12 resultados para email worms

em Indian Institute of Science - Bangalore - Índia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Executing authenticated computation on outsourced data is currently an area of major interest in cryptology. Large databases are being outsourced to untrusted servers without appreciable verification mechanisms. As adversarial server could produce erroneous output, clients should not trust the server's response blindly. Primitive set operations like union, set difference, intersection etc. can be invoked on outsourced data in different concrete settings and should be verifiable by the client. One such interesting adaptation is to authenticate email search result where the untrusted mail server has to provide a proof along with the search result. Recently Ohrimenko et al. proposed a scheme for authenticating email search. We suggest significant improvements over their proposal in terms of client computation and communication resources by properly recasting it in two-party settings. In contrast to Ohrimenko et al. we are able to make the number of bilinear pairing evaluation, the costliest operation in verification procedure, independent of the result set cardinality for union operation. We also provide an analytical comparison of our scheme with their proposal which is further corroborated through experiments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The effect of age of the larvae on the manifestation of the "Sappe" disease of the silkworm by oral inoculation of different pathogens, viz., Aerobacter cloacae, Pseudomonas boreopolis, Escherichia freundii, Achromobacter delmarvae, A. Superficialis, Pseudomonas ovalis, and Staphylococcus albus was tested. It was found that the reaction of the larva to the pathogen was influenced by its age. Some, e.g., Escherichia freundii, were more lethal when introduced at early stages whereas certain others, e.g., Aerobacter cloacae and Staphylococcus albus, caused maximum damage when invading older larvae. Irrespective of the age of infection, death of the worms mainly occurred during molting and before spinning. The studies also indicated that growth and mortality of the larvae were affected differentially by the pathogens.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The oxidative metabolic potential of Setaria digitata, a filarial parasite found in the intraperitoneal cavity of cattle, was investigated. These worms showed active wriggling movements which were not affected by respiratory poisons such as cyanide, rotenone and malonate. They also possessed cyanide-insensitive and glucose-independent oxygen consumption pathways. By differential centrifugation of sucrose homogenates, a fraction containing mitochondria-like particles was obtained in which the activity of the marker enzyme, succinate dehydrogenase, was recovered. This fraction catalysed succinate- and NADH-dependent reduction of both cytochrome c and dyes. Oxygen uptake found with succinate, NADH and ascorbate as substrates was not sensitive to cyanide. Cytochromes could not be detected in either this fraction or homogenates of the worms. H2O2 generation with a number of substrates and lipid peroxidation by measuring malondialdehyde formed as well as by accompanying oxygen uptake were demonstrated in the mitochondria-like particles. A lipid quinone, possibly with a short side chain and related to ubiquinone, was detected in the worms. The results suggested the existence of two cyanide-insensitive oxygen-consuming reactions in Setaria: one respiratory substrate-independent lipid peroxidation, and a second substrate-dependent reaction that requires an auto-oxidizable quinone but not a cytochrome system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Technology scaling has caused Negative Bias Temperature Instability (NBTI) to emerge as a major circuit reliability concern. Simultaneously leakage power is becoming a greater fraction of the total power dissipated by logic circuits. As both NBTI and leakage power are highly dependent on vectors applied at the circuit’s inputs, they can be minimized by applying carefully chosen input vectors during periods when the circuit is in standby or idle mode. Unfortunately input vectors that minimize leakage power are not the ones that minimize NBTI degradation, so there is a need for a methodology to generate input vectors that minimize both of these variables.This paper proposes such a systematic methodology for the generation of input vectors which minimize leakage power under the constraint that NBTI degradation does not exceed a specified limit. These input vectors can be applied at the primary inputs of a circuit when it is in standby/idle mode and are such that the gates dissipate only a small amount of leakage power and also allow a large majority of the transistors on critical paths to be in the “recovery” phase of NBTI degradation. The advantage of this methodology is that allowing circuit designers to constrain NBTI degradation to below a specified limit enables tighter guardbanding, increasing performance. Our methodology guarantees that the generated input vector dissipates the least leakage power among all the input vectors