_2014 00225.txt

The potential robustness of these robots could mean they can take risks traditional robots might not dare#you could roll them off the edges of cliffs


Popsci_2014 00231.txt

#The Rise Of The Crypto Phone Between revelations of NSA spying and a sense that marketers and hackers are picking our digital pockets we re all getting a little edgy about cellular security.

Con Your callers also need to have installed the apps for the encryption to work.####Free WINDOWS OS X Linux Orbot for Androidpros The preconfigured browser routes you through a worldwide network of proxy servers anonymizing IP numbers.

##$40 hidecell. compros Storing your phone in a metal-lined bag will eliminate surveillance possibilities by blocking cell-tower signals along with your Wi-fi GPS and Bluetooth connections.


Popsci_2014_00291.txt

the Advanced High performance Reconnaissance and Surveillance Aircraft (AHRLAC) looks like an alternate history version of a World war i fighter.

The result of a collaboration between South africa's Aerosud aviation firm and the Paramount Group, the AHRLAC is designed as a cheap alternative to the big name in military surveillance right now:

These range from surveillance to light attack, which could make it a useful tool for border patrol, some forms of counterinsurgency warfare,

The pusher propeller design--in which the propellers are mounted behind their respective engines--helps the plane fly slowly, an important task for surveillance aircraft.

It's made to carry everything from surveillance cameras and radar to rockets, flares, and some missiles.


Popsci_2014_00357.txt

#Japan's Military Will Patrol Earth's Orbitals Japan's military plans to take defense to the heavens in 2019.


robohub 00013.txt

and Automation Index ROBO-STOX licenses their proprietary index to ETF Securities to provide European investors with highly diversified access to a new age of growth in robotics and automation.

ETF Securities is the first to license the ROBO-STOX Global Robotics and Automation UCITS Index for use in an exchange traded fund (ETF) that is listed on the London Stock exchange.


robohub 00081.txt

Android developer hacker hustler and resident diabetes expert if our bears ever become sentient you#ll know whom to blame.


robohub 00158.txt

Covering manufacturing agriculture health transport civil security and households the initiative#calledâ SPARCÂ#is the EU#s industrial policy effort to strengthen Europe#s position in the global


robohub 00235.txt

But what happens if theres an emergency and no medical expert to assist? NASA came up with the answer recently


robohub 00262.txt

and World cup Football Packbots will be deployed in Brazil during the 2014â World cup Soccerâ season to bring a high-tech approach to security.

The robots will be stationed throughout Brazilâ#12 host cities during the soccer matches to boost security


robohub 00307.txt

Factory-in-a-Day aims to develop a system that can be purposed easily re for new product lines  by reducing the system integration time to a single day the project hopes to minimize investment risk for SMES.


robohub 00338.txt

#Honda automatic driverless valet parking system Honda has developed a low-cost automatic valet parking system that uses parking lot surveillance cameras to help park cars automatically.

Vision from the rear camera is supplemented with that from surveillance cameras to create a system that can see more around the car. he information that used to move the cars such as white lines is sent to the cars as maps.


robohub 00348.txt

Rather than people who are ill going to the doctor our idea is for healthy people to think about how to stay healthy prepare for any emergencies


robohub 00394.txt

military and security (64%)manufacturing (57%)space exploration (45%)search and rescue (36%)and healthcare (18%.

and security context may be useful to assess what UK citizens are comfortable with ranging from troop support in areas such as minesweeping to remote surveillance to fully armed drones.


robohub 00478.txt

Other applications include home automation surveillance medical instruments prosthetic devices and smart clothing. The artificial compound eye features a panoramic hemispherical field of view with a resolution identical to that of the fruitfly in less than 1 mm thickness.


robohub 00527.txt

evaluate future risks, and identify genes related to illness. y investigating SNPS, we can determine that this drug will work for this person,


robohub.org 2015 00411.txt.txt

The propellers are driven by brushless Hacker A05-13s motors that are attached to the wings by 3d printed mountings.

