217 resultados para Fuzzy box products
Resumo:
Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.
Resumo:
Many fungi, lichens, and bacteria produce xanthones (derivatives of 9H-xanthen-9-one, “xanthone” from the Greek “xanthos”, for “yellow”) as secondary metabolites. Xanthones are typically polysubstituted and occur as either fully aromatized, dihydro-, tetrahydro-, or, more rarely, hexahydro-derivatives. This family of compounds appeals to medicinal chemists because of their pronounced biological activity within a notably broad spectrum of disease states, a result of their interaction with a correspondingly diverse range of target biomolecules. This has led to the description of xanthones as “privileged structures”.(1) Historically, the total synthesis of the natural products has mostly been limited to fully aromatized targets. Syntheses of the more challenging partially saturated xanthones have less frequently been reported, although the development in recent times of novel and reliable methods for the construction of the (polysubstituted) unsaturated xanthone core holds promise for future endeavors. In particular, the fascinating structural and biological properties of xanthone dimers and heterodimers may excite the synthetic or natural product chemist.
Resumo:
At Eurocrypt’04, Freedman, Nissim and Pinkas introduced a fuzzy private matching problem. The problem is defined as follows. Given two parties, each of them having a set of vectors where each vector has T integer components, the fuzzy private matching is to securely test if each vector of one set matches any vector of another set for at least t components where t < T. In the conclusion of their paper, they asked whether it was possible to design a fuzzy private matching protocol without incurring a communication complexity with the factor (T t ) . We answer their question in the affirmative by presenting a protocol based on homomorphic encryption, combined with the novel notion of a share-hiding error-correcting secret sharing scheme, which we show how to implement with efficient decoding using interleaved Reed-Solomon codes. This scheme may be of independent interest. Our protocol is provably secure against passive adversaries, and has better efficiency than previous protocols for certain parameter values.
Resumo:
Despite the fact that Australia is a socially progressive country and boasts one of the largest Gender Dysphoria Clinics in the Southern Hemisphere, delivering services for almost four decades, Australian Governments fail to arrive at any consensus on the legal and human rights approaches to Trans*people. The subsequent lack of recognition does little more than increase the levels of frustration of and the continued discrimination to Trans*people, including adverse mental health problems, in this country. The purpose of this presentation is to provide an overview of the Australian systems that govern Trans*people and to identify how Trans*identities are manipulated in our Federal system of government; a system which offers little to protect the human rights of Trans*people. In order to contextualise the Australian situation, I commence with a brief description on the layers of government which will include how Australian Trans*people are currently protected under the law in those jurisdictions. I then present some of the impracticalities endured by the transitioning individual (single or married) including change of documentation and legal gender status before, during and after surgical transition for both those born on and off shore. This presentation will also include discussion of legislation that has been described by Trans*advocates as “Gesture”, “Cart before the Horse” and “Harmful”. I will conclude with a way forward by suggesting the development of a coordinated all of government approach in consultation with key stakeholders for “Trans* Friendly Legislation” to improve the human and legal rights, and ultimately the health and wellbeing of Australian Trans*identities.
Resumo:
Double or nothing! Recently the total ynthesis of secalonic acids A and D was reported. This work and other natural product syntheses with a dimerization step as a common feature are featured in this highlight. The significant biological activity of the secalonic acids and the fact that their synthesis has fascinated synthetic chemists for the past forty years make this work a milestone in natural product synthesis.
Resumo:
The phenylperoxyl radical has long been accepted as a critical intermediate in the oxidation of benzene and an archetype for arylperoxyl radicals in combustion and atmospheric chemistry. Despite being central to many contemporary mechanisms underpinning these chemistries, reports of the direct detection or isolation of phenylperoxyl radicals are rare and there is little experimental evidence connecting this intermediate with expected product channels. We have prepared and isolated two charge-tagged phenyl radical models in the gas phase [i.e., 4-(N,N,N-trimethylammonium) phenyl radical cation and 4-carboxylatophenyl radical anion] and observed their reactions with dioxygen by ion-trap mass spectrometry. Measured reaction rates show good agreement with prior reports for the neutral system (k(2)[(Me3N+)C6H4 center dot + O-2] = 2.8 x 10(-11) cm(3) molecule(-1) s(-1), Phi = 4.9%; k(2)[(-O2C)C6H4 center dot + O-2] = 5.4 x 10(-1)1 cm(3) molecule(-1) s(-1), Phi = 9.2%) and the resulting mass spectra provide unequivocal evidence for the formation of phenylperoxyl radicals. Collisional activation of isolated phenylperoxyl radicals reveals unimolecular decomposition by three pathways: (i) loss of dioxygen to reform the initial phenyl radical; (ii) loss of atomic oxygen yielding a phenoxyl radical; and (iii) ejection of the formyl radical to give cyclopentadienone. Stable isotope labeling confirms these assignments. Quantum chemical calculations for both charge-tagged and neutral phenylperoxyl radicals confirm that loss of formyl radical is accessible both thermodynamically and entropically and competitive with direct loss of both hydrogen atom and carbon dioxide.