that satisfy the degradation constraint. We formulate the problem as a zero-one integer linear program and show that this formulation produces input vectors whose leakage power is within 1% of a minimum leakage vector selected by a search algorithm and simultaneously reduces NBTI by about 5.75% of maximum circuit delay as compared to the worst case NBTI degradation. Our paper also proposes two new algorithms for the identification of circuit paths that are affected the most by NBTI degradation. The number of such paths identified by our algorithms are an order of magnitude fewer than previously proposed heuristics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Metallophosphoesterase-domain-containing protein 2 (MPPED2) is a highly evolutionarily conserved protein with orthologs found from worms to humans. The human MPPED2 gene is found in a region of chromosome 11 that is deleted in patients with WAGR (Wilms tumor, aniridia, genitourinary anomalies, and mental retardation) syndrome, and MPPED2 may function as a tumor suppressor. However, the precise cellular roles of MPPED2 are unknown, and its low phosphodiesterase activity suggests that substrate hydrolysis may not be its prime function. We present here the structures of MPPED2 and two mutants, which show that the poor activity of MPPED2 is not only a consequence of the substitution of an active-site histidine residue by glycine but also due to binding of AMP or GMP to the active site. This feature, enhanced by structural elements of the protein, allows MPPED2 to utilize the conserved phosphoprotein-phosphatase-like fold in a unique manner, ensuring that its enzymatic activity can be combined with a possible role as a scaffolding or adaptor protein. (C) 2011 Elsevier Ltd. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: The present paper documents the uses of plants in traditional herbal medicine for human and veterinary ailments, and those used for dietary supplements, religious purpose, local beverage, and plants used to poison fish and wild animals. Traditional botanical medicine is the primary mode of healthcare for most of the rural population in Arunachal Pradesh. Materials and methods: Field research was conducted between April 2006 and March 2009 with randomly selected 124 key informants using semi-structured questionnaire. The data obtained was analyzed through informant consensus factor (F(IC)) to determine the homogeneity of informant's knowledge on medicinal plants. Results: We documented 50 plants species belonging to 29 families used for treating 22 human and 4 veterinary ailments. Of the medicinal plants reported, the most common growth form was herbs (40%) followed by shrubs, trees, and climbers. Leaves were most frequently used plant parts. The consensus analysis revealed that the dermatological ailments have the highest F(IC) (0.56) and the gastro-intestinal diseases have F(IC) (0.43). F(IC) values indicated that there was high agreement in the use of plants in dermatological and gastro-intestinal ailments category among the users. Gymnocladus assamicus is a critically rare and endangered species used as disinfectant for cleaning wounds and parasites like leeches and lice on livestocks. Two plant species (Illicium griffithii and Rubia cordifolia) are commonly used for traditional dyeing of clothes and food items. Some of the edible plants recorded in this study were known for their treatment against high blood pressure (Clerodendron colebrookianum), diabetes mellitus (Momordica charantia), and intestinal parasitic worms like round and tape worms (Lindera neesiana, Solanum etiopicum, and Solanum indicum). The Monpas of Arunachal Pradesh have traditionally been using Daphne papyracea for preparing hand-made paper for painting and writing religious scripts in Buddhist monasteries. Three plant species (Derris scandens, Aesculus assamica, and Polygonum hydropiper) were frequently used to poison fish during the month of June-July every year and the underground tuber of Aconitum ferrox is widely used in arrow poisoning to kill ferocious animals like bear, wild pigs, gaur and deer. The most frequently cited plant species; Buddleja asiatica and Hedyotis scandens were used as common growth supplements during the preparation of fermentation starter cultures. Conclusion: The traditional pharmacopoeia of the Monpa ethnic group incorporates a myriad of diverse botanical flora. Traditional knowledge of the remedies is passed down through oral traditions without any written document. This traditional knowledge is however, currently threatened mainly due to acculturation and deforestation due to continuing traditional shifting cultivation. This study reveals that the rural populations in Arunachal Pradesh have a rich knowledge of forest-based natural resources and consumption of wild edible plants is still an integral part of their socio-cultural life. Findings of this documentation study can be used as an ethnopharmacological basis for selecting plants for future phytochemical and pharmaceutical studies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Significant advances have been made in our understanding of heat shock protein 90 (Hsp90) in terms of its