60 resultados para aba autism


Relevância:

10.00% 10.00%

Publicador:

Resumo:

LEX is a stream cipher that progressed to Phase 3 of the eSTREAM stream cipher project. In this paper, we show that the security of LEX against algebraic attacks relies on a small equation system not being solvable faster than exhaustive search. We use the byte leakage in LEX to construct a system of 21 equa- tions in 17 variables. This is very close to the require- ment for an efficient attack, i.e. a system containing 16 variables. The system requires only 36 bytes of keystream, which is very low.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract Background Recent studies show that advanced paternal age (APA) is associated with an increased risk of neurodevelopmental disorders such as autism, bipolar disorder and schizophrenia. A body of evidence also suggests that individuals who develop schizophrenia show subtle deviations in a range of behavioural domains during their childhood. The aim of the study was to examine the relationship between paternal and maternal ages and selected behavioural measures in children using a large birth cohort. Method Participants were singleton children (n = 21,753) drawn from the US Collaborative Perinatal Project. The outcome measures were assessed at 7 years. The main analyses examined the relationship between parental age and behavioural measures when adjusted for a range of potentially confounding variables, including age of the other parent, maternal race, socio-economic measures, sex, gestation length, maternal marital status, parental mental illness, and child's age-at-testing. Results Advanced paternal age was associated with a significantly increased risk of adverse ‘externalizing’ behaviours at age seven years. For every five year increase in paternal age, the odds of higher ‘externalizing’ behaviours was increased by 12% (OR = 1.12; 95% CI = 1.03, 1.21, p < 0.0001). The relationship persisted after adjusting for potential confounding factors. ‘Internalizing’ behavioural outcome was not associated with advanced paternal age. In contrast, advanced maternal age was significantly protective against adverse ‘externalizing’ behavioural outcomes, but associated with an increased risk of adverse ‘internalizing’ behavioural outcomes. Discussion The offspring of older fathers show a distinctly different pattern of behaviours compared to the offspring of older mothers. The diverse socio-cultural and biologically-mediated factors that underpin these findings remain to be clarified. In light of secular trends related to delayed parenthood, the mechanisms underlying these findings warrant closer scrutiny.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Autistic Behavioural Indicators Instrument (ABII) is an 18-item instrument developed to identify children with Autistic Disorder (AD) based on the presence of unique autistic behavioural indicators. The ABII was administered to 20 children with AD, 20 children with speech and language impairment (SLI) and 20 typically developing (TD) children aged 2-6 years. Results indicated that the ABII discriminated children diagnosed with AD from those diagnosed with SLI and those who were TD, based on the presence of specific social attention, sensory, and behavioural symptoms. A combination of symptomology across these domains correctly classified 100% of children with and without AD. The paper concludes that the ABII shows considerable promise as an instrument for the early identification of AD.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Integral attacks are well-known to be effective against byte-based block ciphers. In this document, we outline how to launch integral attacks against bit-based block ciphers. This new type of integral attack traces the propagation of the plaintext structure at bit-level by incorporating bit-pattern based notations. The new notation gives the attacker more details about the properties of a structure of cipher blocks. The main difference from ordinary integral attacks is that we look at the pattern the bits in a specific position in the cipher block has through the structure. The bit-pattern based integral attack is applied to Noekeon, Serpent and present reduced up to 5, 6 and 7 rounds, respectively. This includes the first attacks on Noekeon and present using integral cryptanalysis. All attacks manage to recover the full subkey of the final round.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Plants have been identified as promising expression systems for the commercial production of recombinant proteins. Plant-based protein production or “biofarming” offers a number of advantages over traditional expression systems in terms of scale of production, the capacity for post-translation processing, providing a product free of contaminants and cost effectiveness. A number of pharmaceutically important and commercially valuable proteins, such as antibodies, biopharmaceuticals and industrial enzymes are currently being produced in plant expression systems. However, several challenges still remain to improve recombinant protein yield with no ill effect on the host plant. The ability for transgenic plants to produce foreign proteins at commercially viable levels can be directly related to the level and cell specificity of the selected promoter driving the transgene. The accumulation of recombinant proteins may be controlled by a