267 resultados para Blind Source Separation
Resumo:
Background Mycobacterium abscessus is a rapidly growing mycobacterium responsible for progressive pulmonary disease, soft tissue and wound infections. The incidence of disease due to M. abscessus has been increasing in Queensland. In a study of Brisbane drinking water, M. abscessus was isolated from ten different locations. The aim of this study was to compare genotypically the M. abscessus isolates obtained from water to those obtained from human clinical specimens. Methods Between 2007 and 2009, eleven isolates confirmed as M. abscessus were recovered from potable water, one strain was isolated from a rainwater tank and another from a swimming pool and two from domestic taps. Seventy-four clinical isolates referred during the same time period were available for comparison using rep-PCR strain typing (Diversilab). Results The drinking water isolates formed two clusters with ≥97% genetic similarity (Water patterns 1 and 2). The tankwater isolate (WP4), one municipal water isolate (WP3) and the pool isolate (WP5) were distinctly different. Patient isolates formed clusters with all of the water isolates except for WP3. Further patient isolates were unrelated to the water isolates. Conclusion The high degree of similarity between strains of M. abscessus from potable water and strains causing infection in humans from the same geographical area, strengthens the possibility that drinking water may be the source of infection in these patients.
Resumo:
Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting the vulnerabilities of people, the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” While technology-based security has been addressed by research and may be well understood, social engineering is more challenging to understand and manage, especially in new environments such as SNSs, owing to some factors of SNSs that reduce the ability of users to detect the attack and increase the ability of attackers to launch it. This work will contribute to the knowledge of social engineering by presenting the first two conceptual models of social engineering attacks in SNSs. Phase-based and source-based models are presented, along with an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.
Resumo:
Background Indigenous children in high-income countries have a heavy burden of bronchiectasis unrelated to cystic fibrosis. We aimed to establish whether long-term azithromycin reduced pulmonary exacerbations in Indigenous children with non-cystic-fibrosis bronchiectasis or chronic suppurative lung disease. Methods Between Nov 12, 2008, and Dec 23, 2010, we enrolled Indigenous Australian, Maori, and Pacific Island children aged 1—8 years with either bronchiectasis or chronic suppurative lung disease into a multicentre, double-blind, randomised, parallel-group, placebo-controlled trial. Eligible children had had at least one pulmonary exacerbation in the previous 12 months. Children were randomised (1:1 ratio, by computer-generated sequence with permuted block design, stratified by study site and exacerbation frequency [1—2 vs ≥3 episodes in the preceding 12 months]) to receive either azithromycin (30 mg/kg) or placebo once a week for up to 24 months. Allocation concealment was achieved by double-sealed, opaque envelopes; participants, caregivers, and study personnel were masked to assignment until after data analysis. The primary outcome was exacerbation (respiratory episodes treated with antibiotics) rate. Analysis of the primary endpoint was by intention to treat. At enrolment and at their final clinic visits, children had deep nasal swabs collected, which we analysed for antibiotic-resistant bacteria. This study is registered with the Australian New Zealand Clinical Trials Registry; ACTRN12610000383066. Findings 45 children were assigned to azithromycin and 44 to placebo. The study was stopped early for feasibility reasons on Dec 31, 2011, thus children received the intervention for 12—24 months. The mean treatment duration was 20·7 months (SD 5·7), with a total of 902 child-months in the azithromycin group and 875 child-months in the placebo group. Compared with the placebo group, children receiving azithromycin had significantly lower exacerbation rates (incidence rate ratio 0·50; 95% CI 0·35—0·71; p<0·0001). However, children in the azithromycin group developed significantly higher carriage of azithromycin-resistant bacteria (19 of 41, 46%) than those receiving placebo (four of 37, 11%; p=0·002). The most common adverse events were non-pulmonary infections (71 of 112 events in the azithromycin group vs 132 of 209 events in the placebo group) and bronchiectasis-related events (episodes or investigations; 22 of 112 events in the azithromycin group vs 48 of 209 events in the placebo group); however, study drugs were well tolerated with no serious adverse events being attributed to the intervention. Interpretation Once-weekly azithromycin for up to 24 months decreased pulmonary exacerbations in Indigenous children with non-cystic-fibrosis bronchiectasis or chronic suppurative lung disease. However, this strategy was also accompanied by increased carriage of azithromycin-resistant bacteria, the clinical consequences of which are uncertain, and will need careful monitoring and further study.