Hacker A05-13s Motor controllers: ZTW Spider 12a ESCS with Simonk firmware Propellers: 5×3 GWS EP-5030 Flap servos:


R_agenda.weforum.org 2015 00128.txt.txt

and willing to take risks through our investments. We try to demonstrate that renewable energy is part of the solution.


R_campustechnology.com 2015 01508.txt.txt

we couldn't risk them being bumped by something else, "she said. The Dallas studio provided links to the resumes and portfolios of several actors,


R_defense-update.com 2015 00157.txt.txt

While US Scales Back Support to Rebels The upper chamber of the Russian parliament has given unanimously a formal consent to President Putin to use the nation military in Syria to fight terrorism at a request from the Syrian President Bashar

but some have turned also over their equipment to Al qaeda affiliated Al Nusra Front. The administration announced the creation of the program last year,


R_edition.cnn.com_TECH 2015 00204.txt.txt

It could be used for small package delivery or vertical takeoff and landing, long endurance surveillance for agriculture, mapping and other applications."


R_edition.cnn.com_TECH 2015 00351.txt.txt

Suppressing immunity in this way opens up the risk of new infections and certain cancers. Ott's ambitious technique therefore has an ambitious goal--to one day provide amputees with fully functional limbs that can be transplanted

"We need a limb that doesn't pose any risk to humans, "she says. Ott agrees and is hopeful he will be working in science long enough to see his work come to fruition."


R_news.discovery.com 2015 01060.txt.txt

Nepal's national emergency operation centre said on twitter, less than three weeks after a similar disaster killed more than 8, 000 people.

I saw in the news the day before yesterday that the risk was lower, it wouldn't happen again...

Nepal's National Emergency Operation center tweeted:""Pray to Almighty: Keep all Nepalese Safe in this difficult period of time."


R_news.discovery.com 2015 02451.txt.txt

The mirror uses a series of ultispectralcameras to assess an individual diet, alcohol consumption, physical activity, smoking habit and metabolic risk.


R_news.sciencemag.org 2015 03390.txt.txt

that ARVS dramatically reduce the risk of transmission. Several Prep studies similarly have shown that ARVS protect uninfected people regardless of the route of transmission.


R_news.sciencemag.org 2015 03490.txt.txt

But this creative strategy also carries risks. he rationale is sound, and the data are exciting,


R_phys.org 2015 00002605.txt

#Singapore Telecom to buy US cybersecurity firm for $810 mn Singapore Telecom (Singtel) said Wednesday it will buy almost all of US cybersecurity firm Trustwave for $810 million,

Southeast asia's biggest telecom firm by revenue said it will acquire a 98 percent equity interest in Trustwave under an agreement it signed with the Chicago-headquartered company.

Trustwave, a leading specialist in managed security services, is valued at $850 million, Singtel said in a statement.

Trustwave chairman and chief executive Robert J. Mccullen will hold the other two percent.""We aspire top be a global player in cybersecurity,

"Singtel said it"will leverage Trustwave's threat intelligence, technology and talent to meet the growing demand for always-on managed security services in North america and the Asia-Pacific region".

"Trustwavehich helps firms fight cybercrime, protect their data and reduce security riskas three million business subscribers served by 1, 200 employees in 26 countries.

Singtel said that after the acquisition, Trustwave will continue to operate as an independent business unit

and strengthen is position in the United states and Europe. The purchase will also enable Trustwave to use Singtel's vast presence in the Asia Pacific to"broaden its overall security portfolio

and address the fast-growing emerging security market opportunity"in the region, the statement added. Cash-rich Singtel has been expanding well beyond its small domestic market

and holds substantial stakes in mobile telecom firms in key Asian markets including India, Indonesia, the Philippines and Thailand.