tissue-specific, developmentally-regulated or chemically-inducible promoter such that expression of recombinant proteins can be spatially- or temporally- controlled. The strict control of gene expression is particularly useful for proteins that are considered toxic and whose expression is likely to have a detrimental effect on plant growth. To date, the most commonly used promoter in plant biotechnology is the cauliflower mosaic virus (CaMV) 35S promoter which is used to drive strong, constitutive transgene expression in most organs of transgenic plants. Of particular interest to researchers in the Centre for Tropical Crops and Biocommodities at QUT are tissue-specific promoters for the accumulation of foreign proteins in the roots, seeds and fruit of various plant species, including tobacco, banana and sugarcane. Therefore this Masters project aimed to isolate and characterise root- and seed-specific promoters for the control of genes encoding recombinant proteins in plant-based expression systems. Additionally, the effects of matching cognate terminators with their respective gene promoters were assessed. The Arabidopsis root promoters ARSK1 and EIR1 were selected from the literature based on their reported limited root expression profiles. Both promoters were analysed using the PlantCARE database to identify putative motifs or cis-acting elements that may be associated with this activity. A number of motifs were identified in the ARSK1 promoter region including, WUN (wound-inducible), MBS (MYB binding site), Skn-1, and a RY core element (seed-specific) and in the EIR1 promoter region including, Skn-1 (seed-specific), Box-W1 (fungal elicitor), Aux-RR core (auxin response) and ABRE (ABA response). However, no previously reported root-specific cis-acting elements were observed in either promoter region. To confirm root specificity, both promoters, and truncated versions, were fused to the GUS reporter gene and the expression cassette introduced into Arabidopsis via Agrobacterium-mediated transformation. Despite the reported tissue-specific nature of these promoters, both upstream regulatory regions directed constitutive GUS expression in all transgenic plants. Further, similar levels of GUS expression from the ARSK1 promoter were directed by the control CaMV 35S promoter. The truncated version of the EIR1 promoter (1.2 Kb) showed some differences in the level of GUS expression compared to the 2.2 Kb promoter. Therefore, this suggests an enhancer element is contained in the 2.2 Kb upstream region that increases transgene expression. The Arabidopsis seed-specific genes ATS1 and ATS3 were selected from the literature based on their seed-specific expression profiles and gene expression confirmed in this study as seed-specific by RT-PCR analysis. The selected promoter regions were analysed using the PlantCARE database in order to identify any putative cis elements. The seed-specific motifs GCN4 and Skn-1 were identified in both promoter regions that are associated with elevated expression levels in the endosperm. Additionaly, the seed-specific RY element and the ABRE were located in the ATS1 promoter. Both promoters were fused to the GUS reporter gene and used to transform Arabidopsis plants. GUS expression from the putative promoters was consitutive in all transgenic Arabidopsis tissue tested. Importantly, the positive control FAE1 seed-specific promoter also directed constitutive GUS expression throughout transgenic Arabidopsis plants. The constitutive nature seen in all of the promoters used in this study was not anticipated. While variations in promoter activity can be caused by a number of influencing factors, the variation in promoter activity observed here would imply a major contributing factor common to all plant expression cassettes tested. All promoter constructs generated in this study were based on the binary vector pCAMBIA2300. This vector contains the plant selection gene (NPTII) under the transcriptional control of the duplicated CaMV 35S promoter. This CaMV 35S promoter contains two enhancer domains that confer strong, constitutive expression of the selection gene and is located immediately upstream of the promoter-GUS fusion. During the course of this project, Yoo et al. (2005) reported that transgene expression is significantly affected when the expression cassette is located on the same T-DNA as the 35S enhancer. It was concluded, the trans-acting effects of the enhancer activate and control transgene expression causing irregular expression patterns. This phenomenon seems the most plausible reason for the constitutive expression profiles observed with the root- and seed-specific promoters assessed in this study. The expression from some promoters can be influenced by their cognate terminator sequences. Therefore, the Arabidopsis ARSK1, EIR1, ATS1 and ATS3 terminator sequences were isolated and incorporated into expression cassettes containing the GUS reporter gene under the control of their cognate promoters. Again, unrestricted GUS activity was displayed throughout transgenic plants transformed with these reporter gene fusions. As previously discussed constitutive GUS expression was most likely due to the trans-acting effect of the upstream CaMV 35S promoter in the selection cassette located on the same T-DNA. The results obtained in this study make it impossible to assess the influence matching terminators with their cognate promoters have on transgene expression profiles. The obvious future direction of research continuing from this study would be to transform pBIN-based promoter-GUS fusions (ie. constructs containing no CaMV 35S promoter driving the plant selection gene) into Arabidopsis in order to determine the true tissue specificity of these promoters and evaluate the effects of their cognate 3’ terminator sequences. Further, promoter truncations based around the cis-elements identified here may assist in determining whether these motifs are in fact involved in the overall activity of the promoter.