Resumo:
Recent analyses of National Crime Victimization Survey (NCVS) data show that male-to-female separation/divorce assault varies across geographic regions in the United States, with rural rates of such woman abuse being higher than those for suburban and urban areas. Using the same data set, the main objective of this paper is to present the results of an investigation into whether characteristics of female victims of separation/divorce assault also differ across urban, suburban, and rural communities.
Resumo:
To obtain accurate Monte Carlo simulations of small radiation fields, it is important model the initial source parameters (electron energy and spot size) accurately. However recent studies have shown that small field dosimetry correction factors are insensitive to these parameters. The aim of this work is to extend this concept to test if these parameters affect dose perturbations in general, which is important for detector design and calculating perturbation correction factors. The EGSnrc C++ user code cavity was used for all simulations. Varying amounts of air between 0 and 2 mm were deliberately introduced upstream to a diode and the dose perturbation caused by the air was quantified. These simulations were then repeated using a range of initial electron energies (5.5 to 7.0 MeV) and electron spot sizes (0.7 to 2.2 FWHM). The resultant dose perturbations were large. For example 2 mm of air caused a dose reduction of up to 31% when simulated with a 6 mm field size. However these values did not vary by more than 2 % when simulated across the full range of source parameters tested. If a detector is modified by the introduction of air, one can be confident that the response of the detector will be the same across all similar linear accelerators and the Monte Carlo modelling of each machine is not required.
Resumo:
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipients receive linear combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious node floods the network with bad packets and prevents the receiver from decoding correctly. Cryptographic defenses to these problems are based on homomorphic signatures and MACs. These proposals, however, cannot handle mixing of packets from multiple sources, which is needed to achieve the full benefits of network coding. In this paper we address integrity of multi-source mixing. We propose a security model for this setting and provide a generic construction.
Resumo:
There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to revert back to original relation from watermarked relation) and blindness (not needing the original relation for detection purpose) at the same time. This model has several disadvantages over reversible and blind watermarking (requiring only the watermarked relation and secret key from which the watermark is detected and the original relation is restored) including the inability to identify the rightful owner in case of successful secondary watermarking, the inability to revert the relation to the original data set (required in high precision industries) and the requirement to store the unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to a high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store the original database at a secure secondary storage. We have implemented our scheme and results show the success rate is limited to 11% even when 48% tuples are modified.
Resumo:
There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to revert back to original relation from watermarked relation) and blindness (not needing the original relation for detection purpose) at the same time. This model has several disadvantages over reversible and blind watermarking (requiring only the watermarked relation and secret key from which the watermark is detected and the original relation is restored) including the inability to identify the rightful owner in case of successful secondary watermarking, the inability to revert the relation to the original data set (required in high precision industries) and the requirement to store the unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to a high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store the original database at a secure secondary storage. We have implemented our scheme and results show the success rate is limited to 11% even when 48% tuples are modified.
Resumo:
M. fortuitum is a rapidly growing mycobacterium associated with community-acquired and nosocomial wound, soft tissue, and pulmonary infections. It has been postulated that water has been the source of infection especially in the hospital setting. The aim of this study was to determine if municipal water may be the source of community-acquired or nosocomial infections in the Brisbane area. Between 2007 and 2009, 20 strains of M. fortuitum were recovered from municipal water and 53 patients’ isolates were submitted to the reference laboratory. A wide variation in strain types was identified using repetitive element sequence-based PCR, with 13 clusters of ≥2 indistinguishable isolates, and 28 patterns consisting of individual isolates. The clusters could be grouped into seven similar groups (>95% similarity). Municipal water and clinical isolates collected during the same time period and from the same geographical area consisted of different strain types, making municipal water an unlikely source of sporadic human infection.
