300 resultados para Algebraic attack


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we analyse two variants of SIMON family of light-weight block ciphers against variants of linear cryptanalysis and present the best linear cryptanalytic results on these variants of reduced-round SIMON to date. We propose a time-memory trade-off method that finds differential/linear trails for any permutation allowing low Hamming weight differential/linear trails. Our method combines low Hamming weight trails found by the correlation matrix representing the target permutation with heavy Hamming weight trails found using a Mixed Integer Programming model representing the target differential/linear trail. Our method enables us to find a 17-round linear approximation for SIMON-48 which is the best current linear approximation for SIMON-48. Using only the correlation matrix method, we are able to find a 14-round linear approximation for SIMON-32 which is also the current best linear approximation for SIMON-32. The presented linear approximations allow us to mount a 23-round key recovery attack on SIMON-32 and a 24-round Key recovery attack on SIMON-48/96 which are the current best results on SIMON-32 and SIMON-48. In addition we have an attack on 24 rounds of SIMON-32 with marginal complexity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction Two symposia on “cardiovascular diseases and vulnerable plaques” Cardiovascular disease (CVD) is the leading cause of death worldwide. Huge effort has been made in many disciplines including medical imaging, computational modeling, bio- mechanics, bioengineering, medical devices, animal and clinical studies, population studies as well as genomic, molecular, cellular and organ-level studies seeking improved methods for early detection, diagnosis, prevention and treatment of these diseases [1-14]. However, the mechanisms governing the initiation, progression and the occurrence of final acute clinical CVD events are still poorly understood. A large number of victims of these dis- eases who are apparently healthy die suddenly without prior symptoms. Available screening and diagnostic methods are insufficient to identify the victims before the event occurs [8,9]. Most cardiovascular diseases are associated with vulnerable plaques. A grand challenge here is to develop new imaging techniques, predictive methods and patient screening tools to identify vulnerable plaques and patients who are more vulnerable to plaque rupture and associated clinical events such as stroke and heart attack, and recommend proper treatment plans to prevent those clinical events from happening. Articles in this special issue came from two symposia held recently focusing on “Cardio-vascular Diseases and Vulnerable Plaques: Data, Modeling, Predictions and Clinical Applications.” One was held at Worcester Polytechnic Institute (WPI), Worcester, MA, USA, July 13-14, 2014, right after the 7th World Congress of Biomechanics. This symposium was endorsed by the World Council of Biomechanics, and partially supported by a grant from NIH-National Institute of Biomedical Image and Bioengineering. The other was held at Southeast University (SEU), Nanjing, China, April 18-20, 2014.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Rupture of atheromatous plaque is the major cause of stroke or heart attack. Considering that the cardiovascular system is a classic fatigue environment, plaque rupture was treated as a chronic fatigue crack growth process in this study. Fracture mechanics theory was introduced to describe the stress status at the crack tip and Paris' law was used to calculate the crack growth rate. The effect of anatomical variation of an idealized plaque cross-section model was investigated. The crack initiation was considered to be either at the maximum circumferential stress location or at any other possible locations around the lumen. Although the crack automatically initialized at the maximum circumferential stress location usually propagated faster than others, it was not necessarily the most critical location where the fatigue life reached its minimum. We found that the fatigue life was minimum for cracks initialized in the following three regions: the midcap zone, the shoulder zone, and the backside zone. The anatomical variation has a significant influence on the fatigue life. Either a decrease in cap thickness or an increase in lipid pool size resulted in a significant decrease in fatigue life. Comparing to the previously used stress analysis, this fatigue model provides some possible explanations of plaque rupture at a low stress level in a pulsatile cardiovascular environment, and the method proposed here may be useful for further investigation of the mechanism of plaque rupture based on in vivo patient data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Rupture of vulnerable atheromatous plaque in the carotid and coronary arteries often leads to stroke and heart attack respectively. The mechanism of blood flow and plaque rupture in stenotic arteries is still not fully understood. A three dimensional rigid wall model was solved under steady state