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Theory-of-Mind has been defined as the ability to explain and predict human behaviour by imputing mental states, such as attention, intention, desire, emotion, perception and belief, to the self and others (Astington & Barriault, 2001). Theory-of-Mind study began with Piaget and continued through a tradition of meta-cognitive research projects (Flavell, 2004). A study by Baron-Cohen, Leslie and Frith (1985) of Theory-of-Mind abilities in atypically developing children reported major difficulties experienced by children with autism spectrum disorder (ASD) in imputing mental states to others. Since then, a wide range of follow-up research has been conducted to confirm these results. Traditional Theory-of-Mind research on ASD has been based on an either-or assumption that Theory-of-Mind is something one either possesses or does not. However, this approach fails to take account of how the ASD population themselves experience Theory-of-Mind. This paper suggests an alternative approach, Theory-of-Mind continuum model, to understand the Theory-of-Mind experience of people with ASD. The Theory-of-Mind continuum model will be developed through a comparison of subjective and objective aspects of mind, and phenomenal and psychological concepts of mind. This paper will demonstrate the importance of balancing qualitative and quantitative research methods in investigating the minds of people with ASD. It will enrich our theoretical understanding of Theory-of-Mind, as well as contain methodological implications for further studies in Theory-of-Mind

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines the algebraic cryptanalysis of small scale variants of the LEX-BES. LEX-BES is a stream cipher based on the Advanced Encryption Standard (AES) block cipher. LEX is a generic method proposed for constructing a stream cipher from a block cipher, initially introduced by Biryukov at eSTREAM, the ECRYPT Stream Cipher project in 2005. The Big Encryption System (BES) is a block cipher introduced at CRYPTO 2002 which facilitates the algebraic analysis of the AES block cipher. In this paper, experiments were conducted to find solution of the equation system describing small scale LEX-BES using Gröbner Basis computations. This follows a similar approach to the work by Cid, Murphy and Robshaw at FSE 2005 that investigated algebraic cryptanalysis on small scale variants of the BES. The difference between LEX-BES and BES is that due to the way the keystream is extracted, the number of unknowns in LEX-BES equations is fewer than the number in BES. As far as the author knows, this attempt is the first at creating solvable equation systems for stream ciphers based on the LEX method using Gröbner Basis computations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis is devoted to the study of linear relationships in symmetric block ciphers. A block cipher is designed so that the ciphertext is produced as a nonlinear function of the plaintext and secret master key. However, linear relationships within the cipher can still exist if the texts and components of the cipher are manipulated in a number of ways, as shown in this thesis. There are four main contributions of this thesis. The first contribution is the extension of the applicability of integral attacks from word-based to bitbased block ciphers. Integral attacks exploit the linear relationship between texts at intermediate stages of encryption. This relationship can be used to recover subkey bits in a key recovery attack. In principle, integral attacks can be applied to bit-based block ciphers. However, specific tools to define the attack on these ciphers are not available. This problem is addressed in this thesis by introducing a refined set of notations to describe the attack. The bit patternbased integral attack is successfully demonstrated on reduced-round variants of the block ciphers Noekeon, Present and Serpent. The second contribution is the discovery of a very small system of equations that describe the LEX-AES stream cipher. LEX-AES is based heavily on the 128-bit-key (16-byte) Advanced Encryption Standard (AES) block cipher. In one instance, the system contains 21 equations and 17 unknown bytes. This is very close to the upper limit for an exhaustive key search, which is 16 bytes. One only needs to acquire 36 bytes of keystream to generate the equations. Therefore, the security of this cipher depends on the difficulty of solving this small system of equations. The third contribution is the proposal of an alternative method to measure diffusion in the linear transformation of Substitution-Permutation-Network (SPN) block ciphers. Currently, the branch number is widely used for this purpose. It is useful for estimating the possible success of differential and linear attacks on a particular