234 resultados para signature splitting
Resumo:
Aim Evidence linking the accumulation of exotic species to the suppression of native diversity is equivocal, often relying on data from studies that have used different methods. Plot-level studies often attribute inverse relationships between native and exotic diversity to competition, but regional abiotic filters, including anthropogenic influences, can produce similar patterns.We seek to test these alternatives using identical scale-dependent sampling protocols in multiple grasslands on two continents. Location Thirty-two grassland sites in North America and Australia. Methods We use multiscale observational data, collected identically in grain and extent at each site, to test the association of local and regional factors with the plot-level richness and abundance of native and exotic plants. Sites captured environmental and anthropogenic gradients including land-use intensity, human population density, light and soil resources, climate and elevation. Site selection occurred independently of exotic diversity, meaning that the numbers of exotic species varied randomly thereby reducing potential biases if only highly invaded sites were chosen. Results Regional factors associated directly or indirectly with human activity had the strongest associations with plot-level diversity. These regional drivers had divergent effects: urban-based economic activity was associated with high exotic : native diversity ratios; climate- and landscape-based indicators of lower human population density were associated with low exotic : native ratios. Negative correlations between plot-level native and exotic diversity, a potential signature of competitive interactions, were not prevalent; this result did not change along gradients of productivity or heterogeneity. Main conclusion We show that plot-level diversity of native and exotic plants are more consistently associatedwith regional-scale factors relating to urbanization and climate suitability than measures indicative of competition. These findings clarify the long-standing difficulty in resolving drivers of exotic diversity using single-factor mechanisms, suggesting that multiple interacting anthropogenic-based processes best explain the accumulation of exotic diversity in modern landscapes.
Resumo:
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead and computing efficiency are two parameters to be taken into account when designing a multicast stream protocol. In this paper, we propose to use two families of erasure codes to deal with this problem, namely, rateless codes and maximum distance separable codes. Our constructions will have the following advantages. First, our packet overhead will be small. Second, the number of signature verifications to be performed at the receiver is O(1). Third, every receiver will be able to recover all the original data packets emitted by the sender despite losses and injection occurred during the transmission of information.
Resumo:
The primary motivation for signcryption was the gain in efficiency when both encryption and signing need to be performed. These two cryptographic operations may be done sequentially either by first encrypt and then sign (EtS) or alternatively, by first sign and then encrypt (StE). Further gains in efficiency can be achieved if encryption and signature are carried out in parallel (E&S). More importantly, however, is that these efficiency gains are complemented by gains in security, i.e., we may use relative weak encryption and signature schemes in order to obtain a “stronger” signcryption scheme. The reader is referred to Chaps. 2 and 3 for a discussion of the different “strengths” of security model (e.g., outsider vs. insider adversaries, two-user vs. multi-user setting).
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.
Resumo:
Automated process discovery techniques aim at extracting process models from information system logs. Existing techniques in this space are effective when applied to relatively small or regular logs, but generate spaghetti-like and sometimes inaccurate models when confronted to logs with high variability. In previous work, trace clustering has been applied in an attempt to reduce the size and complexity of automatically discovered process models. The idea is to split the log into clusters and to discover one model per cluster. This leads to a collection of process models – each one representing a variant of the business process – as opposed to an all-encompassing model. Still, models produced in this way may exhibit unacceptably high complexity and low fitness. In this setting, this paper presents a two-way divide-and-conquer process discovery technique, wherein the discovered process models are split on the one hand by variants and on the other hand hierarchically using subprocess extraction. Splitting is performed in a controlled manner in order to achieve user-defined complexity or fitness thresholds. Experiments on real-life logs show that the technique produces collections of models substantially smaller than those extracted by applying existing trace clustering techniques, while allowing the user to control the fitness of the resulting models.
Resumo:
Small S-T splitting : The photoelectron spectrum of the oxyallyl radical anion (see picture) reveals that the electronic ground state of oxyallyl is singlet, and the lowest triplet state is separated from the singlet state by only (55 ± 2) meV in adiabatic energy.
Resumo:
Aground-based tracking camera and coaligned slitless spectrograph were used to measure the spectral signature of visible radiation emitted from the Hayabusa capsule as it entered into the Earth’s atmosphere in June 2010. Good quality spectra were obtained, which showed the presence of radiation from the heat shield of the vehicle and the shock-heated air in front of the vehicle. An analysis of the blackbody nature of the radiation concluded that the peak average temperature of the surface was about (3100± 100)K. Line spectra from oxygen and nitrogen atoms were used to infer a peak average shock-heated gas temperature of around((7000±400))K.