Resumo:
In this paper, we propose a new blind steganalytic method to detect the presence of secret messages embedded in black and white images using the steganographic techniques. We start by extracting several sets of matrix, such as run length matrix, gap length matrix and pixel difference. We also apply characteristic function on these matrices to enhance their discriminative capabilities. Then we calculate the statistics which include mean, variance, kurtosis and skewness to form our feature sets. The presented empirical works demonstrate our proposed method can effectively detect three different types of steganography. This proves the universality of our proposed method as a blind steganalysis. In addition, the experimental results show our proposed method is capable of detecting small amount of the embedded message.
Resumo:
Background Preliminary research shows ginger may be an effective adjuvant treatment for chemotherapy-induced nausea and vomiting but significant limitations need to be addressed before recommendations for clinical practice can be made. Methods/Design In a double–blinded randomised-controlled trial, chemotherapy-naïve patients will be randomly allocated to receive either 1.2 g of a standardised ginger extract or placebo per day. The study medication will be administrated as an adjuvant treatment to standard anti-emetic therapy and will be divided into four capsules per day, to be consumed approximately every 4 hours (300 mg per capsule administered q.i.d) for five days during the first three cycles of chemotherapy. Acute, delayed, and anticipatory symptoms of nausea and vomiting will be assessed over this time frame using a valid and reliable questionnaire, with nausea symptoms being the primary outcome. Quality of life, nutritional status, adverse effects, patient adherence, cancer-related fatigue, and CINV-specific prognostic factors will also be assessed. Discussion Previous trials in this area have noted limitations. These include the inconsistent use of standardized ginger formulations and valid questionnaires, lack of control for anticipatory nausea and prognostic factors that may influence individual CINV response, and the use of suboptimal dosing regimens. This trial is the first to address these issues by incorporating multiple unique additions to the study design including controlling for CINV-specific prognostic factors by recruiting only chemotherapy-naïve patients, implementing a dosing schedule consistent with the pharmacokinetics of oral ginger supplements, and independently analysing ginger supplements before and after recruitment to ensure potency. Our trial will also be the first to assess the effect of ginger supplementation on cancer-related fatigue and nutritional status. Chemotherapy-induced nausea and vomiting are distressing symptoms experienced by oncology patients; this trial will address the significant limitations within the current literature and in doing so, will investigate the effect of ginger supplementation as an adjuvant treatment in modulating nausea and vomiting symptoms. Trial registration
Resumo:
In this research, we introduce a new blind steganalysis in detecting grayscale JPEG images. Features-pooling method is employed to extract the steganalytic features and the classification is done by using neural network. Three different steganographic models are tested and classification results are compared to the five state-of-the-art blind steganalysis.
Resumo:
In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.
Resumo:
Database watermarking has received significant research attention in the current decade. Although, almost all watermarking models have been either irreversible (the original relation cannot be restored from the watermarked relation) and/or non-blind (requiring original relation to detect the watermark in watermarked relation). This model has several disadvantages over reversible and blind watermarking (requiring only watermarked relation and secret key from which the watermark is detected and original relation is restored) including inability to identify rightful owner in case of successful secondary watermarking, inability to revert the relation to original data set (required in high precision industries) and requirement to store unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store original database at a secure secondary storage.
Resumo:
In this Article, Petia Wohed, Arthur H. M. ter Hofstede, Nick Russell, Birger Andersson, and Wil M. P. van der Aalst present the results of their examination of existing open source BPM systems. Their conclusions are illuminating for both Open Source developers as well as the user community. Read their Article for the details of their study.