SPN cipher. However, the measure does not give information on the number of input bits that are left unchanged by the transformation when producing the output bits. The new measure introduced in this thesis is intended to complement the current branch number technique. The measure is based on fixed points and simple linear relationships between the input and output words of the linear transformation. The measure represents the average fraction of input words to a linear diffusion transformation that are not effectively changed by the transformation. This measure is applied to the block ciphers AES, ARIA, Serpent and Present. It is shown that except for Serpent, the linear transformations used in the block ciphers examined do not behave as expected for a random linear transformation. The fourth contribution is the identification of linear paths in the nonlinear round function of the SMS4 block cipher. The SMS4 block cipher is used as a standard in the Chinese Wireless LAN Wired Authentication and Privacy Infrastructure (WAPI) and hence, the round function should exhibit a high level of nonlinearity. However, the findings in this thesis on the existence of linear relationships show that this is not the case. It is shown that in some exceptional cases, the first four rounds of SMS4 are effectively linear. In these cases, the effective number of rounds for SMS4 is reduced by four, from 32 to 28. The findings raise questions about the security provided by SMS4, and might provide clues on the existence of a flaw in the design of the cipher.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work examines the algebraic cryptanalysis of small scale variants of the LEX-BES. LEX-BES is a stream cipher based on the Advanced Encryption Standard (AES) block cipher. LEX is a generic method proposed for constructing a stream cipher from a block cipher, initially introduced by Biryukov at eSTREAM, the ECRYPT Stream Cipher project in 2005. The Big Encryption System (BES) is a block cipher introduced at CRYPTO 2002 which facilitates the algebraic analysis of the AES block cipher. In this article, experiments were conducted to find solutions of equation systems describing small scale LEX-BES using Gröbner Basis computations. This follows a similar approach to the work by Cid, Murphy and Robshaw at FSE 2005 that investigated algebraic cryptanalysis on small scale variants of the BES. The difference between LEX-BES and BES is that due to the way the keystream is extracted, the number of unknowns in LEX-BES equations is fewer than the number in BES. As far as the authors know, this attempt is the first at creating solvable equation systems for stream ciphers based on the LEX method using Gröbner Basis computations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present several new observations on the SMS4 block cipher, and discuss their cryptographic significance. The crucial observation is the existence of fixed points and also of simple linear relationships between the bits of the input and output words for each component of the round functions for some input words. This implies that the non-linear function T of SMS4 does not appear random and that the linear transformation provides poor diffusion. Furthermore, the branch number of the linear transformation in the key scheduling algorithm is shown to be less than optimal. The main security implication of these observations is that the round function is not always non-linear. Due to this linearity, it is possible to reduce the number of effective rounds of SMS4 by four. We also investigate the susceptibility of SMS4 to further cryptanalysis. Finally, we demonstrate a successful differential attack on a slightly modified variant of SMS4. These findings raise serious questions on the security provided by SMS4.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A field survey of faba bean (Vicia [aba L.) for viruses in six Arab countries showed the presence of nine viruses. Bean leaf roll virus (BLRV), bean yellow mosaic virus (BYMV), broad bean mottle virus (BBMV) and to a lesser extent broad bean stain virus (BBSV) were the most common. When testing with ELISA 789 samples with symptoms suggestive of virus infection collected from Egypt, Lebanon, Morocco, Sudan, Syria and Tunisia, BBMV was detected in 203 samples, BBSV in 151, broad bean true mosaic virus (BBTMV) in 7, broad bean wilt virus (BBWV) in 47, BYMV in 314, cucumber mosaic virus (CMV) in 96, pea enation mosaic virus (PEMV) in 31, and pea seed-borne mosaic virus (PSbMV) in 49 samples. Identity of selected field isolates was confirmed by electron microscopy and host reaction studies. In a yield experiment, infection with BYMV, BBMV and BBSV 11 weeks after sowing (pre-flowering) led to 81, 54 and 84% yield loss, respectively. Inoculation with the same viruses 15 weeks after sowing (flowering) and 20 weeks after sowing (pod setting) led to 56, 84 and 18%, and 39, 37 and 18% yield loss, respectively.