Resumo:
The field of research of epithelial-mesenchymal transitions, EMT, and its reverse, mesenchymal-epithelial transitions, MET, has expanded very rapidly indeed from its beginnings, heralded by Professor Betty Hay in the 1970s and 1980s. This expansion has involved the realisation that the EMT was not just an interesting phenomenon of early developmental morphogenetic cell behaviour, but bore remarkable resemblance to clinically crucial pathological events in cancer invasion. Not surprisingly, this discipline soon became numerically dominant in the EMT publication field. Simultaneously, the EMT concept has been extended to normal physiological wound healing. Exploration revealed that these resemblances were more than skin deep: the same sets of growth factors, receptors, transcription factors, epigenetic marks and signalling pathways turned up repeatedly in EMTs and METs in a variety of contexts, both pathological and normal. This molecular genetic research in turn uncovered similarities of the EMT signature to that of fibrosis, a set of diseases which is of enormous clinical importance, rivalling that of cancer. Most recently, and more surprisingly, the EMT signature has shown considerable similarity to that found in stem cell and cancer stem cell biology.
Resumo:
Introduction The dose to skin surface is an important factor for many radiotherapy treatment techniques. It is known that TPS predicted surface doses can be significantly different from actual ICRP skin doses as defined at 70 lm. A number of methods have been implemented for the accurate determination of surface dose including use of specific dosimeters such as TLDs and radiochromic film as well as Monte Carlo calculations. Stereotactic radiosurgery involves delivering very high doses per treatment fraction using small X-ray fields. To date, there has been limited data on surface doses for these very small field sizes. The purpose of this work is to evaluate surface doses by both measurements and Monte Carlo calculations for very small field sizes. Methods All measurements were performed on a Novalis Tx linear accelerator which has a 6 MV SRS X-ray beam mode which uses a specially thin flattening filter. Beam collimation was achieved by circular cones with apertures that gave field sizes ranging from 4 to 30 mm at the isocentre. The relative surface doses were measured using Gafchromic EBT3 film which has the active layer at a depth similar to the ICRP skin dose depth. Monte Carlo calculations were performed using the BEAMnrc/EGSnrc Monte Carlo codes (V4 r225). The specifications of the linear accelerator, including the collimator, were provided by the manufacturer. Optimisation of the incident X-ray beam was achieved by an iterative adjustment of the energy, spatial distribution and radial spread of the incident electron beam striking the target. The energy cutoff parameters were PCUT = 0.01 MeV and ECUT = 0.700 - MeV. Directional bremsstrahlung splitting was switched on for all BEAMnrc calculations. Relative surface doses were determined in a layer defined in a water phantom of the same thickness and depth as compared to the active later in the film. Results Measured surface doses using the EBT3 film varied between 13 and 16 % for the different cones with an uncertainty of 3 %. Monte Carlo calculated surface doses were in agreement to better than 2 % to the measured doses for all the treatment cones. Discussion and conclusions This work has shown the consistency of surface dose measurements using EBT3 film with Monte Carlo predicted values within the uncertainty of the measurements. As such, EBT3 film is recommended for in vivo surface dose measurements.
Resumo:
Person re-identification is particularly challenging due to significant appearance changes across separate camera views. In order to re-identify people, a representative human signature should effectively handle differences in illumination, pose and camera parameters. While general appearance-based methods are modelled in Euclidean spaces, it has been argued that some applications in image and video analysis are better modelled via non-Euclidean manifold geometry. To this end, recent approaches represent images as covariance matrices, and interpret such matrices as points on Riemannian manifolds. As direct classification on such manifolds can be difficult, in this paper we propose to represent each manifold point as a vector of similarities to class representers, via a recently introduced form of Bregman matrix divergence known as the Stein divergence. This is followed by using a discriminative mapping of similarity vectors for final classification. The use of similarity vectors is in contrast to the traditional approach of embedding manifolds into tangent spaces, which can suffer from representing the manifold structure inaccurately. Comparative evaluations on benchmark ETHZ and iLIDS datasets for the person re-identification task show that the proposed approach obtains better performance than recent techniques such as Histogram Plus Epitome, Partial Least Squares, and Symmetry-Driven Accumulation of Local Features.
Resumo:
Epithelial mesenchymal transition (EMT) has long been associated with breast cancer cell invasiveness and evidence of EMT processes in clinical samples is growing rapidly. Genome-wide transcriptional profiling of increasingly larger numbers of human breast cancer (HBC) cell lines have confirmed the existence of a subgroup of cell lines (termed Basal B/Mesenchymal) with enhanced invasive properties and a predominantly mesenchymal gene expression signature, distinct from subgroups with predominantly luminal (termed Luminal) or mixed basal/luminal (termed Basal A) features (Neve et al Cancer Cell 2006). Studies providing molecular and cellular analyses of EMT features in these cell lines are summarised, and the expression levels of EMT-associated factors in these cell lines are analysed. Recent clinical studies supporting the presence of EMT-like changes in vivo are summarised. Human breast cancer cell lines with mesenchymal properties continue to hold out the promise of directing us towards key mechanisms at play in the metastatic dissemination of breast cancer.