Resumo:
Australia is a difficult market for horror movies. Particularly in recent years, Australia has been regarded as a graveyard for many horror films released theatrically. This is not to say that Australians have not enjoyed the occasional scary movie on the big screen. But what types of horror films have been popular with Australian audiences at the box-office remains poorly understood. Horror films revolve around monsters, the fear of death and the transgression of boundaries, and they aim to scare audiences through ‘gross-out’ or ‘creep-out’ factors (some combine both). The former refers to shocking and graphic portrayals of gore and violence – as seen in the sadistic torture of backpackers in Hostel (Eli Roth, 2005), which depicts limbs being hacked off and eyes being cut from nerve endings. The latter refers to the crafting of fear through mood and suspense without explicit bloodshed, achieved brilliantly in The Sixth Sense’s (M Night Shyamalan, 1999) chilling encounters with ‘dead people’. In creep-out films, it is often what viewers don’t see that is most disturbing. Using an analysis of the top fifty films each year at the Australian box office from 1992 to 2012, this article identifies the most successful horror movies over this period to ascertain what types of horror movies – with reference to creep-out and gross-out factors – have been most popular with domestic audiences.
Resumo:
RATIONALE: Polymer-based surface coatings in outdoor applications experience accelerated degradation due to exposure to solar radiation, oxygen and atmospheric pollutants. These deleterious agents cause undesirable changes to the aesthetic and mechanical properties of the polymer, reducing its lifetime. The use of antioxidants such as hindered amine light stabilisers (HALS) retards these degradative processes; however, mechanisms for HALS action and polymer degradation are poorly understood. METHODS: Detection of the HALS TINUVINW123 (bis(1-octyloxy-2,2,6,6-tetramethyl-4-piperidyl) sebacate) and the polymer degradation products directly from a polyester-based coil coating was achieved by liquid extraction surface analysis (LESA) coupled to a triple quadrupole QTRAPW 5500 mass spectrometer. The detection of TINUVINW123 and melamine was confirmed by the characteristic fragmentation pattern observed in LESA-MS/MS spectra that was identical to that reported for authentic samples. RESULTS: Analysis of an unstabilised coil coating by LESA-MS after exposure to 4 years of outdoor field testing revealed the presence of melamine (1,3,5-triazine-2,4,6-triamine) as a polymer degradation product at elevated levels. Changes to the physical appearance of the coil coating, including powder-like deposits on the coating's surface, were observed to coincide with melamine deposits and are indicative of the phenomenon known as polymer ' blooming'. CONCLUSIONS: For the first time, in situ detection of analytes from a thermoset polymer coating was accomplished without any sample preparation, providing advantages over traditional extraction-analysis approaches and some contemporary ambient MS methods. Detection of HALS and polymer degradation products such as melamine provides insight into the mechanisms by which degradation occurs and suggests LESA-MS is a powerful new tool for polymer analysis. Copyright (C) 2012 John Wiley & Sons, Ltd.
Resumo:
MADS-box genes similar to Arabidopsis SHORT VEGETATIVE PHASE (SVP) have been implicated in the regulation of flowering in annual species and bud dormancy in perennial species. Kiwifruit (Actinidia spp.) are woody perennial vines where bud dormancy and out-growth affect flower development. To determine the role of SVP-like genes in dormancy and flowering of kiwifruit, four MADS-box genes with homology to Arabidopsis SVP, designated SVP1, SVP2, SVP3, and SVP4, have been identified and analysed in kiwifruit and functionally characterized in Arabidopsis. Phylogenetic analysis indicate that these genes fall into different sub-clades within the SVP-like gene group, suggesting distinct functions. Expression was generally confined to vegetative tissues, and increased transcript accumulation in shoot buds over the winter period suggests a role for these genes in bud dormancy. Down-regulation before flower differentiation indicate possible roles as floral repressors. Over-expression and complementation studies in Arabidopsis resulted in a range of floral reversion phenotypes arising from interactions with Arabidopsis MADS-box proteins, but only SVP1 and SVP3 were able to complement the svp mutant. These results suggest that the kiwifruit SVP-like genes may have distinct roles during bud dormancy and flowering.