structure, biochemical characteristics, post-translational modifications, interactomes, regulation and functions. In addition to yeast as a model several new systems have now been examined including flies, worms, plants as well as mammalian cells. This review discusses themes emerging out of studies reported on Hsp90 from infectious disease causing protozoa. A common theme of sensing and responding to host cell microenvironment emerges out of analysis of Hsp90 in Malaria, Trypanosmiasis as well as Leishmaniasis. In addition to their functional roles, the potential of Hsp90 from these infectious disease causing organisms to serve as drug targets and the current status of this drug development endeavor are discussed. Finally, a unique and the only known example of a split Hsp90 gene from another disease causing protozoan Giardia lamblia and its evolutionary significance are discussed. Clearly studies on Hsp90 from protozoan parasites promise to reveal important new paradigms in Hsp90 biology while exploring its potential as an anti-infective drug target. This article is part of a Special Issue entitled: Heat Shock Protein 90 (HSP90). (C) 2011 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There are many applications such as software for processing customer records in telecom, patient records in hospitals, email processing software accessing a single email in a mailbox etc. which require to access a single record in a database consisting of millions of records. A basic feature of these applications is that they need to access data sets which are very large but simple. Cloud computing provides computing requirements for these kinds of new generation of applications involving very large data sets which cannot possibly be handled efficiently using traditional computing infrastructure. In this paper, we describe storage services provided by three well-known cloud service providers and give a comparison of their features with a view to characterize storage requirements of very large data sets as examples and we hope that it would act as a catalyst for the design of storage services for very large data set requirements in future. We also give a brief overview of other kinds of storage that have come up in the recent past for cloud computing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

User authentication is essential for accessing computing resources, network resources, email accounts, online portals etc. To authenticate a user, system stores user credentials (user id and password pair) in system. It has been an interested field problem to discover user password from a system and similarly protecting them against any such possible attack. In this work we show that passwords are still vulnerable to hash chain based and efficient dictionary attacks. Human generated passwords use some identifiable patterns. We have analysed a sample of 19 million passwords, of different lengths, available online and studied the distribution of the symbols in the password strings. We show that the distribution of symbols in user passwords is affected by the native language of the user. From symbol distributions we can build smart and efficient dictionaries, which are smaller in size and their coverage of plausible passwords from Key-space is large. These smart dictionaries make dictionary based attacks practical.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Earthworm burrow systems are generally described based on postulated behaviours associated with the three ecological types. In this study, we used X-ray tomography to obtain 3D information on the burrowing behaviour of six very common anecic (Aporrectodea nocturna and Lumbricus terrestris) and endogeic (Aporrectodea rosea, Allolobophora chlorotica, Aporrectodea caliginosa, Aporrectodea icterica) earthworm species, introduced into repacked soil cores for 6 weeks. A simple water infiltration test, the Beerkan method, was also used to assess some functional properties of these burrow systems. Endogeic worms make larger burrow systems, which are more highly branched, less continuous and of smaller diameter, than those of anecic worms. Among the anecic species, L. terrestris burrow systems are shorter (9.2 vs 21.2 m) with a higher number (14.5 vs 23.5) of less branched burrows (12.2 vs 20.2 branches m(-1)), which are also wider (7.78 vs 5.16 mm) than those of A. nocturna. In comparison, the burrow systems made by endogeic species appeared similar to each other. However, A. rosea burrows were short and narrow, whereas A. icterica had a longer burrow system (15.7 m), more intense bioturbation intensity (refilled macropores or soil lateral compaction around them) and thus a greater number of burrows. Regarding water infiltration, anecic burrow systems were far more efficient due to open burrows linking the top and bottom of the cores. For endogeic species, we observed a linear relationship between burrow length and the water infiltration rate (R (2) = 0.49, p < 0.01). Overall, the three main characteristics significantly influencing water infiltration were burrow length, burrow number and bioturbation volume. This last characteristic highlighted the effect of burrow refilling by casts.