Common origins of MDA-MB-435 cells from various sources with those shown to have melanoma properties
Resumo:
Recently, the tissue origin of MDA-MB-435 cell line has been the subject of considerable debate. In this study, we set out to determine whether MDA-MB-435-DTP cells shown to express melanoma-specific genes were identical to various other MDA-MB-435 cell stocks worldwide. CGH-microarray, genetic polymorphism genotyping, microsatellite fingerprint analysis and/or chromosomal number confirmed that the MDA-MB-435 cells maintained at the Lombardi Comprehensive Cancer Center (MDA-MB-435-LCC) are almost identical to the MDA-MB-435-DTP cells, and showed a very similar profile to those obtained from the same original source (MD Anderson Cancer Center) but maintained independently (MDA-MB-435-PMCC). Gene expression profile analy-sis confirmed common expression of genes among different MDA-MB-435-LCC cell stocks, and identified some unique gene products in MDA-MB-435-PMCC cells. RT-PCR analysis confirmed the expression of the melanoma marker tyrosinase across multiple MDA-MB-435 cell stocks. Collectively, our results show that the MDA-MB-435 cells used widely have identical origins to those that exhibit a melanoma-like gene expression signature, but exhibit a small degree of genotypic and phenotypic drift.
Resumo:
Modulation and control of a cascade multilevel static synchronous compensator (STATCOM) configuration to improve the quality of voltage generated by wind power systems are presented. The proposed STATCOM configuration needs only four dc-link capacitors and 24 switches to synthesise nine-level operation. In addition to that, switching losses are further reduced by splitting the voltage source inverter of the STATCOM into two units called the `bulk inverter` and the `conditioning inverter`. The high-power bulk inverter is operated at low frequency whereas the low-power conditioning inverter is operated at high frequency to suppress harmonics produced by the bulk inverter. Fluctuations at the point of common coupling voltage, caused by sudden wind changes, are suppressed by controlling reactive power of the STATCOM. Simulation and experimental results are presented to verify the efficacy of the proposed modulation and control techniques used in the STATCOM.
Resumo:
We review here the recently emerging relationship between epithelial-mesenchymal transition (EMT) and breast cancer stem cells (BCSC), and provide analyses of published data on human breast cancer cell lines, supporting their utility as a model for the EMT/BCSC state. Genome-wide transcriptional profiling of these cell lines has confirmed the existence of a subgroup with mesenchymal tendencies and enhanced invasive properties ('Basal B'/Mesenchymal), distinct from subgroups with either predominantly luminal ('Luminal') or mixed basal/luminal ('Basal A') features (Neve et al. Cancer Cell, 2006). A literature-derived EMT gene signature has shown specific enrichment within the Basal B subgroup of cell lines, consistent with their over-expression of various EMT transcriptional drivers. Basal B cell lines are found to resemble BCSC, being CD44highCD24low. Moreover, gene products that distinguish Basal B from Basal A and Luminal cell lines (Basal B Discriminators) showed close concordance with those that define BCSC isolated from clinical material, as reported by Shipitsin et al. (Cancer Cell, 2007). CD24 mRNA levels varied across Basal B cell lines, correlating with other Basal B Discriminators. Many gene products correlating with CD24 status in Basal B cell lines were also differentially expressed in isolated BCSC. These findings confirm and extend the importance of the cellular product of the EMT with Basal B cell lines, and illustrate the value of analysing these cell lines for new leads that may improve breast cancer outcomes. Gene products specific to Basal B cell lines may serve as tools for the detection, quantification, and analysis of BCSC/EMT attributes.
Resumo:
The particle size, morphology, crystallinity order and structural defects of four kaolinite samples are characterized by the techniques including particle size analysis, scanning electron microscopy (SEM), X-ray diffraction (XRD), Raman spectroscopy, Fourier transform infrared spectroscopy (FTIR) and magic angle spinning nuclear magnetic resonance spectroscopy (MAS NMR). The particle size of four kaolinite samples gradually increases. Four samples all belong to the ordered kaolinite and show a decrease in structural order with the increase of kaolinite particle size. The changes of structural defect are proved by the increase of the band splitting in Raman spectroscopy, the decrease of the intensity of absorption bands in infrared spectroscopy, and the decrease of equivalent silicon atom and the increase of nonequivalent aluminum atom in MAS NMR spectroscopy. The differences in morphology and structural defect are attributed to the broken bonds of Al–O–Si, Al–O–Al and Si–O–Si and the Al substitution for Si in tetrahedral sheets.