conditions and unsteady conditions by assuming a time-varying inlet velocity profile to investigate the relative importance of axial forces and pressure drops in arteries with asymmetric stenosis. Flow-structure interactions were investigated for the same geometry and the results were compared with those retrieved with the corresponding 2D cross-section structural models. The Navier-Stokes equations were used as the governing equations for the fluid. The tube wall was assumed hyperelastic, homogeneous, isotropic and incompressible. The analysis showed that the three dimensional behavior of velocity, pressure and wall shear stress is in general very different from that predicted by cross-section models. Pressure drop across the stenosis was found to be much higher than shear stress. Therefore, pressure may be the more important mechanical trigger for plaque rupture other than shear stress, although shear stress is closely related to plaque formation and progression.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Rupture of vulnerable atheromatous plaque in the carotid and coronary arteries often leads to stroke and heart attack respectively. The role of calcium deposition and its contribution to plaque stability is controversial. This study uses both an idealized and a patient-specific model to evaluate the effect of a calcium deposit on the stress distribution within an atheromatous plaque. Methods: Using a finite-element method, structural analysis was performed on an idealized plaque model and the location of a calcium deposit within it was varied. In addition to the idealized model, in vivo high-resolution MR imaging was performed on 3 patients with carotid atheroma and stress distributions were generated. The individual plaques were chosen as they had calcium at varying locations with respect to the lumen and the fibrous cap. Results: The predicted maximum stress was increased by 47.5% when the calcium deposit was located in the thin fibrous cap in the model when compared with that in a model without a deposit. The result of adding a calcium deposit either to the lipid core or remote from the lumen resulted in almost no increase in maximal stress. Conclusion: Calcification at the thin fibrous cap may result in high stress concentrations, ultimately increasing the risk of plaque rupture. Assessing the location of calcification may, in the future, aid in the risk stratification of patients with carotid stenosis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recovering the motion of a non-rigid body from a set of monocular images permits the analysis of dynamic scenes in uncontrolled environments. However, the extension of factorisation algorithms for rigid structure from motion to the low-rank non-rigid case has proved challenging. This stems from the comparatively hard problem of finding a linear “corrective transform” which recovers the projection and structure matrices from an ambiguous factorisation. We elucidate that this greater difficulty is due to the need to find multiple solutions to a non-trivial problem, casting a number of previous approaches as alleviating this issue by either a) introducing constraints on the basis, making the problems nonidentical, or b) incorporating heuristics to encourage a diverse set of solutions, making the problems inter-dependent. While it has previously been recognised that finding a single solution to this problem is sufficient to estimate cameras, we show that it is possible to bootstrap this partial solution to find the complete transform in closed-form. However, we acknowledge that our method minimises an algebraic error and is thus inherently sensitive to deviation from the low-rank model. We compare our closed-form solution for non-rigid structure with known cameras to the closed-form solution of Dai et al. [1], which we find to produce only coplanar reconstructions. We therefore make the recommendation that 3D reconstruction error always be measured relative to a trivial reconstruction such as a planar one.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: The serotonergic system is thought to play an important role for mediating susceptibility to migraine and depression, which is frequently found comorbid in migraine. The functional polymorphism in the serotonin transporter gene linked polymorphic region (5-HTTLPR/SLC6A4) was previously associated with attack frequency and, thus, possibly with chronification. OBJECTIVE: We hypothesized that patients with the "s" allele have higher attack frequency and, paralleling results in depression research, higher scores of depression. METHODS: Genetic analysis of the SLC6A4 44 bp insertion/deletion polymorphism (5-HTTLPR) was performed in 293 patients with migraine with and without aura. Self-rating questionnaires were used for assessment of depression. RESULTS: Multinomial logistic regression analysis found no evidence for association of the 5-HTTLPR polymorphism with either depression or migraine attack frequency. CONCLUSION: We were not able to demonstrate any influence of the serotonin transporter 5-HTTLPR polymorphism on migraine phenomenology (attack frequency or comorbid depression), thereby excluding this variant to be a common genetic denominator for chronic migraine and depression.