It also has owned a wholly subsidiary in Australia called Optus O


R_phys.org 2015 00002608.txt

#Silicon valley mulls invasion of'unicorns 'When social media software firm Sprinklr unveiled its latest funding last month,

ignoring traditional standards of risk.""We are in a risk bubble, "he said.""Companies are taking on huge burn rates to justify spending the capital they are raising in these enormous financings,

putting their long-term viability in jeopardy.""In a running Twitter conversation on the subject, Danielle Morrill of the research firm Mattermark said"I've narrowed it down to 61 potential dead unicorns.

Airbnb is seen as a threat to the hotel sector similar to Uber's menace to the taxi industry.


R_phys.org 2015 00002966.txt

which could help curb the risk of unwanted infections in agricultural or garden plants, the team says.


R_phys.org 2015 00003021.txt

#Assuring solar modules will last for decades The Energy department's National Renewable energy Laboratory (NREL) is co-leading an international push to assure the reliability of solar panelsn assurance demanded by customers, manufacturers, lenders, and utilities.

along with everyone else in the solar industry, know with maximum assurance how long the PV systems will last and


R_phys.org 2015 00003071.txt

"While these scenarios pose serious threats, our cells have evolved elegant mechanisms to cope, Vindigni says. DNA replicates by unzipping its two interwoven strands


R_phys.org 2015 00003203.txt

"A continuous accumulation of micro-cracking (that leads to a softening of the material) can be used as a metric for material degradation assessment."


R_phys.org 2015 00003298.txt

With a rising global population leading to increased pressure on food resources, it is becoming ever more essential that crop breeding programmes work to enhance the security of global food sources.


R_physicsworld.com 2015 00016.txt.txt

#Lasers burn holes in quantum security systems A new way to hack quantum-cryptography systems has been unveiled by physicists in Canada.

QKD uses the laws of quantum mechanics to guarantee complete security when two people exchange a cryptographic key.

Unconditional security? In practice, however, the security of QKD is impaired by physical limitations of the sources,

receivers and other hardware used to implement it. According to Vadim Makarov of the University of Waterloo and colleagues, many scientists assume that

then QKD can"provide unconditional security"."But the team has shown that even in perfectly understood systems,

The group also used the same laser to weaken the security of"quantum coin tossing,

The Canadian group says that the new results should force scientists to"think again"about how to assess the security of quantum-cryptographic devices,

and other optical attacks will become"an obligatory part of security assurance for future quantum communications".

He believes that countermeasures are possible, suggesting that an additional detector could be installed to register the light from any damaging laser beams.


R_profit.ndtv.com_news_banking-finance 2015 00042.txt.txt

The economy is already under threat of deflation and struggling to revive bricks-and-mortar investment. It is targeted officially to grow by 7 per cent this year,

including in companies partly owned by the China Securities Finance Corp (CSFC), the state margin lender tasked with buying stocks and propping up prices.


R_profit.ndtv.com_news_banking-finance 2015 00421.txt.txt

, according to data from National securities Depository Limited (NSDL. The sales helped push the Nifty down 6. 6 per cent in August, its worst monthly performance since November 2011.


R_scitechdaily.com 2015 00617.txt.txt

However, these devices, often created with nondegradable elastic polymers, bear an inherent risk of intestinal obstruction as a result of accidental fracture or migration.

which is a medical emergency potentially requiring surgical intervention, says Koch Institute research affiliate Giovanni Traverso,

as there is a greater risk for fracture if a device is too large or too complex.

or have a mechanism that would enable it to pass through the stomach unaltered before disintegrating in the intestines. o lower any possible risk of obstruction,


R_scitechdaily.com 2015 00804.txt.txt

Invisibility skin cloaks on the microscopic scale might prove valuable for hiding the detailed layout of microelectronic components or for security encryption purposes.


R_scitechdaily.com 2015 00806.txt.txt

Invisibility skin cloaks on the microscopic scale might prove valuable for hiding the detailed layout of microelectronic components or for security encryption purposes.