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is significant interest in Human-computer interaction methods that assist in the design of applications for use by children. Many of these approaches draw upon standard HCI methods,such as personas, scenarios, and probes. However, often these techniques require communication and kinds of thinking skills that are designer centred,which prevents children with Autism Spectrum Disorders or other learning and communication disabilities from being able to participate. This study investigates methods that might be used with children with ASD or other learning and communication disabilities to inspire the design of technology based intervention approaches to support their speech and language development. Similar to Iversen and Brodersen, we argue that children with ASD should not be treated as being in some way “cognitively incomplete”. Rather they are experts in their everyday lives and we cannot design future IT without involving them. However, how do we involve them Instead of beginning with HCI methods, we draw upon easy to use technologies and methods used in the therapy professions for child engagement, particularly utilizing the approaches of Hanen (2011) and Greenspan (1998). These approaches emphasize following the child’s lead and ensuring that the child always has a legitimate turn at a detailed level of interaction. In a pilot project, we have studied a child’s interactions with their parents about activities over which they have control – photos that they have taken at school on an iPad. The iPad was simple enough for this child with ASD to use and they enjoyed taking and reviewing photos. We use this small case study as an example of a child-led approach for a child with ASD. We examine interactions from this study in order to assess the possibilities and limitations of the child-led approach for supporting the design of technology based interventions to support speech and language development.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study investigates the effect of well-defined poly(dimethylsiloxane)-poly(ethylene glycol) (PDMS-PEG) ABA linear block co-oligomers on the proliferation of human dermal fibroblasts. The co-oligomers assessed ranged in molecular weight (MW) from 1335 to 5208 Da and hydrophilic-lipophilic balance (HLB) from 5.9 to 16.6 by varying the number of both PDMS and PEG units. In general, it was found that co-oligomers of low MW or intermediate hydrophilicity significantly reduced fibroblast proliferation. A linear relationship between down-regulation of fibroblast proliferation, and the ratio HLB/MW was observed at concentrations of 0.1 and 1.0 wt % of the oligomers. This enabled the structures with highest efficiency to be determined. These results suggest the possible use of the PEG-PDMS-PEG block co-oligomers as an alternative to silicone gels for hypertrophic scar remediation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A 16 y.o. fully ambulant boy born to consanguineous Indian parents, presented for assessment of a fragility femoral neck fracture sustained against a background of autism and moderately severe intellectual disability. He had a past history of infantile eczema, and epilepsy treated with anticonvulsants from 2 to 10 years of age, with no further seizures following cessation of anticonvulsants. He had a thin body habitus (see Table 1) with long fingers and a high arched palate. He had no speech and negligible social interaction, but physical examination was otherwise unremarkable. Positive investigations revealed an undetectable serum creatinine and a urinary metabolic screen which showed an elevated GUA:Phe of 160 (< 36) and a decreased creatinine of 0.3 mmol/l (1.2–29.5) consistent with the diagnosis of guanidinoacetate methyltransferase(GAMT) deficiency. He was commenced on oral creatine 5 g three times daily. Despite improvement in physical activity, height and bone density, there was no discernable improvement in his intellectual functioning. Proton and phosphorous brain and leg magnetic resonance spectroscopy(MRS) was performed at baseline and showed an increased inorganic phosphorus peak and decreased phosphocreatine synthesis in brain and decreased creatine concentration in muscle. Following creatine treatment total brain creatine(1H-MRS) and phosphocreatine/ATP ratio (31P-MRS) content increased to 30% and 60% of control values, respectively. Brain GUA returned to normal levels.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite the significant health benefits attributed to breastfeeding, rates in countries, such as Australia, continue to remain static or to decline. Typically, the tangible support offered for women to support breastfeeding behaviours takes the form of face-to-face advice from health professionals, peer counselling via not-for-profit organizations such as the ABA, and provision of information through websites, pamphlets, and books. Prior research indicates that face-to-face support is more effective than telephone contact (Britton, McCormic, Renfrew, Wade, & King, 2009). Given the increasing costs associated with the provision of personalized face-to-face professional support and the need for some women to maximize privacy, discretion, and judgment-free consultations, there is a gap that could be filled by the use of m-technologies such as text messaging and other social media. The research team developed MumBubConnect; a two-way SMS system which combined the personalized aspects of face-to-face contact but maintained levels of privacy. The use of SMS was immediate, portable, and overcame many of the barriers associated with embarrassment. An Page 205 of 312 online survey of 130 breastfeeding mothers indicated that MumBubConnect facilitated the seeking of social support using m-technology, increased self-efficacy and maintained the desire behaviour.