Resumo:
Currently, open circuit Bayer refineries pump seawater directly into their operations to neutralize the caustic fraction of the Bayer residue. The resulting supernatant has a reduced pH and is pumped back to the marine environment. This investigation has assessed modified seawater sources generated from nanofiltration processes to compare their relative capacities to neutralize bauxite residues. An assessment of the chemical stability of the neutralization products, neutralization efficiency, discharge water quality, bauxite residue composition, and associated economic benefits have been considered to determine the most preferable seawater filtration process based on implementation costs, savings to operations and environmental benefits. The mechanism of neutralization for each technology was determined to be predominately due to the formation of Bayer hydrotalcite and calcium carbonate, however variations in neutralization capacity and efficiencies have been observed. The neutralization efficiency of each feed source has been found to be dependent on the concentration of magnesium, aluminium, calcium and carbonate. Nanofiltered seawater with approximately double the amount of magnesium and calcium required half the volume of seawater to achieve the same degree of neutralization. These studies have revealed that multiple neutralization steps occur throughout the process using characterization techniques such as X-ray diffraction (XRD), infrared (IR) spectroscopy and inductively coupled plasma optical emission spectroscopy (ICP-OES).
Resumo:
Metabolic cooperation mediated by secreted factors between Sertoli cells and peritubular myoid cells has been well documented. We have confirmed that factors secreted by peritubular myoid cells modulate androgen-binding protein (ABP) secretion by Sertoli cells and shown further that this can also be achieved with peritubular myoid cell extracellular matrix (ECM). While peritubular myoid cell ECM potentiated the stimulatory effect of dibutyryl cyclic AMP on Sertoli cell ABP secretion, secreted factors did not, suggesting that the two components influence Sertoli cells through distinct mechanisms. We also tested other factors and other cell lines for effects on ABP production by Sertoli cells. The addition of human plasma fibronectin or conditioned medium from the basement membrane-producing Englebreth-Holm- Swarm sarcoma also stimulated ABP secretion by Sertoli cells. Cocultures of epithelial Sertoli cells with the cells of mesenchymal origin, such as testicular peritubular myoid cells, embryonic skin fibroblasts, and bladder smooth muscle cells, significantly stimulated ABP secretion by Sertoli cells, but co-culture with the epithelial-derived Martin-Darby canine kidney cell line had no effect on Sertoli cell-secreted ABP levels. Our data further define the epithelial-mesenchymal cell interaction that exists between Sertoli cells and peritubular myoid cells in the mammalian testis.
Resumo:
We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.
Resumo:
A novel gray-box neural network model (GBNNM), including multi-layer perception (MLP) neural network (NN) and integrators, is proposed for a model identification and fault estimation (MIFE) scheme. With the GBNNM, both the nonlinearity and dynamics of a class of nonlinear dynamic systems can be approximated. Unlike previous NN-based model identification methods, the GBNNM directly inherits system dynamics and separately models system nonlinearities. This model corresponds well with the object system and is easy to build. The GBNNM is embedded online as a normal model reference to obtain the quantitative residual between the object system output and the GBNNM output. This residual can accurately indicate the fault offset value, so it is suitable for differing fault severities. To further estimate the fault parameters (FPs), an improved extended state observer (ESO) using the same NNs (IESONN) from the GBNNM is proposed to avoid requiring the knowledge of ESO nonlinearity. Then, the proposed MIFE scheme is applied for reaction wheels (RW) in a satellite attitude control system (SACS). The scheme using the GBNNM is compared with other NNs in the same fault scenario, and several partial loss of effect (LOE) faults with different severities are considered to validate the effectiveness of the FP estimation and its superiority.
Resumo:
Construction product innovation can exert a positive influence on project and industry performance. However, guidance is scarce on product innovation diffusion for road infrastructure, in contrast to the large body of literature on the manufacturing industry. A conceptual framework is proposed to understand these processes. Advice is given to managers based on the framework and a large quantitative survey. The framework focuses on contextual characteristics that influence the decision to adopt new-to-industry product innovation, as part of a diffusion process. Case study data are interpreted within the revised framework to test its value and disaggregate the broad obstacles to innovation. A large quantitative survey was then conducted to rank the relative importance of the obstacles constraining the adoption of innovative products on road construction projects. The three most important obstacles were found to be: (1) overemphasis on up-front project costs during tender stage; (2) disagreement over who carries the risk of new product failure; and (3) adversarial contract relations. The results suggest refinements to the conceptual framework to make it a more powerful tool for categorizing and analysing construction innovation obstacles. Results also suggest well-resourced repeat interactions within complementary procurement and regulatory systems will enhance the project teams’ ability to recognize and address innovation obstacles. Further, improved relationships are expected to decrease the need for an overly conservative approach to product approval and prescriptive specifications.
Resumo:
The conversion of one-way polyethylene terephthalate (PET) bottles into reusable bottles helps reduce environmental burden. Recently, the Ministry of the Environment in Japan began discussing the introduction of reusable bottles. One of the barriers to introducing the new type of bottle is consumer unwillingness to accept refilled reusable bottles. We administered the questionnaires to consumers in a pilot test on reusable PET bottles organized to analyze the demand for these products. To increase the demand for refilled reusable bottles, it is necessary to supply refilled reusable bottles that are acceptable to consumers who are concerned about container flaws and stains.