R_spectrum.ieee.org 2015 00764.txt.txt

and give clinicians more time to treat someone at risk. Septic shock, which is the third level of sepsis,

or she was at risk for septic shock, an alert was sent to a doctor who could then take action

TREWSCORE correctly spotted 85 percent of the patients who were at risk for septic shock,

For instance, a patient who is treated successfully will appear as low-risk in the electronic health records

Saria and her team address this problem by modifying pattern recognition algorithms so the computer can avoid mistaking high-risk patients for low-risk ones.


R_spectrum.ieee.org 2015 00767.txt.txt

and other sourceso there is nothing to betray the surveillance. The system calculates the positions of hidden target by comparing two signals:

and a surveillance channel, which picks up Doppler-shifted waves reflecting from the moving subject.

and surveillance signals, interprets the very small frequency shifts, and reveals the hidden subject location and motion.


R_spectrum.ieee.org 2015 00855.txt.txt

safety patrols and law enforcement. he most important data come from a handful of car functions:


R_spectrum.ieee.org 2015 01006.txt.txt

That cheap enough to make economic sense in medical emergencies, like those encountered in a neonatal intensive care unit.


R_spectrum.ieee.org 2015 01020.txt.txt

or act early to reduce the risk of stampedes and other dangers. utomated computer analysis of such large-scale and dense crowds has never been done before,

Automated crowd counting could also prove increasingly potent with the growing use of aerial drone surveillance,


R_techcrunch.com 2015 00002472.txt

survey farm land, inspect cell towers, patrol property, or do search & rescue, Now wel see just how many businesses will pay a monthly subscription for Airware to power their drones for industrial inspections, agriculture management, anti-poaching, and more.


R_techcrunch.com 2015 00003080.txt

#France Is One step Closer To Adopting Extensive Surveillance Law Following Charlie Hebdo attacks, The french Government has been tirelessly working to draft

like if someone is watching videos related to terrorism, and then record everything you do online.

but to get tangible results for the Government and French intelligence agencies. In order to campaign for this law

the Government has been saying that intelligence agencies were already spying on everyone, and this new law is a more honest for everyone.

intelligence laws are all about finding the perfect balance between security and privacy. But today law doesn really take privacy into account.

and even The french association of terrorism victims are all against it. But 438 out of 566 members of the lower house from all parties voted for the law.


R_techcrunch.com 2015 07821.txt.txt

#Biometric Security: From Selfies To Walking Gaits Oren Levy is CEO of Zooz. The payments industry, facing the risk of increasingly sophisticated cyberattacks

and various types of credit card fraud, has begun incorporating various types of biometric technology to enhance security

and prevent breaches. As recently reported, Mastercard is launching a facial recognition payment service based on elfiestaken on a smartphone.

which has boosted security on its mobile app by using fingerprint sensors that are installed on some Samsung Electronics devices.

While the payments industry is currently working full steam on various forms of biometric technology aimed at thwarting ever-increasing security breaches in payments technologies,

because it affords a higher level of security against cyber attacks than other protection methods. The newfound availability of biometric technology for mobile and cloud-based platforms raises the security bar further.

Nevertheless, while there are many who hail biometrics as a game changer, others believe that in its current form it does not provide the necessary level of security to prevent identity theft.

The fact is that hackers have succeeded in using photographs to lift fingerprints and access personal accounts.

The notorious hacking group called the Chaos Computer Club even replicated the fingerprint of the German Defense Minister.

A lot is happening these days in the field of identification technology to increase security. Qualcomm Technologies recently announced the development of the first comprehensive mobile biometric solution based on ultrasonic technology.

While traditional fingerprint authentication relies on capacitive touch-based sensors, the new Snapdragon solution features ultrasonic-based technology,

which would prevent hackers from replicating fingerprints or other biometric methods. This type of technology would have the ability to detect

and tokenization layers that will ensure high-level security. The ultimate solution technology may involve using a mixture of several forms of biometric authentication,

Increased security is not the only consideration when discussing the advantages of biometrics. Imagine a world in which there is no need to remember a slew of passwords and PINS for various sites.

and banks millions of dollars and provide high-level protection against cyber attacks. However, when it comes to the extensive use of biometrics in the payments industry,


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011