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Migraines are particularly common in young adults, with the prevalence reducing after the late 40s and early 50s years of age.1,2 Migraines are headaches that can have a throbbing or pulsating feeling, and often occur with nausea, vomiting, and sensitivity to light and sound. These headaches can last between a few hours to three days.1,3 They place a significant burden of disease on quality of life, and have a socio-economic impact through loss of productiveness and sick days.4 Most people report experiencing at least one migraine attack each month, with many reporting that migraine attacks interfered with their daily activities.2 Migraines have been ranked as the third most prevalent and seventh highest specific cause of disability around the world...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we analyse a block cipher mode of operation submitted in 2014 to the cryptographic competition for authenticated encryption (CAESAR). This mode is designed by Recacha and called ++AE (plus-plus-ae). We propose a chosen plaintext forgery attack on ++AE that requires only a single chosen message query to allow an attacker to construct multiple forged messages. Our attack is deterministic and guaranteed to pass ++AE integrity check. We demonstrate the forgery attack using 128-bit AES as the underlying block cipher. Hence, ++AE is insecure as an authenticated encryption mode of operation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A computational model for isothermal axisymmetric turbulent flow in a quarl burner is set up using the CFD package FLUENT, and numerical solutions obtained from the model are compared with available experimental data. A standard k-e model and and two versions of the RNG k-e model are used to model the turbulence. One of the aims of the computational study is to investigate whether the RNG based k-e turbulence models are capable of yielding improved flow predictions compared with the standard k-e turbulence model. A difficulty is that the flow considered here features a confined vortex breakdown which can be highly sensitive to flow behaviour both upstream and downstream of the breakdown zone. Nevertheless, the relatively simple confining geometry allows us to undertake a systematic study so that both grid-independent and domain-independent results can be reported. The systematic study includes a detailed investigation of the effects of upstream and downstream conditions on the predictions, in addition to grid refinement and other tests to ensure that numerical error is not significant. Another important aim is to determine to what extent the turbulence model predictions can provide us with new insights into the physics of confined vortex breakdown flows. To this end, the computations are discussed in detail with reference to known vortex breakdown phenomena and existing theories. A major conclusion is that one of the RNG k-e models investigated here is able to correctly capture the complex forward flow region inside the recirculating breakdown zone. This apparently pathological result is in stark contrast to the findings of previous studies, most of which have concluded that either algebraic or differential Reynolds stress modelling is needed to correctly predict the observed flow features. Arguments are given as to why an isotropic eddy-viscosity turbulence model may well be able to capture the complex flow structure within the recirculating zone for this flow setup. With regard to the flow physics, a major finding is that the results obtained here are more consistent with the view that confined vortex breakdown is a type of axisymmetric boundary layer separation, rather than a manifestation of a subcritical flow state.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Motivated by a problem from fluid mechanics, we consider a generalization of the standard curve shortening flow problem for a closed embedded plane curve such that the area enclosed by the curve is forced to decrease at a prescribed rate. Using formal asymptotic and numerical techniques, we derive possible extinction shapes as the curve contracts to a point, dependent on the rate of decreasing area; we find there is a wider class of extinction shapes than for standard curve shortening, for which initially simple closed curves are always asymptotically circular. We also provide numerical evidence that self-intersection is possible for non-convex initial conditions, distinguishing between pinch-off and coalescence of the curve interior.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We propose a keyless and lightweight message transformation scheme based on the combinatorial design theory for the confidentiality of a message transmitted in multiple parts through a network with multiple independent paths, or for data stored in multiple parts by a set of independent storage services such as the cloud providers. Our combinatorial scheme disperses a message into v output parts so that (k-1) or less parts do not reveal any information about any message part, and the message can only be recovered by the party who possesses all v output parts. Combinatorial scheme generates an xor transformation structure to disperse the message into v output parts. Inversion is done by applying the same xor transformation structure on output parts. The structure is generated using generalized quadrangles from design theory which represents symmetric point and line incidence relations in a projective plane. We randomize our solution by adding a random salt value and dispersing it together with the message. We show that a passive adversary with capability of accessing (k-1) communication links or storage services has no advantage so that the scheme is indistinguishable under adaptive chosen ciphertext attack (IND-CCA2).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Every year, approximately 62 000 people with stroke and transient ischemic attack are treated in Canadian hospitals, and the evidence suggests one-third or more will experience vascular-cognitive impairment, and/or intractable fatigue, either alone or in combination. The 2015 update of the Canadian Stroke Best Practice Recommendations: Mood, Cognition and Fatigue Module guideline is a comprehensive summary of current evidence-based recommendations for clinicians in a range of settings, who provide care to patients following stroke. The three consequences of stroke that are the focus of the this guideline (poststroke depression, vascular cognitive impairment, and fatigue) have high incidence rates and significant impact on the lives of people who have had a stroke, impede recovery, and result in worse long-term outcomes. Significant practice variations and gaps in the research evidence have been reported for initial screening and in-depth assessment of stroke patients for these conditions. Also of concern, an increased number of family members and informal caregivers may also experience depressive symptoms in the poststroke recovery phase which further impact patient recovery. These factors emphasize the need for a system of care that ensures screening occurs as a standard and consistent component of clinical practice across settings as stroke patients transition from acute care to active rehabilitation and reintegration into their community. Additionally, building system capacity to ensure access to appropriate specialists for treatment and ongoing management of stroke survivors with these conditions is another great challenge.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The brain's functional network exhibits many features facilitating functional specialization, integration, and robustness to attack. Using graph theory to characterize brain networks, studies demonstrate their small-world, modular, and "rich-club" properties, with deviations reported in many common neuropathological conditions. Here we estimate the heritability of five widely used graph theoretical metrics (mean clustering coefficient (γ), modularity (Q), rich-club coefficient (ϕnorm), global efficiency (λ), small-worldness (σ)) over a range of connection densities (k=5-25%) in a large cohort of twins (N=592, 84 MZ and 89 DZ twin pairs, 246 single twins, age 23±2.5). We also considered the effects of global signal regression (GSR). We found that the graph metrics were moderately influenced by genetic factors h2 (γ=47-59%, Q=38-59%, ϕnorm=0-29%, λ=52-64%, σ=51-59%) at lower connection densities (≤15%), and when global signal regression was implemented, heritability estimates decreased substantially h2 (γ=0-26%, Q=0-28%, ϕnorm=0%, λ=23-30%, σ=0-27%). Distinct network features were phenotypically correlated (|r|=0.15-0.81), and γ, Q, and λ were found to be influenced by overlapping genetic factors. Our findings suggest that these metrics may be potential endophenotypes for psychiatric disease and suitable for genetic association studies, but that genetic effects must be interpreted with respect to methodological choices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Body Area Network (BAN) is an emerging technology that focuses on monitoring physiological data in, on and around the human body. BAN technology permits wearable and implanted sensors to collect vital data about the human body and transmit it to other nodes via low-energy communication. In this paper, we investigate interactions in terms of data flows between parties involved in BANs under four different scenarios targeting outdoor and indoor medical environments: hospital, home, emergency and open areas. Based on these scenarios, we identify data flow requirements between BAN elements such as sensors and control units (CUs) and parties involved in BANs such as the patient, doctors, nurses and relatives. Identified requirements are used to generate BAN data flow models. Petri Nets (PNs) are used as the formal modelling language. We check the validity of the models and compare them with the existing related work. Finally, using the models, we identify communication and security requirements based on the most common active and passive attack scenarios.